Saturday, August 31, 2019

Hum/176 Week 1

Hello! Thank you for your submission this week. Here is some feedback to help you assess your assignment contribution versus what was expected in this assignment. Please see the following as a guide for how your responses measured versus the ideal answers to this activity. Assignment: News Media, Option 1: Toolwire ® Learnscape Credibility and Impact Purpose of Assignment: In this Learnscape, students take on the role of Deputy Speech Writer for Senator Owen Johnson.Students use the Internet (via a Universe of Content consisting of 12 sites hosted on the Toolwire ® system) to identify credibility issues related to the use of Internet content as it pertains to political issues. In doing so, they also have to discern which sources are most credible and be able to substantiate this. The student is also asked to review a speech outline from the senator and write an introductory paragraph addressing the effect of the Internet on politics.Resources Required: Toolwire ® Learnscape Cre dibility and Impact Grading Guide |Assessment A Part One – Credibility and Impact: Exploring the Internet and Politics | |Summary |This interaction is the first part of the assessment (Part A). The student opens the InVision Pro | | |application and uses a drag-and-drop list to assess the credibility of the sites from the Universe| | |of Content dashboard.When the student has completed the drag-and-drop list, they close the | | |InVision Pro application and their BlackBerry ® Smartphone rings with a video call from the | | |senator. | |Character |Text | | |InVision Pro |Instructions: Indicate whether each Web site is credible by dragging and dropping your | |Application |answer from the list at the left. | | | |[Student drags yes or no to the Credible? column from a list to the left of the table. | | | |The Why? column will automatically populate with notes from the Notepad of the Universe | | | |of Content interaction. When finished, the student is prompted to close the | | | |application. | | | | | | | |[Completed table should look like the below (answers):] | | | | | | | |Website | | | |Credible? | | |Why? | | | | | | | |The Drudge Report | | | |No | | | |News aggregator run by known conservative Matt Drudge – Certainly, he has his own | | | |agenda, but could someone pay Drudge to promote or bury a story? | | | | | | |Daily Kos | | | |No | | | |The largest progressive community blog in the United States – What are the | | | |qualifications of the posters? Do they research their posts or just spout opinions? | | | | | | |The Huffington Post | | | |No | | | |Named after founder and editor-in-chief, Arianna Huffington – Her personal views drive | | | |the content, which leans quite liberal. | | | | | | | |POLITICO | | | |Yes | | | |It looks like it tries to dig a bit deeper than mainstream media.The half news, half | | | |blog format may make it hard to figure out what to take at face value. | | | | | | | |Salon | | | |Yes | | | |Self-described â€Å"award-winning online news and entertainment website. † Forbes calls it | | | |†smart and provocative. It’s well respected, but where does the entertainment end and | | | |the news begin? What’s written to deliberately provoke? | | | | | | | |Colbert Nation | | | |No | | | |Is this truth or comedy? When comedy is the goal, can you ever tell what’s real and | | | |what’s skewed just for a laugh? | | | | | | |The Hill | | | |Yes | | | |Nonpartisan, nonideological with the largest circulation of the Capitol Hill newspapers | | | |– This is where Congress gets its news. Could it use its influence to sway political | | | |insiders? | | | | | | |The Nation | | | |Yes | | | |This site has been reporting since the Lincoln administration. The mission is clear: | | | |â€Å"The Nation will not be the organ of any party, sect, or body. It will, on the contrary,| | | |make an earnest effort to bring to the discussion o f political and social questions a | | | |really critical spirit, and to wage war upon the vices of violence, exaggeration, and | | | |misrepresentation by which so much of the political writing of the day is marred. | | | | | | | |– from The Nation's founding prospectus, 1865 | | | | | | | |That is tough to argue with. | | | | | | | |Red, Green and Blue | | | |No | | |Environmental politics from across the spectrum – likely a bias towards only posting | | | |stories that support their position on the environment. | | | | | | | |Crooks and Liars | | | |No | | | |John Amato’s blog – All opinions with some references to real news outlets. But where | | | |are the facts? | | | | | | |The Washington Post | | | |Yes | | | |The hometown newspaper of national politics – A pile of Pulitzers gives WaPo all the | | | |credibility it needs. | | | | | | | |The New York Times | | | |Yes | | | |Internationally acclaimed, you cannot get more respected than â₠¬ËœThe Gray Lady. But that | | | |doesn’t mean there will never be bias or a conflict of interest. | | | | | | |Assessment A Part Two: Answer the Senator about Credibility, (at Student Office) – Credibility and Impact: Exploring the Internet| |and Politics | |Summary |This interaction is the second half of the first part of the assessment (Part A). The student | | |receives a video call on their BlackBerry ® Smartphone from the senator.After a brief hello | | |interchange, the senator asks the student to comment on credibility issues pertaining to using | | |information from Internet sources. The student answers via a 140-character short-answer format. After| | |the student sends that information, the senator will call back to acknowledge receipt. When the | | |student hangs up, the scene transitions to the student’s apartment. | |Character |Text | | |Senator Owen |Wow, that’s fast.Now that you’ve done the legwork, I need you to comment on credi bility | | |Johnson |issues pertaining to using information from Internet sources. What do you think? | | |Student (via |[Answer should include: You should look for more information about a Web site, as it’s | | |short-answer text |often not obvious whether it’s nonpartisan, leans left or right, or even employs | | |box) |professional journalists. To really find out if a site is credible, you often have to | | | |look past the home page.Many sites have a long track record of credibility, but that | | | |does not exempt them from any and all possibility of bias, conflicts of interest, or | | | |misreporting in the future. The world’s greatest news outlets all make mistakes | | | |sometimes. You should look at everything with a grain of salt. Someone may leave out a | | | |fact by accident, bury a story that puts a friend in a bad light, or publish something | | | |deliberately false to advance their career. ] | | |Assessment B: Writing the Speech, (at Student Off ice) – Credibility and Impact: Exploring the Internet and Politics | |Summary This interaction is the second part of the assessment (Part A). The student is in their office to | | |write the introductory paragraph for the speech. The student opens the outline so that they may use | | |it for reference. They then open a new document in the InVision Pro application and write a | | |short-answer essay (100- to 350-words) in the application. Per the senator’s instructions from his | | |e-mail, the student then attaches the document to an e-mail to the senator. When the student clicks | | |Send, the interaction is complete. |Character |Text | | |InVision Write Pro |The student must write a short-answer essay (100- to 350-words) as the introductory | | | |paragraph to the senator’s speech about the effect of the Internet on politics. ] | | | | | | | | | | | | | | | | | | | |[Answer should include: Politics now change very rapidly.Politicians must be able to | | | |rea ct quickly to what is happening in the world. More voter participation in Internet | | | |media provides politicians with more information about what Americans want. Internet | | | |technology allows politicians to reach more people, more often. ] | | |Written Response | |[Answers Vary: Students provide a 250 word response providing an explanation as to whether or not the information media have | |social responsibility. ] |

