Friday, November 29, 2019

Youth Unemployment in the UK

Unemployment is a macro-economic situation whereby people are ready to work at the current wage rate but because of the prevailing factors of production are not in a position to get placement.Advertising We will write a custom essay sample on Youth Unemployment in the UK specifically for you for only $16.05 $11/page Learn More International Labour Organization defines unemployed people as those who are aged over 16 years and are willing to work and have actively sought employment during the previous four weeks and do not have any paid job. There are various types of unemployment namely: Cyclical unemployment, Frictional unemployment, Structural unemployment, Seasonal unemployment, Voluntary unemployment and under employment (Seymour 2005). Cyclical Unemployment is a type of unemployment, which occurs because of decline in Gross Domestic Product (GDP) especially during periods of contraction/recession or any period when the economy fails to operate at its potential. It is controllable thus receives a lot of attention from macro-economic policy analysts. Additionally, it is characterised by temporary suspension without pay due to reduced demand of goods or services they produce and has to last for a period of seven consecutive days (Seymour 2005). Frictional Unemployment is unemployment resulting from people leaving jobs that they do not like and are searching for new employment or people whom either entering or re-entering the labour force to search for a job. Time lapses between separation and discovery of new job. Structural Unemployment represents unemployment caused by permanent shifts in the pattern of demand for goods or services or changes in technology. This requires the employees to undergo training or move to other locations to find new jobs (Seymour 2005). Seasonal Unemployment is a type of unemployment, which is caused by seasonal conditions affecting specific factors. For example, the agricultural sector is dependent on rainwater. Hence, during periods of good rains there will be high economic activities creating jobs while during periods of dry season there will massive unemployment due to less economic activities. Voluntary Unemployment is unemployment by choice experienced in most of the developed countries. This happens because of the unemployment benefits given by the UK government thus encouraging most youths to look for highly paying jobs. Therefore, in the short-run most of them remain unemployed. Such decisions by most youth have led to increased level of youth unemployment in UK (UK National Statistics).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Underemployment; under normal circumstances people are supposed to work for 6-8 hours a day. Therefore, if an individual works for less than six hours then they are underemployed. This is because the talent or effort is not fully utilized. It can a lso occur when an individual is working in a sector where their skills are underutilized (Seymour 2005). Most of the youth in UK are either working fewer hours such as part time while others work in sectors where their skills are underutilized (BBC News). Unemployment rate measures the unemployment level. It is the proportion of economically energetic people who do not have jobs (i.e. number of people who are unemployed divided by number of those who are in paid jobs or employed, excluding those who are economically inactive from both numerator and denominators) (UK National Statistics). Statistics of Youth Unemployment in UK Economists and the government have carried out several researches over the years about the youth unemployment rate in the UK. According to Labour Force Survey (LFS), youth unemployment rate in the year 2004 rose from 12% to 15% in the year 2008 (BBC News). The number of unemployed youth between the age of sixteen and twenty five years has risen in the current r ecession by over 4% since 2008 and then by over 5% in the year 2010. This means that the unemployment rate for people aged 16-24 years is now triple the rate for older people. The rate of unemployment for individuals over 25 years have also followed similar trajectory since 2004. Therefore, the unemployment rate for people over 25 years in 2010 was still lower than that in the early 1990 (BBC News). The Office for National Statistics (ONS) says that the unemployed youth aged 16-24 has risen more than one million, which is the highest for 15 years. The total number of people unemployed is 2.62 million, which is the highest since 1994 according to ONS. The youth have borne the effect of economic slowdown. Thus, out of the 2.62 million, 1.02 million are youth aged between 16 and 24 according to survey carried between July and September last year (HRM Guide 2012). This has led to people claiming job seekers allowance to rise by 5300 to 1.6 million last month according to ONS. The ONS sa ys that this is the highest rate since they adopted the comparable method in 1992 despite the slight change in basis of calculation (HRM Guide 2012). The Institute for Public Policy Research statistics have shown that the unemployment rate of youth aged 18 is 18.5% for boys and 15.3% for girls (HRM Guide 2012). This is the highest rate they have ever witnessed in the UK. It is attributable to the current euro crisis. According to Lord Stevens, the official statistics of the unemployment rate of the youth hit the one million mark for the first time thus more than a fifth of people aged 16 to 24 years do not have jobs (HRM Guide 2012).Advertising We will write a custom essay sample on Youth Unemployment in the UK specifically for you for only $16.05 $11/page Learn More Causes of Youth Unemployment in the UK Financial Crisis of 2007-2010 The financial crisis that began in the United States caused by the bubble burst in the real estate industry affected sev eral banks .It spread across Europe since most of the banks affected were multinationals with operations across Europe. This led to economic slowdown in the economy of UK. Thus, most of the firms scaled down there production capacity. Consequentially, employers are forced to lay off some workers or were not hiring any more employees (Ruhm 2000). The effect of such circumstances has led to the rise of rate of unemployment among the youth since they are continuously completing colleges and are unable to secure employment (HRM Guide 2012). The Cuts in the Public Sector The government has been reducing its spending over the years. The reduction in public sector spending leads to decreased demand of certain goods and services since the government is the biggest consumer in an economy. Therefore, due to the decrease in demand, the production sector has to reduce its production. Thus, some people become redundant leading to sacking. Some of the firms also stop hiring new staff or reduce th e number of people employed compared to when the factors of production were being fully utilized. Therefore, the cuts in public spending have led to increased unemployment rate of the youth over the recent years (HRM Guide 2012). Immigration from European Union Since the integration of the UK in the European Union, people are free to move from one member state to another. This encouraged many people to migrate from other member states to UK in such for employment or business purposes. This has led to reduction of summer jobs that were available to university students from UK since most of the jobs go to the immigrants from other member states. Hence, such factors have led to the rise of the number of youth who are unable to secure paid jobs (UK National Statistics). Lack of Required Qualifications Researchers have link the lack of jobs by youths to their poor performance there studies such as in GCSE English and Maths. Most of the students have also not been able to proceed with the ir studies to acquire the necessary professional qualifications required in the job market thus unable to secure employment. This is attributable to laziness from the part of the students to work hard in their academics. The support groups in conjunction with the relevant government sectors have been working hard to ensure the students work towards achieving the relevant qualifications required in the job market.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Influx of Goods from Euro Zone After the UK joined, the European Union this allowed non-restrictive trade between member states. Such an agreement has led to the rise of goods exported to UK therefore increasing competition. This has resulted in the decrease in the demand for UK goods thus the decrease in the productivity of UK firms. They have resulted in lying down of workers and reduction in number of people employed. Therefore, this is one of the major contributions in the rise of level of youth unemployment in the UK. Higher Taxation The taxation rate in UK is high such that the cost of production is high. This leads to decreased demand of products thus firms end up retrenching some of the redundant workers. Effects of Youth Unemployment in UK Increase in Crime The youth would need money for consumption for clothing, food or shelter and since they do not have paid job they feel frustrated and start blaming the society for their misfortunes, hence they end up resulting to crimin al activities to get money. Lord Stevens acknowledged this when he said that unemployed youth would fuel disorder in the streets since dissatisfied youth lack hope for the future. He said disorder like the one experienced last year is evidence of the disquiet of youth due to lack of employment (Poverty Site 2012). Increased Chances of Workers Experiencing Unemployment in Adulthood The continued rise in the rate of youth unemployment increases the probability of a worker experiencing unemployment in his adulthood. The result of this the rise of number of people unemployed thus leading to increase of people claiming job seekers allowance which an increase in government expenditure in terms of transfers which is not healthy for the economy (Poverty Site 2012). Loss of Productivity The youth are the most active people in the society therefore when they are not employed statistics show that this equates to 10 million pounds a day of lost productivity. This translates to a direct cost of unemployed youth of close to 5 Billion pounds annually. Such statistics are worrying since this is a lot of potential wasted. The high levels of unemployment lead to too many people being idle thus high loss of productivity in the overall economy (Poverty Site 2012). Increase in Dependency Levels The rise of levels of youth unemployment has led to high levels in dependant population since they need basic human needs but do not have any source of income. Therefore, the rise in unemployment has increased the number of people depending on the government allowances for job seekers thus increasing the government expenditure. Responses Replacement of Future Jobs Fund with Apprenticeship Scheme The labour Party government initiated the Future Jobs Fund policy. It aimed at creating jobs in the future for the youth. The Conservative –Liberal Democrat coalition government viewed this not to very effective method to address the menace of youth unemployment. It replaced it with the curre nt policy of apprenticeship scheme whereby the youths attached to organizations where they will be working under skilled workers thus they end up acquiring necessary skills. This policy will be more effective in solving the youth unemployment problem than the future jobs fund. Overhaul of Schools Career Guidance The Recruitment and Employment Confederation have proposed an overhaul of the school’s career guidance to encourage students to work hard to acquire the necessary skills for job employment. This encourages students to achieve the necessary professional qualifications necessary for employment. Such policy will lead to students being prepared to join the apprenticeship scheme thus improving the level of youth employment. Scrapping of National Minimum wage Dominic Raab called for the scrapping of National Minimum Wage for the 16-21 year olds people thus increasing the level of youth employment. The minimum national wage is a hurdle to organizations since they incur certa in expenditure thus they end up being limited on the number of employees employed. Therefore, the scrapping of the minimum wage will lead to firms employing more people thus reducing the level of unemployment (Poverty Site 2012). Entrepreneurship Encouraged The government and non-governmental organizations have been implementing programmes that instil entrepreneurship skills in people. Such programmes have led to an increase in the level of people who are self-employed. This has led to rise of people who are self-employed in the UK over the years. It has been a very effective method of addressing the problem of youth unemployment (The Guardian 2012). Reference List BBC News, Economy Tracker. Web. HRM Guide 2012, UK Unemployment: Labour Market Statistics. Web. Poverty Site 2012, Youth Adult Unemployment. Web. Ruhm, C. 2000, Are Recessions Good for Your Health. Quarterly Journal of Economics, 115(2): 617–650. Seymour E. H. 2005, The New Economics: Keynes’ Influence on Th eory and Public Policy. London: Kessinger Publishing. The Guardian, Unemployment and Employment Statistics. Web. UK National Statistics, Guide to Unemployment. Web. This essay on Youth Unemployment in the UK was written and submitted by user Juan Shepherd to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Humorous Fathers Day Quotes

