Friday, June 7, 2019

Discussing psychologist perspectives and their use Essay Example for Free

Discussing psychologist perspectives and their use EssayCognitive- This orgasm is portrayed by two theorists Jean Piaget and George Kelly. This perspective refers to age-related changes in knowledge and acts of knowing plus understanding. Research shows that this approach is the best get byment practised for almost every single disorder, another positive point to this perspective is that its really quick with lasting changes it also helps citizenry be add together more confident and boost people with learning difficulties self-esteem. Its also very easy and works for a majority of people. The negatives to this perspective are that it cease be seen as non-person centred, its not effective for lower functioning clients, and some clinicians feel that it doesnt address other issues. This can be used in health and social care through helping individuals who misread situations, as this approach mainly helps people with learning difficulties so it can help certain individuals come to terms with some irrational thoughts they may have. Biological- This perspective is about the view of personality that focuses on the way behaviour and personality are influenced by neuro-anatomy, biochemistry, genetics or evolution.This perspective also helps people understand how and why we have a certain diseases. The positives to this approach the more we know about the brain, the more we should be able to explain how we operate and to understand what makes us tick. Also the main strength to the biological approach is that chemotherapy, ECT and psychosurgery can be used to treat the symptoms of abnormal behaviour directly and in a very short time. The negatives to this approach are the take a chance of side effects- e. g. in case of chemotherapy there is the risk that patients may become psychologically and physically dependent on the drugs involved.Symptoms often recur when the treatment stops, so many patients have to be re-admitted to hospital. It also raises well(p) eth ical issues. Other things people look upon as negative is the fact that its hard to determine the extent to which genetic inheritance influences behaviour. This perspective can be used in health and social care through the use of developmental norms, this means making sure that a young child is development properly, so that their behaviour and understanding matches that if their chronological age.

Thursday, June 6, 2019

An Effective Manager of Home Depot Essay Example for Free

An Effective Manager of Home Depot Essay fit to Robbins and Coulter (2005), stiff private instructors each over the world acknowledge the role that strategic management plays in their shapings performance. Moreover, Drucker (2004) said that the gauge of an effective manager or executive is the ability to get the right things done. This typically entails doing what otherwisewise individuals have ignored in addition to avoiding what is unproductive. Imagination, intelligence, and knowledge might all be wasted in an executive job with protrude the attained habits of mind that form them into results. I believe that Bob Nardelli is exhibiting these characteristics and management style of an effective manager as he leads Home Depot to become continually advantageful in its operations. As he triumphed over variant problems in managing the company and a s a result oh his managerial strategy, Home Depot is now has now increased sales by 60 percent and earnings per constituent by 105 percent (Business Week Online, 2006).During his first day as chief executive officer at Home Depot in the year 2000, the company has various problems to deal with, some of which, were as deciphers it lacked the necessary infrastructure to send even a companywide electronic mail, Home Depot stores were already run-down and was being know as a store with poor customer service, the stores shipments were logged using pencil and clipboard, and Home Depot stores did not have automated inventory systems (Sellers, 2001). Being a visionary leader that he is, Nardelli believed that better processes must lead to better quality ad higher profits for Home Depot.He meshed strategic management in planning to improve the company. As asserted by Robbins and Coulter (2005), the prevailing belief in management theory and society on the whole is that managers are completely responsible or accountable for an boldnesss success or failure. However, Nardelli demonstrated that aside from the fact th at much of an presidential terms success or failure is because of external forces outside of the managers control, the manager has a big responsibility in making decisions for the success of the organization.A major component of Nardellis far-reaching move to reform Home Depot, which is considered to be the worlds third-largest retailer, into a more centralized company, include importing people, ideas, and platitudes from the multitude (Business Week Online, 2006). This might be an unwelcome concept in management circles however, Nardelli couldnt care less. He believes that it is a vital aspect of his strategy to lead in a cumbersome 2,048-store chain and get ready for its next leg of growth (Business Week Online, 2006).In an uncertain and dynamic environment, real world organizations employ strategic decision-making when making decisions offers managers with a comprehensive and systematic means for taking into consideration the external environment, concentrating on an organizat ions strength, reducing weaknesses, and recognizing opportunities in which an organization can have a competitive edge (Shafritz Hyde, 2004).As maintained by Holstein (2004), the Nardelli decision-making model might help create a pattern for other CEOs who have been extremely frustrated and let down by their lack of success in harnessing technology. In transforming Home Depot to what it is now, Nardelli increased information technology using up by almost 20 percent (Sellers, 2001). Then in year 2003 Nardelli spent a total of $400 million on inventory ecstasy and tracking systems (Sellers, 2001). Aside from these, Nardelli in addition spent around $250 million refurbishing Home Depot stores (Pellet, 2001).This included the installation of self-checkout systems in 800 stores to lessen customer lines and ease up salespeople. This also included the provement of two-way cordless scanners, which enabled products to be price-scanned in the shopping cart, in this manner shortening lin es. Being an effective manager, he also paid attention to motivating the organizations workers. Armstrong (2002) said that in providing rewards to employees, supervisors and managers should identify what rewards will succeed for specific employees at any given time. unconstipated though supervisors and managers might not be able to have power over certain rewards like benefits or wages, they have the liberty to give out rewards like recognition and praise. In Home Depot, Nardelli instituted innovations in providing rewards and in human resource management. First, he substituted 157 different employee evaluation forms with two (Pellet, 2001). In addition, coworkers, above and on a lower floor them, rated aalaried personnel from the CEO down and salaries were derived from the scores.Then during a period when Home Depot was planning to hire approximately 100,000 new employees, Nardelli did not automatically approach those employees with poor scores (Pellet, 2001). Nardelli first reque sted for the advice of others and informed underperformers precisely what they were doing wrong. This way, Nardelli showed that it is important for a manager to vigorously seek opposing opinions and inquire regarding the basis for those opinions in the beginning selecting a course of action is being stressed, instead of acting on the basis of tacit or pre-arranged agreement.Necessarily, this needs constantly listening with real admiration so as to promote development of different opinions and supporting rationales, instead of merely setting forth suggestions and working to make agreement around them (Drucker, 2004). Furthermore, Nardelli seemed to follow step two in Peter Druckers model (204) that executives require both themselves and their staff or subordinates what they contribute presently to the organization and what they could contribute to the organization in the future.In Home Depot, Nardelli asserted that in spite of whether a persons belief of what he/she now contributes, or could contribute, equals his/her managers belief, emphasizing and legal transfer out the importance of everybodys role as a contributor is necessary to the organizations general effectiveness. In initiating change in Home Depot, Nardelli showed that everybody in the organization makes decisions nevertheless, decision-making is specifically vital in a managers job.I think that he followed what Robbins and Coulter (2005) said that decision-making is part of all four managerial functions planning, organizing, leading, controlling, and that decision-making is synonymous with managing. Holstein (2004) has written that when Nardelli joined Home Depot, the challenge of improving the companys supply chain and logistics became apparent because the company is way behind other stores in these areas. Hence, he established a model called full truckload to the store, which means that the more you brought, the more it would oblige you to sell, since you get kind of jammed (Holstein, 2004).In basis of information technology, at Home Depot, Nardelli has established a system of checks and balances (Sellers, 2001). The manner is which Nardelli is managing the technological transformation is attracting attention and interest from other executives and managers. Sellers (2001) said that Nardelli has borrowed from the CE playbook to establish a system of checks and balances on how technology is managed, and Nardelli has likewise incorporated technology decisions deeply into his business strategy in runring and managing Home Depot.Furthermore, Nardelli likewise employed create deeper relationships with fewer vendors. As stated earlier, the Nardelli decision-making model might possibly help create a pattern for other CEOs who have been exceedingly frustrated and disillusioned by their lack of success in utilizing technology. In conclusion, in transforming Home Depot to become the earning company that it is now, I believe that Nardelli demonstrated that leadership is the poten tiality to influence people or convocations toward the accomplishment of goals.As a process, Nardelli showed that leadership forms the goals of an organization or group, inspires behavior toward the attainment of those goals, and helps characterize organizational or group culture hence, it is fundamentally a process of influence. References Armstrong, M. (2002). Employee Reward (3rd Edition), CIPD London. Drucker, Peter. What Makes an Effective Executive, Harvard Business Review, Vol. 82, No. 6, June 2004. Holstein, W. (2004). The Depot goes digital how CEO Bob Nardelli is managing a $2 trillion technology transformation, The Chief Executive.Pellet, J. (2001). Mr. Fix-It Steps In, Chief Executive. Renovating Home Depot. (2006). Business Week Online. Robbins, S. , M. Coulter. (2005). Management, (8th ed. ). Prentice Hall. Sellers, P. (2001). Exit the Builder, Enter the Repairman Home Depots Arthur Blank Is Out. New CEO Bob Nardelli Is In. His Job To Tackle the Companys Renovation after Two Decades of Nonstop Expansion, Fortune. Shafritz, J. M. A. Hyde. (2004). Classics of Public Administration, 5th ed. Belmont , CA Wadsworth/Thompson