Friday, August 30, 2019

Marketing Report of the Amul Company, Including the Swot, Tows, Ifsa, Efas Essay

1.0 Introduction 1.1 Background of the Industry The dairy industry plays an important role in the socio-economic development of India. The dairy industry in India is instrumental in providing cheap nutritional food to the vast population of India and also generates huge employment opportunities for people in rural places. The Department of Animal Husbandry, Dairying, and Fisheries, which falls under the central Ministry of Agriculture, is responsible for all the matters relating to dairy development in the country. This department provides advice to the state governments and Union Territories in formulating programs and policies for dairy development To keep focus on the dairy industry a premier institution known as the National Dairy Development Board was established. This institution is a statutory body that was established in 1987. The main aim to set up the board was to accelerate the pace of dairy development in the country and attract new investments. India is a wonderland for investors looking for investment opportunities in the dairy industry. The dairy industry holds great potential for investment in India and promises high returns to the investors. The reasons why the industry has huge potential for attracting new foreign investment are: 1. There is a basic raw material need for the dairy industry; that is, milk is available in abundance. 2. India has a plentiful supply of technically skilled laborers. 3. There is an easy availability of technological infrastructure. 4. India has all the key elements required for a free market system. 1.2 Company History AMUL was set up in 1946 and its full form is Anand Milk-producers Union Ltd. The Brand Amul is a movement in dairy cooperative in India. The management of the brand name is done by the Gujarat Cooperative Milk Marketing Federation Ltd (GCMMF) which is a cooperative organization based in Gujarat. 1.3 Analysis of Vision and Mission VISION: ‘liberate our farmers from economic oppression and leave them to prosperity’. MISSION: ‘Dairy cooperatives of Gujarat turnover to be Rs. 27,000 crores by 2020’. Objective: To ensure that the maximum share of the consumer‟s rupee goes back to the milk producers. After analyzing the vision and mission of the company it is pretty sure that the company would strive to expand its distribution network, would involve its manpower in creative marketing, plan for consumer education and product innovation, would leverage effectively on rising levels, grow affluence among Indian consumers and would tap the rising demand for new value added products. 1.4 About AMUL 1.4.1 Location Amul is located in the Anand district which is in the state of Gujarat and it has set up itself as a model for development in the rural areas. For Amul brand has started the White Revolution of India which has helped to make the country the biggest manufacturer of milk and it‟s by products in the whole world. Amul has around 2.6 million producer members and the total capacity for handling milk is around 10.16 million liters every day. The brand’s capacity for milk drying is around 594 Mts. each day and its capacity for cattle feed manufacturing is about 2640 Mts. each day. 1.4.2 Product Portfolio Amul is the biggest brand in the pouched milk sector in the world and in India it is the biggest food brand. Amul’s range of products includes milk, ghee, milk powders, curd, ice cream, paneer, cream, chocolate, cheese, butter, and shrikhand. 1.4.3 Brand Umbrella The various brands of Amul’s bread spreads are Amul Lite, Amul Butter, and Delicious Table Margarine. ï‚ · The Brand Amul’s milk drinks are sold under various names such as Amul Kool, Amul Kool Cafe, Kool Koko, Amul Kool Chocolate Milk, and Amul Masti Spiced Amul’s powder milk is sold under many names like Amulya Dairy Whitener, Sugar Tea Coffee Whitener, Sugar Skimmed Milk Powder, and Amul Instant Full Cream Milk Powder. The brand’s cheeses are also sold under various names such as Gouda Cheese, Amul Cheese Spreads, and Amul Emmental Cheese. Amul Brand’s desserts are sold under many names like Amul Basundi, Amul Lassee, Gulab Jamun Mix, Amul Shrikhand, and Amul Ice Creams. 1.4.4 Business Markets Amul exports its products to various countries such as USA, Australia, Mauritius, China, Hong Kong, Singapore, UAE, and Bangladesh. Amul has often had a special connection with the film industry. A collation of some of the brilliant Amul adverts over the years is as follows:- 2.0 Environmental Analysis 2.1 STEEP Analysis This STEEP analysis provides concentrated information about Social, Technological, Economical, Ecological and Political aspects that effect Amul directly or indirectly. 2.1.1 Social Amul has effected social change at the village level i.e. people stand in line to deliver their milk without trying to take short cuts. They do not complain if they have to stand behind an untouchable in the line. Hence, the cooperative has thus given a deathblow to the caste system in its own way. Also Amul provided women an opportunity to have a voice in the â€Å"home economy† as they are the major participants in the program. 2.1.2 Technological GCMMF’s technology strategy is characterized by four distinct components: New products, Process technology, Complementary assets to enhance milk production, E-commerce GCMMF was one of the first FMCG (fast-moving consumer goods) firms in India to employ Internet technologies to implement B2C commerce. Customers can order a variety of products through the Internet and be assured of timely delivery with cash payment upon receipt. Another e-initiative underway is to provide farmers access to information relating to markets, technology and best practices in the dairy industry through net enabled kiosks in the villages. GCMMF has also implemented a Geographical Information System (GIS) at both ends of the supply chain, i.e. milk collection as well as the marketing process. 2.1.3 Economical GCMMF proved that efficiency of co-operatives can successfully counter the recessionary trends of the economy thereby ensuring consistent livelihood to the farmer producer and offering value for money products to its consumers. For the third consecutive year, it has posted a double digit growth turnover reaching Rs. 6700 crores. Pandemic economic turmoil has taken its toll, as international prices of all major dairy products have declined drastically in recent months. However, with its sharp focus on domestic Indian market, Amul has successfully insulated Indian farmers from all the turbulence in global dairy trade. It is already providing the best employment option for displaced workers from urban manufacturing sector, who after losing their jobs due to recession, have started reverse migration from cities back to villages 2.1.4 Ecological GCMMF could foresee the impact of below normal monsoon in August 2009 itself and started planning to maintain milk production, procurement and inventory levels. Also, at a time when due to lower production of cereals, fodder prices had jumped almost two-fold, GCMMF enhanced the supplies of cattle-feed to milk producers and maintained its prices below cost and were able to provide better returns to the milk producers to overcome the stress of draught 2.1.5 Political Tussle for the chairmanship of Gujarat Cooperative Milk Marketing Federation Limited (GCMMF), the apex marketing body, emerged as the core issue among political parties. These parties planned gain entry into the cooperative giant‟s affairs. Mr. Bhatol, who was enjoying his second three-year term, was a consensus candidate last year, even as the main political parties failed to choose a new head. Now, barely a year after his taking over for the second term, Mr. Bhatol is under pressure to relinquish the office. 2.2 Issue Priority Matrix Fig 1: Issue Priority Matrix for Amul 2.3 Porter’s Five Forces Model Fig 2: Porter’s Five Forces Model 1. Bargaining Power of Suppliers GCMMF is a cooperative, which means it conducts business by collecting from large number of individual farmers who rely upon the cooperative to give them better price for their produce. Therefore the bargaining power of such suppliers is low. Twenty nine lakhs milk producers gain higher profits only through the co-operative which in turn drives down their bargaining power. 2. Bargaining Power of Buyers There are already other co-operatives existing in India, having their own established brands, which reduce the loyalty of current customers, thereby increasing their bargaining power. 3. Rivalry Among Competitors The market is highly competitive, existence of several players which have already established channels and partners constantly push the envelope. The competition exists locally, nationally and internationally. 4. Threat From Substitute Although no real substitute exist for milk, however competition offers low priced products as well as variety, from skimmed milk to full cream as well as milk powder. 5. Barriers To Entry The competition among existing players is very intense and grown over the years from collection of more and more producers. The producers only supply to such established brands due to their reach and ability to maximize profits. Also the industry is capital intensive along with several legal barriers. Although an innovative2.4 Industry Matrix Key Success Factors Weight Amul Amul Score Mother Mother Dairy Weighted Score 1. Strong supply chain partnerships 2. Efficient control and coordination of the network 3. High returns for the suppliers 4. Use of technology to solve problems 5. Infrastructure 6. Marketing 7. Product quality 8. Wide product portfolio 9. Investment and resources 10. Product availability 0.10 4.0 0.40 3.0 0.30 4.0 0.40 0.05 4.0 0.20 4.0 0.20 3.5 0.17 0.03 0.04 0.20 0.25 0.18 2.5 3.0 5.0 5.0 5.0 0.075 0.12 1 1.25 0.90 3.0 4.0 4.0 2.5 3.5 0.90 0.16 0.80 0.625 0.63 5.0 4.0 5.0 5.0 4.0 0.15 0.16 1 1.25 0.72 0.05 3.5 0.175 4.0 0.20 3.5 0.17 0.05 4.0 0.20 5.0 0.25 5.0 0.25 0.05 4.0 0.20 5.0 0.25 5.0 0.25 Rating Nestle Nestle Score The key success factors of Amul in the industry affect industry rival‟s ability to expand in the competition, raw material availability, packaging, cost, marketing, product design, reputation & credibility, quality and others. These factors are very critical and all players like have to control over them. They change from time to time and affect the finances and the competition. The current industry matrix puts Nestle at the top among others. Although the matrix is not exhaustive and does not include all market leading companies, it still shows where the gaps are and the critical success factors. Nestle takes the lead because of high quality products and aggressive marketing, also the standards and technology used by Nestle is superior than Amul or Mother Dairy, which are domestic brands. Products availability is important factor, since even one miss pushes the customer to seek a different competitor. Amul however is not far behind and can catch up in areas of technology and marketing. 2.4 Key Success Factors The key success factors of the Amul industry are those things that affect industry members ability to prosper in the market place-accessibility to raw materials, packaging cost focus, Advertisement, product design, reputation & credibility, quality control, strategic alliances, are ultimately so important that all firms in the industry must pay close attention to them. These key factors of success are critical in the dairy industry in particular, as they are the factors that shape whether a company will be financially and competitively successful. These critical factors may vary from time to time within the industry as driving forces and competitive conditions change. After calculating the weighted score for all three companies, it seems that Nestle has got the highest weighted score compared to the other two companies. This is because Nestle is able to achieve a high score in product availability success factor and Advertisement success factor. Nestle plays a lead role in advertisement. Their marketing strategy is to reach each and every one through advertisements. They spend a lot in terms of Advertisements. While goodwill plays an important role for Amul, as it‟s been in the market from past three generations, so the advertisement is the least role for their strategy. Still Amul does come up with taglines of movies and current affairs. 