Saturday, November 30, 2019
Iphone Marketing Strategy Essay Example
Iphone Marketing Strategy Essay As the team of marketing consultants hired by Apple Corporation, we have been asked to review their current target markets and marketing mixââ¬â¢s to come up with possible suggestions for improving the overall effectiveness of the organizations marketing efforts. Our main focus will be specifically to cover the already successful iPhone, and not the other wide range of products and services that Apple has to offer such as: computers, software bundles, iPods, and the iTunes store. The iTunes store in its self provides everything from music, movies, shows and even applications which are all compatible with the iPhone. First we will have to identify the target market and address the 4Pââ¬â¢s (place, price, product, and promotion) to find the strengths and possible weaknesses for areas of improvement. We will also be covering market segmentation, showing specifically how they decided to subdivide the market and what Apple is aiming to achieve for each market segment. When the iPhone was first released out in to the public in June of 2007, it was an instant hit, but Apple is always looking to increase its market share in the smart phone industry. The smart phone industry is such a competitive market that innovation and consistent improvement are a must. As the iPhoneââ¬â¢s product life cycle continues to move forward, Apple will need to stay on top of their marketing strategies to remain successful, especially as the product reaches maturity. - Target Market Profile We will write a custom essay sample on Iphone Marketing Strategy specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Iphone Marketing Strategy specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Iphone Marketing Strategy specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Apple has a very unique target market consisting of two major targets which include; consumer targets and business targets. With the consumer market category, Apple has two sub targets. Their primary target being middle to upper class income individuals who need to coordinate their busy schedules while still being able to communicate with colleagues, friends and family. While the Secondary consumer target market consists of high school, college and graduate students, who need one portable multifunction device to satisfy their own unique daily needs. Target Segment| Consumer Need| Corresponding Feature/Benefit| Professionals| * Stay in touch while on the go. * Record information while on the go. | * Email, instant messaging, and phone. * Applications from Mac OS X for notes and record keeping. | Students| * Perform many functions without carrying multiple gadgets. * Style and individuality. | * Music, phone, video and TV shows. * Apple branding as fashion statement. | The chart above shows that Apple uses a demographic strategy, psychographic strategy and benefit sought strategy to segment the consumer market into more specific areas. This helps Appleââ¬â¢s marketing team to better define what the customer needs and wants are so that they can focus on meeting the customer values. Demographic segmentation shows that iPhones are marketed to a specific group of individuals based on age, income, and family life cycle. For example, since the iPhone is a premium product, Apple is able to charge more for their phones than their competitors, but by doing this, Apple is forced to target markets that are capable of purchasing their product at such a high cost. However, in the past year the cost of the iPhone has dropped a significant amount, to a more consumer friendly price. Apple also segments the market based on psychographics segmentation, showing personality, motives, and lifestyles; for example, having over 100,000 apps, to give the consumer the power to personalize their phone to their exact needs and wants. Appleââ¬â¢s intention is to simplify making changes to the iPhone and to adapt to changes in customer expectations according to the benefits they seek such as instant messaging, fast internet access and applications. On the other hand, Apples main business target is to partner with all cell phone providers worldwide to expand their market share of the smart phone industry and eventually be the number one option for consumers looking to purchase a Smartphone. Appleââ¬â¢s secondary target market is medium to large corporations who need a simple solution to stay in communication or access vital data on the go for managers and their employees. By segmenting the smart phone industry, Apple was able to see a new opening in the onsumer market and showing regular consumers how a Smartphone can make their lives easier, and not just how they are beneficial to a business user, giving them a competitive advantage over other smart phone companies that were targeting only the business market, which are already developed. However, now that Apple has peaked in the consumer market and made an image for themselves, they are now considering the business market to take full market share of the entire smart phone industry. The chart below shows different business segmentations and how each segmented portion will be able to utilize the iPhone. Target Segment| Consumer Need| Corresponding Feature/Benefit| Corporate Users| * Input and access critical data on the go. | * Applications from Mac OS X for notes and record-keeping. * Compatible with widely available software. | Entrepreneurs| * Organize contracts, access contracts, and schedule details. | * Wireless access to calendar and address book to easily check appointments and contracts. | Medical Users| * Update, access and exchange medical records. | * Wireless access to calendar and address book to reduce paperwork, and increase productivity. | - Marketing Mix - Product A successful marketing mix is an important asset every company needs to effectively sell as much of their product as possible. In the case of Apple, their team of market researchers do an exceptional job of researching both the consumer and business markets in order to find out exactly what people want, and how to get their point across to everyone. The product in this case, the iPhone, is a very complex product to promote due to the huge increase in demand around the world for smart phones in the consumer market. Apple uses many different strategies to reach both consumer and business markets, especially with outlining the key features of the product. Apple, having patented their touch screen technology, dominates the market with unmatched features and touch screen capabilities that no other company can duplicate. Before the iPhone, touch screen phones needed a stylus to operate, with the introduction of the iPhone however; they have revolutionized how handheld touch screen products operate. The whole operating system in the iPhone is based on thumb touch, as opposed to using a separate, awkward stylus. Along with the iPhoneââ¬â¢s amazing touch screen features comes its built in accelerometer. When the iPhone is rotated from portrait to landscape, the accelerometer detects the movement and changes the display appropriately. This is a key feature for some of the apps you can download for the iPhone, such as games. Sensors within the iPhoneââ¬â¢s display help to maximize battery life by automatically dimming the display when you lift the phone to your ear, or if you are in sunlight as opposed to a dim light. The display also features a multi-touch screen feature, which allows the user to easily zoom in and out, as well as use other capabilities built into several apps. With these features put into the iPhone by Apple, the phone really sells itself solely on its features. - Promotion Due to the ease of use and functionality of the Apple iPhone it is a easy product to sell however, without promoting the product, consumers would have no idea of the benefits the iPhone can provide them. That is where Apples genius promotion strategies come into play. Apple promotes their product literally on every level possible, including television ads, radio, billboards and even at public events. In 2008, Apple released an app that was solely dedicated to The Beatles. This app, in itself made the iPhone a much more sellable product to an older generation of people. This app includes a full discography of The Beatles as well as a full biography, music samples and trivia. Along with an interest in gaining a larger market base, Apple still focuses mainly on the younger generation of people such as young teens all the way up to college students and grads. They effectively reach this target market with advertising in which younger people can easily relate to, such as humor and new and exciting designs. The most recent iPhone ads are incredibly effective due to the fact that they inform you of features such as its touch capabilities, you can watch movies and listen to music on it, you can browse the internet, it knows where you are, and it makes decisions for you all within a comfortable 30 seconds, without rushing it. Along with the advertising aspects of the iPhones promotion, comes all the sales promotions that Apple implements