Wednesday, July 31, 2019

Wal-Mart Scandal

New York Times reporter David Barstow uncovered a shocking story against retail giant, Wal-Mart. His investigation started after Wal-Mart shut down its internal investigation over the possible bribery of Mexican officials. Wal-Mart used these bribes to accelerate growth in their Mexican zoning areas. These allegations surfaced when a Hispanic lawyer contacted Wal-Mart headquarters in Bentonville Arkansas. This lawyer had inside information on Wal-Mart’s bribes, as he represented them in their acts. He was used as a middle man for Wal-Mart’s payoffs to these officials.Wal-Mart took action in defending its image. In 2005 the company launched an internal investigation that dug into the operations of Wal-Mart de Mexico. The reports put together obvious signs that the company had, in fact been bribing the city officials to open up zoning areas and to swiftly create building permits. These bribes reported to total above $24 million. Wal-Mart’s lead investigator had thi s to say after the investigation was conducted, â€Å"There is reasonable suspicion to believe that Mexican and USA laws have been violated. When Wal-Mart’s leaders were faced with the decision to continue the investigation, they gave it to Wal-Mart de Mexico to investigate; it was shut down. Wal-Mart didn’t notify Mexican or American law enforcement with the information and none of these wrong doings were brought to the public eye until the publication of Barstow’s article. Wal-Mart would obviously face critical examination by the public if the allegations were true; reasoning behind closing the investigation. Wal-Mart told the justice department that the investigation was unnecessary and the cases were minor where they did occur.The Time’s had a view in their investigation as they found substantial evidence supporting the bribes taking place. It’s believed that these bribes were the jump start Wal-Mart needed to gain its huge standing in Mexican society. 1 in 5 Wal-Mart’s are located in Mexico. The Times interviewed Sergio Cicero Zapata, who resigned from Wal-Mart de Mexico in 2004. Cicero told them of personal instances of him giving lawyers envelopes of money to pay off government officials. Cicero said that he had done these deals for years while working for Wal-Mart. Along with the information they received from Mr.Cicero, the times also found government documents with evidence of payoffs. These documents showed that within days of the money being given to the lawyers the permits were granted. The Times have published new stories exposing the company further with deeper information that they have gained through their investigation. Some of the information includes: * Wal-Mart pays $341,000 to officials in Mexico City to build a Sam’s club. The building was put in a densely populated area, and was done without a construction license, or an environmental permit or and urban impact assessment, or a traffic p ermit. Wal-Mart bribes officials to build â€Å"a vast refrigerated distribution center in an environmentally fragile flood basin north of Mexico City in an area where electricity is so scarce that many smaller developers turned away. † The bribe for this case was $765,000. * A zoning situation in Teotihuacan caused Wal-Mart to make a payment of $52,000 to enable them to build a store near a famous pyramid site. The citizens were enraged by the location of the store but the protests were ignored and the Wal-Mart was built.The mayor of Teotihuacan spent $77,000 buying and renovating a ranch the next year. Unexpected on a $47,000 yearly salary. * There have also been reports of Wal-Mart building on ancient ruin sites. They have been obtaining the permits to do so illegally. Now that the statements have been made public, Wal-Mart de Mexico has been under investigation by the U. S. and Mexican governments. The leadership is questionable within both Wal-Mart and Wal-Mart de Mexico . The high members of Wal-Mart de Mexico made a choice to shut down the investigation to cover up their tracks.The consequences of being discovered breaking the law to this extreme would put a huge chip on all of the Wal-Mart leaders’ shoulders. The growth of their business is also at stake. Apparently these bribes played a major role in the expansion of Wal-Marts across Mexico. The leaders located in Arkansas will more than likely be held accountable for irresponsible actions as well. If the allegations are true they could be found out for knowing about the illegal bribes. Ethical issues do not look good for leaders; it can dramatically impact the way the company is viewed.The actions of Wal-Mart making deals in Mexico could greatly affect the way the company is viewed and its overall standing to the public. With the investigation still ongoing it has yet to be clear what leaders at Wal-Mart are tied to the bribes in Mexico but it is undoubted by the New York Times that ther e are several people accountable for the actions. It is also possible that Wal-Mart has been doing this in other countries as well, but will only be confirmed when and if the government can obtain the information they need to prove wrong doing against Wal-Mart. Works Cited City. David Barstow; Alejandra Xanic Von Bertrab And James C. Mckinley Jr. Contributed Reporting From Mexico. â€Å"Vast Mexico Bribery Case Hushed Up by Wal-Mart After Top-Level Struggle. †Ã‚  The New York Times. 22 Apr. 2012. The New York Times. 04 Mar. 2013 . Radcliffe, Dana. â€Å"Leadership Lessons From Wal-Mart's Bribery Scandal. †Ã‚  The Huffington Post. 16 July 2012. TheHuffingtonPost. com. 04 Mar. 2013 .

Tuesday, July 30, 2019

Most Violated School Policies Essay

â€Å"The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women.† (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years’ rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a person’s hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a person’s hand and measure the complexity of the vein patterns within that person’s hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate use r. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific person’s DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a person’s child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR & SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled â€Å"individual odor theory.† This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular user’s voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a person’s typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a person’s particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical system’s ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a person’s actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality , every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesn’t have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR & SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a person’s voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a person’s handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the system’s objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the system’s intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric system’s technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the system’s accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a person’s identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individual’s identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate user’s existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original user’s biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individual’s movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse user’s biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware & software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a system’s failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Children’s Clearinghouse: A West Virginia based organization entitled Missing Children’s Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. â€Å"Prisons Use Biometrics to Manage Methadone.† * Germain, Jack M., Sept. 11, 2003. â€Å"Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. â€Å"Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. â€Å"Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. â€Å"Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. â€Å"Biometrics. * Tilton, Catherine J., Feb. 2006. â€Å"The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. â€Å"Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63&sec=&spon=&pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124&Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf >. * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 >.