3.0 Factor Analysis 3.1 Internal Factor Analysis Summary (IFAS) Internal factors Strengths 1. Wide diversity of 0.15 5.0 0.75 Expansion opportunities 0.15 0.10 5.0 4.5 0.75 0.45 low overall costs market leader available products 2. Economies of scale 3. Largest co-operative Weight Rating Weighted Score Comments for milk products 4. Strong supply chain 5. Leading national player 0.05 0.05 4.0 3.5 0.20 0.17 Strong network wide consumer support Weaknesses 1. Lack of scalability 2. Low control over milk yield 3. Transportation delay 4. Inferior technology 5. Low investment Total 0.15 0.10 0.10 1.00 3.5 3.5 2.5 0.52 0.35 0.25 3.86 0.10 0.05 3.0 2.5 0.30 0.12 Saturation Bovine Population Road Infrastructure Old technology No newer investments In the last few years, the cooperative has successfully launched several new product lines, which have been popular among different age groups. In order to leverage from their distribution network, to optimize market supervision expenditures, to achieve increasing efficiency while keeping the distribution infrastructure lean, focused and productive, the amalgamation of its different distribution networks was done. Control over supply chain with industry best practices makes Amul the market leader in dairy products in India. Amul has 14 created social cohesion, employment opportunities, societal infrastructure, milch animal rearing practices, hygiene and sanitation awareness through safe milk concepts etc. Milk products create an inherent weakness, which is perishability. The product can lose quality in a small time scope, therefore several other strengths relating to storage, movement and related logistics have to be improved. Another weakness is that some of the products are very unpopular and cannot compete with other players; this weakness is in terms of frozen products, which are considered low in quality. The marketing for these products is missing and does not appropriately position it. Technology and transportation remain basic weaknesses which mar the efficiency of the entire supply chain. 3.2 External Factor Analysis Summary (EFAS) As a Global enterprise, Amul will be meeting global demands and ensure greater productivity and the opportunity to enhance integration in order to increase efficiency and effectiveness in the business. It already has wide geographic positions and hence this will give it an advantage to get access to gain presence in mature markets. Efforts to exploit export potential are already on, as Amul is exporting to Bangladesh, Sri Lanka, Nigeria, and the Middle East. By following the new GATT treaty, opportunities have increased tremendously for the export of agri-products in general and dairy products in particular. Local competitors are the major problem facing by Amul. They sell their products at a lower price, since being a low capital company; they have fewer expenses to take care of. Secondly as the environmental costs are rising day by day, it‟s getting tough to carry the same pricing throughout. Thus cutting down the extra cost will surely help. Adulteration is also a major threat to quality that takes place due to illiterate farmers from remote villages. 3.3 Strategic Factor Analysis Summary (SFAS) There are certain strategic factors, which are with a long-term mission, and some need to be addressed in the short term. There are other factors, which do not fall into either of the terms mentioned above; they are classified as intermediate term. 16 3.3.1 Short Term The strategic factors that the company needs to satisfy in the short run are Economies of scale as it can change by building few more storage capacity at their new projects. This will also benefit in global expansion of the company. As short term defines a period of a year or so, the solution should be found within a year for a proper success. 3.3.2 Intermediate Term The strategic factors that the company needs to consider during this term are lower yield management, supply chain demand and rising environmental costs. These are classified into intermediate duration because the company must be able to overcome its weaknesses, make use of the opportunities and defeat the threats. All this must be done at the right time to ensure efficient results. In this case the factors are such that the earliest (short term) might not be the best decision to make, as the duration might not be sufficient to overcome all the issues with a clear outlay. 3.3.3 Long Term The strategic factors that the company needs to satisfy during this period are the strength of having a wide range of products. They must be able to continue to maintain many products varieties and build on them efficiently. Using R & D (Research and Development) to overcome the problem of pasteurization as well as satisfying growing global demand is not an easy task and hence requires time and efficiency to meet the needs globally. Last but not least is overcoming the threat of competitors in the long run. 4.0 SWOT Analysis 4.1 Strengths Demand profile: Absolutely optimistic. Milk being a necessity product, the demand will stay and the sales at GCMMF are bound to increase over a period of time. ï‚ · Margins: Quite reasonable, even on packed liquid milk. The margins are enough Flexibility of product mix: Tremendous. With balancing equipment, GCMMF Availability of raw material: Abundant. Presently, more than 80 per cent of to limit the entry of potential entrants. has kept adding a wide array of products to its product line. ï‚ · milk produced is flowing into the unorganized sector, which requires proper channelization. Amul & GCMMF have leveraged this and has got itself a strong base of suppliers who provide them milk throughout the year. Large number of dairy plants in public and cooperative sectors besides several others coming up in the private sector would result in competition. Because of this the end consumer would benefit and a good product mix would emerge. ï‚ · Technical manpower: Professionally trained, technical human resource pool, built over last 30 years is the strength that GCMMF has. The employees of GCCMF are highly recognized in the industry and have earned name for themselves as well as the federation. ï‚ · Enhanced milk production: Increase in the milk production with consequently increased availability of milk processing has led to increase in consumption and faster access to the consumers through effective distribution. The technology is brought from Denmark and the production of milk has benefited from that. ï‚ · Transportation: The transportation facilities and the easy availability of the special trucks have provided a boost. Cold refrigerated trucks are there in place and the warehouses also have the cold storage facilities that facilitate the transportation. ï‚ · Vast resources: Country has vast natural resources which offer immense potential growth and development for dairying. Moreover the financial resources available with the federation are immense and the reputation is such that in case of any further requirements, it can approach any institution and raise any form of capital. Increasing purchase power and changing tastes of the consumers: The purchasing power of the residents is increasing. As a result a lot of products are being consumed. Moreover, the consuming habits are changing. As a result, the demand for products such as butter and cheese is increasing at a very rapid rate. 4.2 Weaknesses Perishability: Pasteurization has overcome this weakness partially. UHT gives milk long life. Still perishability is there at the milk vendor‟s end. This does result in loss of some production. But Amul Dairy is taking steps to store milk at the vendors end. Surely, many new processes will follow to improve milk quality and extend its shelf life. ï‚ · Lack of control over yield: Theoretically, there is little control over milk yield. A lot depends upon the monsoon in the country. This is because of the quality of cattle feed that would be available will not have the required nutritional content. Steps are taken to provide awareness regarding these and the penetration of quality feed is being increased. Moreover, increased awareness of developments like embryo transplant, artificial insemination and properly managed animal husbandry practices, coupled with higher income to rural milk producers should automatically lead to improvement in milk yields. ï‚ · Logistics of procurement: Woes of bad roads and inadequate transportation facility make milk procurement problematic. All these factors lead to perishability of the procured milk. But with the overall economic improvement in India, these problems would also get solved. ï‚ · Erratic power supply: The erratic power supply would cause harm in the Underdeveloped systems: There still exist underdeveloped raw milk collection processing of milk. systems in some parts of the country. However steps are being taken such as setting up of cold storage points at key collection centers to combat the situation. ï‚ · Lack of proper implementation: Dairy development programmes have not been fully implemented as per the needs of the region in different agro-climatic zones. Infrastructure: The infrastructure that is available is not up to the current world Also lack of infrastructure for offering dairy business management standards. programmes to the trained personnel is creating a hindrance. 4.3 Opportunities â€Å"Failure is never final, and success never ending†. Dr Kurien bears out this statement perfectly. He entered the industry when there were only threats. He met failure headon, and now he clearly is an example of „never ending success‟. If dairy entrepreneurs are looking for opportunities in India, the following areas must be tapped: ï‚ · Competition: With so many newcomers entering this industry, competition is becoming tougher day by day. But then competition has to be faced as a ground reality. The market is large enough for many to carve out their niche. Moreover due to competition, there is a chance to better serve the market with innovative products. ï‚ · Value addition: There is a phenomenal scope for innovations in product development, packaging and presentation. Given below are potential areas of value addition: o Steps should be taken to introduce value-added products like shrikhand, ice creams, paneer, khoa, flavored milk, dairy sweets, etc. This will lead to a greater presence and flexibility in the market place along with opportunities in the field of brand building. Addition of cultured products like yoghurt and cheese lend further strength both in terms of utilization of resources and presence in the market place. Yet another aspect can be the addition of infant foods, geriatric foods and nutritional. Export potential: Efforts to exploit export potential are already on. Amul is exporting to Bangladesh, Sri Lanka, Nigeria, and the Middle East. Following the new GATT treaty, opportunities will increase tremendously for the export of agri-products in general and dairy products in particular. There is a strong basis of cost efficiency, which GCMMF can leverage in the world market. ï‚ · Markets: The market for the traditional as wells as processed dairy products is expanding both at the domestic and international front. IT support: Software is now available for project formulation for dairy enterprise. It has also computerized its production processes. Mother Dairy was the first fully computerized dairy in India. In its Anand plant all products are processed computerized, which does not have any hand touch during any stage of process. 4.4 Threats Milk vendors, the un-organized sector: Today milk vendors are occupying the pride of place in the industry. Organized dissemination of information about the harm that they are doing to producers and consumers should see a steady decline in their importance. ï‚ · ï‚ · Infestation: There are increasing incidents of chemical contaminants as well as Quality: The quality of the milk is found to be poor as compared to the residual antibiotics in milk. international standards. One of the reasons for these according to the EU and America is the method of milching the milk. In these nations the milk is hands by the farmers owning the cattle do milched with the help of machines, while in India. ï‚ · Exploitation: The liberalization of the Dairy Industry is likely to be exploited by the multinationals. They will be interested manufacturing the milk products, which yield high profits. It will create milk shortage in the country adversely affecting the consumers. ï‚ · Subsidy by Western Nations: There have been incidences wherein the Western nations subsidizing the dairy products by a few means like transportation. Because of such reasons the final price of the product goes below the prices prevailing in the Indian Market. Hence it proves a threat to GCMMF‟s and other Indian dairy products. ï‚ · Creation of Non Tariff Barriers by Developed Nations: The Developed Nations have created Non Tariff Barriers related to Quality of the milk specifically. They want that the milk be processed with potable Air and Water. They also want that the milching of cattle be done with the help of machines. However this type if system is yet to evolve in India. Because of these reasons they are reducing the market potential of Indian made products, where GCMMF holds a lion‟s share. The study of this SWOT analysis shows that the „strengths‟ and „opportunities‟ far outweigh „weaknesses‟ and „threats‟. Strengths and opportunities are fundamental and weaknesses and threats are transitory. Any investment idea can do well only when you have three essential ingredients: Entrepreneurship (the ability to take risks), Innovative approach (in product lines and marketing) and Values (of quality/ethics). 