along with its carriers. Now with the introduction of the newest iPhone, the iPhone 3G S, the basic iPhones price has been dropped significantly, which leads into Apples latest marketing approach. With Rogers, you can purchase the 8GB iPhone on a three year contract for just $99. In Apples words, ââ¬Å" At $99, every pocket can have one. â⬠However for only another $100, the iPhone 3G S comes with a price tag of $199 on a three year contract, with the slogan, ââ¬Å"What every pocket wants. â⬠- Price With such a large demand lately in the market for smart phones, the prices of the iPhone have had to drop from when they initially came out in order for Apple to stay on the top of the market. When the iPhone first came out in June 2007, it had a hefty price tag of $599 (US) for the 8GB model and $499 (US) for the 4GB model. In just over 2 years, the price of the iPhone has dropped a whopping 83%, from $599 all the way down to $99. With this huge drop in price, Apple has been able to stay on top of the game and bring their customers top of the line products at competitive prices, all while still making a profit. This is a huge feat for a company because this means that as they grow as a company, their client base will grow with them. With the iPhone currently sitting at $99, this price even competes with some of the regular cell phones on the market that do not have nearly the same amount of features and options that the iPhone has. With this being common knowledge for someone who is in the market looking for a new cell phone, they are much more inclined to look into purchasing an iPhone rather than a basic cell phone due to the fact that they can get much more product for their dollar. This is a very good example of Apple utilizing a value based pricing technique to draw in customers away from the competing cell phone companies. A customer will be able to look at a regular cell phone for $99 and see a list of features that come with that phone; they will then look at an iPhone and see the endless list of features with $99 tagged at the end of it. At this point, anyone in the right mind is going to instantly choose the iPhone over the ordinary cell phone, simply because of what you can do with an iPhone, and what it can do for you, all with an attractive price stamped on it. Place With the Apple iPhone now available through Rogers, Bell, Fido and Telus in Canada alone, the availability of the iPhone has gone through the roof, creating a much higher number in sales over the last few months. Since its release, Apple has sold over 30 million iPhones worldwide; this number will continue to grow as they come out with new models and available features. Apple has released the iPhone worldwide, however sales in Europe didnââ¬â¢t hit as hard as expected, quite possibly due to the very late release date. However, in the UK they have sold well over 1 million iPhones as of today, and are still selling. The convenience of the iPhone makes it so easy to use no matter where you are. If your iPhone needs an update of any kind you do not need to plug it into the computer, you can simply do it right from the palm of your hand. A main selling point of the iPhone is the available apps you can download onto it without plugging it into anything. With in between 60,000 to 80,000 available apps, the iPhone can provide you with pretty much any service imaginable, anywhere on the planet. With Apple marketing the fact that you can literally do anything with this phone, no matter where you are, customers have just been jumping on the band wagon left right and center. A large percentage of the apps you can download are free, however there are also many that cost money. On average an app costs anywhere from $0. 99 anywhere up to $100 and more, a huge benefit is that 30% of all sales from Apps go to Apple even if they had nothing to do with the development of that App as it is a part of the contract with all developers and Apple. Since the iPhones release, Apple has generated over 1 billion dollars in sales just from the apps alone, showing the power they have in the market when it comes to making their product available, no matter where in the world you are. With the iPhone currently available through over 120 carriers world-wide and in 89 countries, it can only grow from here. Apple has come this far with the iPhone and if they keep up the way they have been effectively marketing it around the world, marketshare should hit 30% by the end of 2010. Recommendations for Improvement The iPhones marketing team has done a phenomenal job in marketing the Apple iPhone, as well as advertising it to their select target markets. However, on a global scale, Apple did not release the iPhone quite early enough in Europe, possibly deterring potential buyers from the phone (due to the wait). In the U. S. the iPhone was released in June 2007, in Nov of 2007 it was released in the UK, Germany and France. However, not until June of 2008 was the iPhone released to the rest of the European market, a whole year after the original release date. Simply by releasing the phone worldwide all in one big shot could have made much more of a splash in the smart phone market all around the world, this resulting in possibly hundreds of thousands of extra sales. You could however argue that by delaying the release date in Europe, Apple had created a whole lot of hype around the product, leaving some customers just waiting until the day they could get their hands on their very own iPhone. Still, this issue left a sour taste in the mouths of many anticipated fans across the sea. A huge portion of the smart phone market is reliant on businesses. Apple has quite flawlessly mastered their promotions and marketing mixââ¬â¢s directed towards a consumer market. However, they have not yet been able to grasp as much of the business industry as they wish. Blackberrys have taken the business market by storm with their Blackberry Messaging service, allowing any Blackberry user to instantly converse with another or a group of others, with no extra fees tacked on. Another issue being is a Blackberry is still the email king with your e-mails being ââ¬Å"pushedâ⬠to your phone while with an iPhone they are ââ¬Å"pulledâ⬠causing up to a 15 minute delay for e-mails to come in, for a regular consumer thatââ¬â¢s not a big deal but for the business man who is dealing with clients all over the world involving millions of dollars 15 minutes could be the difference between closing or breaking the deal. When you consider those two advantages the Blackberry has in the business world ou have to consider if Apple could come up with a way to deal with those advantages it could persuade companies to switch over to the iPhone platform. Another thing that Apple needs to consider regarding their iPhone on the business side of the market is the camera, it is a huge deal for some companies developing new products that all phones in the offices must not have cameras on them, RIM offers this option for its business consumers simple fact is Apple need s to as well. Once these issues are dealt with and the iPhone then feature wise seems more appealing to businesses putting proper marketing out there saying ââ¬Å"Hey Iââ¬â¢m a business user and I have an iPhoneâ⬠will be key to build the same type of hype on the business level as they have already created on the consumer level. Finally the providers come in to play, a $99 iPhone without a contract actually costs $599. 99 to buy outright so a carrier such as Rogers has to eat $500 of subsidized costs to initially get the customer to purchase the phone and then must hope that they make all that money back with service costs they will charge that customer. In Rogersââ¬â¢ case that doesnââ¬â¢t seem to be a big issue but with many companies in Europe it is because many cellphone providers are reporting that the iPhone has been a money hole for them now and they donââ¬â¢t see that changing. With Appleââ¬â¢s strict pricing rules and absolutely no discount policy if the iPhone doesnââ¬â¢t prove to carriers that it is a revenue generator they may eventually choose to drop the iPhone completely from their lineup of smartphones. Thus causing less market availability resulting in lost sales Apple needs to work with their carriers in a more two-way manner as right now they know the iPhone is in huge demand and carriers canââ¬â¢t afford to not be able to offer it so they accept ââ¬Å"Appleââ¬â¢s way or no way policyâ⬠but if demand slows down then Apple will obviously have to then adjust their approach. With the structure Apple currently has on the consumer side of the market, it is hard to knock them for anything, the iPhone being no exception. They have done a remarkable job promoting their product and will continue to grow as a company as their technology does, competing in the smart phone market as one of the top leaders of innovation and available services. On the business side though they obviously have a lot of room for improvement and with what has been discussed, a few extra features, a few adjustments and a great marketing campaign and Apple should see a huge increase in sales for their business consumers.