Wednesday, June 5, 2019

The Types And Techniques Of Steganography Computer Science Essay

The Types And Techniques Of Steganography Computer Science EssayThis document focus on an unfamiliar field of study in IT welkin i.e. Steganography. This document c all oers various concepts in Steganography, A brief history of Steganography and introducing few types of techniques available today in Steganography. It also upholds other topics resembling security in Steganography, mobile messaging, MMS Steganography related development. This document closes with a summery and proper solution .The initial footages of Steganography were by the Greek historian Herodotus in hischronicles k straight as Histories and run into back to around 440 BC. Herodotus recorded two stories of Steganographic techniques during this time in Greece. The first stated that King Darius of Susa s collectd the head of one of his prisoners and wrote a sneaking(a) subject on his scalp. When the prisoners hair grew back, he was sent to the Kings son in law Aristogoras in Miletus un spy. The second story a lso came from Herodotus, which claims that a soldier named Demeratus needed to channelize a cognitive content to Sparta that Xerxes intended to invade Greece. Back thence, the writing medium was text written on wax-covered tablets. Demeratus removed the wax from the tablet, wrote the mystifying pith on the underlying wood, recovered the tablet with wax to make it appear as a blank tablet and final examly sent the document with knocked out(p) being detected. Romans apply invisible inks, which were based on natural substances much(prenominal) as fruit juices and milk. This was accomplished by heating the mystic text, thus revealing its contents.Invisible inks have become much more advanced and be still in limited use today. During the 15th and 16th centuries, many writers including Johannes Trithemius (author of Steganographia) and Gaspari Schotti (author or Steganographica) wrote on Steganagraphic techniques such as coding techniques for text, invisible inks, and incorpora ting hidden messages in music. Between 1883 and 1907, further development send intelligence discipline be attri saveed to the usualations of Auguste Kerckhoff (author of Cryptographic Militaire) and Charles Briquet (author of Les Filigranes). These books were mostly about Cryptography, but both disregard be attributed to the foundation of around Steganographic systems and more signifi screwtly to watermarking techniques.During the times of WWI (World War 1) and WWII (World War 11), significant advances in Steganography took place.Concepts such as vigor ciphers (taking the 3rd letter from each word in a harmless message to create a hidden message, etc), find substitution and microdot (taking selective information such as pictures and reducing it to the size of a large period on a piece of paper) were introduced and embraced as great steganographic techniques.In the recent digital reality of today, namely 1992 to present, Steganography is being utilize all over the world on computing machine systems. Many tools and technologies have been created that take advantage of old steganographic techniques such as null ciphers, coding in finds, phone, pic and microdot. With the research this topic is now getting a lot of great applications for Steganography in the near future.HOW STEGANOGRAPHY make upSSteganography replaces sp atomic number 18 or un employ bits in regular computer burdens (Graphics, proceed, text) with bits of different and invisible information. Hidden information can be any other regular computer file or encrypted data.Steganography differs from cryptography in a appearance that it masks the existence of the message where cryptography works to mask the content of the message.Steganography sometimes used in conjunction with encryption. An encrypted file may still hide information victimisation steganography, so even if the encrypted file is deciphered,the hidden information is non seen..TYPES OF STEGANOGRAPHYThere argon different shipway to hide the message in another, well known are least world-shattering bytes and Injection.When a file or an image is created in that location are few bytes in the file or image which are not necessary or least important. These type of bytes can be replaced with a message without damaging or replacing the original message, by which the secrete message is hidden in the file or image.Another way is a message can be directly injected into a file or image. But in this way the size of the file would be increasing because depending on the secrete messageSTEGANOGRAPHY IN IMAGEDigital images are the most widely used cover objects for steganography. Due to the availability of various file formats for various applications the algorithm used for these formats differs accordingly.An image is collection of bytes (know as pixels for images) containing different light intensities in different areas of the image. When dealing with digital images for use with Steganography, 8-bit and 24- bit per pixel image files are typical. Both have advantages and disadvantages 8-bit images are a great format to use because of their relatively small size. The drawback is that only 256 possible colors can be used which can be a potential problem during encryption. Usually a gray get over color palette is used when dealing with 8-bit images such as (.GIF) because its gradual change in color would be profounder to detect afterward the image has been encoded with the secret message. 24-bit images offer much more flexibility when used for Steganography. The large accounts of colors (over 16 million) that can be used go well beyond the tender-hearted visual system (HVS), which makes it very hard to detect once a secret message, has been encoded.Large amount of data can be encoded in to 24-bit images as it is compared to 8-bit images. The drawback of 24-bit digital images is their size which is very broad(prenominal) and this makes them suspicious our internet due to their heavy s ize when compared to 8-bit images. Depending on the type of message and type of the image different algorithms are used.Few types in Steganography in ImagesLeast significant bit insertion cover song and filteringRedundant Pattern EncodingEncrypt and ScatterAlgorithms and transmogrifyationsLeast significant bit insertionLeast Significant Bit (LSB) insertion is most widely known algorithm for image steganography ,it involves the modification of LSB layer of image. In this technique,the message is stored in the LSB of the pixels which could be considered as random mental disorder.Thus, altering them does not have any obvious effect to the image. cloak and filteringMasking and filtering techniques work better with 24 bit and grey scale images. They hide info in a way similar to watermarks on actual paper and are sometimes used as digital watermarks. Masking the images changes the images. To ensure that changes cannot be detected make the changes in multiple small proportions. Compared to LSB masking is more robust and masked images passes cropping, compression and some image processing. Masking techniques embed information in significant areas so that the hidden message is more integral to the cover image than just cover it in the noise level. This makes it more suitable than LSB with, for instance, lossy JPEG images.Redundant Pattern EncodingRedundant pattern encoding is to some extent similar to spread spectrum technique. In this technique, the message is scattered through out the image based on algorithm. This technique makes the image ineffective for cropping and rotation. Multiple smaller images with redundancy increase the chance of recovering even when the stegano-image is manipulated.Encrypt and ScatterEncrypt and Scatter techniques hides the message as white noise and White Noise Storm is an example which uses employs spread spectrum and frequency hopping. Previous window size and data channel are used to generate a random number.And with in this rand om number ,on all the octette channels message is scattered through out the message.Each channel rotates,swaps and interlaces with every other channel. Single channel represents one bit and as a issuing there are many unaffected bits in each channel. In this technique it is very complex to draw out the actual message from stegano-image. This technique is more secure compared to LSB as it inescapably both algorithm and discover to decode the bit message from stegano-image. Some users prefer this methos for its security as it needs both algorithm and key despite the stegano image. This method like LSB lets image degradation in equipment casualty of image processing, and compression.Algorithms and transformationsLSB modification technique for images does hold practised if any kind of compression is do on the resultant stego-image e.g. JPEG, GIF. JPEG images use the discrete cosine transform to achieve compression. DCT is a lossy compression transform because the cosine determin e cannot be calculated exactly, and repeated calculations apply limited precision numbers introduce rounding errors into the final result. Variances amid original data values and restored data values depend on the method used to calculate DCTSTEGANOGRAPHY IN AUDIOImplanting secrete message into an speech just is the most contend technique in Steganography. This is because the human auditory system (HAS) has such a vibrant range that it can listen over. To put this in perspective, the (HAS) recognize over a range of power greater than one million to one and a range of frequencies greater than one thousand to one making it exceedingly hard to add or remove data from the original data structure. The only weakness in the (HAS) comes at trying to differentiate sounds (loud sounds drown out quiet sounds) and this is what must be exploited to encode secret messages in audio without being detected.Below are the lists of methods which are commonly used for audio Steganography.LSB codi ngParity coding manikin codingSpread spectrumEcho hidingLSB codingUsing the least-significant bit is possible for audio, as modifications usually would not create recognizable changes to the sounds. Another method takes advantage of human limitations. It is possible to encode messages using frequencies that are indistinct to the human ear. Using frequencies above 20.000Hz, messages can be hidden at bottom sound files and can not be detected by human checks.Parity codingInstead of breaking a signal take down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample regions parity bit. If the parity bit of a selected region does not match the secret bit to be encoded, the process flips the LSB of one of the samples in the region. Thus, the sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive fashion.Phase codingPhase coding att ends to the disadvantages of the noise inducing methods of audio Steganography. Phase coding uses the fact that the phase components of sound are not as audible to the human ear as noise is. Rather than introducing perturbations, this technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, attaining an indistinct encoding in terms of signal-to-perceived noise ratio.Spread spectrumIn the context of audio Steganography, the basic spread spectrum (SS) method attempts to spread secret information across the audio signals frequency spectrum as much as possible. This is comparable to a system using an implementation of the LSB coding that randomly spreads the message bits over the entire audio file. However, unlike LSB coding, the SS method spreads the secret message over the sound files frequency spectrum, using a code that is independent of the actual signal. As a result, the final signal occupies a bandwidth in excess of what is actually required for broadcast.Echo hidingIn echo hiding, information is implanted in a sound file by introducing an echo into the separate signal. Like the spread spectrum method, it too renders advantages in that it allows for a high data transmission rate and provides superior military unit when compared to the noise inducing methods. If only one echo was produced from the original signal, only one bit of information could be encoded. Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal.STEGANOGRAPHY IN VIDEOIn video steganography, a video file would be embedded with supplementary data to hide secret messages. In the process, an intermediate signal which is a function of hidden message data and data of content signal would be generated. Content data (video file) is then combined with this intermediate signal to result encoding. The supplementary d ata can include copy control data which can be brains by consumer electronic device and used to disable copying.The intermediate signal may also contain a pseudo arbitrary key data so as to hide encoding and decode needs corresponding key to unembellishedct hidden information from encoded content. In some implementations regulation data is embedded in the content signal with auxiliary data. This regulation data consists of known properties enabling its identification in the embedded content signal. This encoding is robust against scaling, resampling and other forms of content degradation, so that the supplementary data can be detected from the content which might have been degraded.There are different approaches for video steganography apart from the above mentioned. Most widely known are listed and discussed below.Least Significant Bit InsertionThis is the most simple and popular approach for all types of steganography. In this method the digital video file is considered as separa te frames and changes the displayed image of each video frame. LSB of 1 byte in the image is used to store the secret information. Effecting changes are too small to be recognized by human eye. This method enhances the capacity of the hidden message but compromises the security requirements such as data integrity.Real time video steganographyThis kind of steganography involves hiding information on the output image on the device. This method considers each frame shown at any moment irrespective of whether it is image text .The image is then divided into blocks. If pixel colors of the blocks are similar then changes color characteristics of number of these pixels to some extent. By labeling each frame with a sequence number it would even be easy to identify missing parts of information. To extract the information, the displayed image should be recorded first and relevant program is used then.STEGANOGRAPHY IN DOCUMENTSteganography in documents just focuses on altering some of its char acteristics. They can either be characteristics of text or even text formatting. Below are few ways listed and discussed to implement the same.Since everyone can read, encoding text in neutral sentences is doubtfully effective. But taking the first letter of each word of the previous sentence, one can see that it is possible and not very difficult. Hiding information in plain text can be done in many different ways. One way is by simple adding white space and tabs to the ends of the lines of the document .The last technique was successfully used in practice and even after a text has been printed and copied on paper for ten times, the secret message could still be retrieved.Another possible way of storing a secret inside a text is using a publicly available cover source, a book or a newspaper, and using a code which consists for example of a combination of a page number, a line number and a character number. This way, no information stored inside the cover source leads to the hidden message. Discovering it depends exclusively on gaining knowledge of the secret key.Setting background color and font color is one of the mainly used staganographic approach. This method is focused for Microsoft word documents. Choose predefined colors and set font and background colors of invisible characters such as space, tab or the heading return characters. R,G,B values are 8 bits means we have allowed range of 0 to 255.Most of the viewers would not feel interested about color values of these invisible characters hence 3 bytes of information is easily hidden in each occurrence of space,tab or carriage return.This approach needs no extra information to hide required bits.SECURITY IN STEGANOGRAPHYPURE let on STEGANOGRAPHYPure Steganography is a Steganography system that doesnt require prior exchange of some secret information before sending message therefore, no information is required to start the communication process the security of the system thus depends entirely on its sec recy .The pure Steganography can be defined as the quadruple (C, M, D, and E) whereC the set of possible covers.M the set of secret massage with C M.E C-MC the embedding function.D CM of the extraction function with the property that D (E(c,m))=m for all m M and c C.Cover (C)Message (M)Embedding (E)Extracting (D)Strgo-ObjectMessage(M)In most applications, pure Steganography is preferred, since no stego-key must be shared between the communication partners, although a pure Steganography protocols dont provide any security if an attacker knows the embedding methodPRIVATE KEY STEGANOGRAPHYA Private Key Steganography system is similar to a symmetric cipher, where the sender chooses a cover and embeds the secret message into the cover using a secret key. If the Private Key used in the embedding process is known to the receiver, he can reverse the process and extract the secret message.Anyone who doesnt know the Private Key should not be able to obtain evidence of the encoded informati on. The Private Key Steganography can be defined as the quintuple (C, M, K, DK, and EK) whereC the set of possible covers.M the set of secret message.K the set of secret keys.Ek C-M-KC With the property that DK (EK(c,m,k),k)=m for all m M, c C and k KKEYKEYStrgo-ObjectCover (C)Embedding (E)Message (M)Extracting (D)Message (M)PUBLIC KEY STEGANOGRAPHYPublic key Steganography does not depend on the swapping of a private key. It necessitates two keys, one of them private (secret) and the other public the public key is stored in a public database, whereas the public key is used in the embedding process. The Private Key is used to reconstruct the secret message One way to make a public key Steganography system is to use a public key crypto system. The sender and the receiver can exchange public keys of some public key cryptography algorithm before imprisonment. Public key Steganography utilizes the fact that the decoding function in a Steganography system can be use to any cover, whet her or not it already contains a secret message. The public key Steganography relies on the fact that encrypted information is random enough to hide in plain sight. The sender encrypts the information with the receivers public key to obtain a random-looking massage and embeds it in a channel known to the receiver, thereby replacing some of the natural arbitrariness with which every communication process is accompanied. Assume that both the cryptographic algorithms and the embedding functions are publicly known. The receiver who cannot decide a priori if secret information is transmitted in a specific cover suspect the arrival of message and simply try to extract and decrypt it using his private key. If the cover actually contained information, the decryption information is the senders messageOTHER TYPESMOBILE MESSAGING STEGANOGRAPHYMobile Messaging Service enables mobile users to send and receive messages containing image, audio and video. These messages are exchanged ultimately thr ough a component known as Mobile Switching Center.MMS messages have several benefits like communicating even when the server is busy, exchanging messages while making calls, sending offline messages. They also provide services like eCommerce. As there is possibility of disclosure of confidential and personal information between various systems, information security has got immense importance. MMS Steganography provides confidentiality and integrity with subtle unremovability.Users can profit from concealed channels in order to send and receive hidden messages and keys.Multimedia objects may contain hidden information embedded to them using steganography techniques.The steganography technique used must satisfy followingReliability of secreted information after it has been embedded inside the content should be correct.Content object should remain intact or almost unchanged to the human eyes.There can be mainly two types of steganography techniques possible for MMS objects.Fragile steg anography comprises of implanting information into a file which is destroyed if the file is modified.Video Technique Works over video files. Combinations of sound and image techniques are used to implement this as whole. The scope of adding lots of data is much greater.Sound Technique Works over audio files like Mp3 files. Encode data as binary to sound like noise and can be identified by receiver with correct key. Data being added is in narrow bandwidth compared to the medium.Robust techniques aim to embed information into a file which cannot easily be destroyed.Image Hiding Works over images. film Significant BitLeast significant bits of each pixel in one image are used to hide the most significant bits of another. naive and easy way of information hiding.Direct Cosine TransformTransformed DCT coefficients would be altered. Image would be made robust by scattering the hiding information evenly.Wavelet TransformDividing whole image into small wavelets and then hide the information . Coefficients of wavelets are altered with tolerable noise.Text Technique Works over documents.Just by changing some of the characteristics of the content information can be embedded. Alterations would not be visible to user.As MMS Steganography becomes more widely used now there must be a clear definition of robustness. This definition helps to prevent detection and removal of embedded data. Below are the few properties a good technique should holdQuality of media should not perceptibly degrade after embedding secret data.Secret data should be imperceptible with out secret knowledge, typically the key.If several data are there, they should not hamper with each other.Secret data should survive which dont degrade the perceived quality of work.MMS STEGANOGRAPHY RELATED WORKAs MMS carries multi formatted data such as Text, Audio, Video and images, it has got more chances of sending secret messages and can implement various methodologies in order to keep the message safe and secret. Cu rrently this study is all about Text and Video based Steganography.An MMS capable mobile with inbuilt cameras and customized applications has high importance in terms of steganography creation and extractionCapacityEfficiencyProcessing timeResource time consumptionAdvantageText techniqueless(prenominal)MoreLessLessEasy and simple to implementVideo techniqueMoreMoreMoreMoreHolds lot of information compared to text technique shelve -1- comparison between Text and Video steganography TechniquesPROPER SOLUTIONMMS Messages can hold any of video, audio, image and text encapsulated with in Synchronized Multimedia consolidation Language (SMIL) .The recommended steganography deals with three major parts of MMS which can provide us with maximum capacity possible and not compromising main aim which is issue forth security. The most important issues in steganography are secrecy, payload, robustness and urge on. Below steps describes proposed steganography working modelFirst part of the proce ss hides stegno key in SMIL using white space algorithm.Then Least Significant Bit algorithm is used to hide the secret message in video.Rest of the information would be hidden inside text of the MMS using abbreviation algorithm.Ratio of information hiding in video part to text part is 61 hence I bit stored in text corresponds to 6 bits stored in 3gp video.High security can be granted with reasonable processing speed and without affecting the performance of mobile.2.10 CHAPTER SUMMERYThis document is all about available Steganography techniques and methodologies. It has listed down the various methodologies and their uses. Along with these, it has also included about the MMS Steganography importance and ways to do that.