5.0 TOWS Analysis 5.1 SO Strategies (Maxi-Maxi) Amul can use the strategies that have been formed after in-depth strategic analysis of the company and its industry. Some suggestions in this case would be to increase productivity by using cost effective manufacturing techniques. Also, increase demand for their products world over by first gaining more exposure to the global market. With the use of expansion strategy, it can overcome the location issue, as Amul can expand more areas and it will make the distribution of channel areas easier and convenient. 5.2 ST Strategies (Maxi-Mini) Amul must put into action some of these strategic options to meet the threats‟ using its strengths. Product differentiation is very important to differentiate Amul from the competitors, as it can tackle down the competitor‟s product if Amul products are more outstanding and different from its competitors. Options available can be classified as product elimination and diversification strategy, value marketing strategy and also developing hygienic processing facilities. These are some of the main areas of focus under this section. 5.3 WO Strategies (Mini-Maxi) The strategies formulated to overcome the weakness through opportunities are increase of opportunity through new GATT treaty, develop new process to improve the quality and shelf life of milk and milk products, this can be achieved through pasteurization, homogenization and many other processes like producing UHT milk etc. finally to also increase awareness of scientific developments. 5.4 WT Strategies (Mini-Maxi) The strategies that have been formed to overcome the weakness and threats in Amul company and the dairy industry as a whole are to apply efficient and economical procurement of products. Secondly, to have control over the logistics and to maintain them efficiently. Lastly, create the right type of product positioning for the various product categories that Amul deals with. 6.0 Corporate and Operational Strategies 6.1 Corporate Strategy The strategic factor that the company satisfies is the strength of having a wide range of products. They must be able to continue to maintain many products varieties and build on them efficiently. Using R & D to overcome the problem of pasteurization as well as satisfying growing global demand is not an easy task and hence requires time and efficiency to meet the needs globally. Last but not least is overcoming the threat of competitors in the long run. Recent Strategic choice of Amul consist of moving consumers from lose milk to packaged milk and gradually move them up the value chain, strong supply chain design and improving the socio-economic condition of the consumer anchors the desire to enhance lifestyle. Placing a product in that part of the market where it will receive a favorable reception compared to competing products is the most recent strategy implemented by Amul. In case of Amul it has a positioning strategy and it is â€Å"The taste of India†. This had created value for everyone in value chain, be it customers or the suppliers/farmers. The USP for Amul is Quality with affordability, which appeals to most of the targeted markets. Amul positioned itself with India‟s first pro-biotic wellness ice cream and sugar free delights for diabetics. This was based on good strategies of positioning which helps increase awareness and also improve brand image. They expanded their products in terms of those that can be used even by those who are restricted from consumption due to medical reasons. Amul also priced their products such that it made competitor â€Å"Kwality Walls† rethink their marketing/pricing strategy. This type of product positioning has proved beneficial to Amul and so they must come up with many more of such ideas and products that can help them move forward. 6.2 Operational Strategy 6.2.1 Marketing Strategies GCMMF has become very popular because of its excellent marketing strategy. GCMMF marketing strategy is to understand the consumer needs, develop products that provide superior value at fewer prices. GCMMF has shown a tremendous commitment to the floodwater situations. GCMMF has never stopped the supply of milk and other milk products. And unlike other competitors, it has never taken wrong benefits in these kinds of situations. It has developed an excellent distribution channel to provide its products to the consumers. It has made its products available in each part of Gujarat & India. GCMMF has an excellent distribution. It is its distribution channel, which has made it so popular. GCMMF‟s products like milk and milk products are perishable. It becomes that much important for them to have a good distribution. Wholesaler r Retailer Consumer Fig 3: Distribution Chart The products change hands for three times before it reaches to the final consumer. First of all the products are stored at the Agents end who are mere facilitators in the network. Then the products are sold to wholesale dealers who then sell to retailers and then the product finally reaches the consumers. 6.2.2 Finance Strategies Financial management is that managerial activity which is concerned with the planning and controlling of the firm‟s financial resources. Finance is nothing to other but the money. Money is necessary input for economic activities. In the other wards â€Å"Finance is the common denominator for carrying out vast range of corporate objectives.† This is a co-operative unit, so the finance is raised from members by a way of share capital. In this share capital is limited. This unit has invested so many rupees in the structure of organization. Amul has a long-term finance project. 6.2.2.1 Financial Details Name of Bankers 1. The Kaira District Central Co-operative Bank Ltd. 2. State Bank of India 3. State Bank of Saurashtra 4. UTI Bank Ltd 5. Corporate Bank 6.2.3 Human Resource Strategy The success to any industrial unit depends upon their effective personnel department. Personnel department is basically commercial with human resource of an enterprise and it also continues procurement, development, non-monetary comparison, integration and maintenance of the personnel purpose of contribution towards the accomplishment of the organization‟s major goal and objectives. Amul‟s recruitment and selection process is very systematic and comprehensive. All division head in inform about their manpower requirements. According to the requirement of the personnel division they get require employees by resources like postal services employment exchange education institution and advertisement. Amul Dairy receives lots of applications in response to their advertisement. These forms contain general information about the candidates. Then forms are to be checked 27 by authorized person and after scrutinizing eliminate the unqualified applications. Short listed Applicants are called for personal interview. Interview committee conducts this interview. When applicants are too many, then they conduct a written test. Those who pass this test are called for interview and are selected on the basis of smart selection process. 6.2.3.1 Sources of Recruitment ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · By giving advertisement in news papers Labour Union Voluntary Organization Leasing Contract Private Employment Agency Government Employment Exchange School, Colleges, Universities and Professional Institutes Recommendation of present Employee Recruitment as Temporary Workers 7.0 Future Strategies ï‚ · Expanding the processing and packaging capacity to meet growing demands. In a bid to pump up volumes, ï‚ · Amul is also extending its distribution network to reach new markets. The core strategy is to further consolidate the operations in existing markets which includes Kolkata. ï‚ · Also, it is beefing up the marketing and advertising strategy to sustain its leadership. The company‟s long term strategy also includes foray into South India. ï‚ · To achieve and maintain competitive advantage, innovation in product design and delivery are increasingly essential. ï‚ · To innovate at each stage in value chain – production, procurement, processing, marketing and branding. ï‚ · Launching „Dairy Demonstration Project‟ which is a collective effort of the Union and Bank. The project envisages encouraging the farmers to use high yielding animals and modern aids to increase production. 8.0 References 1. Bowonder, B.; Prasad, Raghu; Kotla, Anup, International Journal of Services Technology & Management, 2005, ICT application in a dairy industry: the eexperience of Amul. 2. Dairy Industries International, Aug2007, Amul becomes top Indian co-operative. 3. Dr. Kurien., â€Å"Amul, The Kaira District Cooperative Milk Producers‟ Union Ltd. Anand, 50 Years of Milk & Health.† 4. Goldberg, Ray A., Knoop, Carin-Isabel, Sunder, Srinivas Ramdas, Harvard Business School Cases, Nov 1998, Amul and India’s National Dairy Development Board. 5. Bellur, Venkatakrishna V.; Singh, Saraswathi P.; Chaganti, Radharao; Chaganti, Rajeswararao. Long Range Planning, December b1990, The White Revolution — How Amul Brought Milk to India. 6. Manikutty, S., Asian Case Research Journal, Dec2002, Gujarat Co-operative Milk Marketing Federation Ltd. (GCMMF). 7. Wheelen, Thomas L. and Hunger, David J, Concepts in strategic management and business policy, 12th edition. 8. Scholes and Whitti ngton, Exploring Corporate Strategy, 7th edition. 8.1 Web References 1. www.amul.com/ 2. www.business.mapsofindia.com/sectors/manufacturing/amul.html 3. www.gcmmf.coop/ 4. www.nddb.org 9.0 Appendix 9.1 List of Products Marketed Bread Spreads ï‚ · ï‚ · ï‚ · Amul Butter Amul Lite Low Fat Breadspread Amul Cooking Butter Cheese Range Amul Pasteurized Processed Cheddar Cheese Amul Processed Cheese Spread Amul Pizza (Mozarella) Cheese Amul Shredded Pizza Cheese Amul Emmental Cheese Amul Gouda Cheese Amul Malai Paneer (cottage cheese), Frozen, Refrigerated and Tinned Utterly Delicious Pizza Mithaee Range (Ethnic Sweets) ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · Amul Shrikhand (Mango, Saffron, Almond Pistachio, Cardamom) Amul Amrakhand Amul Mithaee Gulabjamuns Amul Mithaee Gulabjamun Mix Amul Mithaee Kulfi Mix Avsar Ladoos UHT Milk Range Amul Shakti 3% fat Milk Amul Taaza 1.5% fat Milk Amul Gold 4.5% fat Milk Amul Lite Slim-n-Trim Milk 0% fat milk Amul Shakti Toned Milk Amul Fresh Cream 31 Amul Snowcap Softy Mix Pure Ghee Amul Pure Ghee Sagar Pure Ghee Amul Cow Ghee Amul Infant Milk Formula 1 (0-6 months) Amul Infant Milk Formula 2 (6 months above) Amulspray Infant Milk Food Milk Powders ï‚ · ï‚ · ï‚ · ï‚ · Amul Full Cream Milk Powder Amulya Dairy Whitener Sagar Skimmed Milk Powder Sagar Tea and Coffee Whitener Sweetened Condensed Milk Amul Mithaimate Sweetened Condensed Milk Fresh Milk Amul Taaza Toned Milk 3% fat Amul Gold Full Cream Milk 6% fat Amul Shakti Standardized Milk 4.5% fat Amul Slim & Trim Double Toned Milk 1.5% fat Amul Saathi Skimmed Milk 0% fat Amul Cow Milk Yogi Sweetened Flavored Dahi (Dessert) Amul Masti Dahi (fresh curd) Amul Butter Milk Royal Treat Range (Rajbhog, Cappuchino, Chocochips, Butterscotch, Tutti Frutti) Nut-o-Mania Range (Kaju Drakshi, Kesar Pista, Roasted Almond, Kesar Carnival, Badshahi Badam Kulfi, Shista Pista Kulfi) Utsav Range (Anjir, Roasted Almond) Simply Delicious Range (Vanilla, Strawberry, Pineapple, Rose, Chocolate) Nature’s Treat (Alphanso Mango, Fresh Litchi, Anjir, Fresh Strawberry, Black Currant) Sundae Range (Mango, Black Currant, Chocolate, Strawberry) Millennium Ice cream (Cheese with Almonds, Dates with Honey) Milk Bars (Chocobar, Mango Dolly, Raspberry Dolly, Shahi Badam Kulfi, Shahi Pista Kulfi, Mawa Malai Kulfi, Green Pista Kulfi) Cool Candies (Orange, Mango) Cassatta Tricone Cones (Butterscotch, Chocolate) Megabite Almond Cone Frostik – 3 layer chocolate Bar Fundoo Range – exclusively for kids SlimScoop Fat Free Frozen Dessert (Vanilla, Banana, Mango, Pineapple) Health Isabcool Chocolate & Confectionery Amul Milk Chocolate Amul Fruit & Nut Chocolate Brown Beverage Nutramul Malted Milk Food Milk Drink Amul Kool Flavoured Milk Health Beverage Amul Shakti White Milk Food Ready to Serve Soups Masti Tomato Soup Masti Hot & Sour Soup Recently launched Amul Ganthiya