Humorous Fathers Day Quotes Looking for humorous quotes about fathers? Here are some funny Fathers Day quotes. These quotes reflect the subtle wit with a touch of sarcasm. Poke your dad with your own brand of humor. What fathers love most is a relaxed holiday in the company of their kids. Your father may seem broody on other days, but with a touch of tender love, watch your dad turn into a giant candy-dispensing, singing and laughing, happy old man. Humor is the best way to reach out. It can soothe hurt feelings, calm tempers, and build strong relationships. Share a joke with your dad and watch his lips curve into a sly smile. Tickle him further with more jokes, quips,  and quotes. Read him funny verses or funny Fathers Day sayings to bring out the chuckles. Once  the floodgates open, you will find a very different father beneath the veil of sobriety. Funny Fathers Day Quotes Red ButtonsNever raise your hand to your kids. It leaves your groin unprotected. Jimmy Piersal, on How to Diaper a BabySpread the diaper in the position of the diamond with you at bat. Then, fold second base down to home and set the baby on the pitchers mound. Put first base and third together, bring up home plate and pin the three together. Of course, in case of rain, you gotta call the game and start all over again. Ernest HemingwayTo be a successful father, theres one absolute rule: when you have a kid, dont look at it for the first two years. Phyllis McGinleyThe thing to remember about fathers is... theyre men. A girl has to keep it in mind: They are dragon-seekers, bent on improbable rescues. Scratch any father, you find someone chock-full of qualms and romantic terrors, believing change is a threat, like your first shoes with heels on, like your first bicycle... John AubreySir Walter, being strangely surprised and put out of his countenance at so great a table, gives his son a damned blow over the face. His son, as rude as he was, would not strike his father, but strikes over the face the gentleman that sat next to him and said, Box about: twill come to my father anon. James BaldwinIf the relationship of father to son could really be reduced to biology, the whole earth would blaze with the glory of fathers and sons. Helen HayesWhen Charles first saw our child Mary, he said all the proper things for a new father. He looked upon the poor little red thing and blurted, Shes more beautiful than the Brooklyn Bridge. Peter De VriesMy father hated radio and he could not wait for television to be invented so that he could hate that too. Robert OrbenLife was a lot simpler when what we honored was father and mother rather than all major credit cards.

Thursday, November 21, 2019

Interwar Essay Example | Topics and Well Written Essays - 750 words

Interwar - Essay Example Everybody concentrated on war, which subsequently bred mistrust among countries thereby paralyzing conducive relationships for business. Such precarious times discouraged effective economic activities resulting in a number of world economic disasters. One such disaster was the Great Depression; countries had concentrated all their efforts on the war. Countries had spent billions of dollars purchasing firearms and in the training soldiers, nobody at such times considered the economic repercussions of the exorbitant military spending that the world’s major economies such as the United States of American and the Soviet Union had undertaken. It is only after the war that the countries realized that they had spent more on military at the expense of other sectors of the economy. Furthermore, the war had bred unfriendly relationship between the countries. The regional alignment of countries resulted in the East locking themselves away from the Wets thereby curtailing all business rel ationships between the countries. ... â€Å"Before the war, while most European countries had acquired the constitutional governing systems of some kind, many of these were actually far from being actual democracies† (Martin 312).This implied that the countries had weaker economies and could not possibly afford the cost of the war. However, their participation on the war were inevitable and most countries invested larger amounts of both financial and human resources on the war at the expense of the economy. Combining the political instability of such countries to the implications of the war therefore resulted in a chaotic and unsustainable economic system thereby resulting in the great depression. The First World War lasted for three years a period within which minimal economic activity took place. The world took place in several battlegrounds such as Japan, Italy and Germany and in a number of countries within the Soviet Union. During the wars, such regions therefore became inaccessible and unconducive for any ec onomic activity such as either agriculture or trade. Furthermore, the concern of most governments was on how to save the civilians some of who were dying from the effects of the war and hunger. Three years without a reliable economic activity was likely to bear serious consequences on the countries including those not directly affected by the war. Countries therefore resorted to radical economic policies in the period preceding the war in an attempt to uplift their dwindling economies. The USSR for example implemented a five year plan through which it sought to revamp its economic power and in so doing alleviate the living standards of its people. â€Å"The party

Wednesday, November 20, 2019

The relationship between Entrepreneurship and Economic Growth Coursework

The relationship between Entrepreneurship and Economic Growth - Coursework Example In the modern business world, an entrepreneur can be defined by a number of definitions based on past empirical analytics & researches - an innovator, a leader, a manager, owner of an enterprise, coordinator of economic resources, resource manager, provider of capital, improvement of service levels, enhanced image of the economy on a global platter, and so on. But above all, fundamentally an entrepreneur is the person who has the guts to start and run a business as per the ideas generated by innovations. Entrepreneurs impact the local economies by increasing the diversity, invoking competition, creating jobs, managing social empowerment & practicing Change Agentry, increasing tax revenues, improving existing products & services, etc. and hence overall value adding to the economic performance, productivity and internationalization of the nation. A simple model of the relationship between entrepreneurship and economic growth is presented in the figure below (Figure 1): Figure 1: A simple model showing relationship between Entrepreneurship and Regional Economic Growth (Source: Gleave, Bill Dr. University of Essex. 2007) Entrepreneurs are expected to generate new ideas by virtue of innovations which may comprise of: 1 (a) Introduction of a new product (b) Introduction of a new technology (c) Introduction of a new methodology of production (d) Opening a new business potential & market in the region which has remained untouched largely (e) Discovery of a new source of supply of raw materials, support & services (f) Building a new organization system with innovative business model (g) Create new profit opportunities These opportunities lead to overall... An innovative entrepreneur is expected to possess high-risk appetite when starting a venture. Intelligent entrepreneurs clearly understand the correlation between risk & uncertainty which can be calculated by applying known probabilities and impacts. Knowing the dynamics, the entrepreneurs shall take calculated risks into account to bear the uncertainty of production & trade – the payoff is the profit earned by the entrepreneur which forms the primary motive anyway. A venture capitalist plays the role of trusting the risk appetite of an entrepreneur and funding him/her to help in transitioning the ideas into action thus forming good performing start-ups. A country having an effective framework of capitalists (Banks, Financial Institutions, Private lenders, etc.) ensures better development of entrepreneurship thus boosting the economic growth. This paper critically evaluates the correlation between Entrepreneurship and Economic Growth and the corresponding factors prevalent in the region influencing this relationship both on the positive as well as negative sides. Also, this paper intends to look at what measures of entrepreneurship are being used and discover whether the measures are appropriate. 4 Bosma, Neils and Harding, Rebecca. Global Entrepreneurship Monitor – 2006 Summary Report. Global Entrepreneurship Research Consortium (GERA). 2007. The subsequent section presents research question proposed herewith in order to establish a clear direction to the evaluation of literature and the corresponding data.

