Saturday, August 22, 2020

Telstra Marketing Strategy and Entrepreneurship Free Sample

Question: Talk about theMarketing and Entrepreneurshipfor Telstra. Answer: Presentation: This report examinations the advertising technique of Telstra that is a main media transmission organization in Australia. The report incorporates foundation data of the organization and point by point depiction of the items and administrations of the organization. Alongside this, it centers around the objective market and advertising procedure of the organization. Too, it gives the proposal that can help Telstra to improve its piece of the overall industry and intensity. Organization Background and Product Description: Telstra is a main media transmission and media organization of Australia that was established in 1975, by the detachment of media transmission from the postal capacities. It was found by the death of the new media transmission Act 1975, which set up two legal specialists to be specific Australian Telecommunications Commission and Australian Postal Commission. Head quarter of organization is arranged in Melbourne, Australia. In Australian, Market Company give s17.2 million versatile administrations, 3.4 million retail fixed broadband administrations, and 7.0 million fixed voice administrations to its clients. The current CFO of organization is Warwick Bray and CEO is Andy Penn. In excess of 36000 representatives are working in the association. The beginnings of the Telstra go back in year 1901 when the ward government built up the postmaster general division to deal with the every single postal assistance and residential phone (Telstra, 2016). For giving the media transmission benefit s in Australia; Company propelled countrys first versatile system that was the Public Automatic Mobile Telephone System. Aside from this, in the year1993, Australian telecom renamed to Telstra Corporation restricted and friends began exchanging as Telstra for global market yet in residential exchanging the exchange name of organization was telecom. Organization changed its name in 1995, from telecom to Telstra for household showcase. In 1997, the Australian government offered the 49.9% portions of the organization to financial specialists. After this, in year 1999 ward government provided up to 16.6% offers and recorded on the Australian stock trade, New York stock trade and New Zealand Stock Exchange. In addition, in November 2006, Commonwealth sold further 31% of its offers in the Company as a major aspect of the T3 Share Offer and in year 2007 district moved 17% offers to additionally finance (Telstra, 2016). Besides, to take an interest in the rollout of the Australian governments national broadband system, organization signs a non-restricting money related concurrence with the NBN co. restricted. Alongside this, Telstra assume a noteworthy job in Australian help industry.Company offers the various administrations to clients like information administrations, video call administrations, broadband administrations, voice call administrations, and advanced TV administrations. In addition, organization likewise gives the office of innovation answers for government and business clients. This office incorporates the system application administrations, cloud administrations, and IP systems administrations. What's more, for giving internet providers by means of versatile tablets, home broadband, and portable broadband organization utilizes the ASDL and links (Telstra, 2016). Alongside this, Telstra has various plans and plans for furnishing the media transmission and information administrations with the four unique tablets like Acer Iconia, Apple ipad, Motorola Xoom and Acer Notbook. Telstra likewise offer the different media transmission instruments to its clients like portable and la ndline telephones that make the positive incentive for the organization. Target Market: Target advertise is a market wherein an organization needs to offers its items and administrations to. It additionally alludes to an idea that causes the advertiser to isolate the market into various sections dependent on topography, socioeconomics, and purchasing power. Alongside this, the objective market is a gathering of shoppers and business associations that like to buy a companys administrations and items. Focusing on is a procedure that chooses the market fragment through the investigating the market portion regarding size of market, availability, and allure of the market. The Telstra utilize the absolute market systems wherein organization targets everybody that can utilize telephone. The objective individuals of the Telstra are specialists, understudies, ranch laborers, school children, and individuals who can bear the cost of the telephones. The Telstra Company utilizes the focusing on procedure where organization chooses the entire help showcase and spotlights on just con tributions (Bowles, 2013). Also, more youthful age of the Australia is technically knowledgeable because of this, organization has the various bundles and administrations as per clients needs and for the more seasoned age bunch clients organization has the straightforward bundles and administrations. For affecting, individuals towards the organization, organization offers low value benefits that help the organization in drawing in the low-salary people groups. Aside from this, for giving 4G administration organization target just guys and females clients matured between 18-40 years from higher pay gathering. What's more, for focusing on youthful people groups organization dispatches a tweaked administration in year 2002 that target youngsters under the age 25. Under this administration, organization acquaints brand correspondence business concurring with clients needs and consumption for utilizing the instant message administrations (Walker, 2015). In such manner, Telstra dispatches a SMS administration and to locate the quickest clients to send the instant messages, organization sorted out limited time exercises with Sony Ericsson. Telstra utilize centered advertising procedure in focusing on its market for offering support. It offers quality types of assistance to its clients that expanded its steadfast clients base. To be subjective, serious, and driving association in its engaged market, organization contribute the huge sum the statistical surveying to know about the changing needs and wants of the client. Also, the exploration furnishes the Telstra with adequate data about the promoting patterns, innovation progression, and economic situation that helps in receiving the reward on its engaged advertising procedure. It is imaginative and innovative in its working that assists with being not quite the same as other in centered market. These all the things helps the Telstra to improve its administration quality and serious situation in the Australia (Fletcher and Crawford, 2013). It accepts that emphasis on one market than the entire market in such a case that your fulfilled the one market, it will give equival ent productivity to the enormous market. It positions itself as the main and imaginative organization in the focused on advertise that encourages it in separating itself from its rivals. It utilizes separation technique in target market to harvest the market viably. It utilized remote applications in the Australian market and turned into the pioneer in the media transmission. Since, this innovation enables the Telstra in lessening the wastage of assets, to traffic, and improves the proficiency of the activity. It offers the broadband support with the higher speed to the Australian individual that encourages it to prevailing in the business. In this manner, it very well may be said that Telstra use specialty advertising in choosing the objective market. It centers around one market as opposed to a few markets one after another. Advertising Strategy of Telstra: Telstra is utilizing item separation and market infiltration technique to pick up the upper hand and pulling in more clients. Item separation procedure helps the Telstra in recognizing its items and administrations from its rivals. This methodology helps in drawing in number of clients and making brand picture. Aside from this, showcase infiltration methodology is additionally utilized by Telstra that helps the organization in new item improvement and market extension. This system pulls in more clients towards the organization. Aside from this, for affecting the client's organization and accomplishing the showcasing destinations; organization is utilizing the promoting blend procedure (Telstra, 2016). This incorporates the diverse showcasing factors, for example, item, value, place, advancement, which is talked about beneath: Item: An item and administration is a thing that fulfills the necessities and needs of the clients, which might be in administration as well as physical structure. Telstra offers the media transmission administrations to its clients. In such manner, the organization offers the information administrations, video call administrations, broadband administrations, voice call administrations, and computerized TV administrations. These administrations help the clients in taking care of the correspondence issues. Telstra gives home broadband, versatile broadband and portable tablets benefits independently under the web access. It utilizes the links and ADSL to give the information administration to the clients (CAMERON, 2013).Data assistance can be given the post paid just as prepaid choice. Aside from this, Telstra has four tablets with different plans and plans, which are Apple iPad, Acer Notbook, Motorola Xoom, and Acer Iconia. Value: Telstra Company offers an assortment of administrations to its clients and cost of its administrations are set dependent on offered administrations. In this way, cost of Telstra benefits in Australia is higher than its rivals, which implies the organization is giving top notch administrations to its clients and friends is less ready to take an interest in value wars. Alongside this, organization offers the home broadband arrangement on the least expensive costs that is Big Pond Elite 5GB Liberty. In addition, for the drawing in the client's organization utilizes the entrance evaluating system to new item and administrations. Cost of Telstra relies upon its administrations. It differs as per the legitimacy and kind of the administration (Branson and Sugo, 2016). Cost at the landline shifts from cost of the cell phone and internet providers. Network access cost likewise changes on the post paid and prepaid choice. It furnishes freedom of 5GB information with home broadband admin istrations. Spot: Place is a significant component of the business development that incorporates a physical spot where organization can sell its items and administrations. In this angle, Telstra

