Wednesday, October 30, 2019

STRategic Marketing Management ( Analysis and decisions ) Term Paper

STRategic Marketing Management ( Analysis and decisions ) - Term Paper Example Asides from modifying PCs, the company also developed the audio feature on these PCs that allowed melodies and speech to be played (Baldauf and Stair, 2010:74). Since its inception, the entity has achieved various milestones with the most remarkable one being the Sound Blaster audio cards. The entity has been through difficulties and has always emerged at the top. This paper gives a detailed analysis of Creative Technology and its strategic marketing management. The major factor that has contributed to the entity’s success over the years is Sim’s effective leadership. Sim is a born entrepreneur who comes up with creative ideas that have enabled the entity to remain afloat over time. He had a vision for his company and laid down quantifiable goals that saw the company increased profitability over the years (Koh, 2008:147). Sim was not only visionary but was a strategic decision-maker and highly effective in solving problems that came up in the company’s operations. The second aspect that has contributed to the company’s success is diversity in their products. It can be observed that technology is dynamic and in order to maintain its customers, the entity has always been conducting modifications on their products in the trendiest and latest designs. This can be observed on various occasions. For example, the company was in the lead in the sound card trade in the past twenty years and was struggling owing to the lack of new and inventive products. This explains why Creative Technology ventured into producing a wide array of products including high-end speakers, DVD players and graphic cards. This was followed by the launch of the Sound Blaster and the Cubic CT (Schaar and Chou, 2009:38). Later in 1998 the company entered into the digital segment of the entertainment industry by launching the Sound Blaster Live! That was enjoyed immense success and placed the company at a competitive advantage over its rivals including Philips and Sony.

Monday, October 28, 2019

Basant as a Cultural Heritage of Lahore Essay Example for Free

Basant as a Cultural Heritage of Lahore Essay Basant as a cultural heritage of Lahore by Yasir Raza Naqvi Lahore is an exceptionally festive city. The people of Lahore commemorate many festivals and events throughout the year, amalgamating Mughal, Western and current trends. This blending is extended to include the grand and historically significant festival of Basant. Though religiously not a Muslim cultural event, it is widely celebrated by the Muslim majority population Lahore. It is precisely due to the same reason coupled with other ‘non-Islamic’ practices that it has come under severe criticism by the mullahs. The celebration of Basant grew at an increasing rate in the late 90’s till 2005 where it suddenly came under ban due to an increasing number of deaths caused by highly tensile glass coated threads. Due to the official recognition during Musharraf’s early regime, kite making had become an industry, employing hundreds of thousands of people. The implementation of ban of kite flying followed by the ban on kite making left almost 500,000 families employed. Political turmoil followed by the ban on Basant added misery to the already crawling economy of Pakistan as the number of tourists who came to Lahore just to see the magnificent event of Basant fell tremendously. Therefore, In this essay, I tend to analyze the tri fold significance that Basant holds for Lahore. I would briefly shed light on the history of Basant and its transformation over the years till today coupled with the criticism it faced by religious elements of Pakistan. I would later explain how Basant becomes the center of tourist attraction, and generates a lot of revenue for the local industry thus securing an important position in translating the cultural heritage of Lahore. I would also seek to mention the reasons for the implementation of ban on Basant and propose solutions to uplift it. In the pre-partitioned Punjab, Hindus, especially of Lahore- celebrated Basant by flying kites. It was precisely during that time that the Muslims of Lahore, almost equal in number-comprising of the 48% of the population of Lahore, were instructed by the mullahs of that time to refrain from celebrating the event as it was typically a Hindu festival. However, the youth of that time did take part in the event by flying kites. After partition, almost all the Hindus had left Lahore for India but their tradition of Basant remained; and even today Lahoris take pride in Basant and fly kites from their rooftops with the same enthusiasm. Being the historic capital of Punjab there is no other place where Basant is elebrated with as much vigour and enthusiasm as the ancient city of Lahore. Traditionally, a festival confined to the old-walled city, it has now spread throughout the city. The celebration of Basant is incomplete without the kites and it is for the same reason that Michael Palin in his book Himalaya says: â€Å"Everyone in Lahore flies their kites for a day. † (Palin) Marshall Cavendish in his book People of Western Asia briefly states about the history of Basant and its celebration in the following words: â€Å"Lahores spring festival, Basant (buh-SAHNT): also known as Jashen-e- Baharan), is celebrated in February or March each year. It is an ancient festival that has become increasingly popular in recent years, attracting visitors from other parts of the country. Basant is celebrated with feasting, music, dance and crafts, and the wearing of yellow costumes or scarves, a symbol of the new spring. The most striking feature of the festival is the kite flying. Thousands of kites of all shapes, sizes and colors fill the skies and soar from parks and city roofs. At night, music rings and while white kites are flown, which reflect lights and fireworks. Throughout Pakistan there are local spring fairs with folk dancing; feasting; fairground attractions, such as swings and ferries wheels (sometimes made of wood in rural areas); music; and sporting contests. † (Cavendish) The celebration of this event which includes the spending on the purchase of kites has constantly being termed by the mullahs as un Islamic. In an interesting piece written by Roy McCarthy in The Guardian (17th May 2003), a young woman supporter of the Jamiyat (religious party) is reported as vehemently arguing against Basant. It is not Pakistani culture. Pakistanis don’t need new festivals. The most obnoxious part of the Basant is that it encourages young men and women to dance together and drink alcohol. This is not Islam. This is not Pakistan. This is not part of our civilization. † (The Guardian) The cry by the Jamiyat and other religious parties to impose ban on purely religious grounds, that is, Basant being a Hindu festival and thus unIslamic; therefore it should not be celebrated for the same reason might not be a reasonable argument. Firstly because, Basant is more of an ethnic event and it was celebrated by the Hindus and Muslims (the younger lot) alike by flying kites on Basant day and kite flying is more of a sport in the contemporary world, so the question of kite flying being Islamic or unIslamic does not arise . Secondly, ‘there is no denial to the fact that religion is very important and integral part of the culture of Pakistan but we should remember that cultural traditions are also a cause to celebrate and if nothing else the celebration of Basant can be viewed by the specific gathering of the ethnic group. This is further strengthened by the statement made by Sheikh Saleem, lahori and a local kite maker, eid musalmanon ki hoti hai or Basant lahoriyon ki. Thus it is purely a cultural event and Basant and kite-flying contrary to fundamentalist perceptions had nothing to do with religion. Thirdly, Basant has always been supported by the sufis of the past who were the early preachers of Islam in the subcontinent and were all very close to religion of Islam. However, during times when the state comes under religious influences (MMA had an impressive victory in October 2002), there are efforts to discourage what is, after all, not a religious festival. Pakistan† (Rengel) Sufis of Sub-Continent have a convention of adjusting to the local culture and language of the places they visited to spread Islam. The Chishti sufis, have not only tried to relate to the South Asian culture and music, they even tested and developed different cultural forms. Basant is a living example of religious open-mindedness and respectfulness of other creations of God. Previously, it was these Dargahs and Khaneqahs, which served as basis where people could share equal liberty, message of transparency and oneness. Basant is a tradition initiated eight hundred years ago by the famous poet Amir Khusro. Thus, the sufis of the past, namely Nizamuddin Auliya, Baba Zaheen Shah, Amir Khusro also took part in celebrating the event of Basant through songs. The song sung on Basant commemorates a special event in a saint’s life. Blum and Neuman) Kite-making and kite-flying interdependent on one another spread from the confines of undroon sheher across Lahore, and as the city of Lahore expanded, so did the trade. It grew to such a degree that it attracted people from around the world and made Lahore a place of great tourism for Pakistan and a dynamic source of income for its residents. The festival of Basant transformed over the years due to the introduction of kites of different shapes, sizes and colors and as Saeed writes â€Å"Kite Fighting is an integral part of the Basant Kite festival. Saeed) It is precisely this magnificent display of kite flying on Basant day that made Lahore famous and thus it became the center of tourist attraction. People belonging to upper as well as lower economic classes from around the country and beyond packed city hotels for a few days of late-night festivities. Thus, as the celebrations of Basant got bigger and bigger, more and more support started coming in the form of endorsements by the government, and sponsorship and advertisement by multi-nationals in the private sector such as Coca Cola, Pepsi and Nestle. Official statement of District Chief Nazim of Lahore, 2003, Basant had created a business of Rs. 2 to 3 billion in the province and provided lot of opportunities to common people and owners of cottage industries in the country. To some independent estimates overall euphoria of Basant would generate economic activities of Rs. 4 to 4. 5 billion in the province in 2004†. (Khan) Gradually, the event which was once a general celebration of spring became overly competitive and transformed from being a fun sport to a killer sport claiming hundreds of innocent lives. As the nature of Basant changed so did the demand for the kinds of kites needed and thus new models, enormous kites and dors toughened with steel wire, chemical and glass to have room for the kite-fighting of Basant replaced the traditional kite design, size and thin dors that never utilized anything more than starch. These changes are in-fact the root of the present dilemma. â€Å"Kite flying on Basant has taken 505 lives in the last two years. The supreme court of Pakistan has mentioned 45 kite-flying related deaths in city over the last six months and 460 last year†. Zia) The factor that makes this activity even deadlier is that the dangers to human life from this commotion are multi pronged. In simpler words, the group of people affected by this cannot be specified. Actually, it is so large and all-around a group that the risks seem horrendous. Unlike other hazardous sports, the activity of celebrating Basant and more specifically more often than not, affects people who ar e not even slightly related to kite flying. The deaths quoted above are a testament to this argument. A majority of these deaths were of the unfortunate motorcycle riders who couldn’t endure the wounds after the stray strings, used for kite flying, cut open their throats. Then there were deaths due to the distraction caused by these stray strings. Young boys running after and chasing kites also add up to to this very ill-fated club. The number of wounded people and the number of accidents that kite flying on Basant has been causing is alarming to say the least. But the horror doesn’t end here. Many kite flyers were victims themselves; deaths caused by falling off rooftops, electric shocks due to the use of metal strings and obviously they too have the hazard of the stray thread slitting their throats. The killing of innocent people was not the only reason that the government imposed at a ban on basant. The monetary losses caused by kite-flying are astonishing. Fluctuations in the power supply and frequent electricity trippings have become identical with Basant. Pakistan Times show a grim picture: â€Å"As many as 48,173 power trippings were caused by kite flying were recorded in different parts of the provincial metropolis during the first quarter of current fiscal year. † (Pakistan National News Desk). Every year, the Basant days in Lahore are like a mini-blackout. And the people who have to take the toll are the people who have to work through days and nights to ensure that the people get uninterrupted power supply. The sharp strings and metal twangs can cut through the insulation of wires and every day, hundreds of transformers are left burnt and rendered useless. LESCO: â€Å"The losses suffered by LESCO 350 million rupees during the last 4 years ending 2003 out of which a loss of Rs. 20 million was caused in 2002 by metal wires. Moreover, one grid station had been damaged by metal wire every year during this period resulting in a loss of Rs. 8 to Rs. 9 million and the destruction of 210 feeders. † (LESCO) It is estimated that if there are 50 one-hour breakdowns, it costs Rs. 2. 5 million to WAPDA Steel and glass-edged wires are banned but manufacturers still report roaring trade. (Pakistan times†¦) Kite making is traditionally a family enterprise. Behind every kite is the effort of a minimum of six people. The skill is one that they acquire in their virasat as Baqir Ali Butt stated. In some ways kite-making has been altered by the changing circumstances of Lahore but in other ways it has stayed the same. It continues to provide employment for men, women and children, including handicapped persons and the incomes of 500, 000 people are dependent upon the trade â€Å"Around 500,000 families, directly related to the kite flying business, have lost their sources of livelihood because of the ban on Basant†¦[†¦] The ban is costing them Rs 200 million annually, and at the same time damaging other businesses that are indirectly related to the festival. They said that the people related to the industry, including kite makers, twine (dor) makers, wholesalers and retailers, had lost their means of earning a living. The cost of the paper used in kite making is estimated at around Rs 90 million and the cost of the twine used for flying kites is estimated at around Rs 40 million. The process of making kites involves around Rs 40 million, said Lahore Kite Flying Association General Secretary Sheikh Muhammad Saleem. â€Å"These were taken two years back. Now the number must have jumped,† he said, adding that 500,000 families had suffered because of the ban. † (Dawn International) (Tasleem) â€Å"The Supreme Court on Friday directed the Punjab police to register and take affidavits from the manufacturers of strings for kite flying in the province that they would not produce metallic and other dangerous strings which play havoc with human lives and power lines during Basant festivities. The National Assembly was recently informed that Wapda lost Rs30. 2 million in revenues due to Basant-related mishaps in the Punjab from 1999 to February 2004.