Monday, November 18, 2019

Developing YORKLAB HR strategy Essay Example | Topics and Well Written Essays - 3250 words

Developing YORKLAB HR strategy - Essay Example The company tries to retain its customers by ensuring timely delivery of goods which in turn enables to ascertain growth for the company throughout the year. Yorklab follows a flat organisational structure, which ensures a wide span of control with fewer level of management. The structure allows the company to be less costly, with less management levels. This structure will ensure a better and quick flow of decision within the organisation. Moreover, it will have a fast and clear communication of messages from the management ensuring timely and quality product. This structure helps the company to keep a proper track of the sales and the services provided. The HR policy of the company facilitates in employing people who have knowledge regarding the process and are friendly and ready to work in team. Satisfying the customer is the primary motive of the company and this is the core reason for the success of the organisation for years. The company is in the need to expand its business in to new areas of the market. In this context, the management realises that the current HR system or management structure will not be able to sustain the market growth. The HRM concept used is to bind the employees and the management to achieve the goal of the company. It entails the planning, controlling and organising the employees to add value to their service and achieve the desired objectives. In this regard, the objective of the paper is to explore the efficient structure requirement of the company, to mitigate the issue related with the market expansion. The upgraded HR strategies are required to be implemented by the Yorklab in order to attain profit and growth in the market. HR Strategy Content Human resource management is a strategic approach on managing employment and relation in order to achieve competitive advantage. The competitiveness of a business depends on the manager, employees and the knowledge and training provided. Yorklab in this regard followed the flat structu re of management, with a few number of employees and a wide span of control. This structure had various advantages such as the fast communication of information and quick decision regarding the process improvement. The fewer strata of management also help Yorklab to have a better recurrent communication between the higher level of authority and the staff. The purpose of the company is to expand its business keeping in view the quality and the level of customer satisfaction. This was not possible with the current flat HR strategy used by the company. As the level of guidance and coordination between the management and the employee was less there was no proper co-ordination. With the expansion of business, the current number of employee would not suffice the need of the company. With the increase in the business activities, the complexities would increase and the current flat structure would not support the requisite. The flat strategy with wider span of control renders less amount of time to focus on the individual decisions. This can thus be of a great disadvantage for taking significant strategic decisions which will have a long-term impact on Yorklab (Education-Portal,