Thursday, August 29, 2019

The Social Organization

The late Professor Fiske, in his Outline of Cosmic Philosophy, made a very interesting remark about societies like those of China, ancient Egypt, and ancient Assyria. â€Å"I am expressing,† he said, â€Å"something more than an analogy, I am describing a real homology so far as concerns the process of development,–when I say that these communities simulated modern European nations, much in the same way that a tree-fern of the carboniferous period simulated the exogenous trees of the present time. So far as this is true of China, it is likewise true of Japan. The constitution of the old Japanese society was no more than an amplification of the constitution of the family,–the patriarchal family of primitive times. All modern Western societies have been developed out of a like patriarchal condition: the early civilizations of Greece and Rome were similarly constructed, upon a lesser scale.But the patriarchal family in Europe was disintegrated thousands of years ag o; the gens and the curia dissolved and disappeared; the originally distinct classes became fused together; and a total reorganization of society was gradually [230] effected, everywhere resulting in the substitution of voluntary for compulsory cooperation. Industrial types of society developed; and a state-religion overshadowed the ancient and exclusive local cults. But society in Japan never, till within the present era, became one coherent body, never developed beyond the clan-stage.It remained a loose agglomerate of clan-groups, or tribes, each religiously and administratively independent of the rest; and this huge agglomerate was kept together, not by voluntary cooperation, but by strong compulsion. Down to the period of Meiji, and even for some time afterward, it was liable to split and fall asunder at any moment that the central coercive power showed signs of weakness. We may call it a feudalism; but it resembled European feudalism only as a tree-fern resembles a tree.Let us first briefly consider the nature of the ancient Japanese society. Its original unit was not the household, but the patriarchal family,–that is to say, the gens or clan, a body of hundreds or thousands of persons claiming descent from a common ancestor, and so religiously united by a common ancestor-worship,–the cult of the Ujigami. As I have said before, there were two classes of these patriarchal families: the O-uji, or Great Clans; and the Ko-uji, or Little Clans.The lesser were branches of the greater, and subordinate to [231] them,–so that the group formed by an O-uji with its Ko-uji might be loosely compared with the Roman curia or Greek phratry. Large bodies of serfs or slaves appear to have been attached to the various great Uji; and the number of these, even at a very early period, seems to have exceeded that of the members of the clans proper. The different names given to these subject-classes indicate different grades and kinds of servitude.One name w as tomobe, signifying bound to a place, or district; another was yakabe, signifying bound to a family; a third was kakibe, signifying bound to a close, or estate; yet another and more general term was tami, which anciently signified â€Å"dependants,† but is now used in the meaning of the English word â€Å"folk. † †¦ There is little doubt that the bulk of the people were in a condition of servitude, and that there were many forms of servitude. Mr.Spencer has pointed out that a general distinction between slavery and serfdom, in the sense commonly attached to each of those terms, is by no means easy to establish; the real state of a subject-class, especially in early forms of society, depending much more upon the character of the master, and the actual conditions of social development, than upon matters of privilege and legislation. In speaking of early Japanese institutions, the distinction is particularly hard to draw: we are still but little informed as to the condition of the subject [232] classes in ancient times.It is safe to assert, however, that there were then really but two great classes,–a ruling oligarchy, divided into many grades; and a subject population, also divided into many grades. Slaves were tattooed, either on the face or some part of the body, with a mark indicating their ownership. Until within recent years this system of tattooing appears to have been maintained in the province of Satsuma,–where the marks were put especially upon the hands; and in many other provinces the lower classes were generally marked by a tattoo on the face.Slaves were bought and sold like cattle in early times, or presented as tribute by their owners,–a practice constantly referred to in the ancient records. Their unions were not recognized: a fact which reminds us of the distinction among the Romans between connubium and contubernium; and the children of a slave-mother by a free father remained slaves. * In the seventh ce ntury, however, private slaves were declared state-property, and great numbers were [233] then emancipated,–including nearly all–probably all–who were artizans or followed useful callings.Gradually a large class of freedmen came into existence; but until modern times the great mass of the common people appear to have remained in a condition analogous to serfdom. The greater number certainly had no family names,–which is considered evidence of a former slave-condition. Slaves proper were registered in the names of their owners: they do not seem to have had a cult of their own,–in early times, at least. But, prior to Meiji, only the aristocracy, samurai, doctors, and teachers–with perhaps a few other exceptions–could use a family name.Another queer bit of evidence or, the subject, furnished by the late Dr. Simmons, relates to the mode of wearing the hair among the subject-classes. Up to the time of the Ashikaga shogunate (1334 A. D. ), all classes excepting the nobility, samurai, Shinto priests, and doctors, shaved the greater part of the head, and wore queues; and this fashion of wearing the hair was called yakko-atama or dorei-atama–terms signifying â€Å"slave-head,† and indicating that the fashion originated in a period of servitude. [*In the year 645, the Emperor Kotoku issued the following edict on the subject:– The law of men and women shall be that the children born of a free man and a free woman shall belong to the father; if a free man takes to wife a slave-woman, her children shall belong to the mother; if a free woman marries a slave-man, the children shall belong to the father; if they are slaves of two houses, the children shall belong to the mother. The children of temple-serfs shall follow the rule for freemen. But in regard to others who become slaves, they shall be treated according to the rule for slaves. –Aston's translation of the Nihongi, Vol. II, p. 202. ] About t he origin of Japanese slavery, much remains to be learned.There are evidences of successive immigrations; and it is possible that some, at least, of the earlier Japanese settlers were reduced by later invaders to the status of servitude. Again, [234] there was a considerable immigration of Koreans and Chinese, some of whom might have voluntarily sought servitude as a refuge from worse evils. But the subject remains obscure. We know, however, that degradation to slavery was a common punishment in early times; also, that debtors unable to pay became the slaves of their creditors; also, that thieves were sentenced to become the slaves of those whom they had robbed. Evidently there were great differences in the conditions of servitude.The more unfortunate class of slaves were scarcely better off than domestic animals; but there were serfs who could not be bought or sold, nor employed at other than special work; these were of kin to their lords, and may have entered voluntarily into serv itude for the sake of sustenance and protection. Their relation to their masters reminds us of that of the Roman client to the Roman patron. [*An edict issued by the Empress Jito, in 690, enacted that a father could sell his son into real slavery; but that debtors could be sold

Wednesday, August 28, 2019

See word Assignment Example | Topics and Well Written Essays - 500 words - 3

See word - Assignment Example It supports the employment of immigrants, and provides its employees with a wage that helps them meet their needs successfully. More to this, it advocates for the conservation of the environment as it uses organic cotton and recycled materials to make its products. These aspects endear the company to the public as they take social responsibility seriously. Consequent to this, many customers are drawn to the company, thus promoting the sales of the company. However, the sexual campaigns used by the company to advertise its products expose the employees to sexual harassment, thus interfering with their dignity. Therefore, the company ought to discontinue the marketing strategy, and promote the dignity of its employees. American Apparel serves both male and female customers. This enables the company to sell its products to a wider population, hence attracting a considerable portion of the population. It provides the customers with clothing required for daily use, thus meeting their basic needs. However, older customers who visit the premises of this company tend to get shocked by the adverts used to display the garments, which deters most of them from completing a purchase. This leads to a considerable loss of revenue, which affects the company‘s profitability negatively, thus necessitating a change in the marketing strategy. Competitors in this industry apply marketing techniques that maintain the dignity of individuals. Consequently, customers would prefer buying their garments from such companies, instead of a company that promotes sexual behavior. This compels American Apparel to transform its strategy, to maintain, and attract a large pool of customers. American Apparel serves the global world. However, it specializes in selling to young adults above the age of twenty (Richard Ivey School of Business Foundation 1). Different countries have different cultures that guide their value system. Some countries maintain a restrictive culture,

Tuesday, August 27, 2019

Why parents should not argue in cheldren's presence Essay

Why parents should not argue in cheldren's presence - Essay Example Young children usually regard their parents as role models and try to imitate all they do and put them into their daily activities. Parents posses this magical ability to forget that their kids are within earshot of what they are saying when arguing. Or they assume their children are too young to understand the context of the argument while ignoring to realize the tone of their conversation is noticeable by even a one year old child. The greatest danger is, kids do as we do and most often not as we say, though we wish the opposite. So, what kind of children are we going to raise when we traditionally argue and fight before them? Most of the time, whatever children learn from their families, sometimes they carry them through their lives. Hence, family unity is a very essential component in a child’s growth and future character (Rimm, 2008). For any child to develop into a morally person, one is expected to have learnt good morals from his or her parents (Oliver, 2011). Children regard their parents as their mentors and try to copy whatever things they see them doing. A tender mind of a child once exposed to the sight of parents quarrelling may start imitating what their parents do to other children. Such children tend to develop quarreling attitudes when confronted with tricky situations and on worst case scenario, involve themselves in fights. According to some research conducted on children who were once exposed to seeing their parent’s quarrelling, the research found out that the most of the children developed quarrelling tendencies later in their lives as men or women (Rimm, 2008). Children exposed to the scene of their parents quarrelling sometime become traumatized psychologically. Possessing tender minds, children are the most affected in case of a quarrel. A child in his or her micro-environment usually believes life is a happy place, and by seeing such a scene, become terrified of life’s outcome (Vissing, 2007). A child also believe d that perfection in his or her micro-world is brought by his or her parents, therefore by seeing them quarreling, deprives the child of his or her happiness. Parent’s who quarrel in front of their children should not do so since their subject their children to psychological torture and deprive them of the happiness children should have at such tender age. Quarrelling before children in some countries is punishable since it deprives children their rights. One of the worst side effects of living in a hostile environment is exposure to stress. Stress should not be really a part in a child’s life. Some of healthy stresses such as the thrill to adventure, challenging school work, or normal changes of life are good. However, the negative stress brought about by living in unhappy household full of conflicts is terrible for a child mental and physical health. Parents should also not argue in front of their children since they might cause emotional instability. Sometimes, chil dren become emotionally disturbed when they see their parents quarrelling and become withdrawn. Children are usually free with their parents and believe their parents are their judges in whatever happens to them, but on seeing they quarrel, send fear into their minds (Rimm, 2008). A child, who was once free with his or her parents before a quarrel, may start withdrawing or keeping to himself or herself after the quarrel since he or she distrusts them. Trust in any family is important for its survival. A child learns to be distrustful after such events since the person he or she used to trust, engages in quarrelling. When children become threatened emotionally, they exhibit increased negativity in life. Some of them develop symptoms of anxiety, depression, hostility,

Strategic Management Outline Example | Topics and Well Written Essays - 750 words - 2

Strategic Management - Outline Example Barriers against International Trade Critics believe that factors that influence international trade undermine globalisation (Haberberg and Rieple, 2007:8). The factors include tariffs, licenses, embargos, and investment and exchange control with a view of protecting trade in the international market. The above factors influence the entry behaviour into the international market. Economic analysts have identified reasons behind the resistance to globalisation. These reasons are environmental influences that emanate due to international trade, employment abuses, and perceived inequality of benefits derived from globalisation. Many countries show concern about the treatment that their citizens get whenever they operate in the international scene. Conflicts that arise due to poor treatment may justify resistance to efforts towards globalisation. Benefits derived from the global market are very crucial to globalisation. The players in the international scene bring low-income countries and the developed countries. The transactions between these two groups usually differ. Economists have demonstrated that the benefits that developed nations acquire in the international market are higher when compared to low income countries. This situation tends to justify rejection of globalisation. The international Environment The trade in the international market usually take place within and between Europe, USA, and Japan. This trade depend on political and legal issues, which influence the relationship between these countries, cultural and social issues; shapes the products consumed by these nations, and the infrastructure within these countries. Infrastructure is very crucial because it dictates the operation of factors, which influence the international scene. For instance, transport network and communication determines the ability to deliver products in the international market. The international politics define the environment within which the international players would pre sent their items. The political system dictates policies, which influence globalisation. The legal system of a country would derive its policies from the nation’s political system. These policies would influence the economic climate because they regulate business operations in the international scene. Critics believe that political intervention may affect taxes levied against products in the international market. The interventional by various political systems are evident through inflation and currency rate control. Social and cultural issues are very instrumental to globalisation. The beliefs and values in the international environment would influence practices such as consumer behaviour, expectation of the employees. The understanding of dynamism in the international culture would influence the approach applied by firms in the international market. Critics believe that cultural attributes observed in the international market depend on infrastructural development in a countr y (Haberberg and Rieple, 2007:12). For instance, employee’s skill would depend on education system of that country. On the other hand, telephone, electricity or transport system would dictate the behaviour adopted by various firms. Organisation Location in the International Environment The decision to introduce a product in the internatio

Monday, August 26, 2019

Introduction to Information Systems Essay Example | Topics and Well Written Essays - 2000 words - 2

Introduction to Information Systems - Essay Example In this scenario we have two approaches i.e. structured and object oriented development. In object-oriented development approach we will pursue new evolutionary development scheme where we will be able to design and develop the system in a way to better analyze its overall development lifecycle. On the other hand we have the traditional structured approach that follows a more rigid or inflexible development lifecycle that is well suited for small scale projects. The business of WBY Ltd is evolving day by day and having much better performance requirements through the new web based E-Commerce system. In this scenario the application of traditional structured approach like waterfall will not be best fit for such project. In this scenario we will prefer to use the new object oriented development approach like Spiral development methodology where we will have better control and management facilities through this methodology for the WBY Ltd business new E-Commerce development approach. For WBY Ltd’s E-Commerce system development we have two choices (structured and object oriented development approaches). If we implement object oriented development approach we will get quicker development of the system under consideration. Additionally, we will be able to get facility of reprocess of earlier work that will lessen work load significantly. Then we will be able to take advantage of increased quality of the developed system. The use of the object oriented development approach will offer better facility in case of development of Client/Server Applications. We will as well be capable to better plan to the problem domain using this development methodology. However the use of object oriented development approach will also present some problems for the WBY Ltd business new E-Commerce system development. Here the main problem we can face is the complexity of development