Friday, August 21, 2020

The Negative Effects of Violence on TV Essay Free Essays

The whole of power on broadcasting presents is inacceptable. The stuff that you see on shows that are â€Å"supposedly for kids† simply don’t appear it. As increasingly more brutal broadcasting shows and plans are disclosed each individual dull. We will compose a custom exposition test on The Negative Effects of Violence on TV Essay or then again any comparative point just for you Request Now childs are influenced by it in a negative way. Surveies have indicated that revelations of power to childs at early ages will affect them intellectually. They will either get down to accept nil of power. or then again be over-startled on account of what he/she may hold seen on Television. The Television stations ought to non be permitted to uncover this kind of stuff and power to childs at such early ages. in view of the eventual outcomes it will hang on the teenagers and children. Above all else. there is way exorbitantly much power on broadcasting whether it is on some head cut channel. or on the other hand even a Saturday forenoon sketch plan. For some head cut Television appears. there are three to five hours vicious Acts of the Apostless per hr. For each Saturday plan for childs. there are around twenty to 25 vicious Acts of the Apostless per hr. ( Frazier ) This shows how much power there is on â€Å"children shows† . In an example for the National Television Violence Study. it was discovered that around 60 for each centum of ten-thousand broadcasting plans contained savage stuff. ( Kunkel ) That is a clump! That study â€Å"identified a standard of 6. 000 brutal connections in an individual hebdomad of programming over the 23 channels that were analyzed. counting both communicate and abroad wire networks. The greater part of the savage shows ( 53 % ) contained lethal Acts of the Apostless. what's more, one out of four of the plans with power ( 25 % ) portrayed the utilization of a firearm. ( Kunkel ) That implies that the main part of broadcasting appears. regardless of whether for kids or non. will hold power on that arrangement the greater part the time. ) Statisticss other than demonstrated that the mean arrangement for kids all the more much of the time contained more power so the mean Adult Television. Indeed, even in some â€Å"G† evaluated films. there is power. That is unnecessarily unfortunate especially in view of the impacts it causes. Presently. in the event that you put that detail alongside how much children sit in front of the Television every day. â€Å"An mean American child tickers broadcasting 21-23 hours for every hebdomad. ( Frazier ) That implies per hebdomad. 60 for every centum of those 20s or so hours will hold something fierce that will hold a negative outcome on the children. Other than. orchestrating to the American Psychiatric Association in 1996. fledglings will hold saw 10. 000 phony slayings and 200. 000 Acts of the Apostless of power by the age of 18. ( Frazier ) Besides rehashed presentation to drive from broadcasting is unfortunate for the child’s character. With childs being around power while viewing â€Å"kid’s shows† . â€Å"the kid turns out to be less touchy towards its impacts on casualties and the human suffering it causes. ( Boyse ) Research has demonstrated in the past mature ages that the power on broadcasts so has a negative result on kids. Research from the National Institute of Mental Health in 1982. power is said to take to forceful conduct by children and teenagers. Indeed, even before this. one of the most notable surveies done in 1963 by Bandura demonstrated that power has a significant outcome on the individuals that see it. â€Å"He had a gathering of children see a Television image of a hypothetical record who kicked and rebuffed a hyperbolic plastic doll. After the screening. the children were put in an uproar live with different children who had non seen the image. Those that saw the image showed altogether more forceful conduct than the individuals who didn’t. † Other surveies indicated that childs who saw fierce sketchs had a high chance to non parcel their toys with others. Another study made in 1972 with Liebert and Baron. affirmed the discoveries of Bandura. â€Å"This overview researched children’s readiness to hurt different children in the wake of sing forceful Television plans. Two gatherings of children viewed an alternate Television plan. one of which had forceful substance and one of which was generic. The individuals who saw the forceful arrangement ( The Untouchables ) were seen as all the more ready to hurt another child in the wake of sing the arrangement than the individuals who viewed the generic arrangement ( a way race ) . † ( Frazier ) These unsafe impacts from the power depicted on broadcasting are assembled into three essential classs ; â€Å"children’s obtaining of forceful perspectives and practices ; desensitization. or on the other hand an expanded cruelty towards casualties of power ; and expanded or exaggerated dread of being deceived forcibly. While these impacts reflect unpropitious outcomes. it is the first †an expanded inclining for rough conduct †that is at the core of open wellbeing worry about broadcast power. † ( Kunkel ) Back to desensitization. â€Å"According to the article â€Å"Media Violence. † the American media shows saints legitimately using power as an organization to choose battle. The American Academy of Pediatrics site recommends that attracted out presentation to this sort of power augmentations belief of power as an office of maintain trip sources of income. The 1995 to 1997 AAP National Television Study indicated that 61 for each centum of programming â€Å"portrayed relational power. a lot of it in an engaging or glamorized mode. † Children are attracted to such planning when the rough demonstration appears to be phantasmagoric and the insufficiency of impact appealing. † ( Adams ) He other than expressed that power is both disinfected. â€Å"By cleaned. quick harming and desolation by survivors of power is remembered for not exactly 50% of all scenes of power. In excess of a third of fierce cooperations portray ridiculously gentle injury to casualties. horribly limiting the disagreeableness of hurt that would occur from such activities in the existent universe. In sum. most word pictures sterilize power by doing it seem to be considerably less excruciating and less hurtful than it genuinely is. By glamorized. I imply that power is performed by appealing capacity hypothetical records who are often supported for moving forcefully and who endure no regret. horrible judgment. or on the other hand discipline for their savage conduct. In excess of a third of all power is submitted by appealing characters. also, more than 66% of the power they submit happens with no signs of punishment. † ( Kunkel ) One other employment children may go up against is overexposure to compel. â€Å"Overexposure to compel. also, particularly reasonably portrayed power. may take children to accept that the universe is mostly a risky and shaky topographic point. They may get down to exaggerate the likelihood that they will be casualties of power. go forthing them with undue tension and accentuation. ( Frazier ) Other than doing enthusiastic occupations. it can do some damage to a child’s turning character or moral intentions. â€Å"Sigmund Freud accepted that children need to build up a feeling of ethical quality by the age of five or they could see inconveniences further down the road. In the event that a child doesn’t figure out how to comprehend the contrast among right and inaccurate. she will non build up a leg itimate anxiety of blame or contrition. what's more, will in this manner be bound to indict thoughtlessly in practices that are considered socially and ethically erroneous. The article â€Å"Children. Teenagers. also, Television† states that exploration has indicated broadcasting power to hold a negative outcome on the scholarly open introduction. sex. natural structure develops. furthermore, mental self portraits of youthful review crowds. which can take to brutal or forceful conduct and substance abuse. † ( Adams ) Nowadays. with these â€Å"reality shows† on MTV. The E Network. and so on it’s simple and ordinary to see power. Childs that watch â€Å"The Kardashians† and â€Å"Teen Mom† see their preferred well known people act in a way that is amateurish on broadcasting. be that as it may, they don’t know better. They need to be just similar to them. Network shows like those truly use power and â€Å"incidents† to help raise their assessment and ubiquity. ( Caning ) With these psychological impacts caused from too much screening of power. this demonstrates how broadcasting booking should be progressively delicate for the substance made for kids. In add-on. guardians ought to other than look for and loan in filtrating what their children watch on broadcasting. There are distinctive stairss you can take. that would perchance be able to let your child to non be presented to such power on Television appears. You can look for and watch broadcasting with your childs. That way. you’ll recognize what they watch. also, you can order the substance. ( Boyse ) Other choices incorporate reviewing the substance of the arrangement or perhaps just allotting them a shorter entirety of clasp to sit in front of the Television. In any event that way. there is a littler open door for power in the littler clasp space. ( Frazier ) One other great way to keep up your child’s mind off of broadcasting is look for and obtain them included like different exercises. Sports. perusing. employments. and so forth ; anything like that. Another great idea is look for and address your childs about power in media. On the off chance that you can explain to them why power is mistaken. so you can be progressively lightened and swear them. ( Boyse ) Good imparting is cardinal. On the off chance that you attempt to change over to your child that you are only trying to be concerned and mindful. they’ll comprehend the point you are looking to do. In choice. I accept that children merit better than what is directly going on. As their capacity hypothetical records. we have to help do their â€Å"future† safe. We have to forbid all power from children’s booking. TV stations shouldn’t be permitted to uncover wrong stuff and power to