Tuesday, November 26, 2019
How to Use a Bug Bomb Safely
How to Use a Bug Bomb Safely Bug bombs, or total release foggers, fill a confined space with pesticides using an aerosol propellant. People tend to think of these products as quick and easy fixes for home insect infestations. In truth, few pests can be wiped out using bug bombs. The devices arent particularly useful for controlling infestations ofà cockroaches, ants, orà bed bugs, and for this reason, its importantà to know when its appropriate to use them. Used incorrectly, bug bombs can be downright dangerous.à Each year, people ignite fires and explosions by misusing insect foggers. Bug bomb products can also cause respiratory and gastrointestinal ailments, which in the young or elderly can be fatal. If you are planning to use a bug bomb in your home, make sure to do so safely and correctly. Why Bug Bombs Alone Are Not Effective Bug bombs- sometimes called roach bombs- can be a useful part of an integrated pest management program. Alone, however, they are not especially effective. The reason is simple: The pesticide in a bug bomb (which is not always particularly effective against roaches, fleas, bedbugs, or silverfish) kills only those bugs with which it comes in direct contact. Most household pests are well known for their ability to hide under baseboards, inside cupboards and mattresses, in drains, and along baseboards. Set off a foggerà and youll kill off only those bugs that happen to be out in the open at any given moment. Any pests that are inside or under a protective covering will survive to bite another day. Meanwhile, your counters and other surfaces will have been coated with pesticide, meaning youll have to scrub them down before cooking or sleeping on them. If you are serious about eradicating an infestation, youll need to do much more than simply set off a bug bomb. Because it does take work and know-how to safely and effectively rid yourself of pests, you may want to hire a pest control company. Experts may use bug bombs as part of their arsenal, but they will also: Set bait trapsSpray directly into areas that are protected and likely to harbor pestsUse chemicals that are specifically intended to eradicate particular pests; pyrethrin, the main pesticide in foggers, is most effective against flying insects- but not cockroaches or fleas.Return to reapply pesticides as needed How to Use Bug Bombs Safely Bug bombs are somewhat risky as they contain flammable materials including potentially harmful pesticides. To use them safely, follow all of these instructions. Read and Follow All Directions and Precautions When it comes to pesticides, the label is the law. Just as the pesticide manufacturers are required to include certain information on their product labels, you are required to read it and follow all directions correctly. Understand the risks of the pesticides you are using by reading carefully all label sections beginning with danger, poison, warning, or caution. Follow instructions for use, and calculate how much pesticide you need based on the package directions. Most foggers are intended to treat a specific number of square feet; using a large bug bomb in a small space can increase health risks. In addition, most foggers have information about how long to wait before returning to the sprayed area (typically two to four hours). Use Only the Number of Bug Bombs Specified Contrary to popular belief, more is not always better. Manufacturers test their bug bomb products to determine the safest and most effective number to use per square foot of living space. If you use more than the specified number of bug bombs, you only increase the health and safety risks that come with using them. You wont kill any more bugs. Cover All Food and Childrens Toys Prior to Using the Bug Bomb Once the bug bomb is activated, the contents of your home will be covered with a chemical residue. Do not eat any food items that were not covered. Young children tend to put toys in their mouths, so its best to seal toys inside garbage bags or put them in toy boxes or drawers where they wont be exposed to pesticides. You may also want to cover sofas, chairs, and other upholstered furniture that cant be wiped down. Tell Your Neighbors About Your Bug Bomb Plans Condos and apartment buildings usually share common ventilation systems or have cracks and crevices between units. If you live in close quarters, make sure to let your neighbors know when you are using any airborne pesticide product, and ask them to turn off any ignition sources (stove and dryer pilots, for example) in their units. Your neighbors may prefer to cover their adjacent ductwork, too. Unplug Anything That Can Spark The aerosol propellants used in bug bomb products are highly flammable. A gas flame or ill-timed spark from an appliance can easily ignite the propellant. Always turn off all pilot lights, and take the extra precaution of unplugging refrigerators and air conditioners. To be extra safe, place the bug bombs a minimum of six feet from any potential source of a spark. Once You Activate the Bug Bomb, Vacate the Premises Immediately Silly (and obvious) as this may sound, a good number of reported incidents have occurred because individuals were unable to vacate prior to discharge of a bug bomb. In fact, a CDC study on bug bomb safety showed a full 35 percentà of reported health issues occurred because users failed to leave the area after activating the fogger. Before you activate the product, plan your escape. Keep All People and Pets out of the Area for as Long as the Label Indicates For most bug bomb products, you need to vacate the premises for several hours after activating the product. Do not, under any circumstances, return to the property early. You risk serious health issues, including respiratory and gastrointestinal ailments, if you occupy the home prematurely. Dont reenter your home until it is safe to do so according to the product label. Ventilate the Area Well Before Reentering Again, follow the label directions. After the prescribed amount of time to allow the product to work has passed, open as many windows as you can. Leave them open for a minimum of one hour before you allow anyone to reenter the home. Once You Return, Keep Pesticides out of Pets and Peoples Mouths After returning to your home, wipe down any surfaces where food is prepared, or that pets or people may touch with their mouths. Clean all counters and other surfaces where you prepare food thoroughly. If you left pet dishes out and uncovered, wash them. Ifà you have infants or toddlers who spend lots of time on the floor, be sure to mop. If you left your toothbrushes out, replace them with new ones. Store Unused Bug Bomb Products Safely Children are particularly susceptible to the effects of airborne chemicals, and you shouldnt risk an accidental discharge of pesticides by a curious child. Like all hazardous chemicals, bug bombs should be stored in a childproof cabinet or other secure location. If You Are Exposed to a Bug Bomb While most people understand that they should leave the house after setting off a bug bomb, there are quite a few reasons why someone might be exposed to pesticide-containing fog. According to the CDC, the most common reasons are related to: Bug bombs being set off without warning in apartment buildings with shared ventilation systemsSomeone reentering a building because a bug bomb set off an alarmHomeowners returning too soon after setting off a bug bombInfants and pets being exposed to residual pesticides on blankets, carpets, or other surfaces If youre exposed to pesticide from a bug bomb, you may experience nausea, shortness of breath, dizziness, leg cramps, burning eyes, coughing, or wheezing. These symptoms may be mild or severe; they are, of course, most dangerous among very young children and people who are allergic to the pesticide. If you do experience symptoms, visit the emergency room to avoid complications.
