Saturday, May 23, 2020

Marketing Segments - 2076 Words

THE DIFFERENCES BETWEEN MARKETING STRATEGY AND MARKETING MIX The Differences between Marketing Strategy and Marketing Mix And their Examples Stephen M Okacha California Miramar University March, 2013 THE DIFFERENCES BETWEEN MARKETING STRATEGY AND MARKETING MIX Abstract This paper explores the differences between marketing strategy and marketing mix in the world of doing business. It also outlines some of the examples of both marketing†¦show more content†¦2. Coupons – Coca-Cola gave a free glass of the highly famous beverage. While coupons aren’t technical and are probably one of the most original marketing strategies still used today, it’s quite obvious that when done right, they work; just look at Coca-Colas success today. Once a thorough environmental scan is complete, a strategic plan can be constructed to identify business alternatives, establish challenging goals, determine the optimal marketing mix to attain these goals, and detail implementation. A final step in developing a marketing strategy is to create a plan to monitor progress and a set of contingencies if problems arise in the implementation of the plan. THE DIFFERENCES BETWEEN MARKETING STRATEGY AND MARKETING MIX A good marketing strategy should be drawn from market research and focus on the right product mix in order to achieve the maximum profit potential and sustain the business. The marketing strategy is the foundation of a marketing plan. Consumers like to save money and will often go out of their way to do so. From seeking out local deals, using coupons, or shopping during specific company sales, it’s a proven fact that saving money is a big plus for consumers. Brian, Solis (2011) studies have shown that 9 out of 10 consumers today use coupons and have become especially popular among theShow MoreRelatedMarketing and Segment Essay1657 Words   |  7 Pages Test Bank Strategic Marketing Quarter 2 Decisions 9. Which of the following can you not determine from market research? a) The structure of the market b) The market requirements c) The market requirements of your competitors d) The strengths and weaknesses of your competition 10. Conducting a Market Opportunity Analysis (MOA) is the first step in developing a marketing strategy. e) True f) False 11. What is a differentiated marketing strategy? a. Selection of productionRead MoreMarketing Analysis : B2b And B2c Market Segment1200 Words   |  5 PagesIntroduction Marketing, in its most basic form, is the ability to break down consumers into small segments, and be able to utilize a variety of tools to target and entice them to make a purchase. Marketing can be seen in the branding of products, the promotional materials for products, the name recognition of the company and the appeal of the product overall. Additionally, the need for certain products also drives purchasing. Overall, there are three main market segments that marketers focus onRead MoreMarketing Plan For Target The School Children Segment Essay2043 Words   |  9 PagesYear 1 After reviewing the five target segments, I decided to target the school children segment. This segment has a market size of 35,000, a growth rate of 1%, and 20% of them purchased a pack in 2014. As for the backpack, I wanted to design a pack that will give value to this segment. Inspecting the survey results that asked members of this segment to rate the importance of the five characteristics; capacity, comfort, durability, waterproof, and eco-friendly, lead me to design a red-syntheticsRead MoreMarketing Mixes for Two Different Segments in Consumer Markets?738 Words   |  3 PagesMarketing mixes for two different segments in consumer markets? EDIT Marketing mix is an essential tool that can be used to market our products. Sony Audio and visual system is one of the new innovations in the market and is in demand. But that is not enough as we need to be the market leader. It is important to place the product in the minds of our customers. Therefore we need to make it unique from the other products in the market. It is best that we concentrate on mainly on the youth andRead MoreAnalyzing The Target Market, Segment, Competitor Product And Marketing Mix2361 Words   |  10 PagesThe aim of the report is to research, define and analyse the target market, segment, competitor product and marketing mix as they are important prior to the product launching. The product is designed to monitor and assist patients recovering from arthritis and early stage dementia live independently with focus on people who can still perform their daily activities with no support required. Lipm wearable devices customers are categorised into various groups patients recovering from Arthritics, patientsRead MoreCase Study : Generation Y And Its Marketing Segments Into The Demographic, Psychographic And Behavioural880 Words   |  4 Pages Segmentation The company should divide its marketing segments into the following: demographic, psychographic and behavioural. These three segments will provide Skarp Technologies with a more in-depth understanding of the needs and wants of potential consumers. Demographic Generation Y are open minded when it comes to the trial of new products. Although Generation X can be open to change as well, it is more profitable and beneficial to target Generation Y due to them being more tech-savvy. In termsRead MoreHow Companies Identify Attractive Market Segments and Choose a Target Marketing Strategy.1749 Words   |  7 PagesAssignment: Explain and discuss how companies identify attractive market segments and choose a target marketing strategy. Marketing can be defined as a way of identifying and satisfying consumer needs in such a way as to achieve the organisations objectives for profitability, survival or growth. When looking to develop a new marketing strategy for a certain segment there are a number of stages that are important, if the campaign is to be a success. Initially companies will analyse the current internalRead MoreThe Marketing Segment Of The Discipline1746 Words   |  7 Pagesdifferent cultures are similar or different† (Shenkar, 2001). This construct is now widely used and applied to most business organisation disciplines, such as, management, finance, marketing, and accounting. However, to better explain the impact on global marketing operations, this essay will focus on the marketing segment of the discipline. The study of cultural distance has been used to innovate and transform organisations into foreign expansions and technology transfer (Gomez-Mejia Palich, 1997)Read MoreThe Marketing Segmen t Of The Discipline2455 Words   |  10 Pagesdifferent cultures are similar or different† (Shenkar, 2001). This construct is now widely used and applied to most business organisation disciplines, such as, management, finance, marketing, and accounting. However, to better explain the impact on global marketing operations, this essay will focus on the marketing segment of the discipline. The study of cultural distance has been used to innovate and transform organisations into foreign expansions and technology transfer (Gomez-Mejia Palich, 1997)Read MoreConsumer Behavior Is A Significant Aspect While Developing Marketing Within Different Market Segments1603 Words   |  7 PagesConsumer behavior is a significant aspect while developing strategies in marketing within different market segments. Though there are many studies and researches done on consumer behavior, it is important to note that consumer behavior varies from one product to another and one market to the other. On the other hand, marketing is concerned with the preparation, and producing a good or service, pricing as well as marketing and distributing that product or service to the market or consumers. In order