Tuesday, May 26, 2020

Free Sample of Essay For Scholarship

Free Sample of Essay For ScholarshipIf you have thought about getting a few samples of essay for a scholarship from the Internet, or from someone that can give you a sample of essay for scholarship for free, then you should know that there are some things you need to know. You should be aware of what kind of scholarship you want. You should also know whether or not it will be one that is offered by your university or by a corporation or by a religious organization.You should also know that it will depend on the company you use for your essay for scholarship. You will find companies that offer money for your essays, or companies that will charge a small fee for each essay you submit. Some companies will not charge you for your essay, but rather try to persuade you to pay for their services, and then you will have to pay for their service.It is very important that you do not use companies that charge small fees for samples of essay for scholarship. These companies may send you to a sit e that is supposed to be free, but in reality, it is not. These companies will even send you a different set of essays than the original set that you submitted for your scholarship.So, do not use a company for samples of essay for scholarship that charges a fee. You should always check to make sure that it is free before you try it. A few of these companies offer a chance to test the online service before you can submit your essay. This is where you will learn if the online service is reliable or not.Another thing you need to consider is that when you get your samples of essay for a scholarship, it will be an opportunity for you to show what you have to offer. You should always go into it with an open mind and a real desire to succeed. If you try to write a bunch of essays and have them rejected all at once, it will be hard for you to make a name for yourself.The best thing that you can do is to use your samples of essay for scholarship as a way to get your name out there and to get some attention. If you are really desperate for attention, then do not let it get to you that you need a few samples of essay for scholarship. What you need to do is to get some of these samples of essay for scholarship and use them for your advantage.These samples of essay for scholarship will give you a great chance to get more attention and to get a better job. When you use these samples of essay for scholarship to get more attention, you will have more success. Also, this can help you get that internship that you have been dying to get.

Saturday, May 16, 2020

How Blue Lava Works

Indonesias Kawah Ijen volcano has gained internet fame for Paris-based photographer  Olivier Grunewalds photographs of its stunning electric blue lava. However, the blue glow doesnt actually come from lava and the phenomenon isnt restricted to that volcano. Heres a look at the chemical composition of the blue stuff and where you can go to see it. What Is Blue Lava? The lava that flows from the Kawah Ijen volcano on the island of Java is the usual glowing red color of molten rock flowing from any volcano. The flowing electric blue color arises from the combustion of sulfur-rich gases. Hot, pressurized gases push through cracks in the volcano wall, burning as they come into contact with air. As they burn, sulfur condenses into a liquid, which flows downward. Its still burning, so it looks like blue lava. Because the gases are pressurized, the blue flames shoot up to 5 meters in the air. Because sulfur has a relatively low melting point of  Ã‚  239 °F (115 °C), it can flow for some distance before solidifying into the familiar yellow form of the element. Although the phenomenon occurs all the time, the blue flames are most visible at night. If you view the volcano during the day, it wouldnt appear unusual. Unusual Colors of Sulfur Sulfur is an interesting non-metal that displays different colors, depending on its state of matter. Sulfur burns with a blue flame. The solid is yellow. Liquid sulfur is blood red (resembling lava). Because of its low melting point and availability, you can burn sulfur in a flame and see this for yourself. When it cools, elemental sulfur forms a polymer or plastic or monoclinic crystals (depending on conditions), that spontaneously change into rhombic crystals. Make Plastic SulfurMake Sulfur Crystals Where To View Blue Lava The Kawah Ijen volcano releases unusually high levels of sulfuric gases, so its probably the best place to view the phenomenon. It is a 2-hour hike to the rim of the volcano, followed by a 45-minute hike down to the caldera. If you travel to Indonesia to see it, you should bring a gas mask to protect yourself from the fumes, which may be harmful to your health. Workers who collect and sell the sulfur typically do not wear protection, so you can leave your mask for them when you leave. Although the Kawah volcano is most readily accessible, other volcanoes in the Ijen may also produce the effect. Although it is less spectacular at other volcanoes in the world, if you view the base of any eruption at night, you may see the blue fire. Another volcanic location known for the blue fire is Yellowstone National Park. Forest fires have been known to melt and burn sulfur, causing it to flow as burning blue rivers in the park. Traces of these flows appear as black lines. Molten sulfur may be found around many volcanic fumaroles. If the temperature is high enough, the sulfur will burn. Although most fumaroles arent open to the public during the night (for fairly obvious safety reasons), if you live in a volcanic region, it might be worth watching and waiting for sunset to see if there is blue fire or blue lava. Fun Project To Try If you dont have sulfur but want to make a glowing blue eruption, grab some tonic water, Mentos candies, and a black light and make a glowing Mentos volcano.