Tuesday, June 4, 2019

Indias Foreign Exchange System: An Analysis

Indias opposed metamorphose System An AnalysisCHAPTER-2LITERATURE REVIEW2.1 IntroductionIt is a fact that the currencies of contrasting countries befuddle antithetic grades that is based upon their actual economic and pecuniary strength. It is from this difference that the genesis of strange transform occurs.Foreign supersede erect be termed as the act of matching the variant shelters of the goods and services that is complicated in the global business motion alonet against in order to piddle the exact appraise that is to be conveyred in the midst of the parties of an international art transaction in monetary terms.Foreign reciprocation as an activity had started the day elaboration and independent principalities got established in the world. But in those days it was a compositors case of exchanging note economic value in the form of transfer of goods and services of identical value that is vulgarly identified with barter system. Moreover the proceeding wer e done on a one-to-one basis, and the terms and conditions were determined by the parties entering into such proceedings. at that place was no universal system or rule that determined these minutes. In that way outside qualify and international monetary system is a newfangled day trend that gained an institutional form in the first half of the twentieth century and has been developing since then.2.2 Foreign change overAccording to International pecuniary Fund (IMF), Foreign Exchange is defined as different forms of fiscal official documents like unlike up-to- fightness notes, posits held in orthogonal banks, debt obligations of distant banks and remote governments, monetary gold and Special Drawing Rights (SDR) that ar resorted to make payments in lieu of business legal proceeding that is done by two business entities or otherwise, of nations that have currencies having different implicit in(p) monetary value (www.imf.org).Leading economist Lipsey Richard G.,1993 ha s mentioned that the exotic deepen legal proceeding are basically a form of negotiable instrument that are resorted to deliver the cost of goods and services that form a part of business transactions and otherwise, between business and public entities of nations of the spherical economy.Sarno, Taylor and Frankel, 2003 gives the definition of foreign swap as denoting the act of purchase and sale of currencies of different economies that is performed over the reproduction for various purposes that includes international payments and deliverance of cost of various business transactions, where the value is usually measured by tallying the value of the currencies involved in the foreign exchange transaction with that of the value of U.S. Dollar.According to Clark and Ghosh 2004, Foreign Exchange denotes transactions in international bullion i.e. currencies of different economies. In such transactions the value of a capital of one country is tallied and exchanged with similar val ue of the gold of the country in order to exchange the cost of a business transaction or public monetary transfer that is taking place between two entities of these economies.2.2.1 Foreign Exchange TransactionsTransactions in foreign exchange are done through various types and various panaches between different countries of the world.According to information mentioned in the Reuters Financial Training Series, 1999,TOD Transactions, turkey cock Transactions, Swap Rates, Spot Rates, Forward Rates, Margin Trading and Buy / Sell on inflexible Rates foreign exchange transaction methods are more or less of the commonly used methods that are widely used by ball-shaped managers for their foreign exchange transaction activities.2.2.1.1 TOD Operations TOD Operations are foreign exchange transaction methods where the bargainer uses the exchange site of the day on which the foreign exchange transaction order is to be execute. In other words TOP operations are commonly used in intra-day foreign exchange transactions. As a result they are commonly resorted to by speculators in foreign exchange transactions and those who general speculate on the rates of different foreign exchange tradeplaces of the globe.2.2.1.2 TOM OperationsIn this type of transactions the transaction process carried forward to the next day instead of it existence an intra-day trading. TOM transactions rate is fixed on the day the transaction is signed, but the rate of exchange is agreed upon to be that of the next day.2.2.1.3 SPOTTransactionsSPOT Transactions can be compared with TOM transactions because here also the exchange rate is fixed at a value that prevails over the exchange rate of intra-day trading of shares. But SPOT transactions have been separated as a different category because unlike TOM transactions, SPOT transactions contracts are executed on the third day after the signing of agreement between the Bank and the client.2.2.1.4 Forward Contract Forward contracts are those exchan ge rate contracts where the notes conversion exchange rate agreement is decided at a certain rate at a time that is well before the date of execution of the exchange contract. In that way they are similar to TOM transactions. The only differ from them in the fact that these transactions are do for a long term i.e. generally for one year, and the parties involved in making this foreign exchange transaction deposit five percent of the contract value with the bank involved in facilitating the transaction at the time of executing the contract which is then returned to the client after execution of the exchange transaction. The need for depositing this arrive is to secure the transaction against any loss callable to food market fluctuations.2.2.1.5 SWAP The greatest advantage of SWAP transactions is that the clients involved in the foreign exchange get prior information about the exchange rate of the currencies that are part of the transaction. In this type of transaction the bank f irst buys the come in of transaction form the client and resells it to the client after a few days after disclosing the exchange rate of the currencies involved in the transaction process. SWAP transactions are much sought after by traders because here they get to know beforehand the exchange rate of the currencies involved in the transaction process that helps them in avoiding fluctuations in market rate and gives them the advantage of determining the prices of goods, the nature of the currency market notwithstanding. .2.2.1.6 MarginTradingThe key element of Margin trading is that any trader can opt for SPOT trading round the clock by going through the rim trading mode. The other key element of margin trading is that the traders can make deals with a minimal spread for a huge amount of funds by projecting fraction of the needed amount. In that way it is a unique form of global financial transaction where the threshold value that can be transacted through the margin trading mode i s $ 100000 with bigger deals being multiples of $ 100000. But in order to deal in margin trading the trader has to make a security deposit of five recent of the contract value that has to be replenished from time to time in order to maintain the amount from which the probable losses from margin trading transactions are accommodated.2.2.1.7 Buying/Selling on Fixed Rate Order This is a mutual agreement between the buyer and vendor of foreign exchange. Neither its rate nor its other terms and conditions are based upon actual conditions. Rather the deal is based keeping the mutual profitability of the buyer and seller intact where both of them get their desired amount.2.3 Global Foreign Exchange MarketAccording to the table depicting the Triennial Bank Survey of Foreign Exchange and Derivatives Market Activity done by Bank for International Settlements (BIS)2007, as shown below the global foreign exchange market has an average day-to-day turnover of over $ 2 trillion, which is an incr ease of virtually forty percent in terms of great deals . This put on in foreign exchange transactions it is observe has been out-of-pocket to examine in the volume of trading in Spot and Forward markets. This is indicative towards increase in volatility of foreign exchange markets around the world. (www.bis.org).Global Foreign Exchange Market perturbationDaily averages in April, (in billions $)Year198919921995199820012004Spot Transactions317394494568387621Outright Forwards275897128131208Swaps in Foreign Exchange190324546734656944Gaps in Reporting (Estimated)5644536026107Total Turnover (Traditional)5908201,1901,4901,2001,880Memo Turnover (At April 2004 Exchange Rates)6508401,1201,5901,3801,880(BIS Triennial Central Bank Survey, 2004)As observed by Jacque Laurent L.1996, Studies in foreign exchange point to the fact that the volume involved in foreign exchange transactions in the total markets around the globe has the potential to affect the overall functioning of the global f inancial system due(p) to the systematic risks that are part and parcel of the foreign exchange transaction system. Most of the transactions occur in the major markets of the world with the London Exchange followed by New York and Tokyo Stock Exchange accounting for over sixty percent of the foreign exchange transactions done around the globe. Among these transactions the largest share is carried out by banks and financial institutions followed by other business transactions i.e. exchange of value for goods and services as well as dealers involved in securities and financial market transactions. According to the studies by Levi Maurice D., 2005, in foreign exchange transactions most of the transactions happen in the spot market in the realm of OTC derivative contracts. This is followed by hedging and forward contracts that are done in large numbers. The central banks of different countries of the world and the financial institutions operating in multiple markets are the main player s that operate in the foreign exchange market and provide the risk exchange control machine to the players of the exchange market and the system where around $ 3 trillion amount of money is transacted in 300000 exchanges locate around the globe. The largest amount of transactions takes place in the spot rate and that too in the liquidity market. The quotation on price in these markets sometimes reaches to around two thousand times in a single day with the maximum quotations being done in Dollar and Deutschemark with the rates fluctuating every two to three minutes with the volume of transaction for a dealer in foreign exchange i.e. both individual and companies going to the range of $ 500 million in normal times. In recent years the derivative market is also gaining popularity in OTC dealings with regards to the foreign exchange market.2.4 Global Foreign Exchange Market focus RisksAccording to the researcher Kim S. H., 2005, Foreign exchange transactions are identified by their c onnection with some financial transactions occurring in some overseas market or markets. But this interconnectivity does not affect the inherent value of the currency of the country which is determined by the economic strength of that country. This means that the inherent value of each currency of the world is different and unequal. So when the need arises to exchange the value of some goods or service between countries engaged in such activity it be scratchs imperative to exchange the exact value of goods and services. Considering the complexity and volume of such trading and exchange activity occurring in the global market between countries it is but natural that the currencies of individual countries is subject to continual readjustment of value with the currency with which its value has to be exchanged. This gives rise to the importance of foreign exchange transactions as a separate area of study and at that placeby needs much focus for its at a lower placestanding (Frenkel , Hommel and Rudolf , 2005). In addition to this it is to be established that with the growing pace globalization and integration of global economic order there has been a tremendous increase in international business transactions and closer integration of economic systems of countries around the world especially between the members of WTO, that has led to the increase in economic transactions and consequent activity in international foreign currency exchange system (Adams, Mathieson and Schinasi, 1998). Added to this is the fact that the exchange value of currencies in the transactions is not determined by the respective countries but by the interplay of value of the currencies engaged in an international foreign exchange transaction and the overall value of each currency in the transaction common at that time. In fact each country in the global economic order would want to determine the value of its currency to its maximum advantage, which was doable a few years ago in when the countries used to determine the value of their currency according to the existing value of their economy. The individual countries till the premature nineties used to follow a policy of total or partial control over the exchange value of their currency in the global market. At the same time there also were a group of countries that followed the policy or system in determining the exchange value of their currency i.e. left it to the interplay of global economic activity where the value was determined by its economic performance. The currencies of countries that provide full or partial amount of control in the