Monday, May 18, 2020

Whose Life Is It Anyway - 835 Words

The playwright whose life is it anyway? written by Brian Clark is based around a sculptor called Ken, who has been paralysed neck down in a car accident and is told that he will never be able to move any part of his body again. Most of the action takes place around Kens paralyzed body and his bed. The storys centre of attention is Euthanasia (whether Ken should be allowed to take his own life or not), which serves as the main plot of the story; however there are more issues at hand. The theme of the story is more of a dark comedy but there are also more serious themes involved in the subplots, including love, drama and social issues. Throughout the play Ken is battling for his right to die seeing that he is paralyzed and will not be†¦show more content†¦The use of humour and sexual innuendo’s is also notable, this lightens the tone and also helps the audience to build attachment to Ken as he makes them laugh and feel comfortable. Techniques such as characterism and th e different use of language like puns, metaphors and black humour give the play a stronger effect. The issues surrounding euthanasia are still sensitive and controversial. The issue is highly opinionated, and the fact that Ken fights for his own right to die questions morals and ethics, both from the audience, and society as a whole. In my opinion, Ken should have had the right to die, and others, of sound mind, should be allowed to do so if it is seen to beShow MoreRelatedWhose Life Is It Anyway? Essay4924 Words   |  20 Pageswithout prejudicing the audience in Whose Life Is It Anyway? The central character in Whose Life Is It Anyway? is Ken Harrison who is a patient in the hospital, in which the play is set. The play sees Ken, who has been involved in a horrific car accident, recovering from various injuries, some of which will never heal. The accident leaves Ken paralysed from the neck downwards permanently, which results in him having to stay in hospital for the rest of his life. Throughout the play Ken fightsRead MoreThe Play Whose Life Is It Anyway By Brian Clark855 Words   |  4 PagesRationale: The play â€Å"Whose Life is it Anyway†, written by Brian Clark was premiered in 1978 is predominately based around a controversial topic, which is still highly discussed nowadays: euthanasia. The centre of the main debate examines the question whether or not euthanasia should be legalised and also establishes the patient’s autonomy and doctors’ guidelines. Patient autonomy is the right of the patient to determine their own health treatment. Therefore, the doctors are required to be goodRead MoreEssay on Persuasion Devices in Whose Life is it Anyway884 Words   |  4 PagesPersuasion Devices in Whose Life is it Anyway After reading the play I thought that Ken made the right decision. Therefore, in my view I think that the play does use every device to persuade us that Ken is right. Below there are some of the devices that persuade us Ken is right: - The first device is the title of the play, Whose life is it anyway. For example when Ken doesnt want the injection, Dr. Emerson does not care that Ken doesnt want it, but does it becauseRead More Whose Life Is It Anyway? by Brian Clark Essay1897 Words   |  8 Pages Whose Life Is It Anyway? by Brian Clark Whose life is it anyway? is about Ken Harrison, a paralysed patient in hospital, and his battle to end his own life. The problem here is that he is incapable of committing suicide and has to turn to euthanasia. The hospital is against this. They cannot deliberately let a conscious person die. In this essay I will tackle the question above, how Brain Clark persuades us that Ken’s decision is right. The title of the play, WhoseRead More Brian Clarks Play Whose Life Is It Anyway? Essay1268 Words   |  6 PagesBrian Clarks Play Whose Life Is It Anyway? The play Whose Life Is It Anyway by Brian Clark was made into a stage play and film. The television play was made in 1972 and the stage plays in 1978. In the play,† written by Brian Clarke, the intense argument of committing Voluntary Euthanasia is discussed. The main point of the play, Ken Harrison, once an imaginative, devoted sculptor, is involved in a terrible car crash. Following a long operation, Ken is paralyzed from the neck down;Read MoreThe Medical Industry has Come a Long Way Since the Movie, Whose Life is It Anyway578 Words   |  2 PagesAs a medical industry, we have come along way in just a short time span. The movie â€Å"Whose life is it Anyway?† was a very heartfelt story, which nobody could ever imagine happening to them or in their life. This movie did an amazing job at showing the multifaceted scope of one-persons decision. The patient was not the only one affected, and that the medical professionals are as well. It is easy to see why some policies, and ethical rules come into play. It is apparent how patient choices are now moreRead MoreEssay about How does Brian Clark make his play Whose life is it anyway?1395 Words   |  6 PagesHow does Brian Clark make his play Whose life is it anyway? Interesting, Memorable and Dramatic for a modern audience. Brian Clark makes â€Å"whose life is it anyway?† an interesting memorable play for a modern audience by using a wide variety of techniques that are available when writing plays. The play addresses a range of modern day issues. Recently Charlotte Wyatt’s case and Christopher Reeves’ death have broadened the awareness of the issue of euthanasia and the right to die or be resuscitatedRead MoreAuthority Individual1437 Words   |  6 PagesIn Fahrenheit 451, written by Ray Bradbury, authority is viewed as ruthless and the individual is portrayed as innocent. This is also emphasised in two related texts, Whose Life Is It Anyway? By Brian Clark, and Shawshank Redemption, directed by Frank Darabont. The themes of ruthlessness and innocence are exemplified throughout all three texts, through the concept of the authority and the individual. In Ray Bradbury’s Fahrenheit 451, authority is depicted as ruthless. This is shown throughout theRead MoreThe Catcher in the Rye Rewrite Ending Essay1191 Words   |  5 PagesWriting Activity #4 Rewrite the ending of the story. Anyway, I really did go home after the carrousel. First, Phoebe and I walked out of the park onto the east side, and took the bus to Grand Central, to get my goddam Gladstones out of the strong box there. pretty Though it had stopped pouring out, I was still wet. Boy, it really came down like a madman. I still had Phoebes red hunting hat on, it was soaking wet though. I didnt care. All I could think about Phoebe. Just Phoebe. ImRead MoreSurrogate Mothers : The Topic Of Many Controversies1075 Words   |  5 Pagesbiological ties with the child.(Gay Men Who Become Fathers via Surrogacy: The Transition to Parenthood, 111-141) Moreover, Surrogacy can also be beneficial to women of whom, do not want to undergo pregnancy. (Surrogacy, Slavery, and The Ownership of Life, 139) These women could not want to commit to pregnancy for several reasons, Surrogacy allows women who do not want to commit, to still receive and care for a child of their own. Surrogacy has many benefits and good aspects, that help others in receiving