Wednesday, May 6, 2020

The Effects of Symbols In Tobias Wolffs Say Yes Essay

The Effects of Symbols In Tobias Wolffs Say Yes The author of the short story Say Yes, Tobias Wolff, uses a number of symbols to express his different views on racism throughout the story. Wolff uses this literary device to express a message to his readers. Symbols, something representing something else by association resemblance or convention, are used efficiently in this short story. Wolff uses colors to symbolize a hatred for an alternative race in this short story. The husband more than once makes reference to dark colors which shows the reader that the husband sees this world in black and white. The husband sees the world as good vs. evil, white vs. black society. Furthermore, the reference to color in the†¦show more content†¦Wolff again indirectly shows the husbands feelings towards African-Americans through symbolism. This symbol contributes to Wolff?s message or theme showing the husband?s strong dislike for African Americans. After the author uses this symbolization of a ?flat gray?, the wife ?plunged her hands under the surface? (Wolff 518) and cut her finger on the silverware. She then cries out as her thumb bleeds from the cut. The husband immediately rushes to her need. He acted in concern for her and hoped she appreciated how quick he rushed to her aid. The cut she had from the silverware symbolizes the hurt on the inside. The pain from inside was symbolizing the pain on the inside. Her husband?s inconsiderate feelings for alternate races made her feel like she didn?t know him as well as she thought she did. Wolff used symbolization very effectively by comparing the pain on the outside to the pain on the inside. Wolff?s decision to put in this description of dirty water was not because Wolff hates washing dishes. Wolff put that in there to show a deeper meaning to it. Wolff is trying to show the husband?s views on the topic being discussed indirectly. Wolff shows a deeper meaning when the husband is continuing to wash the dishes. He is spraying the silverware and ?darkened to pale blue? (Wolff 518). This shows again the husband?s reference to colors. This happened right after the wife asked if he would marry her if she were black. Wolff added this symbolismShow MoreRelatedSay Yes Essay648 Words   |  3 PagesThe Effects of Symbols On Say Yes The author of the short story Say Yes, Tobias Wolff, uses a number of symbols to express his different views on racism throughout the story. Wolff uses this literary device to express a message to his readers. Symbols, something representing something else by association resemblance or convention, are used efficiently in this short story. Wolff uses colors to symbolize a hatred for an alternative race in this short story. The husband more than once