international exchange value of its currency are known to follow a Fixed Rate whereas the currencies of countries that allow its currency to seek its inherent value through its performance in the global economic system are termed as following the Floating Rate of foreign exchange conversion mechanism. though logically both the type of mechanism of foreign exchange face the effe ct of exchange rate fluctuations and consequent volatility in rate it is the currencies having a floating rate that are continually affected by the fluctuations in exchange rate in the global market when in the case of currencies with a fixed rate it is more of a controlled and regulated affair (Chorafas Dimitris N., 1992).2.5 Foreign Exchange Risks Prevailing in the Global MarketRisks related to the exchange rate of a currency in the global market as has been mentioned, occurs due to the interplay of inherent value of each currency of the respective countries that are part of the global financial mechanism. Risks related to foreign exchange come into picture and are also inevitable in this world marching towards change magnitude interaction due to globalization. The risks will occur due to business interaction and consequent exchange of value for goods and services.According to Kodres LauraE., 1996, the risks related to foreign exchange occur when there is increased interaction be tween the currency of a country with that of other countries in the international market and that too if the currency has a floating exchange rate. In that case the value of the currency is continually affected by its business and financial performance. This relation with other currencies in the market affects it during the time when the need arises to exchange it with another currency for gag law of financial transaction in some business or financial purposes and gives rise to various types of risks. The prominent risks associated during this situation are Herstatt Risk, and Liquidity Risk.2.5.1 Herstatt RiskHerstatt risk is a risk that is named after a German Bank that got liquidated by the German presidential term in the seventies of the decision century and made to return all the claims accruing to its customers. This is because its creditworthiness was affected and it could not pay the colonization claims to its customers and also on behalf of its customers to their clients . It is basically connected to the time aspect of foreign exchange value claim settlements in which the foreign exchange transactions do not get realized as the bank loses its ability to find the transaction in the intervening period due to some causes. In the particular case the German bank failed to honour the financial settlement claims of its clients to their counter parties that were to be paid in values of U.S Dollars. The main issues that arose were regarding quantifying the amount to be delivered and the time of the transaction process due to the two countries financial systems being located and working according to different or separate time zones. This case has established a phenomenon in foreign exchange market where there whitethorn erupt situations in which the working hours of banks located in different time zones may never match with each other leading to foreign exchange settlement transactions getting affected during the mismatch of the two banks closing and openin g time. In fact the Alsopp Report that studied this phenomenon in detail express that though the foreign exchange transactions are made in pen and paper on a single day the actual transfer of value takes place within three to four days. And with the exchange value of currencies operating in the international market always remaining in a state of flux they either get jacked up or devalued. In either case it affects the clause of transactions that was decided on an intra-day rate, as the value of both the currencies in the international market has changed during these days.2.5.2 Risks related to LiquidityThere can crop up different problems related to the banking systems operations and dynamics i.e. in both technical and management systems as well as inability in terms of volume of available liquidity strength or in mismatch in tallying of time etc that can affect the capacity of banks to honour foreign exchange transactions in terms of transfer of liquidity. These types of risks are being commonly witnessed in newly emerging economies that are being unable to cope with the sudden surge in volume of global business transactions thereby leading to exchange rate settlement and payment delays, outstanding payments and dishonouring of financial commitments in the exchange rate transaction market.2.5.3 Financial RepercussionsAccording to the Studies in foreign exchange related risks by Dumas and Solnik, 1995 aver that risk related to transactions in foreign exchange have increased with globalization and the rise of global economic integration process with the countries getting affected in relation to the volume of their transactions in the global financial and business marketplace. This is because the market is now more oriented towards market value driven convertibility of currencies that is influenced by the global financial movements and transactions, and any independent transaction especially of transnational and international companies will automatically affec t other transactions happening in the global financial marketplace (Klopfenstein G.,1997).However, according to another study by Gallati Reto R., 2003, these international and transnational companies are at the same time being affected by the fluctuations in exchange rate of different currencies of the global market that is exposing their business operations in different global markets to exchange rate related risks especially due to difference in Spot and Forward rates and the inevitable fluctuations (Choi , 2003) that give rise to foreign exchange settlement related problems.2.5.4 Remedies to Foreign Exchange Settlement RisksAs there risks that have cropped up in foreign exchange transactions due to increase in volume and frequency of transactions mainly as a result of globalization so, also there have come up remedies to minimize the risk related to adverse conditions in foreign exchange transactions.The Bank for International Settlements (BIS) in one of its studies in 1999 has said that settlement of claims is the most predominant risk that is related to foreign exchange transactions, especially the speed with which these transactions are materialized and the roadblocks that they may face in the process due to tremendous increase in volume of foreign exchange transactions that cannot be cleared in expected times. The solution to these risks according to the study is to simultaneously clear transactions on either side i.e. for both the parties side so that they simultaneously give and receive payments at the agreed rate of exchange. This would assoil the problem of extended time of actual payment when the rate of exchange fluctuates, thereby creating problems for both the parties. This arrangement is related to deals being processed simultaneously, which requires the concurrence and common cause of both the parties. This is because the party that is expecting a hike in value of its currency may not agree to such a proposal. In that case there should be s ome law or arrangement that would make it mandatory for both the parties to settle their intra-day payments on that day itself so that there is no scope left for speculation by them. According to the study, such arrangements have been made in USA and Europe where systems like Fedwire and Trans- European Automated real-time Gross Settlement Express Transfer ( sucker) have been established. Fedwire facilitates payments in foreign exchange transactions under the mode of Real Time Gross Settlements (RTGS)and TARGET facilitates intra-day transfer of foreign exchange between parties of member countries of Europe on the same day itself.But, for simultaneous release of funds by both the parties and the intra-day settlement of claims to succeed it is imperative that the member countries of the global economic system should come together have concurrence on these issues. This is because all said and done the foreign exchange transaction related rules and laws are still governed by the respec tive countries. And most of these countries are reluctant to make any headway in linking their currency system to the global currency system for speedy disposal of foreign exchange transactions for fear that such a move would expose their currency end financial system to the baneful effects of risks and volatility of global foreign exchange system (Hagelin and Pramborg, 2004).At the level of international trading corporations there has been initiated some steps whereby they have formed a private arrangement known as Group of Twenty. They are a group of twenty internationally acclaimed global clearing banks who have formed an system called the Global Clearing Bank that acts as a connection between the payment systems of different countries and verifies international foreign exchange transactions in order to simultaneously satisfy both the parties regarding authenticity of the process of transaction. The thing is that this system puts a high amount of strain on the financial and forei gn exchange system as well as reserves of individual countries along with requiring them to bring about some amount of commonality between the financial rules and regulations of individual countries which is easier said than done. All the same the establishment of Bilateral Netting System and Multilateral Netting Systems as well as of Exchange Clearing House (ECHO) are trying to facilitate foreign exchange transactions and minimize the inherent risks involved (McDonough ,1996).2.6 Indian Foreign Exchange System2.6.1 Historical BackgroundThe historical background of foreign exchange system in India was a saga of excess control and observe with even minor transactions being made to undergo the rigorous scrutiny of concerned government authorities to avoid any risks associated with such transactions and save the scarce foreign exchange reserves from being frittered away in some transactions considered unimportant or anti-national by the government. The Foreign Exchange Regulation Act (FERA) that was enacted in 1947 and made more stringent in 1973 was the embodiment of the prevailing sentiment of the governments of those days, which was to completely regulate and control all the foreign exchange transactions and protect the foreign currency reserves. (Mehta, 1985)All these changed in the nineties of the last century with the opening up of Indian economy in 1991 in keeping with the recommendations of the High Level Committee on Balance of Payments set up under the chairmanship of Dr C. Rangarajan by the Ministry of Finance, establishment of India and subsequent entry of India into founding Trade Organization (WTO) in 1994. This was preceded by the liberating of current account transactions and establishing full convertibility of current account transactions in 1993. In 1994 also the Government of India accepted Article VIII of Agreement of the International Monetary Fund that established the system of current account convertibility and the exchange value of rupe e came to be determined according to the market rates with only the convertibility of capital account being under the control of the government (Krueger,2002) as the Tarapore Committee on with child(p) Account Convertibility of 1997 (Panagariya A., 2008) suggested the government to keep adequate safeguards before allowing the convertibility of capital account to be determined according to the market forces as there was need to unite the financial system and have an accepted inflation target before such a venture.The Tarapore Committee also suggested that the legal framework governing the foreign exchange transaction system in India also needs to be modernized before going for total convertibility of the capital account due to which the Government repealed the FERA Act of 1973 and promulgated the Foreign Exchange Management Act (FEMA) in 2000.This new act did away with the system of regulation and control and established a system of facilitation and management of foreign exchange t ransactions thereby promoting all the activities related to foreign exchange transactions. The most important thing that was done by FEMA was to recognize violations or mistakes in foreign exchange transactions as a civil offence instead of a criminal offence as was done by FERA. FEMA also shifted the responsibility of proving the violation or mistake in foreign exchange transaction and related rules from the prosecutor to the prosecuted. And if the prosecuted was proved shamefaced he or she was to pay only monetary fine or compensation instead of being jailed as was the earlier provision under FERA. FEMA also simplified many of the rules and notified specific time frames for delivering judgments related to violations of foreign exchange rules and regulations and provide rules for establishing special tribunals and forums to deal with such cases. The compounding rules were also made less stringent and all matters related to compounding rules were notified to be dealt by Reserve Ban k of India (RBI) instead of the previously assigned Enforcement Directorate. RBI was made the designated intensify Authority in all related matters. Only the cases involving hawala transactions were left from its purviewAs per Mecklal and Chand