Sunday, August 25, 2019

Letter of motivation to a Prospective Employer Essay

Letter of motivation to a Prospective Employer - Essay Example I did the following courses during my studies for the Bachelor’s of Science Degree in Criminal Justice and Administration: Contemporary issues in Criminal Justice, Criminology, Policing Theory and Practice, Criminal Law, Interpersonal Communication, Institutional and Communication, Institutional and Community Corrections, Criminal Procedure, Criminal Court Systems, Criminal Organizations, Juvenile Justice Systems and Process, Ethics in Criminal Justice, Cultural Diversity in Criminal Justice, Research Methods in Criminal Justice, Organizational Behaviour and Management, Criminal Justice Administration, Foundations of Criminal Justice, Criminal Justice Policy Analysis, Managing Criminal Justice Personnel, Futures of Criminal Justice, and Interdisciplinary Capstone Course. All these courses are specially designed to equip the student with the knowledge and skills required in dealing with managerial as well as leadership aspects that are related to the operations of the criminal justice agencies. The courses offer a strong foundation of theoretical knowledge that can be transformed into real life practice in the profession of criminal justice. It is my strong conviction that the knowledge I have gained in the field of Criminal justice have greatly enhanced my managerial and administrative skills that are closely related to law enforcement, the criminal courts and corrections. My degree program is designed to offer the students with a strong background in criminal justice principles, theories as well as concepts that are related to justice administration. All the courses I have taken are designed to fulfil the core aspects of criminal justice as portrayed in the domains of courts, police services as well as corrections. The programme offers a global perspective to the realm of criminal justice and it fulfils various management functions that can improve the operations of various managerial departments in related agencies that deal with criminal justice. The courses I took will greatly help me in my profession since I am better positioned to approach any situation with self determination as a result of the valuable theoretical knowledge I gained in each course and I can transform it into real practice. Basically, the BSCJA programme is designed to fulfil various goals and these were fulfilled both in theory and in practice through practical lessons by my tutors who are serving members of the justice system. My professors teach from a practical stand point and this curriculum is designed to equip the student with the much needed practical experience in this particular field where he is given the opportunity to transform the theoretical knowledge gained into real practice. As such, I believe I have the following competencies that can positively contribute to the overall performance of the organization as a whole. I have good communication skills and can communicate both verbally and written at all levels. The valuable knowledge I have gai ned in this particular discipline have developed my style of systematic, creative and logical thinking. I can diligently approach any given scenario and I can find solutions to

Saturday, August 24, 2019

Sustainable Packaging Essay Example | Topics and Well Written Essays - 1000 words

Sustainable Packaging - Essay Example A sustainable packaging is the designing and use of packaging materials that are more sustainable. In designing a company’s sustainability strategy, packaging comes in handy as a very fundamental factor. The sustainable packaging design aims at increasing the use of life cycle inventory and reducing the environmental impacts. Its main objectives are the maintenance of quality human life, secure habitats for the present and future generation needs. Government regulations, corporate goals, branding, logistical optimization, and consumer expectations determines the design of a sustainable packaging. The Sustainable Packaging Coalition (SPC) and the Sustainable Packaging Alliance (SPA) provides businesses and factories with the best information for making sustainable packaging decisions that commercially an environmentally beneficial. The sustainable packaging products emanate from materials that are healthy, recyclable, and environmental friendly throughout their lifecycle. The materials may include papers and recyclable plastic products. The manufacturing process of sustainable packaging uses clean production technologies and best practices that minimise environmental pollution. Gas emissions from manufacturing factories may cause air pollution and global warming. Hence, the production of sustainable packaging must consider this hazard in ascertaining a habitable environment. The design of sustainable packaging products aims at optimizing materials and energy use. This ensures cost effectiveness in production. According to Pike Research, the demand for packaging is valued at $429 billion (Pike Research Web). Packaging ahs also employed more than five million people in the world (SPC Web). The employment, security and protection of human life are social aspects that sustainable packaging offers. With the demand e xpected to rise with relative increase in population and industrial growth, it is very important to use the most sustainable packaging materials. Non-renewable and non-recyclable materials decrease t he level of cohabitation. Air, land, and water pollution are some of the effects of using hazardous packaging products. Hence, manufacturing companies should strive to use eco friendly and life supporting materials in producing the sustainable packaging products should be eco friendly and with an ability to support life. The manufacturing process should conserve raw materials, water, and energy. We can achieve this by shifting from the use of fossil fuels to renewable sources of energy. This would reduce or eliminate toxic emissions, which are harmful to human life and environmental conservation (SPC Web). The products should equally meet the market criteria and guarantee effective performance throughout their life cycles. The process of tendering, acquisition, and production of sustain able packaging should be cost effective to realize targeted comp-any profits. Paper and paper-based packaging dominate the global packaging market. However, according to pike research the use of plastic-based packaging will also grow significantly by the year 2014. Moreover, the demand for sustainable packaging is considerably more than that of general packaging. Better disposal methods

Friday, August 23, 2019

Toxic Chemical Agent Incident Response Assignment

Toxic Chemical Agent Incident Response - Assignment Example Incident command system is a well-organized tool that can be used to manage a disaster in a smooth way. It is a tool that is used for control, command and coordination of the emergency response to protect life, property, and the environment. The tool integrates procedures, policies, facilities, equipment and personnel into a common organizational structure that is specifically designed to improve the emergency response operations. By applying the principles of the incident command system, management of disaster can occur smoothly without confusion. These principles occur in a systematic manner and functions to allow smooth rescue plan for casualties in an emergency response. For methyl isocyanate leak, immediate response plan using the principles of incident command system can minimize the number of casualties (Williams, 2013). In case of the of the methyl isocyanate gas leak, the response teams should use similar terminologies to avoid confusion. The response team should use a common language that each person understands and all commonly used areas should have the same names. For instance, the area where casualties are being staged should have a common name such as the staging area. The gas plant facilities and units should be given similar titles that each response team is familiar with for easy access of resources and to avoid confusion (Strong, et al., 2009). During the gas leak, the first arriving officer to the gas plant assumes the position of the incident commander. The incident commander will start activating other section areas of the response team. The incident commander will raise the alarm, call the ambulance and start organizing on how to evacuate the casualties from the power plant after triaging. The incident commander will, therefore, help make a communication flow smoothly during the rescue process (Williams, 2013). There should be a common communications plan between different response teams.

Thursday, August 22, 2019

Violence in the office Essay Example for Free

Violence in the office Essay Review This assignment required me to find an article on violence in the office and write a brief overview of the article using the university library. I will discuss different types of violence that lead to office violence. I will then discuss ways in which a company can control the influences that incite office violence. After reviewing a few different articles I have decided on an article from the university library called† Out of the Shadows,† by Dori Meinert. This article talks about 2 different stories that both deal with physical and mental violence. The stories were not actually based in an office setting, but were based in a home setting (Meinert, 2011). Though once the violence in the home setting was bad enough it spilled into the work place and eventually put the other employees in danger. The article also discussed the role human resources played and discusses how important this department is in any company. It goes into how human resources resolve problems such as domestic violence, and how they can be a great resource in these kinds situation. Human resources have the training, skill set, and ability to keep issue private that helps in instances where there is violence in the work place (Meinert, 2011). With avoidance programs, employee training sessions, and employee assistance programs these will help train and coach employees through and also help them avoid issues such as office violence. Forms of Bullying in the Workplace When it comes to offices violence that could result in bullying there are many different types. In an office setting violence might include a group or person against a peer or someone who reports to another. The violence can be continuous or just conduct that is unreasonable. The majority of the documented instances were management or the administration who perpetrated a number of offenses. The major types of violence include: nonverbal, verbal, embarrassment, physical, and psychological abuse. Examples of verbal abuse  would be name-calling which happens more often than not. A simple phrase calling someone out of there name and cursing are the quickest way to verbally abuse someone and not realize it (Meinert, 2011). In the second story told in the article a women who is abused in her home life seeks refuge at work and tells her co-workers. She felt like she needed to tell someone to get assistance, which in some cases can help. It can actually backfire in some cases. Telling someone your personal business can lead to peers discussing your personal business behind your back spreading rumors, criticizing, or gossiping about your business. Ways to avoid violence in the work place Training employees on office like conduct, creating avoidance plan, and having a zero tolerance policy in place are the main methods to control, avoid, and protect employees against violence in the work place. Keeping the workers trained on up to date procedures and processes is very important. Also making sure managers and human resources are trained on effective communication is also very important. An employee has to trust their manager and if not their manager, than human resources to feel comfortable to talk about issues like violence. Making sure the employees understand that there is an open door policy and that any kind of violence in the work place in not acceptable and will not be tolerated. Most importantly there needs to be an immediate response and rapid results to create a secure environment for all employees.

Wednesday, August 21, 2019

Linguistics Lecture Essay Example for Free

Linguistics Lecture Essay Today’s Objective †¢ Begin to understand the fundamental ways of thinking in Linguistics. Some properties of grammar †¢ †¢ †¢ creativity generality parity Some properties of grammar: Parity ? all grammars are equally valid prescriptive grammar descriptive grammar ? ? Is this statement a scienti? c observation? A. Yes B. No People who live in East Hamilton often say â€Å"I seen him† where they should say â€Å"I saw him† Clicker frequency is BD. Is this statement a scienti?  c observation? A. Yes B. No In Finnish, prepositions come after nouns. Kissa on poydan alla cat is table under â€Å"The cat is under the table† Is this statement a scienti? c observation? A. Yes B. No If you end a sentence with a preposition you sound ignorant. Gymboree is one of the stores that I shop at. Gymboree is one of the stores at which I shop. Clicker frequency is BD. Clicker frequency is BD. Some properties of grammar: Universality ? ? ? ? all grammars share some universal properties phonological syntactic etc. Some properties of grammar: Mutability ? ? ? ? all grammars change over time sounds words word forms sentence structures [w] not [hw] in Canada by age Some properties of grammar: Inaccessibility ? almost all grammatical knowledge is unconscious (a. k. a. implicit) How can we observe unconscious knowledge? Some properties of grammar ? ? ? ? ? ? creativity generality parity universality mutability inaccessibility.