Friday, November 22, 2019
Advertising Is a Wasteful Expenditure or an Investment
Many a times, we as consumers remember the setting of the ad but forget the brand that was being advertisedâ⬠¦this is definitely a pitfall and must be looked into. For an ad to have a real impact, it must be able to create brand retention. Advertising is the main source of ââ¬Å"Customer Educationâ⬠in marketing. Its main advantage to the customer is that we become aware of the products in the market and have a competitive advantage in buying the products and services. Its main advantage to the seller is in the manner of informing the prospective customers of the values of the products and capturing them. In older days, ads were on papers and pamphlets and billboards. In this electronic era, it has captured the TV and the internet. Therefore advertising is not a waste of resources. But as companies make their advertising expenditure on customer then it would be a bit problematic condition for customers as companies just look for their profits and if the advertising agency is not good then the whole budget goes waste. So i think company should be effective to make an ad as for this era advertising is an important aspect for all types of businesses. But company should not make the ads on the costs of customerââ¬â¢s money as they donââ¬â¢t give customer a big return but they have a huge returns and companies absorb bloods of poor customers. So i think that should be stop or minimized as in India rich are becoming more richer and poor becoming more poorer Advertising Is a Wasteful Expenditure or an Investment Many a times, we as consumers remember the setting of the ad but forget the brand that was being advertisedâ⬠¦this is definitely a pitfall and must be looked into. For an ad to have a real impact, it must be able to create brand retention. Advertising is the main source of ââ¬Å"Customer Educationâ⬠in marketing. Its main advantage to the customer is that we become aware of the products in the market and have a competitive advantage in buying the products and services. Its main advantage to the seller is in the manner of informing the prospective customers of the values of the products and capturing them. In older days, ads were on papers and pamphlets and billboards. In this electronic era, it has captured the TV and the internet. Therefore advertising is not a waste of resources. But as companies make their advertising expenditure on customer then it would be a bit problematic condition for customers as companies just look for their profits and if the advertising agency is not good then the whole budget goes waste. So i think company should be effective to make an ad as for this era advertising is an important aspect for all types of businesses. But company should not make the ads on the costs of customerââ¬â¢s money as they donââ¬â¢t give customer a big return but they have a huge returns and companies absorb bloods of poor customers. So i think that should be stop or minimized as in India rich are becoming more richer and poor becoming more poorer
Wednesday, November 20, 2019
Using relevant theories and examples, explain how motivation can Essay - 2
Using relevant theories and examples, explain how motivation can affect employees commitment and performance at work - Essay Example Keeping valuable employees motivated in an organisation is not only intended to make them commit and perform but also to keep them over the long haul (Frasch 2010). There are many implements used by business organisations to motivate their employees. The most common notion about motivation is to shower them with fat paychecks but this proved to be inadequate in keeping employees motivated (Herzberg 1987). As what organisational theorists have reported, committing employees to perform towards a common goal involves an interplay of various factors that involves not only remuneration, but also the social and psychological dimensions of work that keep employees productive. Several business organisations even went as far as integrating play with work not only to keep their employees committed and productive, but also to induce creativity in the workplace which proved to be beneficial to a companyââ¬â¢s diversification drive such as the case of Google (Lovewell 2005). These various motivation theories shall be discussed in this paper and we will also tackle how these theories affect performance in todayââ¬â¢s competitive environment. The idea of the necessity to motivate employees to encourage commitment and performance among employees was first conceived by management classical theorists such as Taylor, Maslow, Mayo, McGregor, Vroom and Herzberg. While modern management and organisational theorists will argue that their concepts of motivating employees to commit and perform are inadequate, it cannot be denied that these classical theorists provided the basic building blocks of the know-how to motivate employees. From a simple idea of Taylor that adequate remuneration motivates employees, it later expanded to include the other dimension of human needs and aspects with the aim of fulfilling these needs that would enable employees to commit to the organisation better perform. Such, it would be necessary to cite and expound the ideas of these
Tuesday, November 19, 2019
Competitive advantages with the merger of exxon and mobil Case Study
Competitive advantages with the merger of exxon and mobil - Case Study Example Unlike other companies in this industry, such as Shell, Exxon-Mobil now has a new knowledge base of talented professionals that supersedes other industries. The revenues earned by Exxon-Mobil have also provided the firm with new opportunities for further acquisitions, including its 2010 purchase of XTO Energy (Miller, 1). This acquisition has given the business much higher competitive edge due to its capital purchase as XTO is a leader in providing new innovations in unconventional energy resources, including natural gas and fossils fuels that burn cleaner than competitive products. This is a competitive advantage since regulations for clean air emissions are targeting firms and Exxon-Mobil is already geared for compliance and will be able to avoid non-compliance fees and taxation like some of its gas industry competitors. It is clear that the companyââ¬â¢s largest competitive advantage comes in the form of high profitability. Miller, Don. ââ¬Å"Exxon Deal for XTO Energy May Set Off Wave of Energy Mergers and Acquisitionsâ⬠. Money Morning Magazine Online. Accessed October 8, 2011 at
Saturday, November 16, 2019
Adapting the Law to the Online Environment Essay Example for Free