Monday, June 3, 2019

Amore Pacific International Business Strategy Marketing Essay

Amore Pacific world(prenominal) Business strategy food foodstuffing EssayWith low-barriers to entry, the competitive business environment of the cosmetics industry requires companies to secure stable sales conduct, and father great foodstuffing efforts to unalikeiate its returns. However, the cosmetics industry is closely related to the fashion industry which is constantly changing and offer potential emergence opportunities. Consequently, cosmetic products typically have short product life-cycles because which require mass-customization capabilities and production agility.Personal CareOn the new(prenominal) hand, personal care products business is a relatively a mature industry. Also with a low-barrier to entry, the domestic market place is currently saturated with competition. In addition, the emergence of large-scale discount stores and new sales networks has called for rapidly changing marketing and distribution channels. Consequently, the domestic personal care p roducts industry is focusing on developing niche markets by differentiating its product as offering spirited quality and value.1.2. Overview of AMOREPACIFICAMOREPACIFIC Corporation (AMOREPACIFIC or the telephoner) aims to become a global beauty company with its core businesses in cosmetics and personal care and health products. Founded in 1945 as a Pacific Chemical association, AMOREPACIFIC Corporation has been involved in beauty products.With the corporate vision of The World will know us as the Asiatic Beauty Creator, AMOREPACIFIC seeks to push the boundaries of traditional beauty with innovative solutions drawn from its rich Asian heritage.1The Company besides stresses the five values Openness, Innovation, Proximity, Sincerity, and Challenge to openly fleet out with its customers and employees, pursue innovative ideas and new concepts, economise physically and psychologically close to customers, fulfill obligations to society, and be passionate about overcoming challenge s.2The Company first began its export sales via OEM and also began to sell cosmetics products under its own brand AMORE in 1964. In 1990, the Company turned to multinational markets by ease uping its first overseas subsidiary in France, followed by establishing its Shanghai and Chartres plants in 2002 and 2004, respectively.In 2010, AMOREPACIFICs sales r severallyed KRW 2 trillion, with operating profit of KRW 340 billion and net earnings of KRW 285 billion. The Company maintains its deed unrivalled role player in the domestic market with a 34.9% cosmetics market share in 2010. In terms of its overseas operations, the Company has enhanced its sales in 2010 by approximately 11% to KRW 335.8 billion.3With its strong domestic position, the Company is targeting sales and operating profit growth of 10% in 2011 by creation of growth markets. For each business segment, the Companys Cosmetics Division is focusing on securing competitiveness in the Asian markets through reinforcement of RD activities to provide differentiated products and services. For the personal care products business or Mass Cosmetics Sulloc Division, the Company is intent on strengthening domestic market competency by expansion into high-functional products in major personal care categories.2. International Business Strategy of AMOREPACIFICs Cosmetic ProductsAMOREPACIFIC aims to be a Global Top 10 cosmetics company.4While tapping on matured and highly-developed markets such as conjugation America and Western Europe, AMOREPACIFIC is more focusing on developing countries such as chinaware and other Southeast Asian countries.To overcome the limitations of the market coat and increasing take of competition in the domestic market and accomplish economies of scale through market expansion with its own line of competitive products, AMOREPACIFIC, utilizing its number one position in the domestic market, has been looking to develop overseas market with in its efforts to gain presence and become a successful international player in a very competitive global cosmetics industry environment.While the domestic market has been steadily suppuration due to an increase in the number of professional business women who have brought about buying power of female customers, developing market conditions for high-function cosmetic products from the middle-class aging population, as good as an increasing demand from men for cosmetics products, AMOREPACIFIC has been facing increasing competition from the domestic competitors and market penetration from global cosmetics companies. Nevertheless, AMOREPACIFIC has potential to be successful in overseas market taking into account following favourous factorsThe quality and diversity of products of AMOREPACIFIC has reached the level to be competitive against global brands in most product lines.Experiences of highly competitive market in Korea enriched the Company with various competitive marketing strategies.Koreas cultural wave has created frie ndly demands of Korean beauty products among customers, especially in Asian market.Globalization strategy of AMOREPACIFIC is primarily based on a multi-domestic approach path where international strategies take on differentiated approaches for each regional market as diverging demands for cosmetics products exist due to different levels of industrial and economic information for each country/region. In addition, benefits from standardization are less square due to segmented nature of cosmetics market even within the country/region and price functions differently for each customer segment and it is non commonly the major factor for determining purchase. Finally, since demand in overseas market for cosmetics are highly divergent and the Company possesses the capability and resources to leverage with to tack those divergent demand, multi domestic strategy would be suitable for AMOREPACIFIC.Based on such multi-domestic strategy, AMOREPACIFICs globalization strategy takes on differ entiated approaches for developed and developing countries. For emerging countries, AMOREPACIFIC aims for an first market penetration, while, raising image by focusing on the prestige brand lines in developed markets. Two representative countries of AMOREPACIFIC (France and China) have been analyzed beneath to evaluate its international strategy in each country contrasting AMOREPACIFICs strategies in each respective country.2.1. Expansion into the France commercialize2.1.1. Market Penetration with Lolita LempickaFrance has long been renowned as the capital of cosmetic industry and fashion. AMOREPACIFIC began to penetrate the France Market with the Lolita Lempicka Perfume from 1997. In 1997, the Lolita Lempicka Perfume won all the top awards at the French FIFI Award for best womens fragrance, best mens fragrance, and perfume design. AMOREPACIFIC released Lolita Lempicka L in 2006 and released Si Lolita Lempicka in 2009. With the success in France, Lolita Lempicka products are now available for sale in over 100 countries worldwide.52.1.2. RationaleFrance is considered one of the biggest markets of cosmetics products and trend leader of fashion and beauty goods and the arena of competition for global cosmetics manufacturing companies. Experiences and reputation in France market atomic number 50 lead to an expansion in developed markets including the U.S. where the AMOREPACIFIC would consider as major market for growth.2.1.3. Entry Mode SelectionNotwithstanding the high risk of failure, AMOREPACIFIC obdurate to penetrate the France market via direct ownership to establish strategic position as a flagship business in the developed market. With such high level of commitment and resourcing from the headquarters, the Company hired topical anesthetic management with entrepreneurial spirits to experiment with new brand and new strategy. AMOREPACIFIC perceived that its entry elbow room into the France Market was necessary in order to deploy local talents which wo uld enable expansion into adjacent high-end European markets once strategic position is established.2.1.4. Marketing and HR Strategy in FranceAbandoning nationality and company title to overcome the stereotype against Asian cosmetic brands, AMOREPACIFIC teamed up with local marketing agents, manufacturers and vendors.As a newcomer to the market, AMOREPACIFIC differentiated its approach by naming its brand after young local designer to target customers following up-to-date trends of unisex mode and strong fragrance. Also restrain direct distribution channels have been utilized for distribution and advertisement is delivered through only high-end fashion magazines targeting customers in their twenties and thirties as rise as models and designers. As is important to the cosmetics products to be recognized by word-of-mouth, promotion activities are focussed in providing samples to celebrities and influential group of people. Through hiring entrepreneurial local experts in marketing of cosmetics, AMOREPACIFIC could upgrade its marketing expertness in luxury/ subvention market one notch above.2.1.5. Evaluation of the International Strategy in FranceGlobal ConfigurationThe Companys entrance to the France Market was not driven by cost differences or economies of scale, but it rather served the purpose to make a fact for experiments in the leading market. With the successful launch of the Lolita Lempicka brand in France by leveraging the local talent and blinding nationality and company heel, other high-end brand washstand be immortalizeed into the market utilizing the distribution channels secured through perfume business. In addition, AMOREPACIFIC may consider introducing other more competitive premium brands in the market through large scale international cosmetics franchise stores such as Sephora.Global CoordinationLearning the effects from highly autonomous management of local subsidiaries and budge of such knowledge to other developed market strategy (e.g. , U.S.) is expected to benefit the company through global networking. Although it is inevitable to tap on developed market to notch up brand recognition level, considering the Companys ultimate goal of globalization to exposit its market, targeting developed countries would result in limited volume growth at least in the mid-term as we could see from the financial results of France market which was out of red first time in 2010 since its launch in 1997.2.2. China Market Expansion2.2.1. China Market AnalysisThe volume of cosmetics sales in China is still explosive and has high potential to growth (Yearly cosmetics usance of $13 per person compared to $50 in global average)6. China Market is well stratified according to product lines which are in line with development stages of different areas (eastern seaside and western inland). They comprise of all four major segmentation including top luxury market, premium market, middle market and mass market.In China, the cosmetics market is not dominated by single or a few major manufacturers yet and accordingly, market penetration is relatively easy. Compared to use of reconcile products, the skin care products are dominant in market, and as Koreans have similar skin type as Chinese customers, the Company digest check off strong competitive position against the multinational competitors. With increased level of earnings, demand for premium brands is also expected to grow significantly.2.2.2. RationaleWith Korean market beingness saturated, the high growth potential China market appears to be the next logical choice for AMOREPACIFIC. The