Saturday, October 26, 2019

Radio Frequency Identification (RFID) Essay -- microchip radio waves i

Radio Frequency Identification (RFID) Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it. RFID is a better technology than bar codes in many ways. The two are different technologies and have different applications, which sometimes overlap. The big difference between the two is bar codes are line-of-sight technology. That is, a scanner has to "see" the bar code to read it, which means people usually have to orient the bar code towards a scanner for it to be read. Radio frequency identification, by contrast, doesn't require line of sight. RFID tags can be read as long as they are within range of a reader. Bar codes have other shortcomings as well. If a label is ripped, soiled or falls off, there is no way to scan the item. And standard bar codes identify only the manufacturer and product, not the unique item. The bar code on one milk carton is the same as ever...

Thursday, October 24, 2019

The Conqueror And King: Alexander The Great

Alexander the Great, as his name connotes is probably one of the greatest military leaders and conquerors in the history of the world. At a very young age, he was able to put much of the Hellenistic world under his control extending over 3,000 miles from Greece to India (Cummings, 2004). The unification of the numerous Greek city-states under the father of Alexander, Philip II of Macedon was attributable to the the great conqueror who took control over these lands that the Persian army used to control. These include Anatolia, Syria, Phoenicia, Judea, Gaza, Egypt, Bactria and Mesopotamia (Shone and Odgens, 2005).Alongside this, he extended the boundaries of his own empire reaching as far as Punjab (now a province of Pakistan) in the Indian subcontinent. These military achievements of Alexander the Great did not stop here. If he had not died at a very young age, Alexander the Great could have conquered the European lands (Tarn, 1979). He also wanted to continue his conquests by explori ng eastwards, hoping to find the end of the world which had been made known to him by his tutor, the great philosopher, Aristotle. Alexander’s tutor once told him tales of where the lands and the great oceans begin.It was also Aristotle who influenced the young prince greatly on how to behave properly, especially in dealing with women. His great respect for women has been very evident even during his adulthood (Syversten, 1997). In his conquests of new lands, Alexander encouraged the inclusion of foreigners into his army which is basically the reason why some scholars consider him to be a ‘policy of fusion (Cummings, 2004). ’ With this, he also encouraged the intermarriage between his army and foreigners, which he also engaged in by marrying Roxanne, the princess of Bactria, one of the present provinces of Afghanistan.Because of this, the military conquests and achievements ushered in what came to be known as the Hellenistic age, a fusion of Greek and Middle East ern culture (Gunther, 1963). In Afghanistan, for example, the rulers had combined Greek names with their own names. Having lived a life that was full of military achievements and accomplishments, though shortly lived made Alexander a person of vital importance not just in the history of the Greek culture but the history of the world as well. He has also appeared to be a legendary hero in the person of the Homeric hero, Achilles (Green, 1970).The Achievements of Alexander the Great The birth of Alexander the Great on the twentieth of July to Philip II of Macedonia and his fourth wife Olympias in Pella, Macedonia in Northern Greece happened to be the same day when the temple of Artemis has been raised to the ground- a good omen of how great the young prince would be (Robinson, 1963). Aside from this, he could have inherited the military skills and achievements of his other relatives. His father, like him was a great general and organizer. Similarly, Pyrrhus of Epirus was his second co usin (O’Brien, 1992).As a child, it has been said that Alexander would often get disappointed whenever he learns of his father’s successful conquests of new lands, thinking that there would be no more lands left for him by the time he sits on the throne as king (Syversten, 1997). By the time he reached thirteen, the young prince matured, thanks to his education under Aristotle. It was because of his education under Aristotle that he became interested in philosophy, literature, philosophy, countries, ethics, politics, etc.He also developed a love for the works of Homer and the Heroic Age (Pinkerton, 2002). His love for Homer’s the Iliad was the reason why he regarded Achilles to be his role model, and it was because of this that the young boy became fearless and strong which he demonstrated by riding Bucephalus, the horse no one ever dared to touch (Pinkerton, 2002). At the age of sixteeen, King Philip II placed great responsibilities upon the young prince. While the former has been away for a long period of time, one of Macedonia’s colonies revolted.Due to the absence of his father, the young prince took over the situation and commanded the troops to subdue the said rebellion. He was also sixteen years old when he found his first ever colony, Alexandroupolis (Syversten, 1997). Alexander became the king of Macedonia at the age of 20. During that time, the Greek city states became restless under Macedonian rule. On one of his battles in the north, fighting the Barbarians, word spread about Alexander’s death, causing the people of Thebes to revolt.Upon learning of what is happening, Alexander had to engage in harsh measures to quell the rebellion. From then on, no one ever questioned the capacity, strength and efficiency of Alexander as a military leader (Cartledge, 2005). The young king then went on with his conquest of Persia, one of the dreams his father had, also knowing that he could not have real power with Darius, the gre at king of Persia around (Robinson, 1963). He defeated the great Persian ruler at the battle of Issus in 333 BC for the second time and in November of that same year, he was crowned as King of Persia (Stoneman, 1997).It was also in that time when he reached the Indian subcontinent where he defeated Porus, an Indian prince. Although he planned on taking on what lies beyond the Ganges River, Alexander had to go back as his army mutinied against him (Cummings, 2004). He was able extend his empire up to this part because of his marriage to the Bactrian princess, Roxanne (Gunther, 1963). The journeys of Alexander the Great led him to discover numerous cities and colonies. The most popular of them all, is perhaps the city which bears his name, Alexandria.The people in Egypt welcomed the Macedonian king hospitably, having despised their Persian rulers and crowned him as their pharaoh (Syversten, 1997). Egypt then became the center of learning and commerce because of its strategic location (Robinson, 1963). The greatness of Alexander, however started to diminish as he was continuously losing the support not just of his army but of the Macedonians as well because of his adoption of Persian ways (O’Brien, 1992). On July 10, 323 BC, a month before his 33rd birthday, Alexander the Great died.Some say it was because of malaria or other types of sicknesses while others theorize it to be caused by poisoning. Some say this was due to some people’s discontent with his rule, especially the sons of Antipater, the viceroy of Greece. With no legal heir to inherit his vast kingdom which extends from Greece to India, the empire of Alexander the Great has been distributed to his generals. Having conquered vast territory within a very short lifetime, Alexander the Great remains to be the greatest military commander and conqueror in the history of the world.References Cartledge, P. (2005). Alexander the Great: The Hunt for A New Past. US: Vintage. Cummings, L. V. (2004). Alexander the Great. USA: Grove Press. Green, P. (1970). Alexander the Great. USA: Cengage Learning Gunther, J. (1963). Alexander the Great. USA: Random House. O’ Brien, J. M. (1992). Alexander the Great: The Invisible Enemy: A Biography. UK: Routledge Pinkerton, J. (2002). Biography of Alexander the Great. Retrieved October 4, 2007 From http://mi. essortment. com/alexandergreat_rhqk. htmRobinson, C. A. (1963) Alexander the Great: Conqueror and Creator of A New World. USA: F. Watts Publishing. Shone, R. and Odgens, C. (2005) Alexander the Great: The Life of a King and a Conqueror. USA: Rosen Classroom. Stoneman, R. (1997). Alexander the Great. UK: Routledge. Syversten, T. (1997). The Rise and Fall of Alexander the Great. Retrieved October 4, 2007 From http://members. aol. com/tomstp9/alex. html Tarn, W. W. (1979). Alexander the Great. Volume II: Sources and Studies. USA: Cambridge University Press