Monday, May 11, 2020

The Rwandan Genocide of 1994 - 1183 Words

In April of 1994 a terrible event took place, one where approximately one-million people were brutally murdered on the basis of their ethnicity or if they opposed the regime. (Uvin, 2003). This terrible event occurred in Rwanda, and it is known as the Rwandan Genocide. Genocide can be described as a one sided mass killing in which the state or other authority intends to destroy a group, as that group and membership in it are identified by the perpetrator. (Hintjens, 1999) This is exactly what took place in Rwanda in 1994. In Rwanda the population was mostly Hutu (84%) and had two minorities, Tutsi (15%) and Twa (1%). (Hoex, 2010) The perpetrators of the genocide were the Hutu majority and the victims were the Tutsi. In order to†¦show more content†¦As the scholars said â€Å"invention of tradition,† is basically saying that these roles in the society at the time of the genocide had been constructed and it was not something that was primordial. Generation aft er generation this concept of the ethnic difference between the Hutu and Tutsi was more accepted and held to be true. The belief of this being true does not make it true, but just gives power who benefit from this belief. During the colonial period these distinctions became more important. When colonists came to Rwanda they imposed their racial hierarchal system. They said that the Tutsi were not even native Africans and came from a different land and that is why they had the right to rule over the Hutu majority. This was also necessary to the Belgians because it gave them a sense of order, where there were once about twelve clans in the area where they colonized. This way they did not have to learn the culture and make it simpler to rule because there were only two ethnic groups to manage. The Belgians imposed this story of the right to rule and how the two groups of people were different. This also led to the differences in the occupations that the groups were allowed to h old. The Tutsi were delegated the job of ruling, cattle, and military. In order to create this difference that was not really there before, they need a method to divide the people. They did so by the amount of cattle that the man had. If the man had more than ten heads ofShow MoreRelated Rwandan Genocide of 1994 Essays2528 Words   |  11 PagesThe Rwandan Genocide of 1994 lasted only for a brief period and lasted for approximately a hundred days. During that time, an estimated amount of 800 000 people were slaughtered. Beginning on April of 1994, massacres were held on a daily basis with the intent to eliminate an ethnic group known as the Tutsi by another ethnic group known as the Hutus. This genocide was overlooked by the United Nations, and the superpowers of the time offered very little or no assistance at all to Rwanda. The civilRead MoreThe Rwandan Genocide Of 1994 Effect The Hutu And Tutsi1998 Words   |  8 Pagesinvestigation will seek to answer the question â€Å"H ow Did the Rwandan Genocide of 1994 Effect the Hutu and Tutsi?† I chose this question because last year I read the book Left to Tell and I wanted to know more about the two different types of groups, the Hutus and the Tutsis. This was and still is an important topic because many died that day just for belonging to a specific group. This topic shows how much our world has changed since 1994. In order to answer my historical investigation question, IRead MoreThe Rwandan Genocide Began On April 6Th 1994 Culminating1370 Words   |  6 PagesThe Rwandan Genocide began on April 6th 1994 culminating in the killing of an estimated 800,000 Hutus and their sympathizers. After it became apparent that the Rwandan government was not willing or able to protect it s citizens, the question became why did the international community do nothing to intervene. Rwandan citizens’ lived under the premise, that their rights are protected under UN accords and treaties. The Genocide Convention of 1948, outlined the responsibilities of the participatingRead MoreRelationship Between Rwanda, Israels Perceptions Of The 1994 Rwandan Genocide1249 Words   |  5 PagesBeginning in 2008, my research focuses mostly on Rwanda’s political, militarily, economic reconstruction since the 1994 Rwandan Genocide. This research has led to a greater exploration of regional dynamics between other African Great Lakes region nations. During my various periods living within Rwanda, I have had the opportunity to perform independent research and analysis on the nation’s political, military, agricultural-focused development, religious and social history and presence. This researchRead MoreThe Rwanda Of The Rwandan Defence Force904 Words   |  4 Pageshistory, perpetrators, victims and bystanders with difficult answers on how to solve them. The p ost-genocide nation of Rwanda witnessed one of the most horrific events a nation could experience, genocide. However, it has rebuilt itself to become an example nation for transitional justice, political stability and economic development. Rwanda’s military capabilities within the institute of the Rwandan Defence Force (RDF) are well known for its organisation capability and effectiveness in compact. InRead MoreWhat Was Happening Of Your Town?1094 Words   |  5 Pagesin your town? I was born on April 13, 1994, in a small town in the USA. Today, I am a college going student, busy with my studies and other activities. However, during a history lesson, something made me ponder as to what the world would have been like in the year I was born or the month. I listen regularly to the news, but those headlines are forgotten by the end of the day. I just wondered what my city or town or the country was like in the year 1994. I was thinking about going back by twoRead MoreRe Writing History And Rwandan Identity Through The Kigali Genocide Memorial Centre Essay1473 Words   |  6 PagesRe-writing History and Rwandan Identity Through the Kigali Genocide Memorial Centre In April 2004, the Kigali Genocide Memorial Centre opened to commemorate the tenth anniversary of the Rwandan Genocide. Peacefully overlooking the city of Kigali, the Centre seeks to be a place of remembrance and honor for survivors as well as a step towards creating Rwanda’s post-genocide identity. Rwanda has sought to find its place politically, socially, and in memory through this westernized approach to remembranceRead MoreInternational Community Is Culpable For The Rwandan Genocide1376 Words   |  6 PagesFrom April to June 1994, in a mere 100 days, approximately 800,000 Tutsi and moderate Hutu were murdered during the Rwandan genocide (Destexhe, 1994). The international community failed to prevent or stop this slaughter. Considering the horrific nature of this genocide and the vast number of victims, there is a question whether the international community is culpable for the Rwandan genocide; specifically, the role of its key players, the US, the UN, France and Belg ium. I will argue that the internationalRead MoreRwand The Rwandan Genocide1296 Words   |  6 Pages The Rwandan genocide was the killing of 800,000 people in just 100 days. The Rwandan genocide took place in 1994. During this time Rwanda was a small country with a mostly agricultural economy. Although it is small it had one of the largest populations. In 1994 Rwanda was made up of three different ethnic groups. The Hutu made of 85% of the Rwandan population. The Tutsi’s made of 14% of the population and was the minority. The Twa was a small Pygmy group that made up 1% of the population (unitedhumanrightsRead MoreInformative Speech on Rwandan Genocide Outline1300 Words   |  6 PagesBen Johnson Intro to Comm. 1320-04 11/8/12 Rwandan Genocide General Purpose: To Inform Specific Purpose: To share with the class that the Rwandan Genocide was a brutal genocide that most people know little about. Thesis: The Rwandan Genocide is one of the lesser known, quickest, and most inhumane genocides this world has ever seen, and it is still affecting the people of Rwanda till this day. Organizational Pattern: Topical Introduction I. Attention Getter:

Wednesday, May 6, 2020

Symptoms And Symptoms Of Cancer Related Fatigue - 972 Words

Cancer-Related Fatigue (CRF) is the most common and debilitating symptoms in cancer patients, with frequency range from 60 to 90% in cancer patients (Yennurajalingam, 2014). CRF is defined as â€Å"distressing, persistent, and subjective sense of physical, emotional, and/or cognitive tiredness or exhaustion related to cancer, or cancer treatment that is not proportional to recent activity and interferes with usual function† (Yennurajalingam, 2014). Fatigue may be an isolated problem or a part of group of symptoms, such as pain, depression, decrease appetite, and sleep disturbance (www.ons.org, 2016). The effects of CRF range from temporary indisposition to inability to cope with everyday life activity (Homeber, 2012). CRF affects the patients’ quality of life through influencing physical, psychological and economic/occupational domains. Physical, patients reported diminished energy levels, the need to slow down from normal pace, sense of tiredness, and increased need to sleep or rest. Psychologically, patients fail to push themselves to do things, decreased motivation and interest, and the feeling of sadness, frustration, or irritability during their experiences with fatigue. CRF also interferes with cognitive ability such as concentrating, remembering things and keeping dates straight. Economically, patients with CRF needs to take vacation or sick days as a result of CRF about 4.3 days per months during or after treatment (Yennurajalingam, 2014). Currently, there are differentShow MoreRelatedInformation About Cancer Symptoms, By Brijesh Ghelani Essay1063 Words   |  5 PagesInformation About Cancer Symptoms By Brijesh Ghelani | Submitted On January 13, 2011 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Expert Author Brijesh Ghelani The term cancer often sends a chill running as it isRead MoreLung Cancer: The Unbiased Killer Essay examples1712 Words   |  7 Pages Cancer is known as an unbiased killer that knows no race, age or sex of its victims. Doctor Nader (n.d.) states, â€Å"The disease lung cancer is known as the number one cause of cancer related deaths in the United States.† (Lung Cancer Information). Lung cancer takes millions of lives each year, sometimes without the slightest warning. According to The Green Sanctuary (2009), â€Å"The cancer may often be discovered during a routine chest X-ray or CT scan as a small solitary mass.† (What is LungRead MoreSymptoms And Treatment Of A Brain1410 Words   |  6 PagesBrain tumours as well as their treatments bring a raft of symptoms and side effects into a patient’s life and management of these is critical to a person’s well-being. While patients may have experienced the impact of their cancer and its treatment during th eir illness, these effects can often escalate as the disease progresses to the palliative and terminal stage. Palliative care is specialised medical treatment for those with life limiting or chronic illnesses which cannot be cured, and patientsRead MoreThe Importance Of Cancer On Cancer1310 Words   |  6 Pagescommonly used CAM method. It has been found, use of natural products improve the quality of life, increase cancer survival rate and improve immune function (Yin, Wei, Jian Yang , 2013). A systematic review by Yin, et al. (2013), reported cancer patients who used Chemotherapy and natural products such as, astragalus, turmeric, ginseng and ginger have shown a positive outcome regarding cancer symptoms. Most commonly reported was a reduction in chemotherapy induced nausea, vomiting and pain (Yin, et alRead MoreEssay about The Approach to the Care of Cancer1384 Words   |  6 PagesCare of Cancer Kia Nordenskiold September 30, 2012 The Approach to Care of Cancer Cancer refers to a group of diseases that involve uncontrolled cell growth (Corner Bailey, 2008). The unregulated cell division and growth leads to the formation of malignant tumors that invade bordering body parts. Cancer may also spread to distant areas of the body through the bloodstream or lymphatic system. Determining the causes of cancer is a complexRead MoreSymptoms Management Issues And Skills Assessment Essay969 Words   |  4 PagesSymptom Management Issues and Skills Assessment The Cancer Research UK note the symptoms of insulinoma is hypoglycemia such as tiredness, confusion, weak, and light-headedness (Insulinoma | Cancer Research, 2014). Also, Ghosn notes the common symptoms of pancreatic cancer include weight loss, jaundice, pain, nausea and depression. Of the best practices noted by Ghosn, surgery is not an option per the doctor; pharmacological pain medications are not one per Charlie’s choice; diet is the main practiceRead MoreEpstein Barr Virus ( Ebv )1416 Words   |  6 PagesINTRODUCTION Epstein-Barr virus was first discovered in 1964 by Sir Michael Anthony Epstein and Ms. Yvonne Barr. They located it in a Burkitt lymphoma cell line. It was the first virus to be associated with cancer. Infection of Epstein-Barr (EBV) is extremely widespread. The National Institutes of Health estimates that roughly 95% of people carry the virus. The virus was later found to cause infectious mononucleosis. Mononucleosis has since been nicknamed the â€Å"kissing disease†. TransmissionRead MoreRed Blood Cell and E.g. Sickle-cell Anemia Essay1720 Words   |  7 Pagesinfants (5.7 percent), and the elderly (12 percent). Because one of the major functions of red blood cells is to transport oxygen, a decrease in red blood cells decreases the amount of oxygen delivered to the bodys tissues, which results in the symptoms of anemia. Anemia can be defined as a decrease in the oxygen-carrying capacity of the blood caused by low hemoglobin concentration (A Practical Guide, 1). Cells in the body require oxygen to fully utilize fuels. The oxygen is transportedRead MoreThe Ten Attributes Of The University Of Queensland1174 Words   |  5 Pagesinteract effectively with others in order to work towards a common outcome†. To present this case study various technologies were used such as: records of the medical practice that included medical history, pathophysiology, nursing plans, diagnosis, related treatment, nursing intervention, evaluation and recommendation of health care professionals or other health care providers. Despite the fact that not every case study offers detailed directions for the management of patients’ health condition, theyRead MoreCase Study 6 Essay1245 Words   |  5 Pageswhite blood cell count of 250,000.   Clinical presentation included loss of appetite, easily bruised, gum bleeding, and fatigue.   Physical examination revealed marked splenomegaly, pale skin color, temperature of 102 °F, and upper abdomen tenderness along with nonspecific arthralgia. Pathophysiology signs and symptoms The primary pathophysiological etiology for signs, symptoms and laboratory findings in 4 year-old John’s case study are secondary splenomegaly as a result of primary Acute Lymphoblastic