Monday, July 29, 2019

A report on dry bulk shipping

A report on dry bulk shipping Shipping is indubitably one of the fascinating industries in the world. It requires vast knowledge and skill to cop up with the day to day operations because of the complexity of the industry and its dependence on world economics. Dry Bulk ships carry dry cargoes in bulk from one port to another and can be categorised into handysize,  handymax,  panamax,  capesize, and very large bulk and ore carriers according to their sizes. The performance of the bulk shipping market depends on the demand for and supply of bulk shipping services, as well as the characteristics of the market structure. The importance of shipping cycle in case of dry bulk carrier is that they plays a vital part in the economics of shipping industry by managing the investment risk in an industry ,where there is large uncertainty about the future (Stopford,2009) Section 1 Literature Review One of the major aspects affecting the future of dry bulk shipping is the quality and the safety perspective. Nominal freig ht differentiation between ‘quality’ and ‘other’ tonnage has been observed occasionally and much services has been paid to promoting the need for younger and safer ships (Tamvakis  and Thanopoulou,2000) Another factor that can influence maritime flows of dry bulk commodity is seasonality patterns .Spot rates for bigger vessels shows higher seasonal variations compared to smaller vessels, although differences in seasonal fluctuations between sectors are removed as the contract duration increases.   (Kavussanos and Alizadeh,2001) Investing in shipping industry has an entirely new aspect by the introduction of private equity and the development of a hedging strategy, now this can be treated as a portfolio optimization problem. The freight futures provide a comparatively novel medium for hedging risk in  dry bulk  shipping markets. New uprising financial strategies in dry bulk shipping in future can revolutionize the entire market.( Cullinane,1995) Dura tion analysis done by Bijwaard G.E and Knapp.S provides an insight to the effectiveness of prolonging ship lives and the empirical data solidifies the idea about the life span of dry bulk carrier. Life span is an important aspect in predicting the ship cycle(Bijwaard and Knapp,2009)Scrapping of ship is done at a particular time and this is done when the ship is retired from the current use or when shipping cycle demands it. Gain and losses after the scrapping of a ship . entirely depends on the market condition. Demand of Dry bulk shipping is always related to the scrapping industry.(Knapp,2008) The Government is proposing that the UK’s CO2 emissions should fall by at least 80% by 2050 . Release of exhaust gases and particles from oceangoing  ships is an important and growing provider to the total emissions from the transportation sector. New strategies like slow steam, alternate fuel and new logistic approach like jumbo ore carriers etc will be used in future to make the s hipping sector more eco friendly(Eyring et al,2010) Research Hypothesis Marine flow of dry bulk goods in 2050 will be largely influenced on numerous factors and the background study done above concretes this statement. From the background study done above following hypothesis are made.

Sunday, July 28, 2019

The topic of the paper will focus on a criminal case that has been Research

The topic of the will focus on a criminal case that has been adjudicated by the United States Supreme Court and has implications on the criminal justice system - Research Paper Example Immediately the defendant is arrested, pretrial interviews and investigations are conducted by the prosecution. The defendant is then brought before the jury, where the judge informs him of the charges against him. The judge determines whether the defendant should be held in jail or released on conditions during the first appearance (â€Å"Supreme Court of the United States,† 2010). Before the actual trial, the defendant goes into a plea to the charges in a hearing referred to as an arraignment. During the arraignment, if the defendant pleads â€Å"guilty† then he awaits to be sentenced, but if he pleads â€Å"not guilty† the defendant will stand trial. In the criminal cases, the burden of proof rests on the state. A perfect example of a criminal case is the case of Vincent Cullen v. Scott Lynn Pinholster. In 8th January 1982, Scott Pinholster Brown and Corona were accused of breaking into Kumar’s house in the night and viciously beating and killing two men who interrupted the burglary. The two victims killed were Kumar’s friends who arrived at the site, found out what was happening and threatened to call the police. However, before they could call the police, Pinholster attacked Beckett and Brown attacked Johnson stabbing them on the chest till death. As Corona was driving them away from the site, the two kept boosting how they had killed the victims and instructed corona not to speak about the robbery. At the apartment, they split the proceeds from the robbery and dispersed. Two weeks later, corona reported to the police and became the state’s first witness. Pinholster was arrested and charged with first degree murder. Pinholster refused to be defended and insisted that he would be his own witness. During the time in jail, the state mailed him informing him of the prosecution’s intent of using aggravating evidence against him in the trail (Hall, 1999). During the case, the court appointed Harry and Wilbur Dettmar to

Discussion Board Coursework Example | Topics and Well Written Essays - 500 words - 2

Discussion Board - Coursework Example However, the human resource management must make an informed decision pertaining to the award of discretional benefits. The early retirement of employees has merits and demerits to an organization. Therefore, the management must be certain that a decision taken will lead to benefit the organization. The move usually helps in the reduction of anxiety concerning post-employment benefits. Moreover, the initiative benefits the firm given that it spends fewer employees compare to post-retirement benefits. The payment for time not worked affords the employees time for sick leaves, vacations, holidays and bereavement time (Beam and MacFadden, 2010). The benefit is ideal given that it indirectly boosts the performance of the employees. Moreover, it also acts as a performance appraisal time. The work of the employees is reviewed while they are away; hence, the payment for time not worked is a benefit to the company. Additionally, the paid vacations provide the employees with time for rejuvena tion and reflection on their goals while working in the firm. The premium pay also motivates the employees because it is a direct compensation for working in adverse conditions and working for long hours. Therefore, discretionary benefits boost the performance appraisal of employees. Specialized insurance benefits are offered when the clients are faced with emergencies. The benefits enhance a client’s financial security and preparedness for future events. The employment insurance benefits help the clients who have lost their jobs inadvertently. Employees can lose their jobs due to many factors, including a shortage of work and massive layoffs especially during organizational restructuring exercise. According to McCall (2014), specialized insurance benefits are also awarded to the employees when they have no alternative pertaining to the job vacancies. Additionally, clients can be guaranteed outpatient care when the insurance benefits pertaining to health care

Saturday, July 27, 2019

International Business Essay Example | Topics and Well Written Essays - 3000 words - 14

International Business - Essay Example As the jobs of the first world make their way to the developing regions of the third world, the forces of globalization have had many unintended consequences. The loss of manufacturing jobs in the countries of the world and their movement to the lower paying developing â€Å"third world† has restructured the world economy. This brief assignment will explore the globalization phenomenon with an eye to outsourcing and the changes dynamics of the global economic community. Asking the question, what is protectionism and in which way does it affects International Business in the current economic crisis, we will analyze protectionism as the result of outsourcing. This analysis will utilize a case analysis and explore two countries which have embraced free trade and economic growth as a haven for outsourcing. China represents a unique blend of authoritarianism and capitalism leading to sustained and pronounced economic growth in one of the largest – and growing - economies in the world. Mexico represents a controversial source for many American jobs. In addition to a cross-comparative analysis of these outsourcing â€Å"source† countries, we will address criticisms of the globalization phenomenon including the rise of protectionism as a response to the flight of jobs overseas (Lee 1996; Bhagwati 2008). Globalization, as it exists today, rests largely on the shoulders of neoliberal economics and the global entrenchment of capitalism as the dominant economic system in the world. Neo-liberalism, the belief in laissez-faire economics, was best articulated by Margaret Thatcher in the United Kingdom and Ronald Reagan in the United States in the 1980s. Outsourcing is an integral component of the globalization phenomenon and a key aspect of the global division of labour. Thomas Friedman, in his immensely popular book The World is Flat (2005), describes outsourcing as an integral component of the worldwide spread of capitalism and the global division of