Wednesday, October 23, 2019

Response to literature- black snake: the daring of Ned Kelly Essay

Bushrangers are known to be ruthless outlaws. Many people have thought of Ned Kelly as a villain, some think of him as a hero or possibly a victim in most cases. Ned Kelly has committed various villainous acts or has been a part of scenes where he most likely wasn’t supposed to be. However, Ned has also done heroic acts and has been victimized by numerous Victorians at the time. Ned Kelly had been expected to be a villain since a young age. Young Ned had done many things a twelve year old wouldn’t think of committing, such as robbing a bank. Ned was originally sentenced to an unexpected trial because he was caught by a trooper when he was flashing a horse in the local streets of Greta. Apparently, Ned thought the horse he was riding belonged to a friend of the family who left not long ago but the horse was actually stolen. Ned had explained to the judge that he didn’t know that the horse was stolen. Unfairly, the judge charged Ned for receiving a stolen horse and was sentenced to three years of hard labor. As for the family friend who stole the horse, he was sentenced to only six months of hard labor. Many Victorians thought that he deserved it, although, I believe he was highly victimized at the scene of the trial. Ned had always been highly protective of his family. There was a scene that happened at the Kelly’s house between a trooper that spread everywhere in Victoria. A fellow constable had arrived drunk at the Kelly’s doorstep to arrest Ned’s brother Dan who was accused of horse stealing. Later on, the constable started to act inappropriately towards Ned’s sister Kate. Ned’s mother got a hold of a shovel and dented the constable’s helmet. After the crime scene, a trial for the incident occurred and Ned’s mother had to serve three years of hard labor until someone pays the bailing payment. Ned, Dan and two mates of theirs formed a fugitive gang and robbed banks and did obscured acts to pay the bail money. Many different stories have been recorded. This may be a villainous and slightly idiotic thing to do but some may think it is loyal and heroic. There was one incident that made all Victorians turn on Ned. There was a shooting at Stringybark Creek where the Kelly gang had their hideout. The results from the shooting scene left two women widowed and nine children fatherless. Since then, there had been an increasing reward for the find of the Kelly gang. Despite all the villainous acts stated, Ned Kelly was victimized through many events. All his and his family’s trials were unfair due to biasness. Victorians judged the Kelly family and no one listened to their point of view. Ned Kelly stated that the incident at Stringybark Creek was a misunderstanding and that they never planned to shoot. As for the incident at the Kelly house, Ned Kelly was never at the crime scene and was believed to be four hundred-six hundred miles away. It was that the constable was shot by Mrs. Kelly herself but tended the wounds. When the constable went back to the station, he had told the judge, fellow Victorians and partners that is was Ned who shot him. Nevertheless, the judge charged Mrs. Kelly for three years of hard labor and since then, Victorians had been on the hunt for the Kelly’s. Through many of Ned Kelly’s past events, due to all reasoning and evidence stated, it is quite clear that Ned Kelly was put through many crime scenes that he and his family were victimized in.

Tuesday, October 22, 2019

3 Types of Errors in Interpolated Coordination

3 Types of Errors in Interpolated Coordination 3 Types of Errors in Interpolated Coordination 3 Types of Errors in Interpolated Coordination By Mark Nichol Errors in sentences with interpolated coordination, in which a phrase providing additional information is inserted but punctuation and/or words that provide complementary structure are omitted or misplaced, are frequently made but easily avoided, as explained in the discussion and demonstrated in the revision following each example below. 1. It is widely regarded as one of, if not the, greatest films ever made. The flaw in this sentence is simple to detect- simply omit the parenthetical phrase: â€Å"It is widely regarded as one of greatest films ever made.† If the base sentence is syntactically flawed, then the same sentence, with interpolated wording, is also incorrectly constructed. To repair the damage, word the base sentence so that it stands on its own (â€Å"greatest films† must be preceded by the article the within the base sentence), and revise the parenthetical phrase so that it complements the corresponding phrase in the base sentence (â€Å"greatest films† cannot serve both the base sentence and the parenthetical phrase): â€Å"It is widely regarded as one of the greatest films, if not the greatest film, ever made.† An alternative revision that interpolates the parenthetical phrase early but is not as elegant is â€Å"It is widely regarded as, if not the greatest film, one of the greatest ever made.† 2. Mobile apps perform the same or better than they did a year ago. Here, the phrase â€Å"or better than† is not technically a parenthetical phrase because it is not punctuated (though some writers would do so), but it serves the same function- it interpolates additional wording into the base sentence, in this case â€Å"Mobile apps perform the same they did a year ago.† But notice the flaw here: The comparative phrase â€Å"the same as† is missing a word, so revise as shown here: â€Å"Mobile apps perform the same as or better than they did a year ago.† Without this insertion, the erroneous implication is that than serves as a conjunction for both same and better when, according to grammatical rules, it supports only the latter word. 3. Membership or inviting support for the organization is a criminal offense that carries a sentence of up to ten years. A missing word is the problem here, too, but this time it is an absent preposition- membership requires its own preposition so that, similar to the problem in the previous example, it is not misunderstood to share for with â€Å"inviting support†: â€Å"Membership in or inviting support for the organization is a criminal offense that carries a sentence of up to ten years.† (Again, the interpolation â€Å"or inviting support for† could be treated as a parenthesis with bracketing punctuation, but doing so is unnecessary.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:Program vs. ProgrammeOne Fell SwoopPreposition Mistakes #1: Accused and Excited

Monday, October 21, 2019

A Dolls House Essays (1242 words) - Films, British Films

A Doll's House Essays (1242 words) - Films, British Films A Doll's House The events begin to succeed each other more and more rapidly and the circle begins to spin around her. We find that, for saving her husbands life, Nora has committed forgery and Krogstad is ready to use this information in order achieve his goals : ()if I produce this document in court, youll be condemned.(791) This element gives us a hint of women condition in a deeply- rooted man thought society . In addition, Dr. Rank, who had a lethal disease, confesses his love for her : You know now that Im at your service, body and soul.(802) All these events make the circle tighten and spin faster around Nora, who can hardly resist to this pressure and seeks the relief in wildly dancing the tarantella, a dance wich she transforms into a life and death one. This dance can also be viewed as an one of the key element that permits us to say that shes passing from a state of passive victim to a n early state of active agent : Nora dances more and more widly. Helmer stands by the stove giving her repeated directions as she dances ; she does not seem to hear them. .(808) All the other charactersreactions, words and attitudes form the chain wich unbearably surrounds Nora and wich she will finally break, liberating herself from the lie she has been living in for many years-she firmly tells Helmer her decision : I cant stay here with you any longer (...). Im leaving here at once.(821) In addition to this intimate inter-independence between Nora and the other four important characters (viewed as a whole), is the complexity of Helmers wife as a dramatic personage.Compared to the others, Nora is the most round character, one who we see evolving, in contrast with Helmer or Dr. Rank. More precisely, we discover two forms of evolution of this personage : 1.an external one, produced in the readers mind, as he discovers the purpose of her always asking money to the husband and having a toy attitude with him ; 2. and the second evolution, more profound, wich implies the inner transformation of the character, tired of representing someones toy and desiring independence. The beginning of the play presents us a squirrel-like(775)woman, always wanting to please her husband in order to get money from him. She voluntarily accepts Helmer comparing her with a little animal and even seems to identify with this image : Ah, if you only knew how many expenses the likes us sky-larks and squirrels have, Torvald(777). Nora appears completely submitted to her husband, ready to accept whatever he would say or do : I would never dream of doing anything you didnt want me to.(777) in order to satisfy her ( apparent) only preoccupation : You could always give me money, Torvald. (776) The fog and confusion wich surrounded her and her attitude begin gradually to disappear as we find out that she had borrowed money to save Helmers life and she saves almost every penny her husband gives her in order topay the debt off. This stage of Noras external evolution enables us to see a woman who deeply loves her husband, but who is not strong enough to fight against his prejudices : Torvald is a man with a great deal of pride- it would be terribly embarrassing and humiliating for him if he thought he owed anything to me.(782) Moreover, she prefers fancying about a rich man who would give her the money she needs( a psychological escape from the constraints she lives in) than facing her husband. The two evolutions begin to coincide from the moment when Krogstad threatens Nora with telling Helmer that she has committed forgery. We feel that something begins to change when contradictory feelings invade her- love for the children, for the husband, and the desire to commit suicide : () never see the children again()Oh, that black icy water.Oh, that bottomless !(817) On the other hand, she would do almost anything in order to regain her old lifestyle(that of a dollwho passed from the fathers hands into that of the husbands). The transformation seems to end with the firm decision to throw herself into the water after Helmer would have found out the hidden truth : Now you must read your