Cyber Laws and Cyber Crime Free Essays

string(37) " is actually paid by another person\." Presented by: Kale Sandeep N. Gaikwad Avinash R. S. We will write a custom essay sample on Cyber Laws and Cyber Crime or any similar topic only for you Order Now E. (Comp) S. E. (I T) E-mail: sanrajkale@gmail. com E-mail: avi. om007@gmail. com Mob: 919970061442 Mob: 919960308551 G H Raisoni Institute of Engineering and Management, Jalgaon (M. S) Index Topics Page No. 1 Abstract 1 2 Introduction 2 3 Cyber crime 2 4 Classification of Cyber crime 2 5 Status of Cyber Crime 6 6 Cyber law 7 7 Cyber Law in India 8 8 Advantages of Cyber Law 9 9 General Suggestions and information 10 0 Suggestions for better security 10 11 Conclusion 11 12 Reference 12 Abstract: Cyber law and cyber crime is becoming an important issue for social and economical concerned. The use of computer, electronic devices and software is increased; the need to protect these devices and software properly is inherently appeared with this. To protect these, it becomes necessary to know about cyber crime and cyber law. Cyber crime is unlawful act in which computer is either tool or target. After development of internet every computer is able access data and information from all over the world. This also lead to the misuse of computer and internet for Crime such as Financial crimes, Cyber pornography, Online gambling, Intellectual Property crimes, Forgery, Cyber Defamation, Cyber stalking, Email spoofing, Email bombing, Denial of Service attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling etc. Now days most of financial and non-financial activities are done with computer and computer related services such as Internet. Also the concept of e-Governance coming in picture, where the confidential document of an organization is process and stored. The need of protection Cyber security resulted into development of cyber law in India and all around the world. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. The paper throw light on the brief types of cyber crime, status of cyber crime and cyber awareness in India, Cyber law in India , Advantages of it in brief. Also this paper suggests the precaution measures and tips for cyber security for the users of computer and internet. 1. Introduction The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B. C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. Today, computers have come a long way, what with neural networks and nano-computing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. 2. Cyber crime At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, cyber crime was broken into two categories and defined thus: 2. 1. Cyber crime in a narrow sense: Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. 2. 2. Cyber crime in a broader sense: Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession offering or distributing information by means of a computer system or network. As per Indian law, Crime has to be voluntary and willful, an act or omission that adversely affects a person or property. A simple definition of cyber crime would be â€Å"unlawful acts wherein the computer is either a tool or a target or both†. 3. Classification of Cyber crime Cyber Crime is classified into 4 major categories as (A) Cyber crime against Individual B) Cyber crime Against Property (C) Cyber crime Against Organization (D) Cyber crime Against Society 3. 1. Against Individuals 3. 1. 1. Email spoofing : A spoofed email is one that appears to originate from one source but actually has been sent from another source. E. g Avinash has an e-mail address avinash@yahoo. com His enemy, Rohan spoofs his e-mail and sends obscene messages to all his acquaintances. Since the e-mails appear to have originated from Avinash, his friends could take offence and relationships could be spoiled for life. 3. 1. 2. Spamming: Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. 3. 1. 3. Cyber Defamation This occurs when defamation takes place with the help of computers and / or the Internet. E. g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person’s friends. 3. 1. 4. Harassment and Cyber stalking: Cyber Stalking Means following the moves of an individual’s activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms, user net groups. The Oxford dictionary defines talking as â€Å"pursuing stealthily†. Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. 3. 2. Against Property: 3. 2. 1. Credi t Card Fraud :You simply have to type credit card number into www page of vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. . 2. 2. Intellectual Property crimes: These include Software piracy i. e. illegal copying of programs, distribution of copies of software ,Copyright infringement Trademarks violations ,Theft of computer source code 3. 2. 3. Internettimetheft: The usage of the Internet hours by an unauthorized person which is actually paid by another person. You read "Cyber Laws and Cyber Crime" in category "Law" 3. 3. Against Organization 3. 3. 1. UnauthorizedAccessingofComputer: Accessing the computer/network without permission from the owner. This activity is commonly referred to as hacking. The Indian law has, however, given a different connotation to the term hacking, so we will not use the term â€Å"unauthorized access† interchangeably with the term â€Å"hacking†. It can be of 2 forms one is Changing/deleting data i. e. unauthorized change in data and other is Computer voyeur where the criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. 3. 3. 2. Denial Of Service When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. Denial of service attack involves flooding a computer resource with more requests than it can handle. This causes the resource (e. g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. Denial-of-service attacks have had an impressive history having, in the past, brought down website like Amazon CNN, Yahoo and eBay 3. 3. 3 Virusattack A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a possibly evolved copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to. 3. 3. 4. Email Bombing: Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. 3. 3. 5. Salami Attack: When negligible amounts are removed accumulated in to something larger. These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. 3. 3. 6. Logic Bomb : Its an event dependent program , as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E. g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. . 3. 7. Trojan Horse A Trojan is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. There are many simple ways of installing a Trojan in someone’s computer. The Common Types of Trojan horse are †¢ Remote Administration Trojans (RATs) †¢ Password Trojans †¢ Privileges-Elevating Tr ojans †¢ Destructive Trojans †¢ Joke Programs 3. 3. 8. Data diddling This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. 3. 4. Against Society 3. 4. 1. Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. 3. 4. 2. Cyber Terrorism: It is use of computer resources to intimidate or coerce others. Computer crime has hit mankind with unbelievable severity. Computer viruses, worms, Trojans, denial of service attacks, spoofing attacks and e-frauds have taken the real and virtual worlds by storm. The term â€Å"cyber terrorism† can be defined as â€Å"Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. 3. 4. 3 Web Jacking Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. 4. Status of Cyber Crime Ba ck in 1990, less than 100,000 people were able to log on to the Internet worldwide. Now around 500 million people are using the net around the globe. UK has the largest number of infected computers in the world followed by the US and China. The US is the leading source country for attacks. China is second and Germany is third. 4. 