Tuesday, May 5, 2020

Marketing Consumer Behavior

Question: Analyse the internal and external factors influencing the consumer decision making process for a major purchase. Answer: Consumer Buying Behavior Consumer behavior is the phase that the consumers undergo while making a major purchase and this behavior is constantly influenced by external and internal factors of usage and decision. Based on the real-life situations, the buying behavior of the consumers are in a constant stage of evolving. The process of decision-making undergoes five critical stages while buying services and goods and therefore, the marketer has to identify and understand these five steps for proper proceedings towards the product and close the selling process (Solomon, 2014). Presently, one of the most testing situations of the marketers is the identification of the demand of the consumers and explanation for the requirement of a specific service or product. This information related to purchasing decision is crucial for the marketers to understand as it helps them to identify what have the most significance for the consumers and the factors that influence their decision making regarding a purchase. This helps them to create their marketing strategies and programs according to the need of the consumers. The five steps of decision making by the consumer are information search, information, alternative evaluation, post-purchase behavior and purchase. These steps serve as guidelines for the marketers that help them to understand the requirements and communication of the consumers and act accordingly (Juster, 2015). It is not necessary for the consumers to move exactly as stated but it depends on the financial status, the buying stage and the type of the product. The present report is about the decision making of a consumer while purchasing a car. Since it is a major purchase, therefore the internal and external factors influencing the consumer decision makingwill be critically analyzed. This report is based on the decision making of Mr. David Jones, who happens to be one of my acquaintance while he was about to purchase a new Toyota Corolla. Internal Influences The internal influence that affects the decision making of the consumers regarding a major purchase depends on the way of thinking and lifestyle of the consumers. These are also known as the psychological influences and depicts several stages of decision making like identification of feelings, examination and collection of information, development of beliefs and ideas and taking the specific action (Solomon, Russell-Bennett Previte, 2013). Mr. Jones is a banker in Melbourne with a descent income and he decides to buy a new car as per his needs. He has a family of two children and they have their preferences while making the decision for purchasing the new car. Several recommendations came up and was finalized with Toyota Corolla. This finalization was influenced by several internal factors that have been summarized below. Perception: It is a psychological variable that is involved in the decision making of purchasing a car and influences the behavior of the consumer. The individuals perceive their requirements through the media messages and disregard the remaining (Butkevi ien, Stravinskien Rtelionien, 2015). Perception is of two types that include the low-level one called as perceptual vigilance and the high level one called as perceptual defense and these are shaped by expectations, memory and learning. Mr. Jones before buying the car went through an extensive research process and estimated several other cars in the same category according to his need and budget. However, he went on information from different media sources and finally shortlisted a few names according to his perception that stressed mostly on the safety and security of his family. Learning: Learning is a change in the organization or content of behavior or long-term memory. It enables the consumers to acquire the consumption and purchase knowledge and the experience regarding the behavior that is related to the future. Learning can be acquired by thorough information search from different sources or may be through incidental learning. Learning provides useful direction towards the motive of purchasing (Lysonski Durvasula, 2013). After a thorough investigation from the various resources, Mr. Jones learned much about the cars that are the best fit for his requirements. He needed a car that could help him to go to his office daily and go for family outings as well. Therefore, a sedan would best fit his requirements and so he learned much about the sedans from everywhere. Motivation: It is related to the desire of having the expected outcome and is closely associated with the involvement of the consumer in decision-making. Consumers that are highly motivated will get actively involved physically and mentally in the process of purchasing (Betsch Haberstroh, 2014). Marketers can make the consumers motivated by providing them with opportunities for learning more about their product and allowing them to experience the services of the product. Mr. Jones collected information about the sedans from several websites and other media articles actively and went through the video previews. While conducting the research, he analyzed several situations related to his financial position, overall value, time constraints and perceived risk. To all his questions, an answer pointed towards the sedans. Moreover, Toyota was offering a free test drive offer for their sedans at his city that motivated him to go for a sedan by Toyota. Personality: It signifies the psychological characteristics that state the reaction of a person to his surrounding environment. Personality reflects the choice of the consumers for a particular brand or product and helps the marketer to promote the products. Personality is categorized based on the traits, likes and dislikes of the individuals (Lee et al., 2014). Since Mr. Jones is a banker and aged about 30 years, therefore he would prefer a brand that would suit his personality and