Company is able to fully leverage the beneficial electrical shock of Korean cultural wave in China. Although the Company has entered other Asian countries in tandem with China market, the growth and experiences in China market can provide the Company with boosting power to expand further into other Asian countries. Also, the proximity to Korean market and similar cultural backgro und can give the Company competitive edge against other multinational manufacturers.2.2.3. Entry mode selectionThe Company entered into China market through direct investment since 2002. The decision to enter into China in a form of direct investment was primarily due to the potential threats other global and local companies possibly gaining terms in China. The Company needed to stay in competitive position by internalizing technical advantage and products quality while local brands are growing in fast pace. As competition is already intensified in China market, high level of commitment of resources from head office is necessary for sustainable growth in China market.2.2.4. Marketing and HR strategy in ChinaAs the Company owns line-ups of products for all segmented markets, success in one market segmentation can lead to relatively easier launching of other product lines under more competitive conditions.The major product line marketed in China is the Laneige Brand, which is premiu m brand of AMOREPACIFIC which targets the middle-class. As brand recognition is gained from Laneige through skin-care products, it is considered a good strategic move for AMOREPACIFIC to promote other lines of products under very(prenominal) brand including make-up and products with specific functions including anti-aging and whitening.As Korean wave is huge in China market, AMOREPACIFIC leverages the benefit to its maximum by using famous Korean celebrities as models for its flagship brand (Laneige) and sponsoring Korean television dramas aired in China and concert events. However, As Chinese people are known to be not reliant on advertisement on media and cosmetics products are characterized that information on the products tends to be delivered by word-of-mouth through experiences of family or friends, AMOREPACIFIC set up go off booths that provide make-up service, free tutorials and samples.2.2.5. Evaluation of the International Strategy in ChinaGlobal ConfigurationThe main dr ive for entrance into China market is the market expansion. As China market will surely bring larger volume to accomplish economy of scale and its spillover effect to other territories in Asia region will give further boost to AMOREPACIFICs effort in those countries.Although AMOREPACIFIC started with premium brand to make a case in China market, the biggest destiny of the market segment is the mass market with vast demands for lower end products. As AMOREPACIFIC has a line-up of products to administer with all those demands, with success from premium brand, it can expand its efforts to market expansion into more casual younger-customer targeted brands. However, in the course of bringing products in other segment, AMOREPACIFIC carefully needs to consider the possibility of casual brands adversely affecting the premium brand image to the customers. In this regard, AMOREPACIFIC may need to deploy differentiated marketing approach, such as blinding the company name not to be recognize d as same companys brand and targeted promotion to specific group of customers (younger generation or lower income customers).Also, distribution channels other than department stores should be sought for differentiation. The brand shops that offer variety of brands of cosmetics can be fully utilized.Global CoordinationProximity to Korea can serve as an advantage for effective and efficient coordination with local operation. However, major cities located all over the vast land will bring about new challenges to AMOREPACIFIC which have focused on markets in lesseneder in size. For this instance, AMOREPACIFIC needs to bring in local expertise in logistics and tries to establish firm distribution channels.During the launches of its first premium brand, the close monitoring and control by head office and local subsidiaries must have been inevitable. However, to expand into other segment (mass market and luxury market), it is necessary, to beautiful tune its strategy, to leverage the ex perienced local management by delegating more power for more autonomous operation.3. Recommendation for New Potential Market Strategy IndiaBased on the analyses and evaluations of AMOREPACIFCs international business strategy, India may be considered as the next potential target market for its international reach. The recommendations for entry mode and marketing strategies for AMOREPACIFICs entry into India are based on key success factors derived from the following market sound judgment and SWOT analysis.3.1. Market AssessmentThe Indian cosmetics market grew by 9.5% in 2009 to reach a value of $141.6 million. In 2014, the Indian cosmetics market is expected to grow to $198.7 million, which is a 40.3% increase from 2009.7Indias Cosmetics market volume million units, 2005-09(e)(Source Make-Up Industry Profile India, DataMonitor, May 2010)Despite the growth of the Indian cosmetics market, the extent of poverty in the country implies that sales would come from only a small consumer ba se. In this regard, the target market may need to focus on female professionals living in urban areas who are brand-conscious. As seen in the graph below, the cosmetics market in India is already dominated by the top 3 global brands which account for 68% of the total market share.8Indias Cosmetics Market parcel % Share by Value, 2009(e)(Source Make-Up Industry Profile India, DataMonitor, May 2010)Another interesting observation is the market segmentation of the cosmetics type. As seen in the below chart, sassing make-up is the largest segment of the cosmetics market in India, accounting for 51.2% of the total market value.9Indias Cosmetics Market Segmentation % share, by value, 2009(e)Also, Indian market has shown significant growth in the whitening products of 20% every year, making up 55% of total cream products.103.2. SWOT AnalysisBased on the above market assessment of India, AMOREPACIFICs SWOT analysis can be performed as followsStrengthAMOREPACIFICs strong management initiat ives for globalization would offer a sound strategic decision process. As already proven in earlier efforts for globalization, the Company retains competitiveness of its line of products. In addition, the lack of infrastructure of the India in terms of distribution and sales channels would prove to be favorable for AMOREPACIFIC, since the Company retains a unique sales distribution of direct-sales approach, where salespersons personally visit door-to-door for marketing and sales.WeaknessAMOREPACIFICs relatively small presence in a limited number of countries, as well as its weak brand image compared to global players would create challenge for the Company in terms of building its brand. Also, the lack of expertise in cosmetic products for dark complexions could be considered a weakness, considering the Indian population.OpportunitiesConsidering that the cosmetics industry typically has low-barriers to entry, AMOREPACIFIC has opportunities to readily enter into the Indian market. In addition, the market growth potential of India considering its population size and economic growth would offer AMOREPACIFC to enhance its presence in the global market.ThreatsConsidering the different culture and religious background of Indian people, the need for decentralized management could warrant potential management issues with the Headquarters in Korea for potential misalignment in AMOREPACIFICs globalization strategy.3.3. Entry Mode Recommendation High Local Responsiveness ApproachIn case of AMOREPACIFIC, its entry mode to the Indian market should consider the singularity of the culture. India has a unique religion and also has a strong history in their stratification system named Indian Cast system. In order to cope with such unique culture and history, AMOREPACIFIC would need to be highly responsive on the local culture.Observations could be made for other instances where attempts to penetrate into India cosmetics market with high degree of localization had been better o ff succeeding in the India market. Hyundai Motors and LG Electronics are some of examples that were successful cases where localization had been a key success factor in entering the market. On the contrary, Samsung Electronics strategy to seek global efficiency has been enjoying relatively smaller success in India.Considering that AMOREPACIFIC had no prior experience in India, the Company should set up their entry mode as be highly responsive on the local needs. Hiring local managers and staffs who understand the Indian culture would also be very important for the operation of AMOREPACIFIC in India. Joint-venture strategy may also prove to be a viable alternative for AMOREPACIFIC considering its less expertise for customers with darker skin tones. In addition, AMOREPACIFIC may utilize the friendly impression that Hyundai Motors and LG Electronics are making on the minds of Indian people.3.4. Marketing Strategy Recommendation Positioning, Distribution personal credit lineBrand posit ioning and distribution channel would be a very important decision point for entering a market. To be successfully positioned in the India market, AMOREPACIFIC should consider two factors. First, AMOREPACIFIC should position its products to compete with other globally renowned brands to cope with the increasing brand-conscious consumers in India. Second, the Company may need to consider tighter margins to maintain cost competitiveness and capture market share against already established brands.Consequently, AMOREPACIFIC should use a high-end luxury brand strategy distributed in department stores and vocation free shops. This would enable AMOREPACIFIC build up a brand image of high-end quality cosmetics. And at the same time, the Company could utilize secondary affordable mass-market brands to meet the average income consumers in India.An interesting distribution channel that AMOREPACIFIC could additionally set up in India is where they had been successful in Korea, which is direct, face-to-face-sales approach. As the transportation in India is underdeveloped, being able to visit consumers directly and provide quality services should be a great opportunity in entering the market.3.5. ConclusionSince its foundation in 1945, AMOREPACIFIC has been one of the dominant players in the domestic cosmetics industry, with quality product lines ranging from anti-aging solutions and make-up products to personal care products such as shampoos, body cleansers, and toothpastes. With increasingly competitive domestic environment, AMOREPACIFIC has turned its eyes to the global arena. With its vision that The World will know us as the Asian Beauty Creator, AMOREPACIFIC has successfully proven its potential in France with its line of perfume products. Furthermore, AMOREPACIFIC took favorable opportunity of the Korean Wave to sell its products in China considering its cultural similarities and has established a strong brand name.As AMOREPACIFIC has ambitiously declared its goal t o become a Global Top 10 cosmetics company, it needs to continuously seek opportunities abroad where it could utilize its core competencies to establish and strengthen its brand image while maintaining a clear focus on the target market and customers.