1. In India: i) During 2003, a total of 411 cases were registered under IPC Sections as compared to 738 such cases during 2002 thereby reporting a significant decline of 44 percent in 2003 over 2002. ii) A total of 475 persons were arrested in the country for Cyber Crimes under IPC during 2003. iii) The age-wise profile of the arrested persons showed that 45 percent were in the age-group of 30-45 years, 28. percent of the offenders were in the age-group of 45-60 years and 11 offenders were aged 60 years and above. Above figures doesn’t mean that cyber crime is declining in India, the fact is that people in our country do not report cyber crimes for the following reasons: a) They don’t want to face harassment by police. b) The fear of bad publicity which could hurt their reputation in society . Also, c) It becomes extremely difficult to convince the police to register any cyber crime, because of lack of awareness about cyber crime and cyber law and also about their registration and handling by the police. A recent survey indicates that for every 500 cyber crime incidents that took place, only 50 are reported to the police and out of that only one is actually registered. These figures indicate how difficult it is to convince the police to register a cyber crime. The establishment of cyber crime cells in different parts of the country was expected to boost cyber crime reporting and prosecution. However, these cells haven’t quite kept up with expectations. 5. Cyber law The cyber world has no physical boundaries, no single authority who governs the internet. The Internet is the medium for freely sharing information and opinions; It provides everyone with round the clock access to information, credit and financial services, and shopping. Even network information systems are being adopted by the government worldwide, that’s why the governments across the world are recognizing the need to securing regulating the cyber world. 5. 1. Why Cyber law? When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence there is need for Cyber laws in India. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives. . 2 Who should concern about Cyberlaw? Everyone, Cyber law is of everyone’s concern. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in Cyberspace can and will have a Cyber legal perspective. From the time one register Domain Name, to the time one set up a web site, to the time one promote a website, to the time when one send and receive email, to the time one conduct electronic commerce transactions on the said site, at every point of time, there are various Cyber law issues involved. One may not be bothered about these issues today because one may feel that they are very distant from him/her and that they do not have an impact on Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyber law for your own benefit. 6. Cyber Law In India: Cyber Crimes are a new class of crimes to India. It is rapidly expanding due to extensive use of internet. India is among few countries in the world that have a separate law for cyber crimes. Recently Nepal has passed Bill against Cyber crime. Indian parliament has passed the legislation known as Information Technology Act 2000 drafted by the Ministry of Communication and Information. The Information Technology Act came into force on 17th October, 2000. IT Act amends some of the existing legislation, such as Indian Penal Code,1860 Indian Evidence Act, 1872 Bankers Book Evidence Act. 1891, Reserve Bank of India Act, 1934 6. 1. Features of The IT Act 2000: i)Legal recognition of electronic contracts, digital signature, digital certificates. ii) Various types of cyber crime committed in India and outside India is covered alongwithpenalties. ii) Appointment of Certifying Authorities(CA) to issue digital signature, digital certificates. iv)Controller of Certifying Authorities to act as depository for all Certifying Authorities. v) Appointment of Adjudicating Officer for holding enquiries under this Act. vi) EstablishmentofCyberAppellateTribunal. vii) Cyber Regulations Advisory Committee who will advice the Central Government an d CA. Technology. The act is based on the â€Å"United Nations Commission on International Trade Law†(UNCITRAL) model on electronic commerce. 6. 2. IT Act 2000 does not include: ) Specific Definition of cyber crime is not given.. ii) Intellectual Property Rights such as trade Marks, Patents, Digital Copyright Issues. iii) Domain name disputes and their resolution, Data protection issues are not covered. iv)No provision is made for the Taxation issues arising due to e-commerce 7. Advantages of Cyber Laws The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records. The IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Digital signatures have been given legal validity and sanction in the Act. The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. The Act now allows Government to issue notification on the web thus heralding e-governance. It shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. 8. General Suggestions against cyber crime †¢ Don’t delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these. †¢ Try not to panic. †¢ If you feel any immediate physical danger of bodily harm, call your local police. †¢ Avoid getting into huge arguments online during chat or discussions with other users. †¢ Be extremely careful about how you share personal information about yourself online. †¢ Make sure that your ISP and Internet Relay Chart (IRC) network have an acceptable use policy that prohibits cyber-stalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints. If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. †¢ Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet System Administrators or Law Enforcement Officials. 9. Suggestion s for better security †¢ Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. †¢ Make regular back-up of critical data. Back-up must be made atleast once in each day. †¢ Use virus protection software. Checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Use a firewall as a gatekeeper between your computer and the Internet. †¢ Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. †¢ Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. †¢ Regularly download security patches from your software vendors. 10. Conclusion Thus, the awareness of cyber crime and cyber law has become a necessity for persons in cyberspace. The study of cyber crime and its different aspects will be helping to individual in cyberspace to avoid and restrict the cyber crime around them and related to them. Also the study of cyber crime will keep them alert against cyber crime. Absence of Cyber security policy in organization may lead to critical problem for Management to maintain the data security of organization. Recent incidents relating to cyber crime have not just increased the vulnerability of various socio-economic constituents, but also brought forth the need for better managerial and operating capabilities of our legal framework in stopping this growing menace. Cyber law in India is nothing but the outcome of this need. Cyber law will be helpful to control the cases of cyber crime. IT act 2000 has given constitutional support to fight against cyber criminals. This act has also given legal status to e-business, digital signature cause to increase faith in online trading. The number of cases reported is much less than what it is in reality. This is because of unawareness of law. Awareness program on Cyber law and Cyber Crime should undertaken by Social Organisation. The program may include basic information of cyber law, internet security, and minimum hardware and software security measures required for an individual or organisation. Reference: (1) Cyber and Information Technology –Article By Talwant Singh (Judge) (2) Perspective of Cyber crime in India – Kernila Seth (3) Cyber law ,Data Protection in India – Article by Gurpreet Singh (4) www. cuil. com (5) www. cyberlawsindia. net (6) www. cybersmart. in (7) www. indlii. org (8) www. asianlaws. org (9) www. report cyber crime. com (10) www. scribd. com How to cite Cyber Laws and Cyber Crime, Essays