occupation. Toyota is a reputed brand in Australia and has been awarded for on-road performance of its vehicles, especially its sedans (Vohs et al., 2014). Mr. Jones will be using his car for multiple uses like daily transport to his workplace and family outings, therefore, sedans by Toyota will suit his personality the most according to the looks, features, comfort and safety. Attitude: Attitude is a conglomerate of the feelings, behavioral intentions and belief of the consumers towards an object with reference to the context of marketing. These components are interdependent and collectively represent the attitude of the consumer towards the object. It is a psychological variable that affects the decision-making process of the consumers regarding a purchase and evolves out of a negative or positive evaluation (Aguirre-Rodriguez, Bosnjak Sirgy, 2012). Mr. Jones, after the research work and test drive, was certain of his choice for the sedan by Toyota as it met all his expectations and requirements successfully. He developed a positive attitude towards the brand and decided to go for Toyota Corolla as it was the best in its class in terms of price and features. He decided to discuss the car with his family as his family is actively involved in the decision-making and he would like to take their viewpoints and suggestions into consideration. External Influences Apart from the internal influences, external influences also affect the behavior of the consumers. These influences are not individualistic but are external to the consumer. Consumers are human beings that live in a society where they are attached socially in groups. The members of the groups tend to share their common interests and influence each other, as they share their values and rules. Most of the influence is from the primary groups like the family members and the secondary groups include the organizations and clubs, which have lesser influence when compared to the primary group (Oliver, 2014). Both these groups exert the social power that influences the behavior of a consumer while decision making. Two of these external influences have been discussed below. Culture: Cultural factors include the set of ideologies and values of a particular group of individuals. Cultural factors influence the decision making of an individual as every individual has different principles, beliefs and habits that he develops from his backgrounds and family status (Srensen, 2015). Mr. Jones is a native Australian and therefore, he likes to go for a car that is descent in looks as well as superior in performance. According to his position in office, he would like to go for a brand and model that suits well his personality and position. His car would reflect his social success and therefore, he would pay more attention towards the brand value, rather than a cheaper alternative. Group Influence: Since human beings are socially inherent, various individuals in a group influence each other. The framework for the analysis of group influence on the consumers is called reference groups where the consumer uses a group as a standard reference against which, he makes the comparisons (Beach, 2014). Various degrees of influences come from the reference groups. The primary groups have a huge influence, as they are the members of a fraternity while secondary groups have lesser influence like the weekend groups. Mr. Jones discussed his idea of buying Toyota Corolla with his friends and club associates, as it was an important decision that involves a major financial investment. Therefore, he was looking for feedbacks and loopholes that he might have missed in his research. The ideas and suggestions would help him to strengthen or reconsider his decision. Final decision making After all the decision making process, Mr. Jones purchased a new Toyota Corolla as it was a safe and affordable vehicle for his daily use. His family influenced him for safety and his age and financial status influenced him for not being too much extravagant on luxury cars. The decision making process was a lengthy one as purchasing a car turned out to be a complex process. The car satisfies his requirements and fits perfectly in his budget. Consequently, the marketers should also understand the buying decision of the consumers and their safety needs. References Aguirre-Rodriguez, A., Bosnjak, M., Sirgy, M. J. (2012). Moderators of the self-congruity effect on consumer decision-making: A meta-analysis.Journal of Business Research,65(8), 1179-1188. Beach, L. R. (2014).Decision making in the workplace: A unified perspective. Psychology Press. Betsch, T., Haberstroh, S. (Eds.). (2014).The routines of decision making. Psychology Press. Butkevi ien, V., Stravinskien, J., Rtelionien, A. (2015). Impact of consumer package communication on consumer decision making process.Engineering Economics,56(1). Juster, F. T. (2015).Anticipations and purchases: An analysis of consumer behavior. Princeton University Press. Lee, S. W., Schwarz, N., Landau, I. M., Robinson, M. D., Meier, B. P. (2014). Metaphor in judgment and decision making.Metaphorical thought in social life. Washington, DC: American Psychological Association. Lysonski, S., Durvasula, S. (2013). Consumer decision making styles in retailing: evolution of mindsets and psychological impacts.Journal of Consumer Marketing,30(1), 75-87. Oliver, R. L. (2014).Satisfaction: A behavioral perspective on the consumer. Routledge. Solomon, M. R. (2014).Consumer behavior: buying, having, and being. Engelwood Cliffs, NJ: Prentice Hall. Solomon, M. R., Russell-Bennett, R., Previte, J. (2013).Consumer behaviour: Buying, having, being. Pearson Australia. Srensen, J. (2015). Understanding how culture influences emotions in consumer decision-making. InFinding Solutions for the Chanllenges of Internationalization. Aalborg Universitetsforlag. Vohs, K. D., Baumeister, R. F., Schmeichel, B. J., Twenge, J. M., Nelson, N. M., Tice, D. M. (2014). Making choices impairs subsequent self-control: a limited-resource account of decision making, self-regulation, and active initiative.