Saturday, November 16, 2019

The Perimeter Network Security System Computer Science Essay

The Perimeter Network Security System Computer Science Essay As like in the real life, securing the borders are the first level of defense to protect the internal network of an organisation. The purpose of this report is to design a perimeter network security system that will provide security enhancement on the existing network infrastructure of Napier University. Network perimeter is an important line of defence in an enterprise network and every organisation has this perimeter network. Perimeter network is where the internal network meets the border network. The main security architecture using this potential area of the network is firewalling. Here this report discusses the egress and ingress filtering of packets by the firewall in order to let the bad traffic out of the perimeter and allow only the good traffic to trusted internal network. One of the core ideas behind the securing the network from outside threat is to develop and implement multiple overlapping layers of security solutions with different security components like Firewalls, VPN, IDS/P and Proxying. Though there are no single security solutions to protect the university network, multiple layers of perimeter security solution will provide maximum available protection from both outside and internal threats. (Watkins, 2011) The design considers hardening of network devices by striping down unnecessary protocols and services and manages the security perimeter from a management network for proper monitoring and mitigation. The main challenges to design and implement a perimeter security is to determine the proper firewall design, as Perimeter firewall and border routers are key components that decide the security to internal network. Most modern day attacks are happening in the Application layer and filtering in this top layer is extremely important for a successful security design. An enhanced packet inspection with proper monitoring and reporting is required throughout the end points of the network to block the malicious traffic from in and out of the network. There are number of ways and techniques involved in designing a perimeter security and this design proposes the specific solutions to the security threats in a campus wide network than in a highly complex enterprise network. 1 CSN11111 Perimeter Network Security System 10800584 RESEARCH AND DESIGN (25/ 1000 words) Security is not a product but a process. Network security depends on multiple components, policy and procedure to enforce the best practices on systems, people and infrastructure (Michael E. Whitman, 2009). The basic idea of information security is to protect the three fundamental components of information security that are Confidentiality, Integrity and Availability. Perimeter security design follows this principle to protect these components by using various security components. The design of the perimeter security depends on what resources need to be protected and the business need. SECURITY ARCHITECTURE The main design of the security architecture consists of segregating different zones in a network. These zones have different levels of security trust levels that allow or deny traffic. This layered architecture will provide the University to keep out of attackers (the term attacker is used in this report and not hacker, as an attacker is a hacker with a malicious intent and not all hackers are malicious intent). In the enterprise network, the network is divided generally into three zones and these are Border Network, Perimeter network and internal network. The perimeter security consists of border network and perimeter network as shown in the picture. Each of these considered as single entity against potential threats. In a network perimeter has many points where an effective security policy should be established. The network perimeter is the most important points of security against 2 CSN11111 Perimeter Network Security System 10800584 external threats. Many types of security can be implemented like packet filtering, intrusion detection systems/prevention and anomaly detection etc. Border Network Border network is the Internet facing zone via a border router (Edge router) that provides an initial layer of protection against all the starting point of attacks. It is most likely an IDP (Intrusion Detection and Prevention) System to be placed to create an extra layer of security. The border router will allow the traffic as per the Ingress and Egress filtering rules set on the router. Apart from protecting the outside threats these edge router and IDP also help to reduce the network load on the perimeter firewall by filtering spoofed traffic out of reaching to the perimeter firewall. Egress filtering helps to prevent specific types of traffic going out of the University that may be some confidential information or can an attacker plant traffic from a payload. A common rules used in the border router is to filter out the ICMP traffic to avoid the probing of network infrastructure. (Dailey, 2009) Perimeter Network Perimeter network sits in between the Border network and the trusted internal network often referred as DMZ. A Perimeter Firewall is the main component to filter the traffic to DMZ and passes the traffic to internal network. This firewall allows traffic from outside the network to servers like Web server or Email Server and also allows a limited access from the internal users. 3 CSN11111 Perimeter Network Security System 10800584 Perimeter firewall allows the filtered traffic to internal firewall where traffic is further scrutinised by the set of rules according the security policies of the organisation. These firewalls are commonly uses the stateful inspection technology where the states of legitimate traffics are stored in the firewall cache. Only traffic matching the states of the connection is allowed and others are dropped. REQUIREMENT ANALYSIS When designing a secure network there are number of factors are taken into considerations. Security is not just a technical issue but a business issue. The goal is to make sure a balanced approach towards the requirements in general. The general security requiement is to provide the services according to the CIA triad of the information security. Apart from these there are also factors like budget, existing infrastructure and scalability. Other factors also constitute the decision making of a proper design are reduce cost, employee productivity, avoid business down time, comply with industry standards etc. SECURITY THREATS This section discusses the better known attacks and the reason behind using perimeter security as first line of defense. Attacks can be devided into external attacks- coming from the internet and internal attacks- coming from the internal network. Information Gathering is the first method an attacker try to get the maximum informaiton about the network architecture. 4 CSN11111 Perimeter Network Security System 10800584 The external attacks are from the simple probing of the network to DoS( Denial of Service Attacks). An insider attack considers one of the major threats to any perimeter security design. These attacks may come from a mischievous user to a disgruntled employee who wanted to grab confidential information or to steal company secrets like financial data, personal information etc. A well configured internal firewall along along with the perimeter firewall can be the good level of defense against these attacks Other types of attacks inlcude intrusion packet sniffing, IP spoofing and DoS attacks that poses a direct threat to the organisation. Application layer security is one of the important design area to be take care of. Well known attacks like SQL injection are of these types. These exploits the known or unknown vulnerability on a web server or database server in order to gain the unauthorised access to the internal network. DESIGN The design of each of the security zones for the Napier University may be different but as whole these components acts together to provide a common goals by protecting the perimeter. It is important to understand where the perimeter of the network exists and what technologies are used against the threats. Perimeter security is handled by several different technologies including border router, firewalls, intrusion detection sytems and prevention systems, VPNs. Border Router The border router sits in the border or the edge of network where there is a direct interface to Internet. It acts like a traffic policeman, directs the traffic in or out of the network and also block the traffic which are not allowed to. The border router will do a NATing to provide this feature. This will give the outside network to probe the internal network. Although these routers are do not act like a firewall, it helps to protect the very first line of defense. Firewall 5 CSN11111 Perimeter Network Security System 10800584 A firewall is an active device that job is to permit or deny the data packets as per the rules set or the states of the connection. Perimeter firewall is the center point of defense against all the threat that coming to internal network. Firewall can be software based or hardware based hardned for the filtering of packets. The proposed perimeter security can be stand alone or multiple layers that combined with other security devices like IDS, IDP and VPN. A static filter firewall is the common and simplest firewalls. These firewal allow or block traffic based on the packet header. A perfect example is blocking of Spoofed IP traffic. The main advantage of this type is that I has a very fast throughput but the down side is this firewall block already established connection which may be malicious intent. On the other hand the stateful inspection firewall is the best way of defending the maliciuos attacks. Stateful inspection firewall keeps a copy of the state of each connection so that the traffic will be allowed or denied according the states in the state cache maintained in the firewall. The disadvantage of using this firewall is slow traffic coming out of the firewall as invidiual packets need to be verified and checked with the cache table. Another firewall which is effective against the application layer attacks are the Proxy firewalls. Since the most modern day attacks are pointed against the application protocols the stateful or stateful firewalls will not block the malicious traffic coming to/out of the network. A proxy firewall acts in the middle of the internet and private hosts and the proxy by acting on behalf of the host. The filtering rules are applied in the application layer. The ruleset or signature can be created according to the latest threats. Because of the huge number of traffic these firewalls considered the lowest throughput than any other firewall but top end in droping unwanted malicous application layer traffic. A web application filter and a spam filter are the example of a proxy firewall. DMZ A DeMilitarized Zone or DMZ is the separate zone from the perimeter firewall between the external network and trusted internal network. The public internet facing servers like Web servers, email servers are placed in this area because the DMZ is considered the the most sensitive area with high security stance. The firewall restrict the traffic in this zones in order to avoid the potential threats that may come into the internal 6 CSN11111 Perimeter Network Security System 10800584 network. The network inside this zone cannot initiate a session to the outside world unlcess it is a reply to an incoming connection. Intrusion Detection Systems (IDS)/ Prevention systems (IPS) An intrusion detection system or prevention system works in sync with the firewalls by providing a coming security goal of blocking unwanted traffic and notify any event that pop up in the network or host. IDS anlayse the packets for any suspicious activity and alerts the administrator. An IPS will prevent these activity by droping apart from the detection the same way IDS does. IDS and IPS have extensive rules set or singnatures of malicious activity which matches the incoming or outdoing traffic when in operation. One disadvantages with the IPS or IDS is that it may alert an legitimate traffic which considered false positive. A proper configuration of these devices is required in order to kept the false positive minimum as some times this will be a menace to handle too many logs with many thousands of false positives. A host based IDS also provide the security administrator with alerts against he malicious activity destined against a particular server like in Database server. VPN Virtual Private Nework (VPN) establish a secure remote connection to the private network by creating a secure virtual tunnel through the public untrusted network. VPN provides perimeter security by ecrypting the data in the tunnel and establish a secure connection over the internet. VPN considered to be the potential threat when an attacker comprise the tunnel as the traffic cannot be verified by the IDS or IPS because of the encrypted pakcets it uses for communication. An SSL VPN with an end-to-end VPN can be the best possible way to stay the attacker out of the network. A perimeter security design is incomplete without a proper firewall policy and an organisation wide security practices. For example if an administrator keep a weak password for these devices or any hosts in the network can nullify the entire effort put on designing a perimeter security. These security policy should also be applied to 7 CSN11111 Perimeter Network Security System 10800584 systems, and users as there needs to be a minimum level of secure access policy with proper Authentication, Autherisation and Authentication(AAA) methods. http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml Management Network Management and logging is the most important aspects of a perimeter security. This network has the high security stance as all the administrative access are controlled in the management network. An attacker can take direct access by accessing the management network. The traffic to management network to be encrypted to avoid any possible attack on the internal network. For example to access the IDS, ISP and or routers to be through a secure shell, or SSL, or a https access. Log monitoring is another important aspect of a perimeter security like keeping the IDS and IPS logs or firewall logs. Log files can help to identify the probable attack on the internal or malicious activity originating from the internal network. Another possible thing to do to harden all the security devices destined to do only services that (Convery, 2004). IMPLEMENTATION (20/ 800 words) Building a perimeter security system consists of bringing different security technologies explained in the previous topic; together for a common goal-to protect the internal network from external or internal threats. The router and firewall separate the public untrusted network from the internal network, the IDS/IPS monitors all traffic, and the VPN provides remote access. All of these components together form a defense in depth security in a perimeter. Figure xxx shows the outline prototype of the proposed design. 8 CSN11111 Perimeter Network Security System 10800584 authentication server-dmz One of the first best practices before the implementation is to develop a firewall policy. The policy mainly defines the security trust levels of each zone in the network and the flow of the data traffic. The flow of data traffic is one of core in implementing the organisation wide security technologies. Perimeter firewall is the centre point in this prototype. This firewall is a stateful inspection firewall and manages traffic from external and internal network. This firewall is a closed security stance by blocking all traffic except those required for the University network. 9 CSN11111 Perimeter Network Security System 10800584 The figure - above shows how the data flows through different layers of security first where the first line of defense is border router. This multiple layers of security filter the bad traffic in different layers in the network. The first level of defense is border router with a backup from the NIDS. This can be implemented by enabling basic packet filtering rules and Access Control Lists. Blocking the IP Spoofing and ICMP traffic are the examples. This outline NIDS will detect the any unknown behaviour in the traffic, which will be alerted to the administrator through management network. In some cases border router may not required as the perimeter firewall it self can handle the security threats but that depends on the business decision like cost and availability. Diagram for flow of trafficà ¢Ã¢â€š ¬Ã‚ ¦ As shown in the figure the data flow in the perimeter firewall. Perimeter firewalls allows or deny traffic as per the ingress and egress filter rules. Almost all the traffic coming to the internal network will be blocked by firewall and only allow as per the egress rules. The exception for this rule is for VPN clients and the VPN uses the encrypted tunnel and the VPN server is inbuilt in the Firewall itself. The Perimeter firewall also allows ingress traffic to DMZ zone but drop traffic originates from the webserver other than the reply to the already established connection. DMZ is the least trust level and this is why DMZ is isolated from other network zones. The internal network is allowed to access the Internet and Intranet through a proxy server in the DMZ zone. A web filtering software in the Proxy server can be implemented to filter out the unintended malicious URLs and links. The DMZ also has an inline NIPS in order to defend attacks against the application level threats like DoS attacks. The in line IPS behind the Perimeter firewall act like a sub-cop to check the malicious activity originating both from external and 10 CSN11111 Perimeter Network Security System 10800584 internal network. Internal threat may come from a disgruntled employee or a malicious traffic from a Trojan program or a zombie for a possible DDoS (Distributed Denial of Service) attack by a hacker (black hat off course!) harvested by using techniques like social engineering. The table explains the detailed egress and ingress rules on the Perimeter firewall. TRAFFIC TYPES INGRESS EGRESS ALLOW HTTP/S Request, DMZ Allow ICMP DMZ Deny Email (SMTP) Request DMZ Allow Email (Exchange RPC) DMZ Allow All Other Traffic DMZ Deny HTTP Reply DMZ Allow SMTP Reply DMZ Allow Exchange RPC Reply DMZ Allow All Other Traffic DMZ Deny ICMP (depends on policy) Internal Network Deny Remote VPN Connection Internal Network Allow All Other (Including from DMZ) Internal Network Deny Proxy Server (Port 8080)- Internet Internal Network Allow Email Server Access (DMZ) Internal Network Allow ICMP Internal Network Deny All Other Traffic Internal Network Deny Management network in the proposed diagram is one of the top security trust level where the management of all the security devices can be done. Log analysis, Secure tunnel access to routers, firewalls, IDS/P are all done in this network. The trusted servers in the internal network are protected with an internal packet filter firewall with only few of the protocols and ports are allowed. This will give the server farms with highest level of security. The staff and student networks are segregated with VLAN, as staffs should have access to student network but not vice versa. VLAN separate the traffic like a router and this will be important when considered in a University network. 11 CSN11111 Perimeter Network Security System 10800584 Both staffs and Students can have access to trusted servers through the internal firewalls. The NIDS is also monitor any suspicious event and alerted. The other Host based IDS and personal firewall in each of the workstations provides an extra layer of security. So the proposed design with a defense-in-depth can be implemented to enhance the existing infrastructure of the Napier. TESTING AND EVALUATION (25/ 1000 words) 12 CSN11111 Perimeter Network Security System 10800584 CONCLUSION (15/ 600 words) Unifiied threat management Appliance emerging cobbà ¢Ã¢â€š ¬Ã‚ ¦. One persons good enough is another persons never! Bandwidth for authentication is trivial in any case I can think of that doesnt include downloading extremely large biological mappings of the authentication target. As far as security measurements, I dont know what yard stick youre using, but strong on-host, per-host authentication works well when you have a trusted path, everything else is a usability or management compromise, I dont think Id tout them as security features. Placement of authentication server Placement of internal firewall. http://www.sans.org/reading_room/whitepapers/firewalls/achieving-defense-in-depth-internal-firewalls_797 he single, authenticated/anonymous, and individualized DMZ designs are all secure designs that provide the best protection for various network sizes. The single DMZ is respected for its simple design which separates itself from a private network. The authenticated/anonymous DMZ classifies servers and the data they protect in order to segregate servers that need strong access controls from the ones that do not. The 13 CSN11111 Perimeter Network Security System 10800584 individualized DMZ gives the greatest security for a mature network, but also has the highest setup and maintenance costs. All of these secure DMZ designs are susceptible to a poorly configured server which can allow a criminal access to a data store or worse, the entire private network. In a nutshell, theres no such thing as absolute security. How much you invest in firewalls should be a function of how much you have to lose if an attack is successful. (reword) You probably heard a number of so called security experts claim the perimeter is dead because it is not effective at blocking attacks. Nothing cluld be further from the trust. Its true that attacks have become far more complex. The concern is no longer simple port scans. What we need to do however is enhance our posture, not scrap useful technologies. To be fair however, its not just the perimeter that is having the problems with modern attacks vectors. Tools like metasploit have reduced the time of exploit development from days to minutes. Networks are being spear targested with Malware which goes undetected by their Antivirus software, in some cases for as long as two years. Attackers have figured out that they do need to completely defeat forensics, they just need to make it difficult enough that it is no longer cost effective in a CFOs eyes to fully analyse the comprosmised system. So the true problem is attack technology is advancing and we need to keep up. Sometimes this is finding new security technologies and sometimes its by retasking the ones we are already using. To draw a parallel, think of what has happened with the common automobile. 40+ years ago a tuner could tweak more power out of an engine with a simple toolkit from sears. Many of those old times tuners will tell you that engines are now too complex t work on. T o the modern tuner however who is willing to add things like OBD-II adapters and laptops to their toolki, the payoffs are huge. Power levels that used to equire huge V8 engines can be produced in tiny four cylinders with as much displacement as half gallono fmilk. 14 CSN11111 Perimeter Network Security System 10800584 https://ondemand.sans.org/b20080814/viewer.php?mode=2lo=7652moduleid=530 7pos=0hint=1#viewer Properly configured firewalls and border routers are the cornerstone for perimeter security The Internet and mobility increase security risks VPNs have exposed a destructive, pernicious entry point for viruses and worms in many organizations Traditional packet-filtering firewalls only block network ports and computer addresses Most modern attacks occur at the application layer 15 CSN11111 Perimeter Network Security System 10800584