Weekly PortfolioCritical Thinking

Question: Discuss about theWeekly Portfoliofor Critical Thinking. Answer: Ctrical thinking is the ability to engage in reflective and indepepndent thinking on understanding the logical conections, identify, construct and evaluate arguments to solve problem systematically ( Philosophy HKU). For instance, between buying a pen and a laptop which one needs crtical thinking? A laptop simply because it involves proceederial process. Buying a laptop involves knowing the problem of of laptop the types of laptop he wantss, doing the research the available outlets selling the laptop, evaluate the brands, prices and cores available in the market and making decisions. The information obtained from the market concerning the laptop should be reliable,relevant and from aa reputable source. Does the information obtained from the market concerning the laptop brands, quality, core capacity, speed, and any other important information relevant to what was needed in laptop purchasing? Does the information from the market research came from the relevant source? Does the market and outlets are actually available? Where is the outlets located? Does the information come from a reputable company r the outlet? All these tripple R strategy would help in getting the correct information and analysing the knowing the market segments. Crtical thinkking is the key to make rational decisions and come up with the best alternative solutions to a problem by considering the available opportuniies and make the right decisions. ICT professionals are critical thinkers. ICT experts are creative and innovative. They come up with much improved technological advancemements which improve the IT use and makes life easier. For example the use of computer softwares like EXCEL, SPSS and others that help in keeping all the relevant information needed and solve problems which were previously done matually like calculations and data keepings. Also the ICT experts are very critical thinkers as they develop internet use tracks which help to dicourage cyber crimes and thefts related issues by the internet users. The track records of using the internet search sites like google and others are well guided and managed through ICT thinking. Therefore, they protect the information obtained from such sources and discourages cyber cases and plagirarism of online library. ICT experts are very essential as they mould or create new technology hence improving the world economic production and also they help in maitaining internet secu rity through password and usernames hence having the details of the user, therefore helps in tracking records. Portfolio SWOT Analysis Accademic writings is one of the most widely used method by researchers to read many books online and check the online book writers. In academic writing, though there are challenges and shortfalls, improvement is guranteed day by day to the besy way possible. My accademic wrting skills have been facing up and down in the accademic world. The writing spellings, poort time management and high confusion in the wrting formats have posed a big challenge. Therefore, my SWOT Analysis inaccademic writingss, the challenges faced have become my strength as they harden and makes me to work extra hard to overcome the shorfalls. Strength Quick learner and reader as any new thing or subject present to me can take me few days and am at par with other writers Good listerner and follows instructions to the letter. This helps in doing what is right of me as needed by the instructor Weekness Slow in typing and keying of words which can take me some few minuted before I could finish the contenys needed Poor citation and references from different writing formats Threats Lack of internet connectionss and WI-FI in the area of residence Plagirarism of works from other accademic writers Opportunity Few accademic writers High demands of accademic writings and accademic works in the daily learning of students and researchers Strategy to Improve in Typesettings Purchase of personal computer and do more practice on key and typesttings. The useof personal computer would improve the ability to type as any free time, i would take the computer and do typing practic. This will improve the gramatical and spelling mistakes coming with poor typesttings. Mastering of the computrts important keys and familiarize with them so that the keys acn be pressed without looking directly one on one Portfolio; Reflective Writing After submission of accademic paper work to the Participant Activity 1, the feedback received was full of praise and critisms. The praises are showing the positive steps made while the critics are to correct where the mistakes were done for improvement in the submission of the next paper. The problem was the usage of vocabulary and more technical terms in my writings. In every senstence I wrote there was a big or a vocabulary word or a phrase. Too much wordy makes the accademic paper very challenging and hard to read and understand. Some lectureres and other Participants were ever complaining of the same as I do not use simple words which are easy to understand and in the best way possible. The factor contributing to this is to show my language prowess by expressing feelings with bigger terms thinking that they will make it flourish and more appealing to the reader. Also poor punctuations and sentense construction structure was a problem in my writings. Sometimes, full punctuations w ere missing in my writings and knowing the beggining and the ned of a sentence was hard as fullstops, commas, speech quation marks and explamation marks to show the feelings of the story were missing. From using the bigger and hard terms does not reflect the quality and standards of writings as perceived before. Rather it complicates the work and makes it difficult to be understood by some people. The content in writings are more important than the bigger and hard vocabularies used into them. Sometimesthey change the whole meaning of the story or the study when wrongly used in a context it does not well fit since they are prone to misuse. Hence simlicity and familiarity of the worfs chosen is very important and critical in the accaemic writings. While doing another assignment, the choosing of simple words is the key to a better writing techniques and easy understanding of the whole literature. Too much wordy makes writings boring as they often change the content when the same word with different meaningsa are used. Improvement in gramatical punctuations will help me in the next accademic writings. Well placed punctuation marks distinguish