Wednesday, April 15, 2020

Cyber Defense Program in Military Schools Essay Example

Cyber Defense Program in Military Schools Essay Cyberspace has developed into a difficult abstraction presenting innumerable fresh potential and services as well as possibilities for enemies to cause destruction. Lately, the United States Armed Forces has affixed â€Å"Cyberspace† to its mission statement because it distinguished the substantial effect of this new field of expertise. Education act as a fundamental role in producing cyber soldiers to maintain the mission of the United States Military. (Dodge Ragsdale, 2005) The NSA funded the cyber defense exercises presenting priceless real-world knowledge about the new field of cyberspace. The Cyber Defense curriculum was started in the Military schools in 1999. Another reason for the implementation of the Cyber Defense Curriculum for the military schools is the increasingly plausible fact of the growing number of hackers that threatens national defense. The Y2K predicament was a significant problem that was faced in the start of the millennium. (Dodge Ragsdale, 2005) Students started to receive training on how to create and defend cyber weaponry. The course was called Information Assurance. The objective of the course was to enhance consciousness of security issues with information systems. (Felder Brent, 2003) In the Information Assurance course, learn many offensive and defensive techniques in the cyber domain. Cadets can write malevolent applets and viruses but at the same time, form defense mechanisms from it. The reason of this course is not to craft them to become hackers but give them the knowledge of how potential enemies might exercise cyber warfare and target their vulnerability especially in the commercially prevailing information systems. (Gunsch, Raines, Lacey, 2003) We will write a custom essay sample on Cyber Defense Program in Military Schools specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Cyber Defense Program in Military Schools specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Cyber Defense Program in Military Schools specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The first Cyber Defense Exercise in the United States was executed in 2001 to test the skills of different military schools in Cyber Defense. The partakers chosen were the West Point Academy, the US Air Force Academy and the Naval Postgraduate School. The schools were divided into teams were engaged into a cyber warfare. The team that scored the most number of points in the offensive and defensive ordeal is declared the winner. In the successive years, more military school joined the competition. (Cyber Defense Exercise, 2009) Evaluations of the Cyber Defense Program There were several evaluations that were made for the Cyber Defense Course and its relative fields. The studies focused on both technical and general aspect of the program. Although it was effective in developing the skills of the cadets, some other issues were still in question. The following were some of the research questions of the evaluations: Is the Cyber Defense Program cost efficient? In the study of Schepens et. Al. in 2003, it focused on the cost efficiency and impact of the Cyber Defense Course. The rough estimate of conducting the course would be $20,000 for all the hardware and software components. (Schepens, Schafer, Surdu, Ragsdale, 2002) Other costs were not yet included like technical monitoring and repair. The question rising would be if the hefty cost is worth the increase in education effectiveness. (Tomes, 2000) There is an eminent intuitive interest to the concept that innovative experience provided by the Information Assurance course. When cadets essentially execute an attack, they must also depict how they would guard against several attacks. The twofold function of the course instigates self learning since technology constantly upgrade. The course trains a student’s critical, analytic and amalgamating skills. (Schepens, et al., 2002) Some remarks of the students under the first Information Assurance course said that it was a fresh breath of air and that it was invigorating to have hands down experience and learning about cyber defense. Another comment of the course is that it teaches them the indispensable lesson that security is an immense field to defend and it continuously expands. (Tomes, 2000) In terms of the cost efficiency, the starting point of the Information Assurance program was expensive and was shouldered by the National Security Agency. (Augustine Dodge, 2006) In time, more military schools implemented the Information Assurance course. With additional military school consumers, the expenditure of the course basically lessened. In another evaluation for cost efficiency of the Cyber Defense Program, it was noted that military schools can use open source software. Open source is computer software for which the source code and further rights are presented beneath a software license that convenes the open source characterization. (Gourley, 2009) This characterization allows consumers to utilize, alter and develop the software and restructure it in modified or unmodified figure. An example of Open Source software is Linux and an example of Closed Source software is Microsoft. Open Source software is continuously accessible for assessment, and in the majority situations it is cultivated in an open, public, mutual approach. Open source does not just signify approach to the source code, but also give the user the power to develop something greater. (Gourley, 2009) Another feature of open source is its inexpensive price. Since most of the open source software is not in the mainstream of the market, their prices are lower than the trendy closed source software. Therefore, the use of open source software can lower the cost of the Information Assurance course. (Gourley, 2009) One downfall for the use of open source software is its advance interface for beginners. It is not so much user friendly than its rival closed software. (Gourley, 2009) In a military school that is starting Information Assurance, its students might not be that specialized with open source software. Nevertheless, the application of open source software in Information Assurance can be cost minimization scheme. Is the Cyber Defense Program time effective? In another study, the time effectiveness of the program was evaluated. The Cyber Defense Program demonstrated numeral of effective dealings utilized to preclude, or perceive, compromises. However, it is substantial that the application and execution of the course require more time to operate than regular military courses. (Mullins, Lacey, Mills, 