Friday, July 26, 2019

Gutai as critique of the traditional concept of Modernism Research Paper

Gutai as critique of the traditional concept of Modernism - Research Paper Example This damage and destruction took place in the course of centuries and it was described as the beauty of decay. I believe this concept is valid in many people’s imaginations today and by looking into the artworks of the Gutai movements it becomes evident this technique expressed the true art. In the modern art world, it seems to be very difficult to understand the relationship between society and art. Gutai was one of the movements that took place in Japan after the post-war chaotic situation. This movement had specific intentions and purposes which is why it is the most important art movement of this time. This art movement has many characteristics which make it relevant in the media art today. ‘Electric Dress’ was a work by Tanaka which helps in examining and understanding the current media art in Japan (Berghuis 21). The work of Tanaka was remarkable and revolutionary which still holds importance. It was in 1945 after the World War II that the Japanese society h ad come under desperation and chaos. It was then when the artists tried to bring a revolutionary movement which would promote different art works and activities to make a new world. Yoshihara declared that the liberal position of the people was the most important thing which was conveyed through the medium of art. The liberal position of the people who were currently living in the desperation and chaotic time was focused because they believed that the freedom is the main source for human development. The art movement described the position of the people as free. Thus, the main idea behind this movement was to bring out the reality of the society and overcome the situation (Tiampo 84). Tanaka was an artist involved in the Gutai movement and she produced the ‘Electric Dress’ which was stage clothes. The concept was that she changed her clothes frequently during the performance and the colours of the dress were bright and blinking from the electric light bulbs. This showed the attractive beauty from the light bulbs which the human hand could not create. This was the time after which the stage performances became more attractive and pleasing to the audience’s view. Tanaka worked with bringing the newest technology to application by experimenting and using the electric media to promote her artistic work. Her work and skill leaves a huge impression on the Western arts and to the modern arts. However, despite such efforts, Tanaka did not receive appreciation by the Japanese art scene because of her highly skilful work for the newly started art movement. I believe that Tanaka’s efforts left a mark on the art world and even though it was later recognized and encouraged, initially it was seen as a threat to the traditional modernization. The Gutai movement had new and different ideas because all the members of the movement were young artists, who were raised under traditional values of religion and spiritual importance. These artists knew the artistic traditions of Japan but through this movement they decided to completely overrule the past attempts and approaches. Their vision towards this movement was rather different. They aimed to create a relationship between art, body, space and time. The Gutai movement was a revolutionary movement and it started in Japan almost ten years after the World War II had ended. The roots of the Gutai movement

Thursday, July 25, 2019

Criminal Evidence Essay Example | Topics and Well Written Essays - 3000 words

Criminal Evidence - Essay Example The leading case in this area was R v Leatham 1where Crompton J famously remarked 'it matters not how you get it, if you steal it even, it would be admissible in evidence'.2 There were common law rules which allowed the judges to have the discretion to exclude evidence3 at a criminal trial, if this would jeopardise the position of the defendant.4.The standard of reasonableness to be exercised in this regard was that of the "Wednesbury" criteria.5 .Thus the position under common law was that illegally obtained evidence was admissible, given that it was credible, relevant and did not cause adverse inferences to be drawn against the accused.6 The PACE 1984 came into effect in January 1986 and brought changes to the common law position. The main section 78 7of PACE 1984 codified and consolidated the previous common law position.8 However the later body of case law that developed tended to discard the common law approach and develop an entirely new approach to the section, yet the court has not yet given an exhaustive set of guidelines for the section due to the different facts of each case.9Most of the early case law in this regard involved the exclusion of unfairly procured confessions although the position before the PACE 1984 had been very much the same.10 The position in the cases of r... misconduct by the police authorities in the cases of real evidence.11However the court showed some caution in cases involving Alcohol and DNA tests as there was a likelihood of the rigging of such evidence.12In the very controversial case of R v Nathaniel13 the court excluded the evidence of a blood sample of rapist taken four years ago which was promised by the police to be destroyed given that he was not convicted. They tried to use the sample again to convict him four years later but the court excluded this evidence and Lord Taylor CJ made it clear for the court, 'To allow that blood sample to be used in evidence at a trial four years after the alleged offences when the sample had been retained in breach of statutory duty and in breach of the undertakings to the defendant must, in our view, have had an adverse effect on the fairness of the trial. It should not in our view have been admitted.' This case has been followed wherever evidence has been retained in breach of s 64 (3B) of PACE in later cases of rape, murder and theft. For example in the case of Regina v Weir14 the accused was being charged of brutal murder on the basis of very convincing DNA samples which were obtained in breach of s64 (3B) of PACE and thereby the conviction of the defendant was quashed.. Recently however, in the Attorney General's Reference No. 3 of 199915 the House of Lords expressed dissatisfaction with this judgement and regretted not having convicted the accused despite the heavy amount of evidence involved. The Court said that " It must be borne in mind that respect for the privacy of defendants is not the only value at stake. The purpose of the criminal law is to permit everyone to go about their daily lives without fear of harm to person or property. And it is in the

Wednesday, July 24, 2019

Climate change Essay Example | Topics and Well Written Essays - 3000 words

Climate change - Essay Example e glacial formation, which results into movements of the tectonic plates, overwarming and shifting of the ocean beaches and levels (Wlicock, & Hudson 17). A number of catastrophic events have continued to occur because of the climate changes causing devastating damages in properties and lives across the world. These include the Katrina, the earthquakes in different parts of the world, the tsunamis along the beaches of Asian continent and among other events (Wlicock, & Hudson 17). These events have created an urgent need for different world bodies to develop frameworks to mitigate on the causes and develop approaches that can reduce its impacts across the globe. A number of protocols have been ratified by different conventions and most of these are geared towards pushing countries into adopting safe practices that reduces climate change. In this paper, the topic of climate change will be critically evaluated to develop a proper basis of the causes, the impacts and mitigation measures adopted across the world. The paper will also discuss the conventions ratified among them the Kyoto Protocol among others that have aimed to reduce the im pacts of climate change (Scafetta 6). Climate scientists as the major causes of climate change have advanced a number of activities and most of these events are attributed to carefree human activities. On s superficial analysis, climate change can be seen as a situation caused by increased solar energy and radiations from the sun reaching the biosphere and earth surface (Wlicock, & Hudson 17). The movement of such solar energy is dispersed across the globe by oceanic currents, monsoon winds among other means. Climate change causes have been categorized into two classes with the major contributing class being the human causes. The other category of climate change that has remained relatively above human control is the natural causes, mostly resulting from long lasting human activities (Wlicock, & Hudson 19). Greenhouse gas remains