Adapting the Law to the Online Environment Essay Formulating unique conception of the Web in ââ¬Å"Weaving the Webâ⬠Berners-Lee emphasized that the intention was to create a system with ââ¬Å"one fundamental property: it had to be completely decentralized.â⬠In the vision of Berners-Lee: ââ¬Å"That would be the only way a new personà somewhere could start to use it [the Web] without asking for access from anyone elseâ⬠[1]. In the initial years of the Webââ¬â¢s functioning, Berner-Leeââ¬â¢s ideal of a highly decentralized universal system has been shared by tens of millions of people around the world who have appreciated and marveled at an invention that makes it unexpectedly easy for anyone with a computer to connect with anyone else with a computer, anywhere in the world, and to store and send information almost at will. But the Internet and the Web have also moved to the center of attention for governments, business leaders, lawyers and judges, police forces and military establishments, and anyone else dependent on the rule of law and authority structures in modern society. This is a result of the ability and tendency of Internet users to simply skirt or leap over many of the rules and institutions designed to maintain order in the pre- Internet world. Previously designed rules and legal structures enacted for slower-paced, relatively public tangible transactions in a world rimmed everywhere with borders (local, provincial, national) suddenly were challenged as never before when the Internet made it physically conceivable to carry out transactions of almost any kind in a manner simultaneously immediate, anonymous, inexpensive, and seemingly borderless. However, the process of certain democratization, overcriminalization and simply lazier-affair went beyond predictable limits ââ¬â internet identity theft, credit card fraud, controversies with gambling and online porn reveal significant need to adapt the law to online environment, to analyze the specifics of cyber crimes and to create effective regulatory norms. Traditional Crime and Cyber Crime: Defining Boundaries From the primary perspective, the Internet imitates and, in most cases, runs parallel to what is often happening in normal life, therefore, it is no wonder that the law had to take account of this new parallel of real life. Hence the frequent appeals for ââ¬Å"cyberlawâ⬠or ââ¬Å"cyberspace law.â⬠Simultaneously, the imitation of life by the Internet does not completely transcend existing forms of activities in their entirety. Thus while electronic forms of information are the hallmark of the Internet and tend to undermine tangible media, or even render them obsolete, prior forms of information may coexist alongside them, albeit uneasily and suffering permanent corrosion. In so far as it is not possible to divine the extent to which the Net will generate parallel or independent forms of activity, the development of the appropriate law cannot be predictable. One has to determine in each specific sphere of activity how far the parallels go and how big or small the change over the normal may have been before working out the legal response. Consequently, the lack of time or resources cannot be the main reasons for the non-development of Internet law, as Edwards and Waelde suggest[2], although they recognize, somewhat indirectly that the Internet is still developing and so must the Internet law. Edwards and Waelde view ââ¬Å"Internet Lawâ⬠as being a result of (the usual) adaptation process that the law undergoes to catch up with new technological phenomena. They regard Internet Law as a necessity, contrary to the ââ¬Å"core pragmaticâ⬠perception of those they refer to as looking upon the Internet as law-free.[3] And although the regulation of Internet content, transactions and activities seems to be logical and self-evident, the problems start appearing from the very definition of cyber crime. Blackââ¬â¢s Law Dictionary defines a ââ¬Å"crimeâ⬠as a ââ¬Å"social harm that the law makes punishable; the breach of a legal duty treated as the subject-matter of a criminal proceeding.â⬠[4] Anglo-American crimà inal law has for centuries possessed a set of definitions of ââ¬Å"crimesâ⬠that encompass the varied categories of social harms humans can inflict on one another, for instance homicide, rape, robbery, arson, vandalism, fraud, child abuse, etc. According to Susan Brenner, crimià nal law does not typically differentiate offenses based upon the instrumentalities that are used in their comà mission; we generally do not, for example, divide homià cide into ââ¬Å"murder by gun,â⬠ââ¬Å"murder by poison,â⬠ââ¬Å"murà der by strangulationâ⬠and so on.[5] As Brenner points out, criminal law does treat the use of certain instrumentalities as ââ¬Å"aggravatà ing factors,â⬠the use of which can result in an enhanced sentence upon conviction; this is how criminal law genà erally deals with using a firearm or other dangerous inà strumentality in the commission of a crime.[6] This approach could, perhaps, have been taken with regard to cyber crime; we could simply define hacking as a type of trespass, analogous to real-world trespass. The ââ¬Å"crimeâ⬠of real-world trespass is gaining access to a physical space a building or a parcel of land without authorization. We could have pursued hacking in an analogous fashion, perhaps prosecuting it as tresà pass and then characterizing the use of computer techà nology as an aggravating factor.[7] However, that is not the approach the law has taken and is takà ing to the use of computer technology to inflict social harms. What is emerging is a division between tradià tional crimes (trespass, burglary, theft, stalking, etc.) and cyber crimes. The latter encompass the use of comà puter technology to commit either (a) social harms that have already been identified and outlawed generically (trespass, burglary, theft, stalking, etc.) or (b) new types of social harm that do not fall into traditional ââ¬Å"crimeâ⬠categories. It is necessary to adopt cyber crime-specific laws for the first category of conduct because, as Brennanââ¬â¢s hacking-trespass example illustrates, computer techà nology can be used to commit social harms in ways that do not fit comfortably into our existing offense categories. Another Brennanââ¬â¢s example of a denial of service attack[8] simply eludes conventional crimià nal law: it is not theft; it is not extortion; it is not blackà mail; it is not vandalism or trespassing or any other ââ¬Å"crimeâ⬠that has so far been defined. We must, therefore, define new ââ¬Å"cyber crimesâ⬠to encompass denial of service attacks and other ââ¬Å"newâ⬠varieties of criminal activity. In conceptualizing the varieties of cyber crime, it is helpful to divide them into three categories offered by Marc Goodman: crimes in which the computer is the target of the criminal acà tivity, crimes in which the computer is a tool used to commit the crime, and crimes in which the use of the computer is an incidental aspect of the commission of the crime.[9] When a computer is the target of criminal activity, the perpetrator attacks an innocent userââ¬â¢s computer or computer system either by gaining unlawful access to it or by bombarding it from outside. Cybercrimes that fall into this category include simple hacking (gaining access to a computer system or part of a computer system without authoà rization) and aggravated hacking (gaining access to a computer system or part of a computer system without authorization for the purpose of committing a crime such as copying or altering information in the system). The target cybercrimes also include denial of service attacks and the dissemination of viruses, worms and other types of malware. The cyber crimes in this cateà gory tend to be ââ¬Å"newâ⬠crimes and therefore generally require new legislation. A computer or computer system can also be the inà strument that is used to commit what is essentially a traditional crime. Cybercrimes in which a computer is the tool used to carry out criminal activity include online fraud, theft, embezzlement, stalking and harassà ment, forgery, obstruction of justice and the creation or dissemination of child pornography. These are convenà tional crimes, but it may be difficult to prosecute online versions of these crimes using existing substantive law; a jurisdictionââ¬â¢s theft statute may not, for example, enà compass a ââ¬Å"theftâ⬠of intangible property when the theft consists of copying the property, instead of approprià ating it entirely. In State v. Schwartz, Oregon State of Appeal held that ââ¬Å"â⬠¦by copying the passwords, defendant stripped them of their value.