Sunday, October 20, 2019

21 Awesome Email Marketing Examples To Inspire Your Own

21 Awesome Email Marketing Examples To Inspire Your Own If you’ve worked in marketing long enough, you’ve probably been asked one of these questions: â€Å"Before we move forward, do you have an example of this working for another brand?† â€Å"Can you show me how our work compares to other companies?† â€Å"Did you research any examples before putting this together?† Odds are one of those questions might have sent you back to the drawing point. At that point, you probably asked yourself one of the following, too: â€Å"I wonder how other companies do this?† â€Å"It’d be cool if I could see some samples for this from another brand. If only †¦Ã¢â‚¬  â€Å"Is our tactical execution keeping pace with the industry?† And that’s why you’re here. You’re an email marketer, and you need examples to follow. That includes: Newsletter designs to inspire your own. Crafty copy that’ll help spark your creative genius. Technical concepts that make you wonder, â€Å"Why didn’t I think of that?† You’ll find all that here, plus a smattering of templates to help you act on your inspiration. Get Inspired Now With 21 Examples of Awesome Email Marketing From @Get Inspired With 21 Awesome Examples then execute your own email marketing better with these free templates: Email Marketing Calendar: Plan your work, then work your plan! Stop wondering when each email will send and start using a calendar. Email Newsletter Template: Streamline your email copywriting process. Welcome Email Newsletter Template: Write better welcome emails for new subscribers with this simple template. And if you’re searching for tools to help organize and execute better email marketing, get started with . It’s the ultimate all-in-one marketing management platform for planning and executing everything you need to get done. Plus, it integrates with key email service providers like MailChimp, ActiveCampaign, Constant Contact, and Campaign Monitor, so your marketing team can have full visibility of every email you deliver on one comprehensive marketing calendar. Or, start a free 14-day trial. Did you know you can manage email #marketing with @?What Will These Examples Demonstrate? Before digging into each example newsletter below, here’s what each will be evaluated on: Who sent this email?  There’s a mix of major brands, media companies, bloggers, and more. What makes it work?  From design to copy and beyond, each one offers at least one takeaway you can act on. How can you emulate it?  Quick tips and links to external resources to help you implement what you learn. Table of Contents: Sample Emails From 21 Brands You Know Nike Threadless Webpage FX Hotjar Siege Media Nintendo The Verge Think With Google Starbucks Humble Bundle Lifehacker LeadPages Zapier Trello Copyblogger Bonjoro Bird Dogs Mozilla Book Riot Microsoft AdobeSample Emails From 21 Brands You Know 1. Nike This seasonal email from Nike is just in time for summer. The design is simple, the copy is minimal, and overall, it gets right to the point. The CTA buttons prioritize the Men’s section (likely based on my demographic info when I joined their list), but were I shopping for family (say, kids), those options are presented, too. With its sand-like background color, it also invokes beach imagery. How to Emulate This Example Visually, this email relies on sharp photography and creative product layout. That, combined with concise copy, leads to a crisp and uncluttered design that keeps the focus on the product. Here’s what you’ll need: High-quality product photography. If you have a photographer on staff, you’re golden. Otherwise, investing in a DSLR  and learning the basics of photo composition  may help. Understand how to use list segmentation. And send emails with the most optimal CTA to different segments. For example, another version of this email could have been sent to women. For such a simple email, there’s a little bit more happening here than it appears. Check out this great #email #marketing example from @Nike 2. Threadless Creative clothing and decor retailer Threadless has a strong visual brand. That comes across in their email marketing. This email starts with striking imagery and an intriguing value proposition (new designs). It doesn’t waste time providing the CTA button to check them out, either. Beneath that, a giveaway offer smartly shows how their prize products might look in a living space. The â€Å"Last Chance!† copy helps build some urgency, too. The next content section shows how their shirt looks on someone actually wearing it. Plus, it incorporates a quote from the artist who designed it. This last portion at the bottom includes something creative that’s easy to miss, too. Instead of generic â€Å"UPDATE YOUR EMAIL PREFERENCES† copy, it reads â€Å"GET BETTER EMAILS.† That puts the recipient first and offers a benefit rather than a command. How to Emulate This Example Threadless has exceptional visual design. Even if your company doesn’t, there are still a few things you can take away from this. Infuse your copy with urgency. This guide from Copyblogger  will help you there. Use benefit-driven CTAs. Copy like â€Å"Shop Now† and â€Å"Enter Here† are clear and simple. If there are ways to more directly sell a benefit, though, consider experimenting. Include quotes. People love ‘em. They can also help add visual interest to your copy (particularly if you don’t have access to top-quality design). @threadless nailed this awesome #marketing email. Check it out via @ 3. Webpage FX This Pennsylvania-based agency sometimes sends emails that are written like full blog posts. Ordinarily, you might think this goes against best practice, because no one will read the post on your site if they can get it in their email. But, is that a problem as long as they’re getting your content? That appears to be the logic here, because instead of sending readers somewhere else to read, they smartly link out to a call to action (turning three clicks from email to blog to CTA down to just two, from the email to a landing page). In-line images even use directional markup like they would in a blog post: Then, once they have the reader hooked, they let them know, â€Å"Hey, our agency can help you execute this.† It’s a great example of offering enough information to be helpful, but leaving enough out to where one might want some assistance. How to Emulate This Example This is simple: Write your email like a typical how-to blog post. You can get help on that here. Then, drop a relevant and high-value call-to-action into your content. Here’s what you need to know about writing compelling CTAs. Effectively, instead of using email to get blog traffic, you’re creating the same content and cutting out a step between the reader getting to your site and actually converting. That’s smart. Check out this creative email #marketing format from @webpagefx 4. Hotjar Plain text doesn’t have to be plain. This example from Hot Jar uses appealing fonts and color coordination to make a simple email promoting a podcast episode look great. Below, they tempt listeners to click with a free t-shirt offer (and use some simple visual styling to make things look a little more interesting): David’s mugshot even uses a color filter effect to make it stand out. How to Emulate This Example There’s not much to this one but it works exceptionally well. Even if you’re not a design wizard, you can still make your plain text emails look anything but boring. Pick two or three colors to use. Ideally, ones your brand already uses. You can learn all about color psychology in marketing (and snag a free HEX color chart) here. Use the HEX color codes in the post linked above to pick colors you know will look good together. Never mind if you think you have an eye for what looks good. That post will keep you on the right track. Then, when creating an email in your email platform, use those colors on your buttons and background styling. This #email campaign from @hotjar sets a great example to follow: 5. Siege Media Here’s another example of an awesome plain text email. It keeps things skimmable by using single-sentence paragraphs and getting right to the point (this especially makes reading on small phone screens easier). How to Emulate This Example This is even more simple than the Hot Jar example before. Simply use a color that’s used in your logo or branding, and adjust the color of your link highlighting and buttons in your email service provider. Keep your copy tight and concise, and you might be surprised how much better your email looks. This email #marketing example from @siegemedia shows plain-text doesn't have to be boring 6. Nintendo This email from Nintendo makes creative use of an embedded GIF. Not only does it look cool, but it ties in well with the Nintendo Labo’s marketing tagline: Directly beneath that is a CTA with a cardboard-like texture, invoking the Labo’s cardboard design: Next, it shows off some things that can be created with the Labo: The last call-to-action is for a contest that plays off creativity and gets the reader engaged: How to Emulate This Example You might not have the brand recognition of Nintendo. But, don’t let that stop you from turning this awesome email into actionable inspiration: Experiment with GIF email headers. GIF Maker from GIPHY  is a great free tool for doing this the easy way. This guide from Lifehacker  offers more options, from free to Photoshop. Incorporate visual elements from your product in your email design. The Labo is a cardboard kit that can be turned into all kinds of different devices. So, the email uses a cardboard-like backdrop texture. Think about what colors or textures your product invokes and collaborate with a designer to incorporate them. BRB, I need to order a Labo now. Want to do #email #marketing like @NintendoAmerica? Get started with some inspiration here: 7. The Verge Here’s another example of plain text being anything but plain. By using a stylish yet understated header, an interesting font that fits their tech-centric aesthetic, and a little bit of color (borrowing the pink shade from their visual identity system), the Verge makes their daily email update look awesome. How to Emulate this Example There are a few things going on here that can easily be replicated: Use a consistent header graphic: Try creating one with Canva or work with your design team to create something simple. Change your linked text color: Make it match your branding. Keep your copy conversational. Rather than just blast out links, each edition of their newsletter opens with a light and conversational intro. Here's how to make roundup #email newsletters more interesting like @verge 8. Think With Google As this email from Google demonstrates, sometimes less is more. If you have something specific to share, sometimes focusing on that one thing is the way to go, rather than weighing down your email with extraneous content. How to Emulate This Example If you have something important to share, or something that’s a priority to drive traffic toward, send a simple email promoting nothing else but that one thing. One headline, four sentences, and a button should be all you need. How does @ThinkwithGoogle keep #marketing emails simple yet compelling? 9. Starbucks Welcome emails don’t have to be complicated to be effective. This one from Starbucks is visually appealing and clearly communicates when the recipient can expect. How to Emulate This Example If you don’t have welcome emails set up for new subscribers (whether a single message or a conversion-optimized email flow), create one. Get started with Scott Cohen’s guide. Check out this simple yet effective #email #marketing example from Starbucks (plus 20 other brands) 10. Humble Bundle You might have an awesome offer that your audience wants to act on, but just not right now. This example from entertainment media subscription service Humble Bundle gives recipients the option to be reminded about the offer, rather than having to take action right away. Clicking the Remind Me link directs users to the same landing page as the offer button on the left, but prompts this pop-up: Clicking the link ensures you’ll get a follow-up email. How to Emulate This Example Create a call-to-action that’ll either send your email again at a later date (before the offer expires) or adds recipients to a list segment to receive a reminder. Here’s how to use click segmentation in each of four popular ESPs: Constant Contact MailChimp Campaign Monitor Active Campaign This is a bit of a complex process, but essentially, you want to get someone who clicks that button to get added to a segment that will send them a reminder email. If you have an automation expert at your company, work with them to get this set up. How can you use email reminders like this example from Humble Bundle? 11. Lifehacker Email newsletters often link out to multiple articles in a straight line. Lifehacker breaks theirs up using content blocks of various sizes to make it more visually interesting. Note the block for sponsored content here, too: How to Emulate This Example This is as simple as creating a newsletter design that uses content blocks of differing sizes. Don’t go too overboard, but starting with a single column width for your most important content, then including ads, sponsored content, related link, and other content in smaller boxes beneath that is a good start. Limit yourself to two or three different formats. Check out this #email newsletter example from Lifehacker (and 20 other brands) 12. LeadPages The best email marketing often feels like a conversation. This copy from LeadPages nails it. The message opens with a relatable anecdote, then leads into what the email is all about. How to Emulate This Example Write your copy as if you’re talking to an actual person. If you’re struggling to break the grasp of corporate-speak from your copy, start with this great guide from Copyblogger. How can you make email copy more conversational? Follow this example from LeadPages 13. Zapier Want to get people to open an email? Imply they might have a problem they’re unaware of, then offer a solution. This email from Zapier uses a little bit of empathy to soften the blow, too, relating the fact that the writer themself struggles with that same problem. Nobody wants to feel like they’re the only one. How to Emulate This Example This email follows the classic Problem-Agitate-Solve (PAS) copywriting formula: Problem: Identify something your audience struggles with. Agitate: Remind them of how much that problem is a pain. Solve: Promise a solution. That’s it. From the headline to the CTA button, this email moves through all three stages concisely. How can empathy make email more engaging? Check out this example from @zapier 14. Trello CTA button copy like â€Å"Read More† and â€Å"Click Here† are common and, well, boring. This email from Trello uses much better action-driven copy that’s unique and relevant. How to Emulate This Example Avoid the temptation to write boring button copy and think of something more interesting. But, don’t jump to something creative for creativity’s sake. Make sure you’re asking people to do something relevant to the task at hand. For example, if you were writing a button to drive email signups, instead of â€Å"Signup Here,† you could try something like â€Å"Be Smarter† or â€Å"Learn Our Secrets.† Something that implies a benefit for the recipient. How does @trello make email button copy more compelling? Check out this example: 15. Copyblogger This email from Copyblogger mixes up different types of content to hook readers in and give them what they want. It opens with a nice conversational intro: Followed by a clean and crisp CTA: And additional content blocks with new and related articles: Note that the button copy encourages engagement by asking recipients to comment in addition to reading. How to Emulate This Example Follow this email content format: Conversational lead story. This is the piece your subject line should promote. A relevant call-to-action. See if you get more conversions placing it near the middle of your email. Related content. This can be a mix of your own content, or curated sources. Together, each of these elements: Hooks the reader in with casual and conversational copy. Includes a CTA in the middle of the email, where they’re more likely to see it, rather than near the end. Includes tons of relevant content, so the reader is more likely to find something they’re interested in, even if the lead story doesn’t hook their interest. How can marketers format emails like @copyblogger? Check out this example (plus see samples from 20... 16. Bonjoro Bonjoro does a great job of giving their emails personality. The copy is brisk, light, and conversational. Their graphics are well-designed and aren’t afraid to have a little fun. It’s all understated yet crisp, dabbling in humor without going overboard. Check out this header and intro copy: Followed up with an embedded video: And a graphic that works in some nice Mario fireballs and fun copy: This is great because it shows off the company’s quirks while sharing valuable info. How to Emulate This Example Let your company’s personality shine through in your email copy. Whether that’s light and fun, or authoritative and serious, make your emails sound like who you are. This video from Pixel Ink does a great job explaining how to understand brand tone and voice: And this video guide from Copyhackers  explains how to edit email for tone and voice well. How can you infuse personality into your email newsletter copy? Check out this example from Bonjoro... 17. Bird Dogs Men’s shorts company Bird Dogs aren’t afraid of getting NSFW. Not an approach that works for everyone, but works extremely well for reaching their audience. Here’s a fairly tame example of their sense of humor: And their creative approach to product naming conventions: How to Emulate This Example Shorts aren’t the first thing most people think of when they think about †¦ well, anything, ever. Unless you’re getting dressed for a summer day, most of us don’t care that much about shorts. So, if you have a product that’s mostly utilitarian, or just something that’s not super jump-off-the-screen exciting, make it not boring. That can be as simple as writing loose copy that feels like it came from a real person, to making full-blown comedy what you stake your brand on (you need to be good if you’re going to go this route). How can email marketing make ordinary product categories more interesting? See how Bird Dogs does... 18. Mozilla If you subscribe to lots of email newsletters (and most marketers probably do), it can easy to forget who or what exactly some things are that end up in your inbox. While Mozilla is extremely recognizable, you might not be familiar with their IRL Podcast. So, they smartly include explainer boilerplate copy at the end of their email promoting each episode, reminding you what this specific thing from Mozilla is all about: How to Emulate This Example If you send emails to promote a recurring content series (like a podcast, YouTube show, or something else), include something at the end reminding recipients what it’s all about. This will help build awareness around your series or show and help people separate those emails from your other newsletters, offers, and general email content. People get a lot of email. How do you remind them who you are (in case they might have forgotten)? 19. Book Riot Book Riot packs a ton of information and value into their events newsletter. The intro copy is fairly standard: Followed by some sponsored content (an easy way to monetize your list): After that is an extensive listing of book-related events: Including more events for touring authors: Plus events that are upcoming: The way they keep this all from getting too repetitive is to break up the formatting in each section. Each one looks distinct, and the events are listed in order of priority. Then, at the end is a well-designed CTA graphic: Overall, this packs tons of content into a well laid out newsletter. How to Emulate This Example You can cram a lot of content into an email newsletter without it feeling like too much, as long as the visual layout is broken up to be easily skimmable. Organize content into groups and give each section its own formatting style. How can you make long email newsletters easily skimmable? Follow this example from Book Riot 20. Microsoft Want to get people engaged with your email? Make it fun and interactive. That’s exactly what Microsoft does with its rewards quiz emails. Each email features quizzes around a different theme, giving recipients a chance to earn Microsoft Rewards points they can redeem for prizes, coupons, offers, and more. After the opening question (which typically features some striking photography) there are a few more chances to win points, too: How to Emulate This Example Many email service providers integrate with quiz platforms that make creating newsletters like this easy. If you’re a MailChimp customer, consider using Fyrebox: Change up your emails with quizzes. Here's how Microsoft does it (and you can, too) 21. Adobe What if you have different tiers of customers who might be interested in similar yet different products from you? One option is to include two CTAs side-by-side and let them choose which offer is most interesting. In this example from Adobe, there are two different versions of Photoshop with identical pricing, but with different feature sets aimed at different needs. How to Emulate This Example Try offering two similar yet different products in one email to the same audience. This can help identify which is more popular, or just increase conversions by giving recipients a choice in which product to go with (rather than deciding the offer they got didn’t fit their needs).

