Wednesday, December 25, 2019

Essay on Catcher In The Rye - A Sequel - 465 Words

Catcher In The Rye - A Sequel Loomis Chaffee Chapter 1 nbsp;nbsp;nbsp;nbsp;nbsp;Another day another school...I thought about this new school they placed me in. They said I will like it. Well Ill be the one to decide that. Next thing I know Im on a 6:30 train to Windsor, CT. nbsp;nbsp;nbsp;nbsp;nbsp;It was a Thursday and I received a call from Mr.Spencer, well it wasnt really for me but for my parents. I immediately new who it was, you can just hear its a school teacher. One can just hear that over the phone. After the phone hangs up I hear a yell, â€Å"Holden, front and center!† Then we go throughout that whole, we had a discussion with, and all that crap. Then I received the news, after speaking to Mr.Spencer we have decided†¦show more content†¦Well Mr.Spencer teaches at a prep school and. I didnt let them finish the sentence. â€Å"NO!† I exclaimed. I refuse to go to one of those prep schools, all of the little kids are phonies. But then as abruptly as that little conversation started, it ended. They said, â€Å"You are going come Saturday and you cant do a thing about it.† nbsp;nbsp;nbsp;nbsp;nbsp;So then they say, â€Å"We will get you a train ticket for the earliest train out of Central Station.† I stormed out, knowing that I was defenseless against them I went straight into my room and packed, thinking of ways to get back at them. I thought then I realized that I shouldnt even bother wasting my time, I knew that it would be a small time before I would be kicked out anyhow. nbsp;nbsp;nbsp;nbsp;nbsp;Bags outside the door at 5:00 A.M. So your father can put them on the car. A couple days went by, as boring as any other days. I mostly sat around on my bed thinking about those phony people I will be stuck with. Hopefully I can be stuck with a roommate who resembles good ol Jane Gallagher. But not those dumb preps like at Pencey and Elkton Hills. I cant stand those people, they try to be people which they are clearly not, that just makes me so...MAD. Huuuuaaaaaaa I just gotta sit down, all of this new school, Connecticut business is getting to me. I mean where is Connecticut, I never was really good at geography, now it catches up with you. Now is one of those times which I really could use someoneShow MoreRelatedD. Salinger s The Catcher s The Rye 1872 Words   |  8 Pages D. Salinger s novel is often called, . . . the forbidden fruit in the garden of literature (The Catcher 116). J. D. Salinger is a writer from the 1950s, a time where literature has questioned the ideas of traditions placed in a community. Through his life and through his characters Holden Caulfield and Phoebe Caulfield in the 1950s realistic fictional bildungsroman The Catcher in the Rye, the postmodernist author J. D. Salinger focuses on the theme of self isolation in society in order toRead MoreSimilarities Between Salinger And Harper Lee s The Rye 1987 Words   |  8 Pagesliterary world, is for writers to â€Å"write what they know†. In many c ases this rings to be true, perhaps the writers will set their story in a place they once lived, base a character on someone they once knew. It’s quite evident that in the novels Catcher in the Rye and To Kill a Mockingbird there are striking similarities between these novels and their respective authors’ own lives. It could be said, that these authors simply used their own experiences as inspiration to their novels. However, when takenRead MoreThe Catcher in the Rye by J. D. Salinger2004 Words   |  9 PagesThe Catcher in the Rye is a popular novel written by J.D. Salinger. Published in 1951, the book was originally written for adults, but it is now remembered and adored by people from all parts of the world and people from all walks of life – especially by teenagers – a likely effect that was only inevitable considering the center stage of the narrator the great crumby flake Holden Caulfield, to use his style of speaking, who accurately portrayed te enage angst and loneliness in a style that many youngstersRead MoreEssay on The Need for Brutality in A Clockwork Orange 4668 Words   |  19 Pagespublished A Clockwork Orange, it contained a twenty-first chapter which showed Alex jaded with ultraviolence and ready to settle down (Burgess, A Clockwork Orange 207-219). In the tradition of rites of passage novels such as Huck Finn and Catcher in the Rye, he emerges from various trials with the cold, cruel adult world with a new-found threshold for love (Connelly 42). Alex develops a penchant for maudlin pop songs, a sharp contrast to the dynamic symphonies he once adored (Burgess, Orange 212)Read MoreChildrens Literature13219 Words   |  53 Pagesa specific author, tended to dominate childrens literature until the end of the Victorian period. The most popular literary fairy tale of the Victorian period was Lewis Carrolls Alices Adventures in Wonderland (1865), which was followed by its sequel Through the Looking Glass (1872); both were illustrated by John Tenniel. Carrolls imaginative novels are often credited with changing the emphasis of childrens literature from instruction to delight. When compared with the majority of the childrens