2007) Also, scrupulously understanding attacks and defends were essential for safe security operations, but requiring a tedious learning process. Furthermore, it was imperative to make sure the systems applied have been correctly patched and renewed. It should be mentioned that in real-world procedures, patch management is a multifaceted matter that needs receptiveness and attention. This makes additional time consumption. Another time spending effect of the Cyber Defense Program is the time and resource intensity for the workload of the instructor. (Mullins, et al., 2007) However, even with time consuming activities of the course, it is still being managed. Military schools somehow compress the activities to course to conserve time consumption. The faculty of the military schools that has Information Assurance courses remark that the additional load given are worth the excellent performance of the students. Another remarkable activity of the course that improves time utilization is the further engagement in Cyber Defense Exercise between different schools. (Adams, Lacey, Gavas, Leblanc, 2009) This was mentioned earlier in the paper in which military schools take part in the annual Information Warfare. The warfare investigates the effectiveness and time efficiency of the Information Assurance course in the schools. Cadets will build up their own team and represent their school. The Information Warfare improves time effectiveness of the course because it compels the cadets to attack and defend as fast as possible in a certain given time. The improvemen t in time effectiveness in the course is a huge factor that helps the military schools to win the competition. In a given school year, cadets with potential skills in Information Assurance are time pressured to create attacks and concoct defensive schemes in a nick of time. (Adams, et al., 2009) The inclusiveness of time effectiveness in course permeates the time saving scheme in the program. In a recent Information Warfare between several military schools, the winner of the competition was the school that attacked and defended in the most number of times in a given time limit.   (Mullins, et al., 2007) Therefore, it can be deduced that time effectiveness is correlated with successful Information Assurance courses. Table 1. 2006 Cyber Defense Exercise Results School Score AFIT 50,550 USAFA 48,425 USMA 46,600 USNA 45,650 USCGA 44,100 USMMA 43,725 (Mullins, et al., 2007) Results and Conclusion The following evaluations were clear in addressing two vital concerns about the Cyber Defense Program which is cost efficiency and time effectiveness. In the cost effectiveness of the program, the evaluations clearly pointed out that the Cyber Defense Program is costly. A plausible solution for this predicament would be the increase of Information Assurance course military school users. The greater the consumers of the course would result into a reduced expenditure. Therefore, the Information Assurance course should be promoted to the different military schools around the United States. Also, it can be opened that the Information Assurance course should not be held back to military schools exclusively. Other school should also access the course for further learning improvement. Another concern of the evaluations would be the use of cheaper software. The open source software is relatively economical than the other commercially closed software. The problem concerned with open source software for the Information Assurance course would be its advanced interface in which new users of the program might not easily familiarize with the system compared to the other software. Therefore, it should be recommended that open source software may be used by military schools that have an established experience in Information Assurance to lessen expenditure and greater progress into advance technical systems. Time effectiveness was also addressed as an issue on the Information Assurance course. The technicality and complexity of the program spends much time. In a certain evaluation, it was seen that the military school faculty can still cope-up with the additional time effort as long as they can see the improvement in the cadets. Another activity that boosts the time effectiveness of the course is the construction of Cyber Defense Exercise between military schools. It inculcates time effectiveness in the students in attacking and defending during a certain period of time. However, it was not yet certain whether an increase in the budget of the Information Assurance course would increase the effectiveness of the program. Therefore the creation of competitive and spirited competition should be increased because it can improve the time effectiveness of the course. In all the gathered evaluations for Cyber Defense Program, it was unanimous that the students positively liked the program and has increased their analytic and cognitive skills. In a generalization, even with some unresolved matters, the effectiveness of the program is unwavering. The benefits produced by the program outweigh its costs. Therefore, the Cyber Defense Program should continue and grow. REFERENCES Adams, W. J., Lacey, T., Gavas, E., Leblanc, S. P. (2009). Collective Views of the NSA/CSS Cyber Defense Exercise Curricula and Learning Objectives, 4(2), 10. Augustine, T., Dodge, R. C. (2006). Cyber Defense Exercise: Meeting Learning Objectives thru Competition. Paper presented at the Proceedings of the 10th Colloquium for Information Systems and Security Education, Adelphi, Maryland. Cyber Defense Exercise (2009). Realistic Network Defense in a Hostile World: NSA CDX Fact Sheet, 23(3), 21. Dodge, R. C., Ragsdale, D. J. (2005). Technology Education at the US Military Academy. IEEE Security and Privacy, 3(2). Felder, R. M., Brent, R. (2003). Learning by Doing. Chemical Engineering Education, 36(4). Gourley, B. (2009). Open Source Software and Cyber Defense Paper presented at the White House Review of Communications and Information Infrastructure Gunsch, G. H., Raines, R. A., Lacey, T. H. (2003). Integrating CDX into the Graduate Program. IEEEInternational Conference on Systems, Man and Cybernetics, 5(2). Mullins, B. E., Lacey, T. H., Mills, R. F. (2007). The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. Paper presented at the 40th Hawaii International Conference on System Sciences, Honalulu, Hawaii. Schepens, W., Schafer, J., Surdu, J., Ragsdale, D. (2002). The Evaluation of the Effectiveness of Information Assurance Education. Paper presented at the The Cyber Defense Exercise. Tomes, R. (2000). Boon or Threat? The Information Revolution. Naval War College Review, 53(5), 21-38.