Wednesday, November 13, 2019

The Rabies Virus and Treatment Essay -- Biology Medical Biomedical

Rabies Virus and Treatment Rabies is a virus that is characterized under the family name Rhabdoviridae and genus name Lyssavirus which travels to either the brain or the spinal cord, where it attacks a victim's nervous system until death occurs as discovered by Pasteur. It is rabies unique bullet-shaped body and tubular extensions, along with its specialized proteins that contribute to its deadliness. Aside from one case of rabies that occurred in 2004 in Wisconsin, rabies has proven fatal; there is no real treatment besides prevention. Vaccinations and precaution serve to be most effective pre-exposure, while post-exposure treatment can be a combination of respiratory and cardiac support, and intensive care. As part of the Rhabdovirus, Rabies is similar to 75 other viruses, but only closely related to 5, which are believed to have originated in Africa. Each year, around 7,000 cases of rabies are recorded according to an article for parents on Kids health website, but because of vaccinations, only one or two die. All, including Rabies virus, have a bullet shaped body accompanied by â€Å"bizarre elongated filaments V or Y shaped†(Kaplan, et al. 2). Once the rabid viruses infect the blood stream, they begin their migration to the brain where the virus begins to multiply effectively and abundantly in cerebral matter, producing defective interfering particles, as described in the book Rabies by Kaplan, Turner, and Warrell. Like many other viruses, rabies has an excellent way of transmitting itself, allowing it to be efficient-saliva. While it is true that simple UV rays found in the sun can kill the virus in a dead body laying around, as well as acidity and soaps, because organic matter like soaps are able to dissolve the virus’ out... ...y day, doctors look for new and more effective methods of treatment, looking for solutions in vaccinations and in the infamous G protein, but again, prevention is key. Works Cited Center for Disease Control. (2003). Rabies: The Virus. Retrieved July 19, 2006, from http://www.cdc.gov/ncidod/dvrd/rabies/the_virus/virus.htm. Center for Disease Control. (2004). Rabies Prevention and Control: General Questions. Retrieved July18, 2006, from http://www.cdc.gov/ncidod/dvrd/rabies/ques&ans/q&a_transplants_general.htm Faqs. (2005). Rabies. Retrieved July 19, 2006, from http://www.faqs.org/health/Sick-V4/Rabies.html Kids Health. (1995-2006). Infection: Rabies. Retrieved July 24, 2006, from http://www.kidshealth.org/parent/infections/bacterial_viral/rabies.html Kaplan, Colin, et al. Rabies. New York: Oxford University Press, 1986 Rabies. San Diego: Academic Press, 2002

Monday, November 11, 2019

Employee Handbook Essay

When employers are putting together the employee handbook, they need to include some legal issues that may apply when there are any disputes or how go along with some procedures. The handbook is used to familiarize the employees with the policies and procedures that are to be followed in the organization. Employers may include certain provisions that dictate how the employees may carry out certain activities without putting the employer’s business in jeopardy. The employers should ensure that they use the right language that will be later be interpreted by the employees in the right manner and that may not be violating employee organizational rights. Most employers ensure that the employee handbook has certain restrictions that prevent employees from sharing the employer’s confidential information with outsiders. Such information is not usually available to the public and if it happens that it is leaked out, it would cause some damages to their business. However, it is under the National Labor Relations act (NLRA) that the employees are free to discuss details about their compensation or conditions against which they have been employed with other people who are not part of the organization. The NLRB prohibits employers from giving policies of this nature. One of the Sections in the NLRA states that employees have a right to join or form unions or even be engaged in concerted activities. However another section states that there are unfair labor practices that may be faced by an employer if employees join or form these unions or engage in other concerted activities. There may be problematic employee organizational rights that are under the NRLA but the employers can draft them in such a way that they are lawful according to the Act. The employers may include some anti-union statements that may be used when employees engage in unfair labor practices. Whatever provisions are included in the handbook about legal considerations such as how the employer may violate the rights of the employees and generally how each party should conduct its activities without hurting each other. ETHICAL CONSIDERATIONS With many and different types of employees from different parts of a nation or even region, there is always a need for the employers to have certain considerations concerning the ethical culture of the organization. The ethical culture of an organization defines how the employees are to carry out all the operations in the organization. Employees are supposed to treat customers with much respect since they are the major source of profits for the organization. They are supposed to take care of the interests of the employers and at the same time take care of their own interests. These interests should not be in conflict since they depend on the employer and the employer also depends on their efforts. The ethical considerations may also involve how to pass information to their core workers or the line managers or even to the top management. They are supposed to use a certain communication channel that has been specified in the employee handbook. Communication is one of the important aspects in a business and therefore employers may consider this as one of the elements that determine the public image that they depict to the general public. Privacy is also a matter of ethical consideration whereby the employees are obligated to keep information about their employer to themselves and not discuss their terms and conditions of their employment. Each organization and employer will have their own considerations to include in the employee handbooks but they should conform to the Acts of the National Labor Relations Act. Roger K. G. , Bankovich, C. & Browning,J. (2005). What’s in Your Employee Handbook? Some Provisions May Be Harmful Rather Than Helpful Under the National Labor Relations Act. ASHHRA/IRI 24th Labor Activity Report. Papademetriou, L. (2003). Employee Handbook: We Scare Because We Care. London: Random House Publishers.