Tuesday, July 23, 2019

Price of gold Essay Example | Topics and Well Written Essays - 750 words

Price of gold - Essay Example The world market has seen a sharp rise in need of keeping wealth in the form of gold. The increase in demand by business persons and central banks in different regions requires an increase in supply of gold. The demand has not been met with similar supply because of constant factors in the supply chain. The suppliers of gold are not increasing their mining capacities in purchasing additional machineries or identifying new mines. The rise in demand with no rise in supply eventually leads to sharp increase in the prices of gold (Wise 2012). The rises in prices can persist for two years before the supply matches up with the demand through an increase in supply. Different factors make the market supply of gold inelastic limiting on supply capacity of miners. Gold mining is an expensive undertaking that needs investors to put a lot of resource in building crushing and drilling machineries. The massive investment cannot be made in a short time to meet the enormous demand in the market lead ing to a constant supply being made no matter the increase in demand of product in the market. Increase in supply can be made through long-term investment that can extend to 10 years before production begins. The inability of suppliers to respond to forces of demand leaves the market volatility high. The huge numbers of speculators in the market contributes volatility in gold prices. ... The supplier will increase prices because they cannot meet the large demand in the market. The increase in supply price can get to 11% increase with regard to the increase in demand. Announcement of huge releases of gold to the market in large quantity on prediction prices will remain high leads to reduction in prices (Thomas, 2012). The large amount supply with no increase in demand means sharp decreases in prices sometimes totaling to 5% decrease from previous day’s prices. The world gold supply from recycling vendors has seen sharp decrease. People selling their gold ware during the global economic crisis caused the decrease. Statistic have shown recycling supply used to cater for 45% of the world market in 2008. In 2011 recycling source of gold contributed 2% of the world gold supply which was a small proportion compared to the previous 45% supply. The fall in the amount of recycled gold available in the market with demand increase has led to prices increases. This leaves the supply from the mines to cater for 98% of all the demands. Lack of ability by the miners to cater for the 98%has contributed to the volatility leading to a sharp increase in prices of gold (Jeff, 2012). The central banks from different countries were key suppliers of gold to the markets. The banks released large amounts of their gold to the market without making purchases to replenish the dwindling stocks. The exhaustion of gold in their bulk meant that the different countries bank start purchasing the gold in competition with the retail purchasers. The purchasing of gold by the central bank increases demand while their lack of ability to supply creates shortage (BBC, 2011). The two forces of demand and supply lead

The Sinking of the Aragon Essay Example for Free

The Sinking of the Aragon Essay With the outbreak of world one war the royal mail moved its home port to Newport, South Wales. However the Brittish government was in dire need of battle ships to strengthen their naval force. Many ships were converted from simply postal delivery vessels into war ready troop carrying ships. One of these ships was the Aragon The Aragon built in harland and wolf in Belfast was 9588 tons and could carry 306 first class 66 second class and 632 third class passengers. It was launched on the 23rd of Febuary 1905. The following information was gathered from an unsigned letter written by an officer of the Aragon to a Mr.  John William Hannay the father of a VAD on board the Aragon on her way to serve in palestine and Egypt. For two weeks the Aragon laid at anchor in the shelter of the harbour at Marseilles. Every day they would await sailing orders. At last they recieved orders and the ship, set sail. It set of in company with another transporter ship called the Nile and also with an escort of destroyers. On board there was 160 nursing sisters, 150 military officers, 2200 troops and the ships own officers and crew. In total there was 2700 poeople on board the Aragon. One of these men was my great grand uncle Thomas Cassin who was an Irish man and inlisted as a British solider. Along with the thousands of people on board ready to serve there was also 2500 bags of Christmas destined for Egypt. From Marseilles they set sail to Malta in safety. However There was some fierce weather and the sea became quite heavy. Many became sick. Miss Hannay the VAD nurse being sick for just one day. They arrived at the windy bay in Malta on the 23rd of December where they remained for four days until the 27th. They spent their Christmass holidays here in safety. On the fourth day they set out to sail again still in the company of the NIle and a fresh escort of destroyers. There were three destroyers in number, two of which were Japanese and the other British. They arrived near their destination, Alexandria Egypt, on the 30th of December in the morning. The port was just becoming visible to the naked eye on the horizion. Everyone was very excited to reach shore and every vantage point on the boat was filled with eager passengers looking on ward at the port. Many had packed their luggage and were already attired for disembarkation. It was heard that many were congradulating themselves on a safe voyage. The Aragon with the British destroyer Attack was entering the channel that leads to the port. They were already past the first buoy which indicated entrance into the channel. At this point a wireless message was intercepted from trawlers in the channels that there were mines further on. The Attack, being the senior ship, imediately signalled to the Aragon to follow them as they turned seawards. The trawelers which were there to direct the ships through the channel were doing the same and retreating. The Aragon had to keep well away from the buoy that they had already passed by when entering the port. Unkown to both the Aragon and the Attack there was a German submarine lurking in the depths of the waters right beside the buoy. It was unable to fire before because of the close proximity of the ship, if they did they would have endangered their own submarine. However now that the Aragon was turning seawards, she presented a perfect target for the Germans who took full advantage. The officers of the Aragon on duty on the bridge saw the periscope of the submarine and at the next instant the wake of a torpedo which was heading straight for the ship. In a desperate effort for surrvival the passengers and crew tried to turn the ship to avoid the torpedo but this was to no avail as the ship was quite slow. The explosion was a dull crashing blast and the ship shuddered violently. An officer who was on duty at the time was covered in glass as all the windows on the boat shattered. In the next instant the ship became aware to the fact that they had all been dreading. Everyone on board was at their sations in record time, orders were obeyed with precision. The first order given was the rescue of every sister. They were lowered into the rescue boats before doing anything else. This only took a few minutes and was carried out without a hitch. The boats they got on were the best in the ship and in a position to afford greatest possible facility for getting off. The Aragon sent a call for assitance to the shore and recieved a reply within seconds. By the time the sisters ships had got clear, the ship had taken a heavy list to starboard and had sunk deep astern. It remained like this for a few minutes. The Destroyer took this time to run up along side and the remaing passengers were ordered to get off. They managed to do this by attaching ropes from the Aragon to the Destoryer Attack. On other parts of the ship troops were ordered to take water as the rafts were let loose. In just moments the sea was full of struggling men. Many of the officers and troops were trying to get the remaining life boats into the water but they had become jammed by the list. The crew could now feel her sinking fast. It had become impossible to stand upon the deck. It was about fifteen minutes after the inicial explosion. The commander gave the order every man for himself! . There was a rush to get over the side of the boat but nowhere was there any sign of panic. The discipline was astounding as the troops clung on to each other, singing and cheering until they reached the water level. Then they broke into struggling masses. Then it was heard shes going and the Aragon began to sink rapidly astern. The Destroyer was still at rescue work but only one rope remained. One officer was trying to cross when they finally cut the remaining rope. He was thrown into the water between the two ships. He sank like a stone because his full uniform restricted him to swim. However he still managed to get to the surface and make his way onto the Destroyer. The Attack was full of both injured and dying. The Aragon was sinking rapidly, one could hear a roar of rushing water and smashing of internal fittings. Dozens of men still clung to the decks and at the last moment jumping into the water rather than be sucked under along with the ship. Many of their efforts for survial were futile as with the height that the bow had been raised because the ship had turned whilst it was sinking, they died on impact with the water. With a great surge, a roar of rushing water and the explosion of the ships boilers the Aragon was no more and it went beneath the surface. There was now silence over the men. The place where the ship once was, was now replaced by struggling men clinging to upturned boats and wreckage. The Destroyer was now alive with activity. As they attempted to move ahead to the safety of the harbour with all their injured on board, one man shouted and screamed and next instant there was a terrible explosion. The Destroyer was hit by another torpedo. The middle of the Destroyer had been smashed sending men flying into the air. OIl, fumes, splinters of wood and steel were sent in every direction. She broke into two halves and began to sink immedietly. Both the bow and the stern rising into the air as the middle(wher the torpedo hit) sank rapidly. Everyone jumped for the water. It was chaos around the remains of the destroyer. The only hope left for survival was two trawlers which were near at hand. Except for the trawlers the only rescue boats were the rafts from the Aragon which were already on their way to shore. Only wreckage and struggling men remained in the water, everything else had disappeared. However the rafts did an ecellent job, bringing hundreads to the trawlers near by. Other trawlers became visable on the horizon as the rushed at full speed towars the wreckage. However as the port was 80 miles away it took them some time to arrive and many men perished in this time. The temperature of the water was very cold and this contributed to some of the deaths. It took the trawlers an hour to reach the men but without them few would have survived. The VAD sisters who were the first to leave the Aragon arrived on shore at arround 2:30pm. It wasnt untill 4:30pm when the trawlers with the wounded and survivours arrived. The people on the shore were ready for them when they arrived and the wounded were rushed to hospital. In conclusion the Aragon was torpedoed 8 miles from Alexandria Egypt at 11am on Sunday December 30th 1917 and sank in twenty minutes. The escort for the Aragon the British Destroyer The Attack was also torpedoed about 5 minutes later. It took between 5 to 7 minutes to sink. The other transport ship The Nile with two Japanese destroyer escorts left the Aragon at day break, the day of the attack. They also came under submarine attack but managed to reach their destination safely. My great uncle unfortunately perished that day. It was hard for an Irish man to join the Brittish army. I imagine he would have recieved a lot of criticism for doing so, but he did what he thought was right. He fought with the allies and aggainst evil and for that my family is very proud of him.