Saturday, October 19, 2019

Six Feet of the Country Essay Example | Topics and Well Written Essays - 500 words

Six Feet of the Country - Essay Example apartheid system was implemented in South Africa which segregated the people into major racial groups - white; Bantu, or black Africans; Colored, or people of mixed descent; and Asians - and determined the living and employment standards of each group. Public facilities were segregated and nonwhites were not represented in the national government. The policy ended in 1990 when then-President F. W. de Klerk released the anti-apartheid activist and African National Congress leader Nelson Mandela from prison and legalized black African political organizations (â€Å"Apartheid†). Clearly, the story was set at a time when apartheid was at its peak as the narrator tells us about the â€Å"tensions the Johannesburg people speak of† not being the hubbub of the city but of the â€Å"guns under the white men’s pillows and the burglar bars on the white men’s windows..† and the awkward moments when â€Å"a black man won’t stand aside for a white man† (Gordimer 9). The couple chose to live in the farm to change something in them and find peace in their marriage. Although it is clear that they were not able to fulfill the latter goal, at least they were able to change. The histrionic Lerice became engrossed with running the farm and became attached to the servants. The narrator, who was a complainant brat who did not care about his servants as long as they did their work, sees the injustice of the system in the middle of the business of illegal immigrant’s body. Upon knowing of the death, the narrator notified the health authorities and the police to be able to know the cause of death. Apparently, the young man died of pneumonia and was disposed of by the authorities. However, Petrus insisted on burying his brother’s body and repeatedly begged the narrator, his baas or boss, thinking that because the baas is a white man, he can do anything. Petrus, together with the other servants, scraped up twenty pounds just to be able to get the dead body back which annoyed the

Friday, October 18, 2019

Design ethics of pratice Essay Example | Topics and Well Written Essays - 1750 words

Design ethics of pratice - Essay Example This paper highlights the competing values that have played out the contemporary companies that advertise their products. In 1996, Calvin Klein also known as CK made remarkably advertisements in the televisions, and magazine, the advert was in promotion of their jeans products. The advert drew criticism from all quarter of the world given the kind of pictures that were used in the adverts, the company used picture of some young people that were posed in a provocative manner- the young people were actually nude. They made this pictures be aired in televisions attracting huge uproar of complains and castigation. Notwithstanding, CK has had a fair share of controversies surrounding their advertisement criteria, in 1980's they aired ads that saw a 15-year-old actress Brooke Shields saying, ‘Nothing comes between me and my Calvin’ (Berry 2000, p. 41). The advert becomes controversial in the sense that it is mostly concentrated around the actress private parts; this has raised eyebrows and attracted condemnation from the public. The focus of the advert on the specific parts of the actress body was perceived unethical and resulted into complains that were given then. The company staged a series of ads in 1996 that was aimed at promoting the CK jeans wear by engaging models who posed in suggestive ways. The ads began in early July and ran in several magazines that were read by those considered to be under aged. For instance, during the period of advertisement in the magazines, young girls aged 12 years got access to the pictures that were considered unethical. Many publishers, in this relation claimed that the adverts that were used by CK then bordered pornography and should not have been aired to the public. Figure A shows one of the images taken from the ad of 1996 Figure A As can be seen in the pictures, the ad exhibited a photographer shooting a young male and a female models in what appeared to be a wood-panelled basement. The shooting was coupled wit h a creepy, predator voice of the young lady asking the man who is half dressed some suggestive questions. The lady asked â€Å"Do you think you can rip off that shirt on your body?† the young man then responded and obliged to the young lady’s question by removing the shirt. She continued and commented â€Å"That's a nice body, do you work out?† at this time, the camera used in the shoot out was concentrating in the young lady’s private parts. Parent groups and children welfare organizations raised questions about the age of the participants in the campaign, many of whom looked to be under 18.  These organizations felt that the children were being coerced to appear in the shoot out under the pretence that they will be normal shooting but the whole issue changes to the nude shooting that is used for CK adverts. According to the organizations, adverts should be moderated even if they have to be suggestive about sex, the one that was used by CK went overbo ard since the shoot out was done in an environment that depicted pornography. The belief that the advert bordered on pornography is also accentuated by the fact that one can hear the photographer instructing the actress on how to look like a pornographic actress.   This public complain was taken to the department of justice and investigations were warranted to look into the possibility of the advert having violated child phonographic

Module 5 - Case Managing Workplace Safety and Health Assignment

Module 5 - Case Managing Workplace Safety and Health - Assignment Example The law gives permission to CMS for variety of actions like it may charge fines to the nursing home, even assign a temporary manager. If the nursing home fails to correct its misgivings, CMS has right to terminate certification agreement and thereafter it ceases to be a provider as the nursing home. Providing care, safety to nursing home residents is an uphill task. The residents often require assistance in performing daily activities including bathe and walk. The injury prevention efforts should focus on resident lifting and handling methods. A working group is to be formed to study above safety hazards and action plan to be prepared in consultation with the experts. That action plan is to be implemented in accordance with the OSHA regulations. Full-fledged records are to be maintained for future corrective action and monitoring of the each major type of incidents. There are several elements to Safety and Health program, which will be formulated, developed, and monitored to see that they are strictly followed. Outcome from each of the accident prone area so obtained will be compared with the previous month’s incidents so that progress made on each count can be notified and next corrective action is initiated. It will be a continuous process and may last for several months until desired levels of safeguards, quantitatively and qualitatively, achieved. Following are the areas, which will be studied intensively and form a part of the safety and health program. United States Department of Labor has devised guidelines to reduce the manual lifting of the residents. Ergonomic study is required to be done with respect to lifting and handling the residents for their many daily activities to increase safety of the staff and residents. Repetitive, forceful and prolonged actions of the hands with lifting, pushing, pulling of heavy objects and awkward postures could cause normal to serious injuries in the long