one sentence from another, one point to an other and express the feelings. Therefore, improving in the punctuation would make my work more simple and easier to read and understand since the points are separated. Taking course in English language is very important in improving the punctuation problems. Reading more books of English and doing more research on English punctuation skills would improve my ability in English writing and sentence constructionss. Portfolio; Responding to an Ethical Scenario I as an ICT clerk Assisstant working in the ICT Industry in Sydney have a friend working in the same Industry as ICT Clerk Asistant too. During our cordial relationship, I realized her husband is diagnosed with terminal illness and soon to die just 6 months while they are planning to buy a property in Sydney. Since the huge amount of money soon be invested in the propertyand repaying the loan from one salary source would be difficult, I will not take side and keep quiet for the issue. Rather I would take the step to advice in professional way. Four professional characteristica would help me in this dilema situation. Firtly, information interegrity is very crucial (ACS, July 2012). I willnot tell anybody in the management concerning my friends husband health situation as this will cause working discmfort in the office but only the operation manager. Rather I would take advisoryand encouragement measures as social responsible person (ACS, July 2012) to talk to my friend and ask her any past health records of her husband and any information sheknows of her husband health status. Then advice her of the cosequences of taking such investment risk. Using economic and market situations, I would advice her to tell her husand to re-think buying the property now due to future economic change and buy it later after 6 months elapsed. Honesty(ACS, July 2012) is the next key to help the situation. Being too honest and open to her and tell her the facts rather than telling lies that bound. Honsty concerning her health situation is very important. Keeping silent and quiet will not solve the situation rather telling her the truth that will set me free in long run if they go against my advice given to her. Showing more love, companion and understanding to her(ACS, July 2012). Telling her that her husbands health situation is beyond human nature but lshowing more love, care and understanding of her situation will comfort her and feel appreciated in the industry by other fellow workmates. Keeping loyalty and total assurance (ACS, July 2012) of her job even after the death of her husband is very crucial. Knowing that she will be the bread-winner to her family after the death of her husband in six months time and the challengers of single parent face, she will keep her job and offer her service to the ICT industry competen tly and serving the community interests (ACS, July 2012). Portfolio; Succesful Completion Justification In communication and passing of information the use of interpersonal skills togethr with listening and verbal skills are highly crucial. For example, when talking to a dumb person and sometimes there is mis-communication, the use of interpersonal skills, reading and verbal is very important. Interpretation the meaning of gesturess needs interpersonal skills. Unable to commnicate using gestures due to not knowing the meanings, reading and writing is important and verbal shoutings from the to show the displassure and any feelings he or she has is seen. This helps in communication and understanding. Effective use of reading skills help in understanding the instructions given before doing accademic work. Reading while writing the accademic work also ensures quality work is deliverd. Hencd reading skills are important in following the instructions and quality work delivery. In the research paper and assignments, the reading skills are importantly used. For example, reading the ICT Codes of Conduct and Standards of ACS. Soving a problem in a group vonflict or assigning tasks and duties to a group needs proper communicaion, understanding and respect of everybody within the group structure. Use of good channel of communication and professionalism ethics would help in reducing conflicts and easy duty assignments to individuals. Open minded communicationas and ability to listen to everyones views in the group would ensure mutual respect an this improves teamwork and togethernes. Other skills used are rspect and understanding of all parties involved in the conflict situation or in assigning tasks. Discusion and understanding of the ethicalissues of ICT and its professionalism is very important. The two assessments where the ehics discussed include; first seminar and conference of ICT workers, professionals and other stakeholderss. Secondly, training and undertaking ICT courses that comes with its ethics and practices as units in the curriculum to impart the knowlede to the ICT students. The ICT skills learned fromnthese two sessons are important in ICT profesionalism. The skills were learned through direct observation of how the other professionals were carrying out themselves in and out the session period. The skills also learned throgh direct participation in the ICT conflict resolution team as the team member. There notes were taken and kept to help me in fuure references in case of such conflicts arise. The two things I liked about the unit were the interractions of the ICT professionals, to gthemselves and to the society.the ethics and code of conducts an ICT personel should have while carrying out the ICT duty. Also to the society where one tries tohelp the situation of other fllow work mats and the society in gneral. This improve unity and teamwork Another thing is the group or ICT conflict group resolution. There are many cases of conflicts in the offices where people work together. However, kowing how to solve the problem would improve the productivity and teamwork within the prganization structure. The topic is very nterructive. However, there are still some improvements to be done to make it more appealing to many. Firstly, the availabibility of readily ICT and ACS Codes of Ethics to many people and ICT personels. There are very few ICT personels who can access the materials so that they can read and understand the standard ethicks needed if them. Some conflict cases occur wuthin the ICT industries and how they can be solved hasposed a big challenge to them. Secondly, References ACS, Ajuly 2012, accessed through Google www.acs.org.au on 27, May,2017 Phhilosophy; Critical Thinking, HKU University, 2007 (accesed on 27, May 2017