Monday, July 22, 2019

Garnier Report Essay Example for Free

Garnier Report Essay †¢The first Garnier product was made by Alfred Garnier in 1904, a hair tonic. The full company name, Laboratories Garnier, originated in the 1920s as a producer of haircare products made with organic ingredients. Garnier continues that mission today, as all of its products are made with natural ingredients. The LOreal Group has owned Garnier since 1965. LOreal †¢LOreal, based in France and the United States, has been in operation since 1909. It now owns five divisions including Garnier. LOreal has a focus on research, especially studies in sustainable development, with research centers on three continents. Products †¢Garnier currently has three product lines: Fructis, Nutrisse and Nutritionist. Fructis, started in 1996, is the Garner line of haircare and styling products. Nutrisse, Garniers hair color line released in 2002, was originally called Natea when it debuted in 1998. Natea wasnt as successful in the United States as in Europe, hence the name change. Garnier started selling Nutritionist, its skincare product line, in 2005. Innovation †¢Besides introducing Alfred Garniers hair tonic in 1904, when people still used soap on their hair, Garnier has been the first to produce sun-care items (in 1936) and the first to make a permanent home hair color (in 1960). Today Garnier is the number-one brand in Europe using natural ingredients. Research †¢Garnier exemplifies LOreals emphasis on scientific study. Research for Garnier goes through four stages at one of LOreals sixteen research centers. Then Garnier conducts clinical studies and consumer studies before releasing the product, as well as surveys afterward Garnier uses scientifically proven, natural ingredients to promote optimum hair health and let inner beauty shine through. The Garnier Fructis hair care line and Garnier Fructis Style products, allow women of all hair types to get the gorgeous locks they want. Garnier products have garnered prestigious beauty awards from top magazines like Allure, Health Magazine, More Magazine, CosmoGirl!, and Cosmopolitan. The brand is also a sponsor of Project Runway and models of this popular reality show strut the catwalk with styles powered by Garnier products.