Tuesday, August 20, 2019

Analysis of Intrusion Detection Systems (IDS)

Analysis of Intrusion Detection Systems (IDS) Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting and reporting to the network personnel. The Intrusion Prevention Systems got both characteristics i.e. threat detection and prevention. The detection process analyzes the events for any possible threats while the intrusion prevention stops the detected possible threats and reports the network administrator. Purpose Scope The main purpose of the project is to evaluate the security capabilities of different types of IDPS technologies in maintaining the network security. It provides detail information about the different classes components of IDPS technologies, for example, detection methods, security capabilities, prevention capabilities internals of IDPS. It is mainly focused on different detection techniques responses by these technologies. 1.2 Audience The information can be useful for computer network administrators, network security personnel, who have little knowledge about these IDPS technologies. 1.3 Project Structure The project is organized into the following major structure: Section 2 provides a general introduction of IDPS. Section 3 provides detail information about of IDPS technologies, components architecture, detection methodologies, security capabilities prevention capabilities. Section 4 provides the internals of IDPS incident response. Section 2: Introduction of IDPS This Chapter Explains the Intrusion Detection Prevention Process, Uses, Functions and Different Types of IDPS The modern computer networks provide fast, reliable and critical information not only to small group of people but also to ever expanding group of users. This need led the development of redundant links, note book computers, wireless networks and many others. On one side, the development of these new technologies increased the importance and value of these access services and on other side they provide more paths to attacks. During the past, In the presence of firewalls and anti-virus software, organizations suffered huge losses in minutes to their businesses in terms of their confidentiality and availability to the legitimate clients. These modern threats highlighted the need for more advance protection systems. Intrusion detection prevention systems are designed to protect the systems and networks from any unauthorized access and damage. An intrusion is an active sequence of related events that deliberately try to cause harm, such as rendering system unusable, accessing unauthorized information or manipulating such information. In computer terminology, Intrusion detection is the process of monitoring the events in a computer network or a host resource and analyzing them for signs of possible incidents, deliberately or incidentally. The primary functions of IDPS are the identification of incident, logging information about them, stopping them preventing them from causing any damage. The security capabilities of IDPS can be divided into three main categories: Detection : Identification of malicious attacks on network host systems Prevention: stopping of attack from executing Reaction: Immunization of the system from future attacks. On the basis of location and type of events they monitor, there are two types IDPS technologies, host-based network based. The network-based IDPS monitors traffic for particular network segment and analyze the network application protocol activity for suspicious events. It is commonly deployed at the borders between networks. While on the other hand, host-based IDPS monitors the activity of a single host and events occurring within that host for suspicious activity. There are two complementary approaches in detecting intrusions, knowledge-based approach and behavior based approach. In knowledge-based approach an IDPS looks for specific traffic patterns called Signatures, which indicates the malicious or suspicious content while in the behavior-based approach an intrusion can be detected by observing a deviation from normal or unexpected behavior of the user or the system. What is an IDS? The Intrusion Detection Systems (IDS) can be defined as: tools, methods resources to identify, assess report unauthorized or unapproved network activity. It is the ability to detect attacks against a network or host and sending logs to management console providing the information about malicious attacks on the network and host resources. IDSs fall into two main categories: Host-Based Intrusion Detection System (HIDS): A HIDS system require some software that resides on the system and can scan all host resources for activity. It will log any activities it discovers to a secure database and check to see whether the events match any malicious event record listed in the knowledge base. Network-Based Intrusion Detection Systems (NIDS): A NIDS system is usually inline on the network and it analyzes network packets looking for attacks. A NIDS receives all packets on a particular network segment via one of several methods, such as taps or port mirroring. It carefully reconstructs the streams of traffic to analyze them for patterns of malicious behavior. The basic process for IDS is that it passively collects data and preprocesses and classifies them. Statistical analysis can be done to determine whether the information falls outside normal activity, and if so, it is then matched against a knowledge base. If a match is found, an alert is sent. Figure 1-1 outlines this activity. Response Manager GUI Host System Pre-processing Statistical Analysis Alert Manager Knowledge Base Long-Term Storage Signature Matching Fig 1.1 Standard IDS System What is an IPS? IPS technology has all capabilities of an intrusion detection system and can also attempt to stop possible incidents. IPS technologies can be differentiated from the IDS by one characteristic, the prevention capability. Once a threat is detected, it prevents the threat from succeeding. IPS can be a host-based (HIPS), which work best at protecting applications, or a network-based IPS (NIPS) which sits inline, stops and prevents the attack. A typical IPS performs the following actions upon the detection of an attack: IPS terminates the network connection or user session. It blocks access to target .i.e. IP address, user account or sever. It reconfigures the devices i.e. firewall, switch or router. It replace the malicious portion of an attack to make it benign An IPS typically consists of four main components: Traffic Normalizer: Interpret the network traffic and do packet analysis and packet reassembly traffic is fed into the detection engine service scanner. Service Scanner: Builds a reference table that classifies the information helps the traffic shaper manage the flow of the information. Detection Engine: Detection engine does pattern matching against the reference table. Figure 1.2 outlines this process: Response Manager GUI Traffic Normalizer System Scanner Detection Engine Alert Manager Reference Table Long-Term Storage Signature Matching FIG 1-2 Standard IPS Uses of IDPS Technologies The identification of possible incidents is the main focus of an IDPS, for example, if an intruder has successfully compromised a system by exploiting the vulnerability in the system, the IDPS could report this to the security personnel. Logging of information is another important function of IDPS. This information is vital for security people for further investigation of attack. IDPS has also the ability to identify the violation of security policy of an organization which could be intentionally or unintentionally, for example, an unauthorized access to a host or application. Identification of reconnaissance activity is one of the major capabilities of IDPS, which is the indication of an imminent attack, for example, scanning of hosts and ports for launching further attacks. In this case, an IDPS can either block the reconnaissance activity or it can alter the configurations of other network devices Functions of IDPS Technologies The main difference between different types of IDPS technologies is the type of events they can recognize. Following are some main functions; Recording of information regarding observed events, this information could be stored locally or could be sent to the logging server. Sending of alerts is one of the vital functions of IDPS. Alerts are sent through different methods i.e. email, SNMP traps, syslog messages etc. In case of detection of a new threat, some IDPS do have the ability to change their security profile, for example, when a new threat is detected, it might be able to collect more detail information about the threat. IDPS not only performs detection but it also performs prevention by stopping the threat to succeed. Following are some prevention capabilities: It can stop the attack by terminating either network connection or user session, by blocking access to a target host. It could change the configuration of other network devices (firewalls, routers switches) to block the attack or disrupt it. Some IDPS could change the contents of a malicious IP packet, for example, it can replace the header of an IP packet with a new one. Types of IDPS Technologies IDPS technologies can be divided into following two major categories: Network-Based IDPS Host-Based IDPS Network-Based IDPS Network-based IDPS monitors network traffic for a particular network segment. They analyze the network and application protocol activity to identify any suspicious activity. A network based IDPS is usually sits inline on the network and it analyzes network packets looking for attacks. It receives all packets on a particular network segment, including switched networks. It carefully reconstructs the streams of traffic to analyze them for patterns of malicious behavior. They are equipped with facilities to log their activities and report or alarm on questionable events. Main strengths of network-based IDPS are: Packet Analysis: Network-based IDPSs perform packet analysis. They examine headers of all IP packets for malicious contents. This helps in detection of the common denial of service (DOS) attack. For example, LAND attack, in which both the source destination addresses and source destination ports are same as of the target machine. This cause the target machine to open connection with itself, causing the target machine either performs slowly or crash. It can also investigate the payload of an IP packet for specific commands. Real Time Detection Response: Network-based IDPS detects attacks in real time as they are occurring in the real time and provides faster response. For example, if a hacker initiated a TCP based DoS attack, IDPS can drop the connection by sending a TCP reset. Malicious Content Detection: Network-based IDPS remove replaces suspicious portion of the attack. For example, if an email has infected attachment, an IDPS removes the infected file and permits the clean email. Evidence for Prosecution: Network-based IDPS monitors real time traffic and if an attack is detected and captured the hacker cannot remove the evidence. Because the captured attack has data in it but also the information about his or her identification which helps in the prosecution. Host-Based IDPS A Host-Based system monitors the characteristics of a single host and the events occurring within that host for suspicious activity. It require some software that resides on the system and monitors the network traffic, syslog, processes, file access modification and configuration or system changes. It logs any activities it discovers to a secure database and check to see whether the events match any malicious event record listed in the knowledge base. Some of the major strengths of Host-Based IDPS are as under: Verification of Attack: Host-based IDPS uses logs which contains events that have actually occurred. It has the advantage of knowing if the attack is successful or not. This type of detection is more accurate and generates fewer false alarms. Monitoring of Important Components: Host-Based IDPS monitors key components for example, executables files, specific DDLs and NT registry. All of these can cause damage to the host or network. System Specific Activity: Host-based IDPS monitors user and file access activity. It monitors the logoff or login procedure and monitors it on the basis of current policy. It also monitors the file access for example, opening of a non shared file. Switched Encrypted Environments: Host-Based IDPSs provide greater visibility into purely switched environment by residing on as many critical hosts as needed. Encryption is a challenging problem for network-based IDPS but not a major problem for host-based IDPS. If the host in question has log-based analysis the encryption will have no impact on what goes in to the log files. Near Real Time Detection: A host-based IDPS relies on the log analysis which is not a true real time analysis. But it can detect respond as soon as the log is written to and compared to the active attack signatures. Real Time Detection Response: Stack-based IDPS monitors the packets as they transverse the TCP/IP stack. It examines inbound outbound packets and examines in real time if an attack is being executed. If it detects an attack in real the time then it can responds to that attack in the real time. Section 2: IDPS Analysis Schemes IDPSs Perform Analysis: This Chapter is about the Analysis Process- What Analysis does and Different Phases of Analysis. 2.2 Analysis In the context of intrusion detection prevention, analysis is the organization of the constituent parts of data and their relationships to identify any anomalous activity of interest. Real time analysis is analysis done on the fly as the data travels the path to the network or host. The fundamental goal of intrusion-detection prevention analysis is to improve an information system’s security. This goal can be further broken down: Create records of relevant activity for follow-up. Determine flaws in the network by detecting specific activities. Record unauthorized activity for use in forensics or criminal prosecution of intrusion attacks. Act as a deterrent to malicious activity. Increase accountability by linking activities of one individual across system. 