Thursday, October 17, 2019

Intrinsic vs. Extrinsic Motivation Research Paper

Intrinsic vs. Extrinsic Motivation - Research Paper Example perform at the best possible level. This motivation could be innate or derived from external forces/functions, referred to as intrinsic motivation and extrinsic motivation, respectively. Level and/or intensity of these two types of motivation have an impact on individual’s commitment, interest, and ability to perform, learn and progress in all aspects of life, be it learning, working, or performing any other activity. Moreover, individuals are variably inclined towards extrinsic and intrinsic rewards. Extensive theorizing and research have pointed out that both these motivations are impacted by each other and that they either enhance or undermine impact of the other. This study explores this aspect of motivation while comparing and contrasting both types, with support derived from theories, researches and practical applications. Getting inspired by engaging in activities that produce excitement and challenge is a basic human nature and is one of the core routes towards human development (Sansone & Harackiewicz, 2000). The Cognitive Evaluation Theory explains intrinsic motivation as individual’s opinion or feeling and competence rather than an inner urge itself. Here the control and learning aspects emerge when rewards are attached to task accomplishment. The CET proposes that an individual’s intrinsic motivation is based on control and information. It proposes that if the individual’s locus of control lies outside, then intrinsic motivation is low and if it lies inside, then intrinsic motivation is high; secondly, if the individual has positive information of competence, knowledge, and/or stimulation, then intrinsic motivation is higher and vice versa (Weinberg, 2009). Traditionally, extrinsic rewards were considered as harmful because extrinsic motivation was compared with extrinsic pu nishment (Cameron & Pierce, 4). The CET theory forms the base for understanding intrinsic and extrinsic motivation as well as many arguments with respect to

Final exam study sheet Research Paper Example | Topics and Well Written Essays - 500 words

Final exam study sheet - Research Paper Example Explanation- This is an ironical statement and also the mostly used in the entire story since it is the only answer that Bartle by provides for every question asked regardless whether he is to anything or not. Using the word ‘prefer’ does not necessarily mean that Bartleby would do as expected despite what he claimed to prefer. Quote two (unreliable narrator)-Dead letters! Does it not sound like dead men? Conceive a man by nature and misfortune prone to a pallid hopelessness; can any business seem more fitting to heighten it than that of continually handling these dead letters, and assorting them for the flames? Explanation- In this quote, it is evident that the narrator has ways of involving his audience through asking of questions hence providing a chance for them to flow with him. He uses this technique in explaining the reasons behind the character traits of Bartleby and the reason that led to his job dismissal. Quote one (feminism)-â€Å"But now there was a dull stare in her eyes, whose gaze was fixed away off yonder on one of those patches of blue sky. It was not a glance of reflection, but rather indicated a suspension of intelligent thought.† Explanation- The above quotes explains facts on feminism whereby the author shows the different reactions among women on receiving sad news. The reaction of Louise shows how deeply the news reached to her and the mannerisms in which her reaction was different from that of other people. In her gaze, there is a difference that can be considered shrewder and even incredibly active. Explanation-this quote is ironical in that the previous day before the news were brought Louise prayed that life would be long yet it is during this time that her loved ones die. Also, in the prior days she had always prayed that her days would be shorter. Explanation- This quote is ironical in

Wednesday, October 16, 2019

Intrinsic vs. Extrinsic Motivation Research Paper

Intrinsic vs. Extrinsic Motivation - Research Paper Example perform at the best possible level. This motivation could be innate or derived from external forces/functions, referred to as intrinsic motivation and extrinsic motivation, respectively. Level and/or intensity of these two types of motivation have an impact on individual’s commitment, interest, and ability to perform, learn and progress in all aspects of life, be it learning, working, or performing any other activity. Moreover, individuals are variably inclined towards extrinsic and intrinsic rewards. Extensive theorizing and research have pointed out that both these motivations are impacted by each other and that they either enhance or undermine impact of the other. This study explores this aspect of motivation while comparing and contrasting both types, with support derived from theories, researches and practical applications. Getting inspired by engaging in activities that produce excitement and challenge is a basic human nature and is one of the core routes towards human development (Sansone & Harackiewicz, 2000). The Cognitive Evaluation Theory explains intrinsic motivation as individual’s opinion or feeling and competence rather than an inner urge itself. Here the control and learning aspects emerge when rewards are attached to task accomplishment. The CET proposes that an individual’s intrinsic motivation is based on control and information. It proposes that if the individual’s locus of control lies outside, then intrinsic motivation is low and if it lies inside, then intrinsic motivation is high; secondly, if the individual has positive information of competence, knowledge, and/or stimulation, then intrinsic motivation is higher and vice versa (Weinberg, 2009). Traditionally, extrinsic rewards were considered as harmful because extrinsic motivation was compared with extrinsic pu nishment (Cameron & Pierce, 4). The CET theory forms the base for understanding intrinsic and extrinsic motivation as well as many arguments with respect to

Tuesday, October 15, 2019

No topic 1 Essay Example | Topics and Well Written Essays - 250 words

No topic 1 - Essay Example inees through journal writing but there are other researchers who have shown that journal writing cannot assess how the practitioners will stop during an activity to frame the problem according to their past experiences and observations. Judging trainees through journal writing can impact their writing so it is not an effective assessment technique. However, reflective writing still is a great assessment mechanism in which the medical educators assess the writing both qualitatively and quantitatively and find out if the trainees have used reflective process in analyzing and solving a clinical problem by linking their knowledge with what should be done. Educators can assess whether trainees have tried to synthesize the information in the reflective process and have considered all perspectives to the solution. They can also assess whether the trainees have explored options other than what is needed or have made assumptions but do not know how to apply them. Thus, this way the educators can assess the trainees through the reflective

Monday, October 14, 2019

Cultural Evaluation in Japan Essay Example for Free

Cultural Evaluation in Japan Essay Cultural evaluation in which you identify the ways that arguments or presentation of the arguments would need to be changed as the result of cultural differences in the country of Japan.               Language is a process of free creation; its laws and principles are fixed, but the manner in which the principles of generation are used is free and infinitely varied. Even the interpretation and use of words involves a process of free creation. ‘Noam Chomsky’. Self-expression should be done in an artistic way for the fulfilment of communication.             Japanese business persons come up with resolutions based on the cultural value of Group frontage. Conclusions tend to be made by group consensus as opposed to Individuality. A foreigner who would desire to venture into business in Japan should not be pretentious as He or She is making advances in establishing a business foundation. Displaying a humanistic culture will be a great principle that will propel the business to greater heights. Strategic measures to observe as a business person             For one to hit the expected set mark in a business, observe and apply the following aspects so that your message is communicated virtually, without embarrassing, intimidating, or offending the clients that are within your target. Speech clarity            This calls for clear articulation so that people can hear and comprehend every word you are saying. Avoid mumbling in your speech, or speaking extremely fast when addressing the prospective client whose native language is Japanese. Speak moderately            Address business people by reducing speech speed. Allow them time to capture your words and abstract the meaning. Provide verbal and non-verbal clues to check for conformity whether you are being understood. When your clients prompt you to repeat what you have said, look puzzled, or respond with difficulty, most likely they have not understood you (Delassus, 1972). Repeat your proposal slowly in the same or different words. In case this does not work out, write it down. Triangulate the key points          This approach calls for expressing the same idea more than once in slightly different ways. It provides your clients better chances to capture what you are saying. For example: Entrepreneur’s Words and Clients’ Thoughts â€Å"I presume the equipment will run smoothly†¦Ã¢â‚¬  Yes†¦ or â€Å"The gadget will operate properly†¦Ã¢â‚¬ Right†¦ Maintain appropriate tempo and intonation         When varying the tone of your voice, switching the tempo, and stressing on areas you would like to emphasize, you provide more hints to help your correspondent grasp your message. Provide posters through the conversation             Posters initiate your partners beforehand by informing them about the topic of your discussion or presentation, as well as any changes along the way. For instance: A slide show, model or chart can be very helpful. Create verification links             In inter-cultural communication, especially, it is valuable to keep checking whether your listeners are getting along with the discussion. This can be done by; asking questions, providing elaborative statements until the idea is passed across. Express numerals and dates slowly            Numbers can be expressed in various ways in different parts of the world These include phone numbers, prices, quotations, , flight numbers, exchange rates, dates addresses,. For example: $1800 can be expressed as eighteen hundred or one thousand eight hundred. October 20th can sound like October 28th. Write down unfamiliar codes or technical symbols            When professional jargons are to be used, it is advisable to write them on a white board, provide a slide or handout. Repeat the use of a term that listeners are not familiar to know or cannot understand (Varley, 2000). Confirm schedules            Observe protocols related to time or dates. Arriving on time sends a positive signal of commitment and certifiable.   Maintain a sense of humour            When expressing yourself, it is important to maintain social relations by sharing humorous experiences in life. Allow the clients to also feel free to share their experiences. Maintain equilibrium. Be sincere                Sincerity and taking up responsibility creates a fair relationship, a positive atmosphere for doing Business References Delassus, J. F. (1972). The Japanese: A critical evaluation of the character culture of a people. New York: Hart Pub. Co http://www.jetro.go.jp/costarica/mercadeo/communicationwith.pdf http://www.presentationprep.com/international-presentations/ Varley, H. P. (2000). Japanese culture. Honolulu: University of HawaiiÌ€ Press. Source document