Sunday, July 21, 2019

Marketing Strategy of Big Bazaar India

Marketing Strategy of Big Bazaar India In this assignment, I have described its marketing strategies and promotional activities. The assignment is based on the effective marketing strategy which influences customer to purchase a product of Big Bazaar helps to understand the effect of marketing strategy which is responsible for attracting customer towards big bazaar. The research was carried out as per the steps of Marketing Research. The well supportive objectives were set for the study. To meet the objectives primary research was undertaken. The data collection approach adopted was experimental research. Big Bazaar is the fastest growing and most successful Retail chain in India. Big bazaar is the first retail chain to be started in India and is the largest until now. In the later part of the assignment I have applied 4Ps marketing strategy to show that how Big Bazaar has reached from introduction stage to growth stage and observed via some points that this company is right now in growth stage of Product Life Cycle model. I have also analyzed the SWOT showing how this company made its brand more effective. I have also described some suggestions to improve its brand image towards customers. Contents INTRODUCTION: BIG BAZAAR is a name renowned in Retail. It is now a brand image in private retail sector. Wal-Mart is the retail stores of USA and is known all over the world for its fashionable and affordable materials and is known as one of the best in its field, big bazaar can be said as the Wal-Mart of India running a chain of more than 100 retail stores in India. People around the country thinks that big bazaar is inspired from Wal-Mart and it is quite obvious to think as Wal-Mart is world leading chain of retail shopping but actually the idea of big bazaar came to the CEO Kishore Biyanifrom a 25 years old store Saravana which was owned by a family and worked on the philosophy of low margin high turnover. Following its slogan of isse sasta or achha kahin nahi(Meaning cannot find cheaper and better than this anywhere) it provides the consumer with the best of the materials at a rate less than rest of the market. Big bazaar is the subsidiary of Future Group, Pantaloons Retail India ltd. The brain behind big bazaar is the CEO of Future Group Mr. Kishore Biyani Future group is has various brands like Pantaloons, F123, Copper Chimney, Etam, Staples, One Mobile, Urbana, Brand Factory, LootMart, HomeTown and Central. Big bazaar covers all parts of India including the metro cities Kolkata, Delhi, Chennai, and Mumbai. Big bazaar started with its first store in Kolkata, west Bengal in 2001 and now owns more than 100 stores all over India making itself the fastest growing retail chain in India and leaving all its competitors behind. WHY BIG BAZAAR? Indian retail sector is witnessing one of the most hectic Marketing activities of all times. The companies are fighting to win the hearts of customer. There is always a first mover advantage in an upcoming sector. This advantage goes to BIG BAZAAR in India. It has brought about many changes in the buying behavior of people as Big Bazaar provides all items in one roof at low rates. The consumers preferences are changing they are moving from shops stores to Modern Retail outlet. Its the main challenge to the Modern retail outlets to attract the customers towards them from that of competitors. To attract more customers companies have to carry out the promotional activities in unique way. BIG BAZAAR has maintained that uniqueness has succeeded in attracting customers. The promotional activity of the company, which famous as Less Price than others as it saysNobody Sells Cheaper and Better!is made its place in minds of customer. As the competition is becoming stiff in the market the activities conducted by the company are unique, that have brought fruitful result to the company. Among them sales Promotions is one of the leading activity or unique among all other activities has high influence on the customer walk-in. OBJECTIVES: To know the effective marketing strategy which influence customer to purchase a product of Big Bazaar. To know the marketing and promotional strategy of big bazaar. How Big Bazaar Establish and maintain its position in retailing through promotion. LITERATURE REVIEW: RELATED CASE STUDY: A lot of case studies have been done before on this topic and its different aspects as my focus is on leading towards success through the low cost strategy which is followed by big bazaar, one of them is described below: Building brand through challenge: In 2001, PRIL opened its first Big Bazaar, a 30,000 square feet store in Kolkata. The major USP of the Big Bazaar, store was low pricing. These stores offered the best price proposition to customers. As part of this, the stores focused less on branded items and more on unbranded products with the same quality as branded ones, at a much cheaper rate. Commenting on this, Biyani said, We are not in the business of selling ambience, but in the business of giving the best possible deals to our consumers. The first Food Bazaar was set up in Lower Parel in suburban Mumbai in 2001. Food Bazaars represent PRILs foray into yet another value retailing business, focusing on food and grocery products. These stores were designed based on PRILs understanding of the emotional and rational needs of Indian housewives The tremendous success of the Pantaloons, Big Bazaar and Food Bazaar retailing formats, easily made PRIL, the #1 retailer in India by the early 2004, in terms of turnover and retail area occupied by its outlets. In the fiscal year ended June 30, 2003, PRIL increased its retail area by 66% to 586,000 sq. ft and reported revenues of Rs 4.45 billion, a 56% increase over fiscal 2002. Its net profits rose by 63% to Rs. 114.1 million in fiscal 2002-03, over the previous year. Big Bazaar has positioned itself as a value for money proposition for Indian family retail store. They wanted to promote Big Bazaar as a retail store which gives its customers maximum advantage over other retail stores by catering to all their needs budget wise and income level wise. Sabse Saste 3 Din'(the cheapest 3 days) brain child ofMr. Sadashiv Nayak, President Big Bazaar and Rajan Malhotra, President Strategy and Convergence, Big Bazaar, believe that Consumers are always looking for best value for their money. Big Bazaars Sabse Saste 3 Din is a great opportunity for them to save money and gets best products at the best possible prices. These three days have come to truly signify freedom from high prices for consumers in the country. Maha Bachat ( save money) was introduced five years back ( in the year 2006 ) and it is still running very successfully. It is known as one of Indias mega shopping campaign. Continuing its efforts to provide the best shopping deals and savings to Indian consumers, Big Bazaar is always set to make Republic Day and Independence Days shopping, truly memorable, with rock bottom prices, best possible discounts and mega offers. Apart from the flagship Big Bazaar and Food Bazaar stores, other future group retail formats like Furniture Bazaar, Electronic Bazaar, Depot, and Home Bazaar stores are also a part of this mega campaign. From daily household needs of food and grocery to apparels, RETAIL INDUSTRY IN INDIA: India has one of the largest numbers of retail outlets in the world. Of the 12 million retail outlets present in the country, nearly 5 million sell food and related products. Thought the market has been dominated by unorganized players, the entry of domestic and international organized players is set to change the scenario. Organized retail segment has been growing at a blistering pace, exceeding all previous estimates. According to a study by Deloitte Haskins and Sells, organized retail has increased its share from 5 % of total retail sales in 2006 to 8 % in 2007. The fastest growing segments have been the wholesale cash and carry stores (150%) followed by supermarkets (100%) and hypermarkets (75-80%). Further, it estimates the organized segment to account for 25 per cent ofthe total sales by 2011. India retail industry is the largest industry in India, with an employment of around 8% and contributing to over 10% of the countrys GDP. Retail industry in India is expected to rise 25% yearly being driven by strong income growth, changing life styles, and favorable demographic patterns. It is expected that by 2016 modern retail industry in India will be worth US$ 175 -200 billion. India retail industry is one of the fastest growing industries with revenue expected in 2007 to amount US$320 billion and is increasing at a rate of 5% yearly. A further increase of 7-8% is expected in the industry of retail in India by growth in consumerism in urban areas, rising incomes, and a steep rise in rural consumption. It has further been predicted that the retailing industry in India will amount to US$21.5 billion by 2010 from the current size of US$ 7.5 billion. Shopping in India has witnessed a revolution with the change in the consumer buying behavior and the whole format of shopping also altering. Industry of retail in India which has become modern can be seen from the fact that there are multi- stored malls, huge shopping centers, and sprawling complexes which offer food, shopping, and entertainment all under the same roof. India retail industry is progressingwell and for this to continue retailers as well as the Indian government will have to make a combined effort. 