Saturday, November 9, 2019

The Cries of the Assimilated Native Americans Professor Ramos Blog

The Cries of the Assimilated Native Americans The colonists wanted to expand west into the territory of the Native Americans but they did not have plans to do this politely. In order to get the land, the colonists took desperate measures to accomplish their conquest leading to the cruel treatment of the Native American people. They began to assimilate the Native Americans in a number of ways like taking the young children to educate, setting them up in low jobs, sending them to war, and even trying to convert them to Christianity. Zitkala Sa writings Impression of an Indian Childhoodand â€Å"The Soft-Hearted Sioux† present examples of some of the ways that the Native American people were forced to conform to the ways of the colonists. The most common tactic used by the colonists in order to assimilate the young Native American children was to remove them from their tribes and educated them in boarding schools. In bothImpressions of an Indian Childhoodand â€Å"The Soft-Hearted Sioux† Sa writes about how each of the main characters are taken from their families to be educated among the ways of the colonists, ways that these Native Americans would be taken advantage of. Sarah L. Surface-Evans writes, â€Å"Federal Indian boarding schools were instituted †¦ to forcefully assimilate American Indian children into mainstream United States society† (Surface-Evans 1). The goal of these schools was â€Å"to strip American Indian children of their language, customs and religion,† (Surface-Evans 1). The colonists claimed to want to help and give the Native Americans better education by taking the children and giving them a better chance than what their parents had. In reality the children would be w orking low level jobs such as farming and other domestic labor (Surface-Evans 1). The children, once adults, would be working in the lower class for the colonists because the lower jobs were all they were taught to do. This was so that the Native Americans would remain under the control of the colonists and the colonists would receive low-cost labor. The Native American children were not being taught without bias. They were taught within their gender so that they learned from boarding school that â€Å"the boys performed the farm labor, providing milk, eggs, meat, and produce† while the â€Å"girls were trained in basic skills to work as domestic servants (sewing, cooking, and nursing)† (Surface-Evans 4). Because of this limited teaching, it was all they could do. The Native Americans would leave the schools without the equal education of the colonists limiting their jobs to farm worker and servant. This was done so that they could blend the Native Americans into the colonists’ society while keeping them in lower level class in poverty and the colonists keeping themselves at the higher-class paying jobs. Another example of a cruel strategies the colonists used to assimilate the Native Americans, was to use them as soldiers in the First World War. Chris Rein writes, â€Å"Indian allies service with the army became part of a larger campaign of assimilation and acculturation† this is because they were only thought of as power to win the war (Rein 1). The colonists did not care if the Native Americans lived or died in their aid to the war, they just saw them as more ammunition in the battle. After this war, in no time the Native Americans were so assimilated that they were said to be â€Å"indistinguishable from [the] countrymen in uniform† (Rein 1). This made the Native Americans even more so assimilated that when returning to their tribe they would be turned away but the colonists did not care if the â€Å"educated† Native Americans were no longer accepted by their tribes. These children, now adults are manipulated to do the work that the colonists do not wish to do. They send these â€Å"educated† adults back to the tribes as an attempt to â€Å"civilize† the older generations of Native Americans by trying to convert them to Christianity but they are only seen as traitors to their people. This is something the young man in â€Å"The Soft-Hearted Sioux† experiences as he is called a traitor by a member of his tribe, â€Å"‘What loyal son is he who, returning to his father’s people, wears a foreigner’s dress?’†¦ ‘Here is the traitor to his people!† (Sa 649). This is a cruel pain that the Native Americans must encounter as they feel the disapproval of the people of their tribe and then to feel the disapproval again going back to the colonists without any converts. When rejected by both their tribe and the people who taught them this new way of life who else are these â€Å"educated† Native Americans to turn to. In the ending of â€Å"The Soft-Hearted Sioux† the young man left in a similar situation to this and his only choice left was death, â€Å"I do not fear death. Yet I wonder who shall come to welcome me in the realm of strange sight† (Sa 651). Even in his moment of dying the Native American is left in confliction of the two beliefs, will he be meet with a free spirit or with the love of God. Zitkala Sa writesImpressions of an Indian Childhoodand â€Å"The Soft-Hearted Sioux† as examples to describe the cruelty the Native Americans experienced because of the colonists who assimilated them in order to get their land they wanted for themselves. Sa writes this to reach the minds of those who are unaware of the cruelty that occurred in the conquest of land between the colonists and the Native American people. In a quote obtained by Chris Rein, presented by a Cherokee missionary states, â€Å"the full-bloods remembered only too well how the Georgians had treated them and they would never trust their former enemies [the Confederacy] to abide by any treaty† (Rein 4). While things are no longer as vivid and horrific as this Cherokee missionary describes there are still wrongs that are being made toward Native Americans. In present day, the Native American people still receive a lack in the respect they deserve from other parties of race. Because of the assimilation of the Native American people their population is less than what it should be and their rights are still very minimal sending them to live on reservations under poor conditions. Rein, Chris. â€Å"The U.S. Army, Indian Agency, and the Path to Assimilation: The First IndianHome Guards in the American Civil War.†Kansas History, vol. 36, no. 1, Spring 2013,pp. 2–21. EBSCOhost, search.ebscohost.com/login.aspx?direct=truedb=a9hAN=87082925site=ehost-live. Sa, Zitkala. â€Å"The Soft-Hearted Sioux.† The Norton Anthology of American Literature, edited byNina Baym and Robert S. Levine, 8th ed., vol. 2, W.W. Norton Company, 2013,pp. 647–651. Sa, Zitkala. â€Å"From Impressions of an Indian Childhood.†The Norton Anthology of AmericanLiterature, edited by Nina Baym and Robert S. Levine, 8th ed., vol. 2, W.W. Norton Company, 2013, pp. 639–646. Surface-Evans, Sarah. â€Å"A Landscape of Assimilation and Resistance: The Mount Pleasant IndianIndustrial Boarding School.†International Journal of Historical Archaeology, vol. 20,no. 3, Sept. 2016, pp. 574–588. EBSCOhost, doi:10.1007/s10761-016-0362-5. Rein, Chris. â€Å"The U.S. Army, Indian Agency, and the Path to Assimilation: The First IndianHome Guards in the American Civil War.†Kansas History, vol. 36, no. 1, Spring 2013,pp. 2–21. EBSCOhost,search.ebscohost.com/login.aspx?direct=truedb=a9hAN=87082925site=ehost-live.