Tuesday, December 17, 2019

Banned Books - 1233 Words

Banned Books 3 Where Have All the Books Gone? Books are dangerous. They make you thinkÂ…feelÂ…wonderÂ…. They make you ask questions (Weiss p.2). At the present time, at least seventy-five books are being banned. This is hurting our culture more than it is helping. This has to be stopped; books cannot be taken off of the shelves at the rate that they are today. The books that are being taken off of the shelves are, for the most part, considered classics. The act of book banning puts limitations on what authors can say, and what readers can read (Dorshemer p.1). The banning of books in America is a violation of our first amendment rights. Amendment 1 of the United States Constitution states as follows: Congress shall make no law†¦show more content†¦The firemen in this book are responsible for burning huge quantities of books. This act brainwashes the population because people lose the power to think for themselves. This book is banned in many places for portraying such a world. In reality, if something isnt done quickly, this place could be America. I could not imagine having limitations put on what I want to read just because of what it says (Weiss p.3) Since The Adventures of Huckleberry Finn was first published in January 1885, it has always been in trouble. It is considered the one book from which all modern American literature came, but was condemned in Mark Twains time as coarse and vulgar, so it was banned from the shelves. Still controversial today, many school districts across the country have banned it from their curriculum for being racist. Unsurprisingly, this is nearly always at the insistence of those who have never even read the book. It is also no surprise that so many students have read it just to see what those guardians of their morals have found so offensive (Edwards p.2). One librarian at a conference on childrens literature in Virginia this summer speculated asShow MoreRelatedBanned Books On The American School System1824 Words   |  8 PagesBanned Books in the American School System Literary works are the foundation for education and are crucial for multiple reasons, some of which include that literature obtains a large variety of information that is at times not accessible to students by computers and teachers alone. Another advantage is adults and children alike improve their understanding and knowledge of certain topics whilst improving their intelligence of the language itself. Banning literary pieces of work is unjustifiable andRead More Banned Books Essay1279 Words   |  6 PagesBanned Books The problems with banned books has been a controversial issue between parents as well as adults. The concerns that parents have are with the fact that these certain books are to be banned to keep their kids from being exposed to some of the ways of the world. Some of the concerns that these parents have are with usage of some derrogatory words or lanuguage not preferrred by some parents. The things that parents fail to realize is that by law, a librarian has the responsibilityRead MoreBanning Books Should Not Be Banned Books1558 Words   |  7 Pages On the topic of banning books, many parents worry about the wellbeing of their kin when placed and introduced into dangerous topics. Often fearing their child is unable to handle the true reality of life s many undesirable events. Parents will go as far as banning a book about a little yellow bear and his friends living in the woods. As many of us go through hardships it s just a â€Å"roadblock we have to drive or swerv e on the road,† to development. Through the strife of concerned parents, manyRead MoreShould Banning Books Be Banned?1745 Words   |  7 Pages In American School System books are often banned with the best intentions—to protect others, frequently children from difficult ideas and information. When a book is banned it is removed from a school library making the book non-accessible to students. In many cases books are banned because they contain controversial ideas that adults want to censor from children’s lives. In John Green’s Looking For Alaska controversial topics such as sex, drugs, alcohol, vulgar language, and rule breaking areRead MoreEssay on Censorship and Banned Books1191 Words   |  5 PagesCensorship and Banned Books Books are dangerous. They make you thinkÂ…feelÂ…wonderÂ…. They make you ask questions (Weiss p.2). At the present time, at least seventy-five books are being banned. This is hurting our culture more than it is helping. This has to be stopped; books cannot be taken off of the shelves at the rate that they are today. The books that are being taken off of the shelves are, for the most part, considered classics. The act of book banning puts limitations on what authorsRead MoreWhat are Banned Books? Fahrenheit 451 Essay912 Words   |  4 PagesMany books have been questioned and challenged. Even as far as to banning them. But what exactly is a banned book and why are they banned? A banned book is a book that has been censored by an authority, a government body, a library, or a even school system. A book that has been banned is actually removed from a library or school system. The actual contextual reasons as to banning them is use of explicit violence, gore, sexuality, explicit language, religion, or dark times in history. On the non-contextualRead MoreIts Time to STOP Banning Books Essay1383 Words   |  6 Pagesto make it easier for people to talk about sex in a more mature manner. Banning books that contain sexual content, vulgarity, and violence give children and young adults a reason to snicker about these topics when discussed in class because we are taught that these topics are not appropriate to talk about publicly. There are many factors that play a major role in how an individual perceives certain topics in books. If taught at an earlier age that these topics are suitable for mature discussionRead MoreThe Pros And Cons Of Books976 Words   |  4 PagesThe books that are banned are the ones that define our past. Book censorship is when the government or a school bans a book because of its depiction to the reader. Book banning is becoming more prevalent as the years have gone by because there are more parents that want to protect their children. Book banning is an extremely important topic because it is shielding young people’s knowledge of what the world truly is. This is a problem because when kids are finally on their own they might not be readyRead MoreThe Banning of Texts Such as Adventures of Huckleberry Finn Essay1047 Words   |  5 Pageseven banning things that will threaten their power. These things are banned or challenged due to the fact that these figures do not approve of their content. One of the most common things banned and or challenged is that of written text. One such text is, Adventures of Huckleberry Finn. It has been banned in Concord, Massachusetts on the basis of â€Å"it being more suited to the slums than to intelligent respectable people† (Banned 1) and the overall vulgarity of the text. Because of vulgarity and seeminglyRead MoreThe Importance Of Censorship In Libraries728 Words   |  3 Pageschallenges a book that is explicit with sexual language, homosexuality, and or religion. The meaning of censorship is to ban a book, its not necessarily up to the library, but more so to the community and the school board. Anyone can challenge a book to be censored, even if it’s not explicit, if you personally take offense to a book you can challenge it to be a censored or banned book, but with that you have to have a valid reason on why you want it banned or censored. There are thousands of books that