2.3 Anatomy of Intrusion Analysis There are many possible analysis schemes but in order to understand them, the intrusion process can be broken down into following four phases: Preprocessing Analysis Response Refinement 1. Pre-Processing Preprocessing is the key function once the data is collected from IDPS sensor. The data is organized in some fashion for classification. The preprocessing helps in determining the format the data are put into, which is usually some canonical format or could be a structured database. Once the data are formatted, they are broken down further into classifications. These classifications can depend on the analysis schemes being used. For example, if rule-based detection is being used, the classification will involve rules and patterns descriptors. If anomaly detection is used, then statistical profile based on different algorithms in which the user behavior is baseline over the time and any behavior that falls outside of that classification is flagged as an anomaly. Upon completion of the classification process, the data is concatenated and put into a defined version or detection template of some object by replacing variables with values. These detection templates populate the knowledgebase which are stored in the core analysis engine. 2. Analysis Once the processing is completed, the analysis stage begins. The data record is compared to the knowledge base, and the data record will either be logged as an intrusion event or it will be dropped. Then the next data record is analyzed. The next phase is response. 3. Response Once information is logged as an intrusion, a response is initiated. The inline sensor can provide real time prevention through an automated response. Response is specific to the nature of the intrusion or the different analysis schemes used. The response can be set to be automatically performed or it can be done manually after someone has manually analyzed the situation. 4. Refinement The final phase is the refinement stage. This is where the fine tuning of the system is done, based on the previous usage and detected intrusions. This gives the opportunity to reduce false-positive levels and to have a more accurate security tool. Analysis Process By Different Detection Methods The intrusion analysis process is solely depends on the detection method being used. Following is the information regarding the four phases of intrusion analysis by different detection methods: Analysis Process By Rule-Based Detection Rule-based detection, also known as signature detection, pattern matching and misuse detection. Rule-based detection uses pattern matching to detect known attack patterns. The four phases of intrusion analysis process applied in rule-based detection system are as under: Preprocessing: The data is collected about the intrusions, vulnerabilities and attacks and then it is putted down into classification scheme or pattern descriptors. From the classification scheme a behavior model is built and then into a common format; Signature Name: The given name of the signature Signature ID: The unique ID for the signature Signature Description: The description of the signature what it does Possible False Positive Description: An explanation of any â€Å"false positives† that may appear to be an exploit but are actually normal network activity. Related Vulnerability Information: This field has any related vulnerability information The pattern descriptors are typically either content-based signatures, which examine the payload and header of packet, or context-based signatures that evaluate only the packet headers to identify an alert. The pattern descriptors can be atomic (single) or composite (multiple) descriptors. Atomic descriptor requires only one packet to be inspected to identify an alert, while composite descriptor requires multiple packets to be inspected to identify an alert. The pattern descriptors are then put into a knowledge base that contains the criteria for analysis. Analysis: The event data are formatted and compared against the knowledge base by using pattern-matching analysis engine. The analysis engine looks for defined patterns that are known as attacks. Response: If the event matches the pattern of an attack, the analysis engine sends an alert. If the event is partial match, the next event is examined. Partial matches can only be analyzed with a stateful detector, which has the ability to maintain state, as many IDS systems do. Different responses can be returned depending on the specific event records. Refinement: Refinement of pattern-matching analysis comes down to updating signatures, because an IDS is only as good as its signature update. Analysis Process By Profile-Based Detection (Anomaly Detection) An anomaly is something that is different from the norm or that cannot be easily classified. Anomaly detection, also referred to as Profile-based detection, creates a profile system that flags any events that strays from a normal pattern and passes this information on to output routines. The analysis process by profile-based detection is as following: Preprocessing: The first step in the analysis process is collecting the data in which behavior considered normal on the network is baselined over a period of time. The data are put into a numeric form and then formatted. Then the information is classified into a statistical profile that is based on different algorithms is the knowledge base. Analysis: The event data are typically reduced to a profile vector, which is then compared to the knowledge base. The contents of the profile vector are compared to a historical record for that particular user, and any data that fall outside of the baseline of normal activity is labeled as deviation. Response: At this point, a response can be triggered either automatically or manually. Refinement: The profile vector history is typically deleted after a specific time. In addition, different weighting systems can be used to add more weight to recent behavior than past behaviors. Section 3: IDPS Technologies This section provides an overview of different technologies. It covers the major components, architecture, detection methodologies security capabilities of IDPS. Components Following are the major components and architecture of IDPS; Sensor Agents: Sensors Agents monitors and analyze the network traffic for malicious traffic. Sensor:The technologies that use sensors are network based intrusion detection prevention systems, wireless based intrusion detection prevention systems and network behavior analysis systems. Agents: The term â€Å"Agent† is used for Host-Based Intrusion detection prevention technologies. Database Server: The information recorded by the sensors and agents are kept safely in a database server. Console: A console is software that provides an interface for the IDPS users. Console software is installed on the administrator’s PC. Consoles are used for configuring, monitoring, updating and analyzing the sensors or agents. Management Server: It is a centralized device, receives information from sensors agents and manages that information. Some management server can also perform analysis on the information provided by sensor agents, for example correlation of events. Management server can be both appliance based or software based. 3.1 Network architecture IDPS components are usually connected with each other through organization’s network or through Management network. If they are connected through management network, each agent or sensor has additional interface known as management Interface that connects it to the management network. IDPS cannot pass any traffic between management interface and its network interface for security reasons. The components of an IDPS i.e. consoles and database servers are attached only with the Management network. The main advantage of this type of architecture is to hide its existence from hackers intruders and ensure it has enough bandwidth to function under DoS attacks Another way to conceal the information communication is to create a separate VLAN for its communication with the management. This type of architecture doesn’t provide a much protection as the management network does. 3.2 Security capabilities IDPS provide different security capabilities. Common security capabilities are information gathering, logging, detection and prevention. 3.2.1 Information gathering Some IDPS gather general characteristics of a network, for example, information of hosts and network. They identify the hosts, operating system and application they use, from observed activity. 3.2.2 Logging capabilities When a malicious activity is detected by the IDPS, it performs logging. Logs contain date time, event type, rating and prevention action if performed. This data is helpful in investigating the incident. Some network-based IDPS captures packet while host-based IDPS records user ID. IDPS technologies allow log to be store locally and send copies of centralized logging server i.e. syslog. 3.2.3 Detection capabilities The main responsibility of an IDPS is to detect malicious activity. Most IDPS uses combination of detection techniques. The accuracy and types of events they detect greatly depends on the type of IDPS. IDPS gives great results once they are properly tuned. Tuning gives more accuracy, detection and prevention. Following are some the tuning capabilities: Thresholds: It is a value that sets the limit for normal and abnormal behavior. For example, the number of maximum login attempts. If the attempts exceed the limit then it is considered to be anomalous. Blacklists Whitelists: A blacklist is list which contains TCP or UDP port numbers, users, applications, files extensions etc that is associated with malicious activity. A whitelist is a list of discrete entities that are known to be benign. Mainly used to reduce false positive. Alert Setting: It enables IDPS to suppress alerts if an attacker generates too much alerts in a short time and blocking all future traffic from that host. Suppressing of alerts provide IDPS from being overwhelmed. 3.2.4 Prevention Capabilities IDPS offers multiple prevention capabilities. The prevention capability can be configured for each type of alert. Depending on the type of IDPS, some IDPS sensors are more intelligent. They have learning simulation mode which enables them to know when an action should be performed-reducing the risk of blocking benign activity. 3.2.5 Types of Alarms When IDPS detects an intrusion it generates some types of alarms but no IDPS generates 100% true alarm. An IDPS can generate alarm for legitimate activity and can be failed to alarm when an actual attack occurs. These alarms can be categorized as: False Alarms: When an IDPS fails to accurately indicate what is actually happening in the network, it generates false alarms. False alarm fall into two main categories: False Positives: These are the most common type of alarms. False positive occurs when an IDPS generates alarm based on normal network activity. False Negatives: When an IDPS fails to generate an alarm for intrusion, it is called false negative. It happens when IDPS is programmed to detect ck but the attack went undetected. 2. True Alarms: When an IDPS accurately indicates what is actually happening in the network, it generates true alarms. True alarms fall into two main categories: True Positives: When an IDPS detects an intrusion and sends alarm correctly in response to actually detecting the attack in the traffic. True positive is opposite of false negative. True Negative: It represents a situation in which an IDPS signature does not send alarm when it is examining normal user traffic. This is the correct behavior. ARCHITECTURE DESIGHN Architecture design is of vital importance for the proper implementation of an IDPS. The considerations include the following: The location of sensors or agents. The reliability of the solutions the measurements to achieve that reliability. For example using of multiple sensors, for monitoring the same activity, as a backup. The number location of other components of IDPS for usability, redundancy and load balancing. The systems with which IDPS needs interfacing, including: System to which it provides the data i.e. log servers, management softwares. System to which it initiates the prevention responses i.e. routers, firewalls or switches. The systems used to manage the IDPS components i.e. network management software. The protection of IDPS communications on the standard network. 3.3 Maintenance Operation Mostly IDPS are operated maintained by user graphic interface called Console. It allows administrator to configure and update the sensors and servers as well as monitor their status. Console also allows users to monitor and analyze IDPS data and generate reports. Separate accounts could be setup for administrators and users. Command Line Interface (CLI) is also used by some IDPS products. CLI is used for local administration but it can be used for remote access through encrypted tunnel. 3.3.1 Common Use of Consoles Many consoles offer drill down facilities for example, if an IDPS generates an alert, it gives more detail information in layers. It also give extensive information to the user i.e. packet captures and related alerts. Reporting is an important function of console. User can configured the console to send reports at set time. Reports can be transferred or emailed to appropriate user or host. Users can obtain and customized reports according to their needs. 3.3.2 Acquiring applying updates There are two types of updates –software updates and signature updates. Software updates for enhancing the performance or functionality and fixing the bugs in IDPS while the signature updates for adding detection capabilities or refining existing capabilities. Software updates are not limited for any special component but it could include all or one of them i.e. sensor, console, server and agents. Mostly updates are available from the vendor’s web site. New Chapter Detection Methodologies Most IDPS uses multiple detection methodologies for broad accurate detection of threats but following are primary detection methodologies: Signature Based Detection Anomaly Based Detection Stateful Protocol Analysis 3.3.1 Signature Based Detection The term Signature refers to the pattern that corresponds to a known threat. In signature based detection, the predefined signatures, stored in a database, are compared with the network traffic for series of bytes or packet sequence known to be malicious, for example, an email with the subject of free screen savers and an attachment of screensavers.exe, which are characteristics of known form of malware Or a telnet