Wednesday, November 6, 2019

Marketing Management The WritePass Journal

Marketing Management Marketing Management 1. Marketing Plan Outline1.1 Corporate Mission:1.2 Corporate Objectives:1.3 Market Overview:1.3.1 Market:1.3.2 Product:1.3.3 Customer Target:1.3.4 Competition:1.4 .Marketing Mission:1.5 Marketing Objectives 2011-2012:1.6   IMC Campaign 2011-2012:1.7   Budget 2011:1.8   Controls:2. Critical Evaluation of the Marketing Plan2.1  Ã‚   Saudi Political Situation:2.2 Saudi Economical Situation:2.3 Saudi Social Environment:2.4 Saudi Technological advancements:2.5 Saudi Legislative Scenario:2.6 Environmental Awareness in Saudi:2.7   The Jeddah Gate Customer:2.7.1 Liberal Elite:2.7.2 Investors:2.8 Competitor Threats:2.9 Jeddah Gate SWOT: 3.   Impact of Technology and New Media3.1 The rise of technology and new media in Saudi:3.2 Growth of the internet in Saudi:3.3 Impact of technology and new media on Emaar’s future marketing plans:4. Sustainability:  BibliographyRelated 1. Marketing Plan Outline 1.1 Corporate Mission: To transform Emaar into a one-stop, global solution provider for lifestyle, including homes, work, play, leisure, retail, health, education, finance, industry and more. (www.emaar.com.ae) 1.2 Corporate Objectives: To become one of the most valuable lifestyle real estate developers in the world beyond real estate development. Adopt a strategy of business segmentation to create different business clusters functioning as different growth engines. (www.emaar.com.ae) 1.3 Market Overview: 1.3.1 Market: Saudi Arabia’s real estate market is relatively underdeveloped and its expanding population, a lack of affordable housing and few home financing options has seen significant demand build up. The Kingdom faces housing demands of over 1.3mn housing units by 2015 (National Commercial Bank Capital Research Department 2008, p11). The markets relative infancy has also shielded it from the worst of the global financial crisis leaving it economically stable compared to its neighbors in the Gulf (The PRS Group, Inc. 2010. P4) In the midst of all the political upheaval in the Arab world; the Kingdom has taken a pre-emptive approach and recently announced further benefits for its people, such as interest free housing loans and a bigger budget for infrastructural development amongst many others (us-sabc.org). So far the Kingdom has not seen any major uprising from the population; however the situation is unpredictable and can change without warning (www.ft.com). 1.3.2 Product: Jeddah Gate (JG) project establishes a new and innovative way of thinking about urban cities and living. The layout of the project deviates from the traditional concepts of residential complexes and introduces a community residence aspect for the first time in Saudi Arabia; where people can live, work and play in one location (www.emaarme.com.sa). Main features of the JG community: 550, 000 sq. m. total area, 6000 residential units, 75000 sq. m of retail space, 230,000sq.m†¦ commercial space and Schools Public Facilities (www.emaarme.com.sa). 1.3.3 Customer Target: 1.3.4 Competition: 1.4 .Marketing Mission: In 2011-2012 Jeddah Gate will focus on communicating the USP of work, live and play within the community; to increase customer awareness, increase traffic at sales center and help in generating sales. (Jeddah Gate Marketing Plan 2011) 1.5 Marketing Objectives 2011-2012: Leverage the concept of live, work and play and growth of Jeddah Gate as a project, as a community and as a symbol of success in all aspects of ATL BTL communications. To generate 240+ in target market registered traffic every month and increase sales conversion ratio above 2% (Registered traffic is: sales center walk in, calls to call center, online registration, event attendance). Coordinate with Sales team to achieve the 2011-2012 sales revenue targets:    1.6   IMC Campaign 2011-2012: 1.7   Budget 2011: 1.8   Controls: Closely monitor the effects of the marketing campaigns through keeping track of the rate of traffic at the JG sales center, incoming calls for information in the call center and conduct professional research to evaluate the level of awareness created. 2. Critical Evaluation of the Marketing Plan 2.1  Ã‚   Saudi Political Situation: The political environment in Saudi has been quite stable over the years, being a purely monarchical government no serious political unrest has occurred (The Economist Intelligence Unit Limited 2010 p3). A stable political environment has helped the country prosper; according to The Global Competitive report (2010-2011 p37) conducted by the World Economic Forum, Saudi Arabia has risen to the second highest place in the MENA (Middle East Africa) region in terms of global competitive advantage due to several economic initiatives undertaken by the regime such as improvements to the institutional framework, a stronger corporate governance framework, investing in the private sector and reforming legal issues (Mohamed A Ramady 2010 p3) . The current political upheaval in the MENA region cannot be ignored; so far Saudi Arabia has witnessed very minor protests by a minority of the population, however the risk of serious political unrest in Saudi is not highly probable due to the strict anti-protest laws in place by the government (ft.com ) Keeping the above in mind it can be assumed that the current Saudi political environment is the optimum situation in which a real estate development company such as Emaar Middle East can grow and be successful. The planned development projects of Emaar such as Jeddah Gate will receive full governmental support and backing making it easier to operate i.e. getting quicker building permits than usual, land deeds and financial backing which will help in generating revenue. 2.2 Saudi Economical Situation: By virtue of its size and available resources, Saudi Arabia is the largest economy in the GCC that is still relatively untapped. The main source of the Saudi economy is oil, however in the current years, one of the key economic objectives of the government is to diversify the economy and reduce dependency on revenue generated by only oil (Datamonitor 2008 p15). With the economy going strong; the government has injected the revenues generated by oil back into the country, with public spending focusing on education, housing and social measures (Global Investment House 2011 p1-6). Keeping in mind the growing population, changing demographics, larger personal disposable income and growing housing demand of over 190,000 units per year (National Commercial Bank Capital Research Department 2008, p11), the funding allocation for housing has been given a higher priority. In August 2010 the government announced a five year $385bn budget to strengthen the country’s infrastructure and real estate projects (www.oxfordbusinessgroup.com). A new pending mortgage law will enable Saudis to obtain mortgages long term loans with very low interest rates. When this law is passed it is believed that the demand for housing will further increase and open the market to a wider section of the population in the Kingdom (http://arabnews.com). The Jeddah Gate project will greatly benefit from the current and future demand in housing, the economic boom and the upcoming new mortgage law; especially since it offers a product that is unique to the market and more people will be financially able to purchase a home. 2.3 Saudi Social Environment: The Saudi society is conservative and very traditional. However, considering that nearly 70% of the Saudi population is below the age of 30, the trend is slowly changing towards a more modern outlook without losing sight of religion and culture (Colliers International 2009 p6) The Saudi people tend to be very private; because of this they prefer living in villas rather than apartments. Nevertheless, the younger generation is more open to purchasing an apartment to live in than the older generation (Colliers International 2009 p28). The Jeddah Gate project needs to clearly understand the needs and wants of this young generation and ensure that the marketing strategy undertaken is in line with those needs and wants, because by fulfilling the needs of the consumers, the Jeddah Gate project will be able to create trust and loyalty amongst the Saudi consumers as well as generating revenues. 2.4 Saudi Technological advancements: Since 2000 the Saudi government has started giving importance to the science and technological advancements in the country. A new science and technology policy has been placed for 2001-2020 which helps in the growth of technology in Saudi. (Datamonitor 2008 p21). The government’s financial position provides it with the advantage to invest in the required technological advancement, a good example would be the King Abdullah University of Science and Technology which was established in 2009 and has the vision of becoming the icon of aiding the advancement of technology not only in Saudi Arabia but in the world.   (kaust.edu.sa) Real estate sector is also indulging in technological advancements and Emaar is the pioneer of high tech projects such as Jeddah gate. The JG project provides its customers â€Å"Smart Homes† which are technologically advanced and allow the residents to use the Building Automation System where they can set the ambience of their residential or business units including curtains, intercom, surrounding sound system and other features, with the click of a remote (ameinfo.com). The marketing team needs to incorporate this advanced technological feature in the communication section of their marketing plan to attract potential tech-savvy customers. 2.5 Saudi Legislative Scenario: The legal system in Saudi is Shair’ah based i.e. Islamic Law. However, in the recent years the Saudi government has taken steps to reform certain aspects of the legal system, especially related to the business world and foreign investment. Even though certain laws are reformed the execution process is slow in comparison to other countries in the GCC, making it hard for companies to obtain the required licenses on time, causing delay and financial loss in some cases (Mohamed A Ramady 2010 p34). The Jeddah Gate project can be affected by some legal delays such as obtaining land deeds and or building permissions. These delays should be preempted by the team working on the strategy and be taken into consideration when communicating with the customer to ensure that all customer expectations are met without creating any dissatisfaction. 2.6 Environmental Awareness in Saudi: Saudi Arabia started addressing environmental issues seriously after the 1980, when the country’s industry had started to grow.   Most of the environmental concerns addressed were related to the conservation of biodiversity and protection of wildlife (Datamonitor 2008 p26). The proper implementation of environmental plans, along with the proposed education and awareness-raising programs, will encourage the growth of sustainability conciseness in the Kingdom (Datamonitor 2008 p26) As for the real estate sector, the green building concept is fairly new. The Green Building Council has been set up in 2009 to promote and facilitate the green building practice in Saudi Arabia (saudigbc). However, currently most of the mega projects in Saudi, including Jeddah Gate are not practicing green building concepts. 2.7   The Jeddah Gate Customer: 2.7.1 Liberal Elite: Groups of wealthy Saudi families connected through interactive social networks. Western educated and influenced, this group share experiences and follow the same purchasing trends. They are well traveled, cultured and sophisticated and part of the see and be seen crowed (Colliers International 2009 p35). This group can be considered the trend setters, opinion leaders and early adopters (rogerclarke.com) in the market .This is the primary target for the Jeddah Gate project, since the liberal elite will be able to relate better to the community living concept of freedom and modernity. 2.7.2 Investors: Groups of wealthy individuals who understand the benefits of investing in Saudi real estate, they would want to be a part of the upward trend of Saudi real estate market. Western educated and influenced, this group is very business savvy (Colliers International 2009 p36). This target audience should be approached for the Jeddah Gate project; however the marketing communication and sales pitch should be business focused with facts and figures explaining the return on investment. 2.8 Competitor Threats: Ironically, the only direct competition a project like Jeddah Gate faces is from other projects being constructed by Emaar in other cities of Saudi Arabia such as the Khobar Lakes project in the Eastern province of Saudi (Jeddah Gate Marketing Plan). Nevertheless, Emaar should never lose sight of the indirect competitions i.e. singular residential towers etc†¦ and always monitor the growth of these projects so that they are able to counter any decrease in sales due to competition. As the housing demand grows Emaar has to make themselves aware of any new projects that may come up in the future, in order to able to take preemptive action to remain the first property developer in the mind of the customers. 2.9 Jeddah Gate SWOT: 3.   Impact of Technology and New Media 3.1 The rise of technology and new media in Saudi: Compared to its neighbors in the Gulf, Saudi Arabia accepted the advent of new media much later. Internet was officially introduced in 1999 and had limited usage (internet.gov.sa). This was mainly due to the overall cultural restrictions of the society where the conservatives in the country felt that the easy access of all sorts of information may be a source of corruption for the young generation (http://opennet.net). Nevertheless, when internet with restrictions i.e. blocked adult websites, online casinos etc†¦ was finally introduced to the Saudi market the usage grew at a very rapid pace (businessweek.com). 3.2 Growth of the internet in Saudi: The usage of internet is rapidly growing in Saudi Arabia. In 2010 38.1% of the population was using the internet and still growing. (internetworldstats.com). Considering the young population of Saudi, it’s no surprise that social communities such as Facebook and Twitter are highly popular. In August 2010 there were 2,575,740 Facebook users in the Kingdom and growing rapidly. (internetworldstats.com) Also a new trend of online shopping has been emerging in the recent years. Many Saudis go to websites such as Amazon to fulfill their retail needs; they book hotels, buy their tickets online (ameinfo.com). The internet is also used for entertainment purposes i.e. websites such as YouTube, gaming websites, music downloads etc†¦ are quite popular. In addition, Saudis use the internet to seek information through sites such as Google, yahoo etc. †¦ (ameinfo.com ) 3.3 Impact of technology and new media on Emaar’s future marketing plans: Keeping the above in mind, it can be assumed that the future of internet and social media will be very bright and be one of the primary ways to interact with young Saudi consumers. Emaar must consider this rising trend in their future marketing strategies. Emaar will have to incorporate on a larger scale the use of web related marketing campaigns, in addition they would need to revamp their website to allow customers to view the product/project online and have the option of booking an apartment or villa online by making an initial web payment. Since the access of both positive and negative information on the web is easily available, Emaar must also in the future, look into web PR campaigns e.g. set up an Emaar blog which would counter any negative information pertaining to the project or company and promote positive news about the project and company. Using web related marketing tools will help Emaar in communicating with the customers quicker and to a larger audience. In addition if sales are conducted through web marketing which is much cheaper than above the line marketing campaigns, the return on investment would be significantly higher. It can be assumed that the internet is the future and if Emaar fails to utilize this growing phenomenon and communicate with the customers through the medium they relate too then Emaar will be losing potential customer and revenue. 4. Sustainability: Since the 1992 Earth Summit, there has been a rapid growth in awareness towards the need to address issues of sustainability (www.developmenteducationreview.com). In developed countries sustainability consciousness is on a constant growth trend, where more and more companies have to adhere to the demands of the society and be more active when it comes to sustainability (Ali M. Al-Yamiand A.D.F. Price. 2009, p109). Keeping in mind global sustainability consciousness and the spread of awareness throughout the world, it can be assumed that it is only a matter of time when sustainability will take an important role in the Middle East as a whole and in Saudi Arabia in particular. In fact, the Saudi government has created a preliminary guide for building standards that they intend to circulate over the next two years. The objective of the proposed standards guide is to reduce the cost of construction, power, and water consumptions and extend the age of current buildings (Jesse Lapierre. 2009, p2). Hence we can gather that the future of green buildings in the Kingdom is promising and should be taken into consideration for all upcoming projects. In relation to sustainability in real estate sector, throughout the world a number of countries now practice the principles of sustainable construction. The reason for this is that Green Buildings can provide financial benefits such as energy savings, water savings, reduced waste etc†¦ (Gregory H. Kats. 2003, p3). In addition, for the real estate developers Green Buildings can generate revenues through higher selling price/rents and lower operation costs (http://sustainablecitiescollective.com). Even though Emaar has been a part of some charity related programs and follows very strict ethics standards. However, currently corporate social responsibility (CSR) does not play a significant role in Emaar’s marketing strategies especially for the projects in Saudi. If we look at the current triple bottom line (Andrew W. Savitz, Karl Weber 2006) plan for Emaar in Saudi, it can be noted that, the main focus is on the profit and then the people, whereas the planet is not as seriously considered. Emaar being the largest real estate developer in the GCC should aim to be the pioneer in creating awareness about CSR and striving towards green building for all future projects in Saudi. Being the first developer to be CSR conscious would provide Emaar with an edge over future competitors, because they can use this opportunity for PR, use it as a unique selling point, and show the Saudi consumer that Emaar is a company that cares about the planet.   Bibliography 1   Ali M. Al-Yamiand A.D.F. Price. (2009). An Overview of Sustainability in Saudi Arabia. An Overview of Sustainability in Saudi Arabia, p109-118 2  Ã‚   Andrew W. Savitz, Karl Weber (2006). The Triple Bottom Line: How Todays Best-Run Companies Are Achieving Economic, Social, and Environmental Success and How You Can Too. United States of America: Jossey-Bass- A Wiley Imprint. p3-6. 3   Chris Cheatham . (2010). The Profit Motives for Green Building. Available: http://sustainablecitiescollective.com/chrischeatham/16637/profit-motives-green-building . Last accessed 23rd March 2011. 4  Ã‚   Colliers International. (2009). Jeddah Real Estate Market Report. Jeddah Real Estate Market Report. 0 (0), p6-150. 5   Communications and Information Technology Commission CITC. (2011). Internet in Saudi Arabia . Available: internet.gov.sa/learn-the-web/guides/internet-in-saudi-arabia/view?set_language=en. Last accessed 24th March 2011. 6   Datamonitor. (2008). In-Depth PESTLE insights. Saudi Arabia Country Analysis Report, p11-28. 7   Emaar. (2010). Mission, Vision, Strategy, Values. Available: emaar.com/index.aspx?page=about-mission. Last accessed 7th March 2011 8   EmaarME. (2008). Overview. Available: emaarme.com.sa/ProjectsPages/p1/index.htm. Last accessed 8th March 2011 9   EmaarME Jeddah Gate Marketing Plan (2010), p1-26. 10   Global Investment House. (2011). Saudi Arabia Unveils Expansionary Budget for 2011. Saudi Arabian Budget 2011. 0 (0), p1-6. 11 Gregory H. Kats. (2003). Green Building Costs and Financial Benefits. Green Building Costs and Financial Benefits, p2-10. 12 Internet World Stats. (2010). Saudi Arabia Internet Usage and Marketing Report. Available: internetworldstats.com/me/sa.htm. Last accessed 22nd March 2011 13   Jesse Lapierre. (2009). Saudi Arabia: Green Building. Saudi Arabia: Green Buildings p1-5 14   King Abdullah University of Science Technology. (2011). Vision Mission. Available: kaust.edu.sa/about/vision_mission.html. Last accessed 20th March 2011. 15 MD Rasooldeen. (2011). Shoura to pass mortgage law without delay: Al-Asheikh. Available: http://arabnews.com/saudiarabia/article304339.ece. Last accessed 11th March 2011. 16 Mohamed A Ramady (Springer). (2010). Policies, Achievements and Challenges. The Saudi Arabian Economy. 2 (7), p2-41. 17   Nadeen El Ajou. (2009). Emaar Middle East showcases Smart Community living at Jeddah Gate and Al Khobar Lakes . Available: ameinfo.com/193088.html. Last accessed 11th March 2011. 18   National Commercial Bank Capital Research Department. (2008). Kingdom Under Construction. Real Estate Sector. 0 (0), p6-8. 19   OBG. (2011). Saudi Arabia: Spending gets a boost. Available: oxfordbusinessgroup.com/economic_updates/saudi-arabia-spending-gets-boost. Last accessed 13th March 2011. 20   OpenNet Initiative. (2004). Internet Filtering in Saudi Arabia. Available: http://opennet.net/studies/saudi. Last accessed 24th March 2011. 21   Peter Burrows . (2008). Internet Censorship, Saudi Style. Available: businessweek.com/magazine/content/08_47/b4109068380136.htm. Last accessed 24th March 2011. 22 Richard Milne. (2011). SP says turmoil could still spread. Available: ft.com/cms/s/0/bd50b568-45c0-11e0-acd8-00144feab49a.html#axzz1HRU1fpkX . Last accessed 11th March 2011 23 Ros Wade . (2008). Education for sustainability: Challenges and opportunities. Available: developmenteducationreview.com/issue6-focus3.   Last accessed 19th March 2011. 24   Roger Clarke . (2009). A Primer in Diffusion of Innovations Theory . Available: rogerclarke.com/SOS/InnDiff.html. Last accessed 28th March 2011 25   SGBC. (2010). About Saudi Green Building Council. Available: saudigbc.com/about.htm .   Last accessed 22nd March 2011. 26 Siba Sami Ammari. (2011). Saudi Arabias internet users spend around $3bn in 2010 on buying products and services through e-commerce. Available: ameinfo.com/256866.html. Last accessed 23rd March 2011 27  Ã‚   Siba Sami Ammari. (2009). Survey shows 97.5% of Saudi Arabia and UAE internet users use Google . Available: ameinfo.com/200706.html. Last accessed 24th March 2011 28  Ã‚   The Economist Intelligence Unit Limited. (2010). Saudi Arabia. Country report (0), p3-27. 29  Ã‚   The PRS Group, Inc. (2010). Saudi Arabia Country Forecast. Saudi Arabia Country Report. 1 (1), p2-70. 30  Ã‚  Ã‚   U.S.-Saudi Arabian Business Council. (2011). King Abdullah Returns to Kingdom, Enacts Measures to Boost the Economy . Available: us-sabc.org/custom/news/details.cfm?id=957 . Last accessed 12th March 2011 31  Ã‚  Ã‚   World Economic Forum. (2010). The Global Competitiveness Report 2010-2011. The Global Competitiveness Report 2010-2011. 1 (1), p37.