â⬠[10] Jurisdictions may therefore find it necessary to amend their existing substantive criminal law to ensure that it can be used against these cy ber crime variants of tradià tional crimes. The last category consists of cyber crimes in which the use of a computer or computer system is incidental to the commission of the crime. This category includes, for example, instances in which a murderer uses a comà puter to plan a murder or lure the victim to the murder scene; it can also include a blackmailerââ¬â¢s using a comà puter to write extortion letters to his victim or a drug dealerââ¬â¢s using a computer to monitor his sales, inventory and profits. Here, the computer is merely a source of evidence and new substantive criminal legislation is generally not needed. The cases in this category can, however, require new law to resolve procedural issues such as the processes used in gathering evidence of cyber crimes. The basic federal cyber crime provision is 18 U.S. Code à § 1030; among other things, it criminalizes hacking, cracking, computer fraud and the dissemination of viruses, worms and other types of malware. The statute accomplishes this by directing its prohià bitions at conduct that targets a ââ¬Å"protected computerâ⬠and then defining ââ¬Å"protected computerâ⬠as a computer encompassed by federal jurisdiction.[11] Section 1030 defined a ââ¬Å"protected computerâ⬠as either (a) a computer used exclusively by a financial institution or the federal government or used nonexclusively by a financial institution or the federal governà ment if the conduct constituting the crime affects its use by the financial institution or federal government; or (b) a computer used in interstate or foreign commerce or communication.[12] The notion of basing the statuteââ¬â¢s prohibitions on conduct directed at a ââ¬Å"protected computerâ⬠was introduced when à § 1030 was a mended in 1996; until then, it criminalized conà duct that was directed at ââ¬Å"federal interest computers,â⬠i.e., computers used by the federal government or loà cated in more than one state.[13] The 1996 amendment broadened à § 1030ââ¬â¢s reach; it now encompasses conduct directed at any computer conà nected to the Internet. In 2001, the Patriot Act amended à § 1030 to make it clear that the statute can be used to prosecute criminal conduct which occurred outside the United States, a position the Department of Justice had long taken, for instance in case United States v. Ivanov. The Patriot Act expanded the definition of a protected computer to include comà puters used in interstate or foreign commerce that are located outside the United States if they are ââ¬Å"used in a manner that affects interstate or foreign commerce or communication of the United States.â⬠[14] Problematic Aspects: Copyright, Child Pornography, Identity Fraud in Internet In order to address the problems in regulation of online environment more effectively, this paper aims to focus on several most problematic aspects of the issue ââ¬â copyright violations, child pornography and identity theft or credit card fraud. Defined by Culberg, copyright is ââ¬Å"a legal device giving the author (or holder of the copyà right) the exclusive right to control the reproduction of his or her intellectual creationâ⬠for a specific period of time.[15] Copyright law in the United States derives from the U.S. Constitution and is therefore exclusively federal; states do not have the authority to legislate in this area.[16] Defenses to a charge of criminal copyright infringeà ment are, first, that the offense cannot be prosecuted beà cause the five year statute of limitations has run.[17] Other defenses are the ââ¬Å"first saleâ⬠doctrine and an argument that the defendant did not act ââ¬Å"willà fully.â⬠The first sale doctrine lets one who purchased a copyrighted work freely distribute the copy she bought.[18] Under the doctrine, however, the purchaser can only distribute the copy she bought; she cannot copy the purchased item and distribute the copies.[19] Since most computer software is distributed through licensing agreements, the first sale doctrine typically does not apply when someone is charged with software piracy.[20] With regard to the claim that a defendant did not act ââ¬Å"willfully,â⬠there is some ambiguity as what is required to show ââ¬Å"willfulness.â⬠Courts disagree as to whether it requires an ââ¬Å"intent to copy or intent to infringe.â⬠[21] The newest weapon in the federal arsenal of copyà right statutes is the Digital Millennium Copyright Act, which added two sections to title 17 of the U.S. Code. Section 1201 makes it unlawful to circumvent measures used to protect copyrighted works, while à § 1202 makes it unlawful to tamper with copyright management inà formation. Another new section, 17 U.S. Code à § 1204, creates criminal penalties for violating either sections 1201 or 1202 of the DMCA. The first criminal prosecuà tion under the DMCA was filed in 2001 against Dmitry Sklyarov, a Russian citizen, and his employer, Elcomà soft, Ltd.[22] They were charged with violating 17 U.S. Code à § 1201(b) (l) (A), by trafficking in technology designed to circumvent the rights of a copyright owner, and with violating 17 U.S. Code à § 1201(b) (l) (C), by trafficking in technolà ogy marketed for use in circumventing technology that protects the rights of a copyright owner. Another area that is a high priority in federal comà puter crime prosecutions is child pornography. To unà derstand the current state of the law outlawing child pornography, it is necessary to understand the First Amendment, which states, in part, that Congress is to make ââ¬Å"no law abridging the freedom of speech.â⬠The U.S. Supreme Court has interpreted this part of the First Amendment as prohibiting the criminalization of any but a very few limited categories of speech: ââ¬Å"[T]he First Amendment bars the government from dictating what we see or read or speak or hear. The freedom of speech has its limits; it does not embrace certain catà egories of speech, including defamation, incitement, obscenity, and pornography produced with real chilà dren.â⬠[23] From the critical as well statistical perspective, child pornography appears a relatively recent addià tion to the list. However, the rise of comà puter technology raised concerns about ââ¬Å"virtualâ⬠child pornography, i.e., pornography created using morphed or other artificial images of children, and in 1996 Congress adopted the Child Pornography Prevention Act, codified as 18 U.S. Code à § 2251. This Act extended the prohibitions on manufacturing, possessà ing and distributing child pornography to encompass pornography that featured not only ââ¬Å"realâ⬠children but what ââ¬Å"appearedâ⬠to be a real child.[24] In 2001, a coalition of free speech advocates challenged these provisions of the federal child pornography statutes; they argued that because no ââ¬Å"realâ⬠children are harmed in the creation of ââ¬Å"virtualâ⬠child pornography, it does not fall under a category of speech that cannot constitutionally be criminalized.[25] When the case was before the Supreme Court, the Department of Justice argued that virtual child pornography can be criminalized because (a) pedophiles use it to seduce children into sexual acts and (b) it stimulates pedophiles into molesting chilà dren.[26] The Supreme Court rejected these arguments and held that the prohibition of virtual child pornograà phy violated the First Amendment, so the statutory provisions at issue were unconstitutional and unenforceà able.