Sunday, June 2, 2019

Club Drugs Essay -- essays research papers

Its 6 oclock on a Saturday morning and while some teenagers are enjoying the extra hours of sleep, many are tranquillize bouncing around to the sounds of techno music. Thousands of teenagers and even some adults gather into clubs decorated with black lights, disco balls, and tons of smoke machines. Their hearts are pounding and their pulse is hie at the speed of light, all compliments of designer drugs known as club drugs (National Institute on drug Abuse). Changing the molecular structure of an alert drug or drugs to create a new substance creates designer drugs (Kusinitz 151). The all night dance parties, known as raves, are about the wildest occasion going from midnight till dawn, and often beyond. Just because these drugs may portray something that may sound like fun, the downfall of these drugs make you think twice before winning them at the club.Raves are becoming more popular than ever and these designer drugs are becoming even easier to get a hold of (Kusinitz 46). Whe n asked, over 50 percent of high school seniors said they knew they could get ecstasy fairly easily or very easily if needed (National Institute on Drug Abuse). Since untrained amateurs normally create designer drugs in underground laboratories, the drugs can be dangerous (Mass 16). Among all designer drugs, MDMA, or raptus is the most commonly used (Kusinitz 47). Others include Ketamine known commonly as Special K or K, and LSD also known as acid.Ecstasy is used at the party and rave scene for it...

Saturday, June 1, 2019

I am a Wimp :: Personal Narrative Essay Example

I am a Wimp   I am sitting alone on the N train. I am in my usual spot back car, second floor, first window seat. It is cold inside. It is wet come forthside. Im tired. My thoughts argon playing themselves out in-between the lyrics on my walk-man. For Friday, I am mellow. The two sides of my personality are trying to communicate, and I have decided to simply sit down and list to the conversation.   My workweekday egotism goes to high school in Manhattan. I am often tired and try simply to get through the day. I usually do not have fun during the week. I like my friends, but there is no time to have a good time together. I sense inadequate at my high school. many students do just as much work as I do and make it look easy. My week self is often frustrated.   In comparison, my weekend self is rested and happy. I leisurely groom myself in the morning. My weekend friends are impressed that I motivity so far to get to school. They are impressed that I get good grades. But overall they are impressed that I am allowed to extend for lunch and that I actually go back to classes. My weekend self buys into the hype, and is very proud.   I realize part of the equation is location. My weekday self spends its days on Madison Avenue, while my weekend self spends its days in Queens. Even though I have lived my entire life in this neighborhood I have always felt a little out of place. Its a tough neighborhood and Im not afraid to say I am a wimp. I enjoy the freedoms of the Upper einsteinium Side. The only attitude I receive is from rich women who wish teenagers would stop crowding their streets and talking too loudly. If I give someone a look, I am not afraid they are going to follow me or jump me. The kids in my neighborhood seldom finish school. Most go to an substitute high school or get their G.E.D. after dropping out. They eventually get decent jobs, but hardly a(prenominal) receive college educations. In the end, few adults in my neighborhoo d enjoy their jobs. I fear this will happen to most of my weekend friends.   Location also affects my individuality in other ways.I am a Wimp Personal Narrative Essay Example I am a Wimp   I am sitting alone on the N train. I am in my usual spot back car, second floor, first window seat. It is cold inside. It is wet outside. Im tired. My thoughts are playing themselves out in-between the lyrics on my walk-man. For Friday, I am mellow. The two sides of my personality are trying to communicate, and I have decided to simply sit down and listen to the conversation.   My weekday self goes to high school in Manhattan. I am often tired and try simply to get through the day. I usually do not have fun during the week. I like my friends, but there is no time to have a good time together. I feel inadequate at my high school. Many students do just as much work as I do and make it look easy. My week self is often frustrated.   In comparison, my weekend self is rested and ha ppy. I leisurely groom myself in the morning. My weekend friends are impressed that I travel so far to get to school. They are impressed that I get good grades. But overall they are impressed that I am allowed to leave for lunch and that I actually go back to classes. My weekend self buys into the hype, and is very proud.   I realize part of the equation is location. My weekday self spends its days on Madison Avenue, while my weekend self spends its days in Queens. Even though I have lived my entire life in this neighborhood I have always felt a little out of place. Its a tough neighborhood and Im not afraid to say I am a wimp. I enjoy the freedoms of the Upper East Side. The only attitude I receive is from rich women who wish teenagers would stop crowding their streets and talking too loudly. If I give someone a look, I am not afraid they are going to follow me or jump me. The kids in my neighborhood rarely finish school. Most go to an alternative high school or get their G.E. D. after dropping out. They eventually get decent jobs, but few receive college educations. In the end, few adults in my neighborhood enjoy their jobs. I fear this will happen to most of my weekend friends.   Location also affects my identity in other ways.