4PS OF MARKETING: Marketing is the promotion of products, especially advertising branding. Marketing practice tends to be seen as a creative industry, which includes advertising, distribution and selling. Marketing mix is a deciding factor in formulating marketing techniques for the success of a particular brand, commodity or company. The components of marketing mix are: Product Price Place Promotion http://marketingroi.robinsonmaites.com/wp-content/uploads/2010/01/4ps.gif Source: http://notesdesk.com/notes/marketing/the-marketing-mix-4-ps-of-marketing/ PRODUCT: Big Bazaar offers the maximum variety for every category of product. The product is the same in every store in the city but the brand options are more in Big Bazaar and the quantity for each product is not limited to large packs only. The commodities sold by the retail chain includes its own products which get a ready distribution network. The own products of Big Bazaar include My World fashion magazine which is not available anywhere else. So costs are very low for such products. PRICE: Price is the critical point in a competitive industry. Big Bazaar works on a low cost model. It considers its discounted price as its USP. There is an average discount of 6-8% on all items in respect to their MRP. Prices of products are low because it is able to secure stock directly from the manufacturer. There are huge synergies in terms of bulk purchasing, transportation and central warehousing. These all factors are very helpful for the retailers to keep low prices. PLACE: Place means the location of the business. Big Bazaar has always worked on cheap locations. It targets semi-urban population with its placement. Its strategy is to find a low-cost location and it never goes for hot spots in the city. It relied on promotional activities to make up for unattractive locations. Another strategy used by Big Bazaar to overcome location disadvantage is use of internet. It has launched a merchandise retailing website www.futurebazaar.com which targets high-end customers ready to use credit cards. The promotion of this website is done through advertisement on Google. The website is put as sponsored link. PROMOTION: Big Bazaar has huge promotion budgets. The biggest idea behind all advertisements is to make people do bulk shopping. There are 2 types of promotional strategies of big bazaar. One is the advertisement which promotes the brand and creates awareness towards people. It is not targeted at promoting each store but only creates an image of Big Bazaar as low-cost shopping option. The store has advertised through TV, road shows and also started reality show-typed promotional campaign The Big Bazaar Challenge. Promotions like Sabse Sasta Din(Cheapest Day) are a very successful strategy to get good results. In this products across categories such as furniture, electronics, utensils, apparels and food products at the lowest possible prices, coupled with attractive promotional schemes. Some of the most attractive offers being a 20-litre branded microwave oven with grill for Rs 2,399, jeans and trousers for Rs 199 and HCL laptops for Rs 22,800. Buy 2 Get 1 Free types of promotions are very common. Original prices are cut down and new prices are shown, of which customer takes quick notice. There are loyalty schemes which reward regular clients. CURRENT POSITIONING STRATEGY OF BIG BAZAAR: Big Bazaar is holding a strong position in the market and is growing very fast. It captures the maximum Indian market and with a strong financial background and it has to go a long way through. The low price strategy it is successfully running its business all over India and is still growing bigger and bigger. The following graph shows the Product Life Cycle of Big Bazaar which is currently at the growth stage. Source: http://www.coolavenues.com/know/mktg/ravi-big-bazaar-14.php Looking at the product life cycle of big bazaar it can be seen that it is in the growth stage at this point of time and still have a lot scope to grow. It is said that: Cheap prices are a luxury for the rich but a necessity or a need for the poor. So Big bazaar has understood the need of a vast population of the upper middle class and middle class people of the country and in fact no matter how rich a person is wherever he/she can get good brands at a cheaper rates they will be attracted towards it whether an average or a rich person. RETENTION STRATEGY: Big Bazaar strive to foster a feeling of well-being in their employees through care and respect, Big Bazaar have several structured processes including employee mentoring and grievance management programmers which are intended to facilitate a friendly and cohesive organization culture. Off -site activities are encouraged to improve interpersonal relationship. Big Bazaar also acknowledge the efforts exerted by their employees by organization an annual celebration called Pantaloon Day where Big Bazaar recognize employees who have shown exceptional talent, sincerity and dedication. Big Bazaar have implemented an employee suggestion programme called Prerna wherein the employee can give their suggestions. Every quarter the best suggestion received per zone per format is awarded prize called Golden Cap. BIG BAZAARS NEW MARKETING STRATEGY: Big Bazaar has launched new marketing strategy which is based on Guerrilla Marketing. Guerrilla marketing warfare strategies are a type of marketing warfare strategy designed to wear-down the enemy by a long series of minor attacks, using principles of surprise and hit-and-run tactics. Attack, retreat, hide, then do it again and again, until the competitor moves on to other markets. Guerrilla force is divided into small groups that selectively attack the target at its weak points. In the world of cut throat competition, corporate use extension of the same strategy in marketing. Corporate like Pepsi, Coke etc have been using the same for quite some time now and the latest entrant is our very own Future Group- Big Bazaar, Future Bazaar, Pantaloons, e Zone are all part of this group and they are taking on the biggies like Shoppers Stop, Lifestyle, and Tatas Westside. In order to do the same, Future Group have come up with 3 catchy and cheeky ad campaigns which surely do catch our eyes a nd surely one cant resist appreciating the same. ADVERTISING: THE ESSENTIAL OF BRAND BUILDING PROCESS- Advertising is an essential component of brand building. The advertisement and brand building is done through various ways, the techniques used are: Tag-line:Big Bazaar tag-lines are the key components of advertising. These tag-lines are modified according to demographic profile of customers. These catch-phrases appeared on hoardings and newspapers in every city where Big Bazaar was launched. Print Ads:Big Bazaar newspaper advertisements are present just before launch of any new scheme. TV Ads:Kishore Biyani spends a lot of money in brand building exercise. Big Bazaar commercials are shown on various channels in India. Presently, Fashion at Big Bazaar commercial is aired. Road-side Advertisements:Big Bazaar bill-boards are displayed on prime locations in various cities as a brand building exercise. They display the catch-phrases now-a-days. Radio Ads:This technique is used in cities like Sangli (Tier 1 / Tier 2 cities).Now-a-days, it is replaced by advertisements on FM channels. This informs customers about all new happenings at Big Bazaar. For example: The departmental store chain Big Bazaar has launched a commercial sometime back to promote The Great Exchange Offer. The commercial portrays how customers can exchange any old and broken items (junk) and get new products at a discounted price from Big Bazaar. Customer can get the amazing prices for junk. The month of January and February is generally a low-key affair in terms of customer footfalls and revenue generation. Innovative, out of the box promotions is one of the effective ways to draw customer attention and shore up the revenue. Historically Exchange schemes have been used to induce better sales; it also has a strong appeal with the Indian mindset of getting value even for their junk, states an official release from Big Bazaar. SWOT ANALYSIS: Strengths: Maximum number of varieties: People prefer those places where they can get the maximum products they need and Big Bazaar provides vast range of products under one roof helping in attracting customer and their family to shop together and enjoy the experience. High brand equity: Big Bazaar has created high brand equity through its promotions and marketing it has created a different image for its products as the cheap and best. Largest chain of retail marketing in India: Big Bazaar is the first retail chain to be started in India and is the largest and successful until now. High capacity investment: Big Bazaar offers 1,70,000 products and owns more than 100 retail stores all