Sunday, October 13, 2019

Non State Actors In International Security

Non State Actors In International Security 1. In the process of state transformation, such as the emergence of new political spaces beyond the territorial nation state, relocation of politics from the state to international and sub-national organizations, diffusion of political power from public authorities to semi-public and private actors, and de-legitimization of the state (crisis of the welfare state, state failures, lack of performance), the old paradigm of top-down, state-led, command control ways of steering the states has been replaced by the new forms of governance and policy instruments: network-like arrangements of public and private actors, self-regulation by business organizations, public-private and civic-private partnerships, etc have emerged (Arts, 2005, p. 2). Many scholars refer to this as a shift from government to governance which is generally referred to as global governance in the study of international relations (Ibid.,p 3). This new concept of global governance invariably includes the relevance of non -state actors (NSAs) for governing global issues. 2. With the proliferation of non-state actors in International Politics,..the traditional Westphalian nation-state is experiencing an erosion of power and sovereignty (Non-state actors, 2010). This eventually undermines the states monopoly of the use of force as well as the monopoly on raising taxes and revenues which seriously restrict the effective performance of basic functions of the sovereign nation state.  [1]  This would not only lead to additional humanitarian disasters, but create tangible security problems and governance failures at the local, regional and at the global level. 3. Non-State Actors have emerged in international relations as important actors. They are limiting the authorities being enjoyed by sovereign nation-state under state-centric international relations based on principles of Westaphalian system.  [2]  By weakening states, NSAs are establishing themselves at domestic as well as international level. 4. At present world order, international security seems to be influenced by NSAs at unprecedented level. The diverse range of non-state actors plays a unique role in the changing dominion of international security in different manner, either positively or negatively. Certainly the various types of non-state actors like Intergovernmental Organizations (IGOs), Non Governmental Organizations (NGO), Multinational Corporations (MNCs) and private security firms, and Violent Non-State Actors (VNSAs) may exert their energy in different manner in order to influence the international relations of 21st century there by affecting the international security as a whole. In order to understand the degree, nature, and gravity of influence, the major NSAs have been exerting on international security, their role in international relations need to be explored. METHODOLOGY Statement of the problem 3. To understand and explore the degree, nature, and gravity of influence, the major non-state actors have been exerting on international security. Hypothesis 4. The NSAs are the important players of international relations and they influence international security to a greater extent. The degree and nature of influence exerted by various non-state actors is not same. It is basically depend on the intention and capability of the individual non-state actor. Justification of The Study 5. In post cold war era, international security seems to be influenced by NSAs at an unprecedented level. The role that the NSAs play in the international security arena has come to the notice of many only after the attacks of September 11th. The non-state actors come in various shapes and sizes ranging from Intergovernmental organization, non governmental organization, Transnational companies, terrorist and various criminal organizations etc. This diverse collection of NSAs, with different intentions and capabilities, each plays different and unique role in the international relations. This study will try to explore the role of NSAs in international relations in order to understand the degree, nature, and gravity of influence that the major NSAs have been exerting on international security. Scope 6. Every study and research will not be free from some weakness and drawbacks. The study is limited to certain boundaries for which future new researcher will try to find out the fact in more detail. The scope of the study is limited to the exploration of the influence of major NSAs on international security. NSAs, most active as well as with the strategic influence on international relations have been selected for the study. In this study, international security has been discussed from the traditional security point of view. The traditional security concept refers to the realist construct of security in which the referent object of security is the state. Research Methodology 7. Due to the nature of the subject matter the research is based on the documentary sources. Published materials in the form of books, journal article, dissertations, and reports mainly collected from electronic sources, mostly internet, have been used as secondary sources for this research. Organization of the Dissertation 8. It is proposed to study the subject in the following manner: (a) Chapter I: Introduction. The subject would be introduced broadly. Similarly the necessity to carry out the research and the objective to be achieved from the study would be highlighted. This chapter also includes the limitation of the study, methods followed and the preview of the study. (b) Chapter II:Non State Actors and International Security. The detailed Concept of non-state actors and its role at present day world order will be highlighted. Brief background of non-state actors, its relevance at present day context and the diverse assortment of non-state entities will also be briefly brought out. Finally the most influential non-state actors in international relations in framing the international security will be identified for further discussion. (c) Chapter III: Intergovernmental Organizations (IGOs) as Non State Actors. This part would bring out various important intergovernmental organizations presently active in the world politics. Arguments would be made to qualify these intergovernmental organizations as non-state actors and at the end their contribution in international security will be brought out in detail. (d) Chapter IV: Violent Non State Actors (VNSAs) and International Security. This part will highlight the role and significance of the violent non-state actors in international security. In doing so firstly the violent non-state actors are clearly defined and out of many violent non-state actors only relevant and most influential violent non-state actors would be selected for further discussion. (e) Chapter V: International Nongovernmental Organizations (INGOs) and Multinational Corporation (MNCs) as International Players. In this portion the argument would be made to analyze importance of the International Nongovernmental Organizations and Multinational Corporations in driving the international relations of 21st century. Finally some conclusions will be drawn regarding the role being played by International Nongovernmental Organizations and Multinational Corporations in shaping the international security. (e) Chapter VI: Conclusion. Based on the arguments made in the various chapters a logical conclusion would be drawn in identifying the degree, nature, and gravity of influence, the major non-state actors have been exerting on international security. CHAPTER II NON STATE ACTORS AND INTERNATIONAL SECURITY 9. According to Wikipedia, online encyclopedia, Non-State Actors, in international relations, are actors on the international level which are not states. (Non-state actors, 2010). In Bas Arts definition, they ..are all those actors that are not (representatives of) states, yet that operate at the international level and that are potentially relevant to international relations (2005, p. 4). Citing Josselin Wallace (2001), Joanna Szalachas defines NSA as ..an organization largely autonomous from central government funding and control, it acts between the modern states within the networks, which extends across many borders (n.d., p. 3). 10. First two of above mentioned definitions are simple and believe that only an actor, essentially not a state, active as well as influential at international level, could be a NSA. Szalacha seems to be accepting that a transnational actor focused to a state could also be a NSA. Saying largely autonomous from central government, she does not negate the possibility of some link between NSA and state. Abram Paley is concerned about the strategic role or effect of an actor to qualify itself as a NSA. After discussing several definitions, he summarizes an inclusive definition of strategic NSA with two vital components: (a) any actor that participates on the international stage or affects international interaction, but is not part of the domestic state structure, and (b) an actor-not an issue-that has the common attributes with which all actors in Common game-theoretic models are endowed-i.e. preferences, beliefs, strategies, etc. (Paley, 2008, p. 33). 11. From these different definitions of NSAs, following could be concluded: NSAs are autonomous from states or do not represent the states or governments but may have some link with certain state(s). NSAs operate at international or minimum transnational level. NSAs strategically influence international relations. 12. There are different classifications of NSAs; Table 1 shows three of them by Paley (2008, p. 29), Ataman (2003, p. 45) and Arts (2005, p. 4). Although, there are great similarities in all these three classifications, all writers mention that their classification is not the complete one. Paley says his classification is out of some common example and NSAs are not limited to them, whereas Atamans list of five NGOs is the ones which he believes are of more effective types. 13. There are varieties of actors other than state and it is difficult to find one of such actors without some sort of international or transnational connection in present context of globalization. Therefore, one may come up with more types of NSA than that is mentioned here. For example, Wikipedia in its classification of NSAs, apart from these common ones, has also included the international media, and transnational Diaspora communities (Violent non-state actors, 2010). It has grouped NSAs using violence as Violent NSA but not included IGOs. Regarding, VNSA, it is a common practice to address all NSAs which use illegal violence as their means. There is a lack of consensus on the issue of IGOs; one school of thought believes that an organization formed and collectively participated by the states cannot be termed as a NSA.  [3]  As per the definition and degree as well as gravity of their strategic influence on international relations, one can draw the conclusion that the major N SAs could be classified into four groups, namely IGOs, VNSAs, INGOs, and MNCs. Abram W Paley Muhittin Ataman Bas Arts International Terrorist Organizations. International Criminal Organizations. Nongovernmental Organizations and Grassroots Activists. International Institutions and Inter-governmental Organizations. Multi-national Corporations. Individual Actors. International Intergovernmental Organizations (IGOs). Transnational or International Nongovernmental Organizations (NGOs). Multinational Corporations (MNCs). National Liberation Movements (NLMs). Epistemic Communities. Religious and Humanitarian Organizations. Terrorist Groups and Drug Traffickers (Narco-Terrorists). Intergovernmental Organizations (IGOs). International Non-Governmental Organizations (INGOs). Corporate Interest Groups (CIGs) and Transnational Corporations (TNCs), Epistemic Communities (ECs). a remainder category (including terrorist networks, professional organizations, scouts, churches, etc.). Table 1: Different Classifications of NSAs 14. NSAs appeared at international level as a group of social actors since 1980s and by 1990s, those organizations have gained power and increased influence on public institutions and different states agendas (Szalacha, n.d., p. 3). But NSAs are not completely new phenomena; ..the Hanseatic League monopolized trade on the Baltic Sea between the 13th and 17th centuries, the highly powerful East India Company was founded in 1600, European haute finance was a major contributor to the relative peace of the 19th century, and the Red Cross dates to the 1860s (NIC, 2007). According to Ataman, The proliferation of non-state actors has recently led some observers of international relations to conclude that states are declining in importance and that non-state actors are gaining status and influence (2003, p. 42). Quoting Miller, Ataman further says, The growth of so many kinds of non-state actors challenges and even weakens the state-centric concept of international politics and replaces it w ith a transnational system in which relationships are more complex. These organizations changed the international environment (Ibid.). A report says, A globalization-fueled diffusion of finance and technology has enabled non-state actors to encroach upon functions traditionally performed by nation-states, facilitating their evolution into forms unheard of even a few years ago (NIC, 2007). 15. The NSAs have emerged in international relations as equal as the nation-states. It may compel states to adopt more complex transnational system but in reality, NSAs rise has greater impact in international relations. NSAs have changed the overall traditional concept of international relations, based on the principles of Westphalian system of sovereign states, as Schwartz writes, The influence of non-state actors in this globalized world is unquestionably stronger than at any point since the Westphalia system of state sovereignty was established in 1648 (n.d.). 16. International security is the most influenced aspect of the changing trend of international relations due to the rise of NSAs. Under the traditional concept of international relations, international security is maintained through two types of organizations: classical collective security organization and defensive security organization. The first type of organization is designed to promote international security through regulating the behavior of its member states, whereas defensive security organization is to protect a group of states from threats emanating from a challenging state or group of states. (Gleason Shaihutdinov, 2005, p. 274). In present context, the role of traditional collective security organizations has expanded, if not changed; those organizations have been transformed into NSAs as intergovernmental organizations. Similarly, defensive security organizations have lost their appeal in present unipolar world order; but threat of violent NSAs for them has replaced t hat of formidable rival state or group of states. 