Monday, November 4, 2019

The dream act Essay Example | Topics and Well Written Essays - 2000 words

The dream act - Essay Example migrants completed at least two years of military service at a higher learning institution, they would earn a six year temporary residence, within which they could qualify for permanent residency only if; one, they achieved a degree from a higher education institution in the U.S, too, they served in the military for two years, and three, to have completed two years while pursuing a higher or bachelor’s degree within the country (â€Å"DREAM Act Summary† n.p.). Come November 2013, most (14) states introduced customized versions of the Dream Act that controls the financial aid and tuition charges for state-level universities. The mentioned act resulted in both embracement and rebellions as well. The proposers supported the bill, saying it would create economic and social positives in that it would not support an amnesty program. Opposers on their part criticized the bill as one that would feed and promote illegal immigration, in addition to crippling deportations. The following text will discuss the Dream Act, focusing from an anthropological point on biopolitics and hegemony as social forms of governmentality. An overall definition of the term hegemony refers to it as a success of equalizing status quos between dominant classes and subordinate classes by presenting and exercising a common customized definition of reality as per a general worldview, and enforcing it on the different classes such that they accept it as common sense in achieving similar grounds. It is a rather effective mode of eliminating mean dominance in it eliminates exercising indirect dictatorship on other classes which establish status quos that only benefit members of their own while discriminating on the others. This is the â€Å"cultural hegemony† theory as explained by one Italian Marxist Gramsci. Concisely, the dominating class, by use of consensus pushes other classes into accepting their perspectives of the world as the only ones, therefore marginalizes them. Gramsci however, explains

Saturday, November 2, 2019

Discussion board 1 international law Essay Example | Topics and Well Written Essays - 500 words

Discussion board 1 international law - Essay Example Two Articles are classified under this Chapter, mainly giving detail on United Nations four Purposes (Article 1) as well as its seven Principles (Article 2). Maintenance of peace and security as well as friendly relationships among nations coupled with cooperation summarizes the purposes. Sovereignty, good faith, peace security and justice, territorial integrity, assisting the UN, adherence by non members as well observance of domestic jurisdiction are the Principles. Contained in this Chapter are membership regulations under Article 3 to Article 6. Original membership, peace loving states admission, any other admission, suspension and expulsion are highlighted across these Articles (Grant, 2009). Articles 7 and 8 fall under this Chapter to give detail on organs of the UN, which include General Assembly, Security Council, Economic and Social Council, Trusteeship Council, International Court of Justice (ICJ) and Secretariat and a provision for subsidiary organs. Eligibility to the organs is not restricted. From Article 39 to 51, this Chapter outlines practices and regulations to follow when dealing with issued threats against peace. It is termed as Action with Respect to Threats to the Peace, Breaches to the Peace and Acts of Aggression (Schweigman, 2001). Schweigman, D. (2001) The authority of the Security Council under Chapter VII of the UN Charter: legal limits and the role of the International Court of Justice. Leiden, Netherlands: Martinus Nijhoff