Thursday, November 14, 2019
Letters and Correspondence in Austens Emma Essay -- Jane Austen
Letters and Correspondence in Austen's Emma Emma as the next step in the epistolary novel Jane Austenââ¬â¢s novel Emma was written at a time when the epistolary novel had just passed its peak (Cousineau, 32). Not only do letters and correspondence feature heavily in the novel, but according to April Alliston, ââ¬Å"elementsâ⬠¦ characteristic of novels of womenââ¬â¢s correspondence recur in Austenâ⬠(221). Some examples of these elements that Alliston provides are the existence of young marriageable heroines; deceased mothers, or threatening ones which, in Austenââ¬â¢s novels, have become merely negligent; and substitute mothers who pass advice on to the daughter (221). As epistolary novels were comprised entirely of letters, early novelists could assert the pretended truth of their work rather than label it as fiction (Cousineau, 28). However, one disadvantage to this practice is that artefacts such as letters are ââ¬Å"inscribed in doubleness and contradiction" (Cousineau, 14). Letters serve as a medium between the letter-writers and the reader, a medium which has the potential to warp the truth according to the private and unknown whims of the writers. By adopting an omniscient narration of her charactersââ¬â¢ thoughts instead, Austen ââ¬Å"[focussed] the readerââ¬â¢s ââ¬Å"gazeâ⬠on the private space from which the heroine gazes out, thus fixing her more squarely in its exemplary frame than letter fiction ever couldâ⬠(Alliston, 234). Although this method of narration ââ¬Å"sacrifices the ââ¬Å"documentary statusâ⬠â⬠¦ that eighteenth century fiction strove to achieveâ⬠(Alliston, 236), Austenââ¬â¢s novels al low us to see directly into a characterââ¬â¢s thoughts. This both promises a more reliable version of "truth" by enabling the reader to learn a characterââ¬â¢s genuine motivation, an... ...aults: Correspondences in Eighteenth-Century British and French Womenââ¬â¢s Fiction. Stanford, California: Stanford University Press, 1996. 219-241. Austen, Jane. Emma. New York: Oxford University Press Inc., 2003. Austen, Jane. Pride and Prejudice. Hertfordshire: Wordsworth Editions, 1997. Cousineau, Diane. ââ¬Å"Letters and the Post Office: Epistolary Exchange in Jane Austenââ¬â¢s Emma.â⬠Letters and Labyrinths. Cranbury, NJ: Associated University Press, 1997. 13-51. Knoepflmacher, U. C. 2. The Importance of Being Frank: Character and Letter-Writing in Emma. Studies in English Literature, 1500-1900, 1967. JSTOR 7 April 2007. Wheeler, David. The British Postal Service, Privacy, and Jane Austenââ¬â¢s ââ¬Å"Emmaâ⬠. South Atlantic Review, 1998. JSTOR. 7 April 2007.
Monday, November 11, 2019
Upward Initial Velocity
1). A stone is dropped from rest from the top of a tall building, as Figureà 2. 17à indicates. After 3. 00 s of free-fall, what is theà displacementà yà of the stone? | The stone, starting with zero velocity at the top of the building, is accelerated downward by gravity. | | Reasoningà à The upward direction is chosen as the positive direction. The initialà velocityà v0à of the stone is zero, because the stone is dropped from rest. Theà accelerationà due to gravity is negative, since it points downward in the negative direction. Solution | 2). After 3. 00 s of free-fall, what is theà velocityà và of the stone? Solution 1).A football game customarily begins with a coin toss to determine who kicks off. The referee tosses the coin up with an initialà speedà of 5. 00 m/s. In the absence of air resistance, how high does the coin go above its point of release? Reasoningà à The coin is given an upward initial velocity. But theà accelerationà due to gravity points downward. Since theà velocityà and acceleration point in opposite directions, the coin slows down as it moves upward. Eventually, the velocity of the coin becomesà v=0 m/s at the highest point. | At the start of a football game, a referee tosses a coin upward with an initial velocity ofà v0=+5. 0 m/s. The velocity of the coin is momentarily zero when the coin reaches its maximum height. | Solution| 2). What is the total time the coin is in the air before returning to its release point? Reasoningà à During the time the coin travels upward, gravity causes itsà speedà to decrease to zero. On the way down, however, gravity causes the coin to regain the lost speed. Thus, the time for the coin to go up is equal to the time for it to come down. In other words, the total travel time is twice the time for the upward motion. With these data, we can use Equationà (v=v0+at) to find the upward travel time. Solution
Saturday, November 9, 2019
The 5 P’s of International Business
If you're wondering why nations trade with each other. It's because of the 5 P's: Product, Price, Proximity Promotion, and Preference. Product No country can produce all its own goods and services, a trade is obvious solution. A country's resources determine what goods and services it can produce. PriceDue to wages, taxes, fuel and other transportation costs, the costs of producing various goods from country to country may vary. Businesses in foreign countries may be able to produce products cheaper, which they can sell their products at a lower price at Canada. ProximityBorder cities such as Windsor and Ontario are tremendously influenced by their American counterparts. Businesses from both sides of the border share and exchange goods and services. Promotion With global technology such as the internet, business can let people far away know about the goods and services they are selling.Factoring Affecting The Flow Of Goods ; ServicesConsumer Needs and IncomesThe amount of money that consumers have to spend has a direct impact on the flow of goods and services in a country. In some parts in the world some people have a lot of money to spend while in other places people's income barely cover basic needs. Currency Values Most nations have their own kind of currency. The exchange rate refers to the value of one's country' currency against the currencies of other countries. It helps determine how much we pay for imported goods and services and how much we receive for what we export. When the Canadian dollars falls, imported goods become more expensive, and we tend to reduce the volume of our imports. How To Convert To Other CurrenciesConverting Canadian To Another Currency:Canadian dollar is trading at 80 US Cents How many US dollars will purchase $40 worth of Canadian products?Amount = Fund x Rate1 Can = 0.8 US1 x 40 Can = 0.8 x 40 US40 Can = 32 US$32 American to buy $40 worth of Canadian products.Converting Another Currency To Canadian:Given that the Canadian dollar is trading at 90 US cents. How many Canadian dollars will purchase $70 worth of American products?Amount = 1 divide Rate x Fund1 Can = 0.9 US1 divide 0.9 CAN = 0.9 divide 0.9 US1.11 x 70 Can = 1 x 70 US77.78 CAN = 70 US$77.78 Canadian to buy $70 worth of American products.Advantages And Disadvantages Of International BusinessAdvantages: increased markets for businessesa broader choice of products, services, and prices for consumerscreate jobsexchange knowledge which results in new approaches to production, marketing, and selling.political benefits: partners in trade seldom go to war with each otherimprove understandingincrease the level of respect people have for one another. Disadvantages: less money to spend on domestic goodsnew industries will not be able to compete with well-established industries in other countriesunfair competition due to cheap foreign labourcompetition from foreign enterprises may lead to losing of jobsBarriers To International BusinessTariffCountries place a tax called a tariff on-in-coming goods to protect domestic manufacturing. A tariff barrier slows the entry of foreign goods by making them more expensive.QuotaThis is a limit on the number of products in a category that can come into a country. The quota on clothing and textile import.EmbargoEmbargo is a complete stop to the transfer goods and it is often used as a form of political or social protest. Health and Safety Standards Countries can set such high health and safety standards for imported goods that it becomes more difficult for foreign competitors to enter the market. Trade Agreement & PactsOne of the earliest trade agreements the GATT ( General Agreement on Tariffs and Trade) brought over 100 major trading nations in 1947.It was based on 3 major principles:equal non-discriminatory treatment for all member nationsgeneral reduction of tariffsthe eliminations of non-tariff barriers