17. Non-State Actors have emerged in international relations as important actors. They are limiting the authorities being enjoyed by sovereign nation-state under state-centric international relations based on principles of Westaphalian system. By weakening states, NSAs are establishing themselves at domestic as well as international level and they influence the international security to a greater extent. The degree and nature of influence may vary from one NSA to other; it could be positive or negative as well as at large or small scale. Whatever role the major NSAs are playing in international relations, needs to be studied in order to explore their influence in international security. CHAPTER III INTERGOVERNMENTAL ORGANIZATIONS AS NSAs Defining IGOs 18. The term official web page of Harvard University defines IGOs as an entity created by treaty, involving two or more nations, to work in good faith, on issues of common interest. In the absence of a treaty an IGO does not exist in the legal sense. For example, the G8 is a group of eight nations that have annual economic and political summits. IGOs that are formed by treaties are more advantageous than a mere grouping of nations because they are subject to international law and have the ability to enter into enforceable agreements among themselves or with states. (Harvard Law School 2010, Intergovernmental Organizations) 19. The main purposes of IGOs were to create a mechanism for the worlds inhabitants to work more successfully together in the areas of peace and security, and also to deal with economic and social questions. In this current era of increasing globalization and interdependence of nations, IGOs have come to play a very significant role in international political systems and global governance. 20. The number of IGOs is difficult to determine, but estimates range from 270 to more than 1000. They cover multiple issues and involve governments from every region of the world. Among the oldest IGOs are the United Nations, which replaced the League of Nations, the Universal Postal Union, and the North Atlantic Treaty Organization (NATO). Other well-known IGOs are the European Union (EU), the Organization of Petroleum Exporting Countries (OPEC), the African Development Bank (ADB) and the World Trade Organization (WTO). 21. Since the creation of the UN and NATO, IGOs have become essential actors in the international security. IGOs, such as the UN and the EU, have the ability to make rules and exercise power within their member countries, their global impact continues to increase. 22. Ataman cites Miller to define IGOs as ..voluntary associations of sovereign states established to pursue many objectives for which states want to cooperate through sort of formal structure and to which states are unable to realize by themselves (Ataman, 2003, p. 43). Sovereign states establish IGOs through a treaty  [4]  and accept its authority to make decisions regarding particular problems for common benefit. In other words, the states voluntarily give up sovereignty to an IGO in order to achieve common security, cooperation for collective goods, economic rearwards and political influence. 23. In Atamans view IGOs could be classified by their scope (global and regional) or by their function (political, economic, social and environmental) (Ibid.). Wikipedia has classified them as worldwide global organizations, regional organizations, Cultural, linguistic, ethnic, religious, or historical organizations, Economic organizations, organizations for collective security or mutual defense provisions (Intergovernmental organization, 2010). Among these organizations United Nations (UN) and its specialized agencies as well as some regional organizations such as European Union (EU) and collective security organization such as NATO play significant role in international security (Ibid.). Types of IGOs 24. IGOs are typically organized by their membership and by their purpose. For example, the UN is called a global organization because all countries are allowed membership. There are currently 192 member states in the UN. Some IGOs are regional and limit their membership to states within the designated regions. Other IGOs are referred to as selective organizations because they base their membership on criteria other than geography. The Organization of the Islamic Conference, for example, bases its membership on religious affiliation. OPEC, on the other hand, is comprised only of countries that produce oil. Specialized IGOs, such as NATO, limit their activities to a particular field. General IGOs have expertise on a wide variety of topics. The UN is also a general IGO as it is involved in a wide range of issues, including security, poverty reduction, health, telecommunications, international criminal justice, human rights, economic development, and environmental protection (Ibid.). Role in International Relations and Effects on International Security 25. Quoting several constructivist views, Susan Park writes. IGOs ..are norm diffusers or transmitters within the international realm; teaching states their interests (Park, 2004). They ..do this through establishing regimes, forming international agendas, constructing discourse, enforcing rules, and mediating between states (Ibid.) Park believes that these important roles ..show the significance of these organizations as the glue of the international state system, binding states together in various regimes (Ibid.). She argues that the IGOs .. act as official gate-keepers, determining which non-state actors and groups within civil society are deemed legitimate, thus de-legitimizing others, thereby shutting the latter out of the global governance structure (Ibid.). 26. IGOs are the main tools of global governance in true sense; and they are legitimate NSAs. They are responsible for collective security and defense, and they have been contributing a lot for the maintenance of international security. IGOs, formed out of common interests of the member states, maintain international security or stability by keeping member states united. On the other hand, especially collective defense oriented IGOs maintain balance with rival state or group of states. 27. UN is the key player of international relations in present context. The primary mission of UN is to maintain international peace and security.  [5]  To fulfill its mission UN has a strong mandate which it exercises through the Security Council. Since its inception, UN has continuously been trying to prevent conflicts, keep and enforce peace, and disarmament as well as proliferation of WMDs. 28. Regional organizations are also taking big steps, especially on the field of Human Security. EU is unifying entire Europe, which now is unlikely to spark other Great War. Unified Europe can maintain a balance with any other power which may emerge in future. However, regional alliances for comprehensive security are replacing the traditional military alliances; NATO is still effective. NATO, the only remaining major defense organization after the disintegration of former Soviet Union and demise of rival Warsaw Pact, is no more concerned for balance of power, but it is still significant for US and its allies for their defense. NATO is instrumental for US led War on Terror in Afghanistan. Criticism 29. The role played by IGOs at the international level is not out of controversy. There is always a question mark over their effectiveness. Some scholars argue that there problem lies on the fundamental structure and changed role of IGOs, mainly security organizations; according to Gleason Shaihutdinov, Throughout the world, the major inter-state security organizations continue to be essentially Westphalian in nature. They assume the primacy of state actors. While collective security organizations have re-focused to their objectives to confront challenges emanating from below the level of the nation-state, they have not yet reorganized their operational programs to achieve these goals. (2005, pp. 274-275) 30. IGOs like UN have been blamed as tool for powerful countries to impose their principle on the weak countries. ..the UN Security Council cannot accept any decision against the interests of the five permanent members and those of their allies, i.e., the UN Security Council decisions on the Palestinian question against Israel have often been vetoed by the United States (Ataman, 2003, pp. 44-45). The stability achieved on the cost of a states principles could not be long lasting; since it creates discontent and hatred among the people, which could be the seed of a future conflict. 31. Other IGOs, such as WTO and IMF, have been criticized for their role in globalization. Many people believe that globalization further weakens the weaker nation-states whereas strong states take maximum benefit out of it. The increasing gap between powerful states and weak states can gradually lead them to a conflict, jeopardizing international security. Overview 32. Security always puts its stakeholders under a dilemma; states need to think rationally while joining organizations or alliances. Barry Buzan portrays a picture of such dilemma in following words: Security cannot be achieved by either individuals or states acting solely on their own behalf. Some collective measures are necessary among the members of the system if each is to achieve security. Just as security cannot be achieved by individual actors, neither can it be created by concentrating all powers and responsibility at the upper levels. When such concentration happens, as we have seen in the case of individuals and the states, the collective institution becomes major source of threat to those smaller actors it was supposed to protect. (1987, p. 253) 33. Schwartzs following view on UN reflects importance of such IGOs amid their own drawbacks, While the UN is certainly not the ideal institution for international security simply because it is the sum of its parts, states the world would undoubtedly be far more insecure without it. There is no other forum in the world in which every state that wishes can participate. The implication of this should not be underestimated. Communication is essential for averting crises. And there is no other organization in the world with as broad and sweeping a mandate as the UN (Schwartz, n.d.). 34. The criticism of IGOs, exposed drawbacks and their likely consequences are not baseless accusations, but these needs be sorted out through reforms. As the key actors of global governance, IGOs play most significant role on regulating international relations and make huge positive contribution to the maintenance of international security. CHAPTER IV VIOLENT NON-STATE ACTORS AND INTERNATIONAL SECURITY General 35. Even a cursory global survey suggests that violent non-state actors (VNSA s) have become a pervasive challenge to nation-states. In the 21st century, the state monopoly of the use of force is increasingly being reduced to a convenient fiction. No nation state is free of VNSAs. Relatively few of the sovereign states can truly claim a monopoly of force within their territorial borders. 36. One of the most striking features of VNSAs is their sheer variety. This suggests that there is some danger in lumping them together under a single rubric. Yet, it is clear from the preceding analysis that they do have certain things in common: they all emerge in response to inadequacies, deficiencies or shortcomings in many states and to one degree or another seek to compensate for those shortcomings. At the same time, there are important differences in motivation, purpose, power structures and the like. One of the dangers, however, is that they will increasingly form alliances with one another. There are certainly examples of linkages between organized crime and terrorist networks. Identifying VNSAs 37. VNSAs are those NSAs which use illegitimate violence as their means, they might be having some links with a state(s), and their objective could be political or economic. In Ulrich Schneckeners view VNSAs armed non-state actors willing and able to use violence for pursuing their objectives, and not integrated into formalized state institutions (Schneckener, 2006, p. 25). Following statement portrays a detail picture of VNSAs: VNSA are a distinct form of non-state actor, which distinguishes them from police forces and militaries. It is their use of collective violence that most clearly distinguishes Sendero from Starbucks, but their goals and methods also contribute to their illegitimacy. They are illegitimate vis-à  -vis the classical state system in part because the essence of being a state is having a monopoly on the legitimate use of violence. By definition, VNSA resort not only to random or opportunistic aggression, but to collective violence as a tool to achieve goals. Collective violence is really an extension of collective action, which is coordinated action by the members of the group in pursuit of common ends. (Bartolomei, Casebeer, Thomas, 2004) 38. Williams says One of the most striking features of VNSA s is their sheer variety. This suggests that there is some danger in lumping them together under a single rubric (2008, p. 17). VNSAs could be found being treated separately or as a group on the study of NSAs. Table 2 shows two different groupings of VNSAs by Ulrich Schneckener (Schneckener, 2006) and Phil Wiiliams (2008). However, there is no significant difference between these two groupings; on the basis of degree of activity as well as impact at international level, only terrorist organizations, insurgents, organized criminal groups, and private security agencies or private military companies (PMCs) could be considered as major VNSA for this study. Ulrich Schneckener Phil Williams Rebels or guerrilla fighters Militias or paramilitaries Clan chiefs or big men Warlords Terrorists Criminals Mercenaries and private security companies Marauders Warlords Militias Paramilitary forces Insurgencies Terrorist organizations Criminal organizations and youth gangs Table 2: Different Classifications of VNSAs The functions VNSAs fulfill for members and supporting constituencies 39. A key part of this is the extent to which the VNSA becomes an alternative form of governance and fulfils functions normally the responsibility of the state. It is important to determine what kinds of capacity gaps and functional holes are filled by VNSAs. These can include the provision of state functions such as imposing and maintaining security and order and can extend to what might be described as paternalistic forms of social welfare. Indeed, for VNSAs filling functional spaces is often even more important than filling territorial spaces. This analytical framework is helpful in considering a wide variety of VNSAs. These include warlords, terrorist organizations, organized crime groups both domestic and transnational, transnational youth gangs, militias and insurgencies. VNSAs in International Relations as Security Threats 40. VNSAs directly challenge and affect individual nation-state or number of states through networking of violent operations. According to Fraiman, they ..pose significant challenges to the administration of states, mainly by threatening their internal monopoly on the use of force. However, at times, these groups can also present considerable external security threats to other states in the international system (2009, p. 1). The most of the modern major conflicts are betwee