over India and has the strong financial background as being the subsidiary of future groups which owns the pantaloons which is one of the biggest the industries in mens wear in India and have its work is spread all over India. Future group is one of the leading groups in India. Everyday new promotions and schemes of low prices and discounts: Big Bazaar always offers new schemes of low prices and gives discounts in products like Big Bazaar offers the sabse saste 3 din ( the cheapest 3 days) in which it offers the lowest of prices than other days. Facilities like online booking and delivery of goods: It is not just a chain of retail shopping but also provides online shopping facility to the consumers. Weaknesses: Overcrowded: During offers, promotions and even on weekends the place is overcrowded with people and sometime even there is the situation of closing the store due to it. Checkout can be extremely slow: There can be seen a long queue on the billing counters making the consumer wait for hours due to the slow service and the crowd. Perception of low price=low quality: Generally people think that if any product has low price then the quality of the product will be low as they think quality comes with price. Targets at the middle class and upper middle class only: It targets at the middle and upper middle class due to which it ignores the upper and elite class people as they are the cream of the society who are ready to pay any price for the quality and product they need. Opportunities: Big Bazaar can enter into production of various products due to its in depth understanding of customers tastes andpreferences. Nowadays people prefer going to one big store and buy everything instead of visiting different places for different items and waste time. So Big Bazaar can expand the business in smaller cities as there is a lot of opportunity. Lot of potential inthe rural market. Threats: High business risk involved: Big Bazaar investment is very large so it is obvious that there is high business risk involved. Lot of competitors: There are a lot of countries which are planning to enter the Indian market like Wal-Mart, Carrefour and Tesco which is a big threat to Big Bazaar. Less Parking Space: Customers are not satisfied with the parking space availability provided by Big Bazaar. Hence its a threat of Big Bazaar as it may loose its customers because of less parking space availability. In holidays it will be very difficult for customers to park their vehicle in Big Bazaar. Unorganized retailing: Unorganized retail stores are a threat to the business of big bazaar as now also people prefer to go to the local stores which are convenient enough for them. COMPARITIVE ANALYSIS: BIG BAZAAR V/S VISHAL MEGA MART Vishal Mega Mart ( FOR DETAILS REFER APPENDIX) Fields Big bazaar Vishal mega mart Price Big Bazaar prices are very low because its adopt the low price marketing strategy. Vishal Mega Mart prices are not low because they give whatever is market price. Service Big Bazaar services are not quite good as billing problem due to crowd and less parking space. Vishal Mega Mart does not face these kind of problems as its not overcrowded. Ambience Product variety Big Bazaar has lots of variety in every category of products. In Big Bazaar people can find almost everything. Vishal Mega Mart dont have so much varieties as it is smaller than Big Bazaar. Convenience Big Bazaar has always worked in cheap location so that it is very convenient for the people to go to the Big Bazaar rather than going outer of the city. Vishal Mega Mart also works in low cost loacation but it is not so much popular in comparison of Big Bazaar as showrooms of Vishal Mega Mart are less than Big Bazaar. Shopping experience In Big Bazaar people can buy the maximum variety of products of every category under one roof helping in attracting customer and their family to shop together and enjoy the shopping experience. Vishal Mega Mart also provides the products under one roof but there is not so much varieties so that customers dont attract so they can not enjoy their shoppings Product quality The product quality is good in Big Bazaar because people can find cheap and best things in Big Bazaar. The product quality is also good in Vishal Mega Mart but the prices are very high. RECOMMENDATIONS: Big bazaar should keep offers in regular intervals so that there should not be a long term gap, because offer is the most influencing factor which is responsible for customer purchase decision. Big bazaar should start emphasizing more on internet shopping along with the formal retail shopping because a large population of the country likes to shop online in order to save time. Along with the different discounts and offers it should pay attention towards the students and provide some offers for them also because half of the Indian population is of youths and students. It should work on its billing counters and customer service in order to solve the problem of long queues and waiting customers. CONCLUSION: Big Bazaar is undoubtedly the number one retailer in India. It has built a very emotional and cordial relationship with its customers. It is also very intending to built long-term relationship with all its stakeholders, which is very essential for a successful business venture. It is observed that the organization hierarchy is professional as all the departmental Managers directly report to the store manager who in turn reports to the Zonal Head. Big Bazaar, with 25 years of experience in the field of weaving fabrics, is the leading Apparels and fashion design fabric company. There exist a healthy and positive relationship between employees and managers. The employees accept their responsibilities wholeheartedly, accept that it is their responsibilities to carry out a part of the activities of the company and they will be held accountable for the quality of their work. It is found that more than 60% of employees are of the age group of 20-35. Fromthis it reveals thatcompany is having young and energetic workforce who are very creative, enthusiastic and also very determined to grow in their career and in turn helping the company to grow. Working environmentis good and also the various facilities provided helps in motivating the employees. The company is reaching out to all the sections of the society as it is creating a hypermarket where not only the rich people shop but also the middle and the lower class customers come to enjoy the whole shopping experience. Moreover the customer friendly ambiance and the organized retailing of products also make Big Bazaar one of the successful retail industries in India. REFRENCES: Abhay, 2008. Big Bazaar. [Online] Available at: http://ekikrat.in/Big-Bazaar [Accessed 23 March 2011]. Admin, 2009. Marketing Mix. [Online] Available at: http://notesdesk.com/notes/marketing/the-marketing-mix-4-ps-of-marketing/ [Accessed 18 March 2011]. Berry, T., 2008. How to Perform SWOT Analysis. PaloAltoSoftware,Inc. Bhasin, R., n.d. Big Bazaar Case Analysis. [Online] Available at: http://www.slideshare.net/pushpa14/big-bazaar-case-analysis [Accessed 29 March 2011]. Bhatia, H., 2010. Big Bazaar. [Online] Available at: http://business.mapsofindia.com/india-retail-industry/companies-growth/big-bazar.html [Accessed 21 March 2011]. Cook, S., 2011. Big Bazaar India. [Online] Available at: http://goindia.about.com/od/shopping/gr/big-bazaar.htm [Accessed 20 March 2011]. FutureBazaar.com, 2010. Future Bazaar India Ltd. [Online] Available at: http://bigbazaar.futurebazaar.com [Accessed 24 March 2011]. Group, F., 2008. Future Group. [Online] Available at: http://www.futuregroup.in/home.asp [Accessed 22 March 2011]. Gupta, N., 2010. Big Bazaar Maha Bachat. [Online] Available at: http://www.indiasummary.com/2010/08/11/big-bazaar-5-days-maha-bachat-sale-from-big-bazaar-india-august-2010-for-independence-day/ [Accessed 25 March 2011]. Kotler, P., n.d. In Marketing Management. 12th ed. Kumar, V., 2010. Promotional Strategy of Big Bazaar Maintaining the image in Retailing. [Online] Available at: http://www.skylinecollege.com/blog/dissertation/promotional-strategy-of-big-bazaar-maintaining-the-image-in-retailing [Accessed 19 March 2011]. Malhotra, R., 2008. Big Bazaar Indias Real Retail Story. [Online] Available at: http://www.moneycontrol.com/news/business/big-bazaar-%E2%80%93-india%E2%80%99s-real-retail-story_358768.html [Accessed 26 March 2011]. Mital, D., 2010. Big Bazaar: a Review. [Online] Available at: http://www.chillibreeze.com/articles/Big-Bazaar.asp [Accessed 27 March 2011]. Rakesh, 2011. Big Bazaar. [Online] Available at: http://www.pantaloonretail.in/fashion-bigbazaar.asp [Accessed 20 March 2011]. Raman, A. Winig, L., 2006. Big Bazaar. Harvard Business Review, p.23. Rao, V.S.R., 2010. Big Bazaar. [Online] Available at: http://www.citeman.com/11184-big-bazaar/ [Accessed 28 March 2011]. Sankar, M., 2009. Big Bazaar The hypermarket. [Online] Available at: http://articles.besttofind.com/a-1462/business--finance/big-bazaar-the-hypermarket.html [Accessed 26 March 2011]. Sumesh, 2008. Sasta Shopping. [Online] Available at: http://www.sastashopping.com/search.aspx?search=big-bazaarallwords=true [Accessed 25 March 2011].