Thursday, November 7, 2019
Minority Report essays
Minority Report essays In Minority Report the conventions of genre support the composers (Steven Spielberg) vision. The conventions of genre include the settings, characters, plot, themes etc and Minority Reports conventions follow most of the common Sci-fi conventions. The settings in sf are usually futuristic cities or in space, Minority Report is set in the near future, in a futuristic city in America and therefore supports Spielbergs vision. The characters are usually male lead actors who are usually scientists or astronauts, but Spielberg made the lead actor one who is not as set in stone, personality wise and also in security. Usually the lead actors are usually scheming scientists or courageous heroes. But Spielberg moves outside of the usual characters and uses one that is not as common but still effective. The themes of Minority Report follow a few of the ones commonly associated with Sci-fi. Good vs. bad, technology and its domination or in this sense, mans reliance on technology and them taking the world they live in, the meant to be utopia, for granted. Love also plays a larger role than usual. The mood of the film is not exactly dark but it has quite a few dark moments. It is some what dystopian and pessimistic, with a some what bleak look for the future in term of security and personal well-being. The language used in Minority Report is the same as nowadays with the exception of the technical jargon but which is nothing too advanced. So therefore Minority Report does use a lot of aspect of the conventions of Sci-fi to support Steven Spielbergs vision. ...
Monday, November 4, 2019
Use of the veto Research Paper Example | Topics and Well Written Essays - 2250 words
Use of the veto - Research Paper Example Giving the president the veto power helps him to defend himself, as well as his office by preserving his own independence and importance, so that he can be relied on to exercise this power. However, Spitzer (12) argues that the veto power that was introduced into the presidency through the United States constitution, is limited compared to that of the British monarchââ¬â¢s veto that was used as reference by the founders. Unlike the king, of Great Britain who has an absolute veto, the president of the United States has limited veto that can be overridden by a two-thirds vote, in both the house and the senate. Reason for doing this was that the framers of the U. S. constitution believed a limited veto would be more efficient than an absolute one because it would be put into active use; thus, promote political development. Gilmour (198) evaluates both the president and presidency approaches to give centered explanations of the presidential activities in relation to their power to use the veto. He uses individual bill data passed by Congress to determine the extent to which institutional factors account for vetoes and how variation accounts for an individual presidentââ¬â¢s veto behaviour (Gilmour, 198). As stated by Gilmour (199), the presidential vetoes mainly occur when the congress passes objectionable bills, which bring the president under control of the congress. However, despite being controlled by the congress, most presidents have different veto behaviour with some being more prone to using veto than others. For this reason, Gilmour (200) claims that the presidentââ¬â¢s veto decision is highly influenced by external factors although individual choices and strategies of presidents also play a significant influence. Gilmour (200) argues that contemporary research on the president has focused more on the presidency-centered approach than the president-centered approach. The presidency-centered approach states that the president is a clerk and that
Saturday, November 2, 2019
Destructive Leadership in the Military - Chapter 3 Dissertation
Destructive Leadership in the Military - Chapter 3 - Dissertation Example A valid informed consent is also a requirement by federal regulation, which identifies the eight basic disclosure elements. According to the National Archives and Records Administration (2012), a statement of the contents of the research, its purpose, the expected length of participation, was clearly explained to the potential participants. The informed consent will be given to participants prior to the start of the research. The informed consent will concentrate on the ethical and legal framework of the research. First, a brief will be conducted with the participants to provide essential information about the research. The participants will be provided an opportunity to ask questions which will be answered correctly and broadly. When all participants are thoroughly briefed and have a clear understanding of the study, they will each receive a copy of the informed consent to sign as evidence. A copy of the form will be retained by the researcher, and the other copy given to the respon dent. If any new information arises as the research progress, the participants will be informed The respondents will also be made aware they can withdraw from the research any time before the final dissertation is written. By providing substantial background information, and enumerating the rights of the participants, voluntary, and signed consent of the participants will be obtained. ... Confidentiality The confidentiality of the participants will be of paramount importance, especially in the current case in which the respondents are active members of the Marine Corps and may be working under the very senior enlisted Marines about whom they have provided the information. The following measures will be taken to ensure the protection of respondents. First, the research will ensure that respondentsââ¬â¢ names and any other identifying characteristics will not be mentioned in the dissertation, and the collected data will be used only for developing the research analysis. Furthermore, interviews and interviewees will be identified by a generic code and all information that relates to the interviewee will be kept in a secure location for a three-year period from the completion of the study, after which all information and data will be destroyed. A code will be given to all participants who have signed the informed consent. Each participant will be given a code, example (MIL 001) for the first participant up to (MIL 00n) for the nth participant. The participants will be required to identify themselves using the assigned code for every interview or questionnaire administered to them. Once the data collection process begins, participants will not be addressed by name, but by their assigned code, which they will receive prior to the interview process. The participants will not write their names on the interview or questionnaires, and any data that contain the participantââ¬â¢s name will be invalid and destroyed immediately. The confidentiality of the participants is the respondents are active members of the Marine Corps and may be working under the senior enlisted Marine whom they have provided the informationof great importance because it protects them from
Subscribe to:
Comments (Atom)