Monday, December 9, 2019

Case Study and Lecture Notes for Intended Market Entry to Singapore

Question: Discuss about the Case Study for Intended Market Entry to Singapore. Answer: Introduction This paper shall focus on product or service launch decisions. This paper shall particularly focus on determining segmentation, targeting and marketing mix strategy for introducing Ola Cabs in Singapore. Purpose The purpose of this report is to develop strategy for launching product or service in a foreign country market. International marketing strategy is critical as it would help the company in competing in the regional as well as global arena. The paper aims to investigate the optimal product strategy. It shall also describe the variables that would affect the timing and sequence of entry in the market. Limitations A few limitations were faced while preparing this report. It has a limited scope. It provides suggestions, not solutions. It uses a fragmented approach. The suggestions can be resistant to marketing managers. It was lengthy and time-consuming to research data and present it in a succinct form. The report could have been made better by conducting an in-depth analysis for stating the competitive analysis. Scope The scope of this paper is to research the market segment and transform market challenges into new opportunities. The report shall also provide guidelines for international marketing managers looking to launch products or services in the global market. This paper shall assist the management practitioners to be counterproductive in product launch decision making. Background As discussed in the previous report, Ola Cabs needs to be launched in Singapore for meeting the demands or shortage faced in the economy. Ola Cabs or Ola was founded in the year 2010 in Mumbai, India. With the initial success in Mumbai and the national roll out, Ola is ready for global expansion. Ola offers a wide array of cab services ranging from economical to luxurious commutation based on booking through a mobile app. Ola provides benefits to the commuters as it is hassle-free travelling, cash and cashless payment options. Singapore has experienced a shift in trend towards convenient commutation with the increased smartphone usage. Singapore is chosen after conducting a thorough review and concluding that the country faces taxi-shortage. Environmental Analysis According to the previous report, politically, taxi-booking apps experience tighter control and stringent regulations. The LTA planned to regulate third-party taxi booking apps for only using licensed vehicles and drivers. The policies further state that the companies without a registration certificate are liable to pay a penalty of S$10,000. Alternatively, the person may face imprisonment of up to six months, or both (Tegos 2015). Economically, the country has a low unemployment rate, growing GDP and strong development. The Singapore government has avoided setting a minimum-wage system. Singapore enjoys the lower unemployment rate of 1.9% in comparison with other developed countries (Feng 2015). Socio-culturally, the commuters are favouring the third-party taxi booking apps. Other features such as safety, reduced hassles, easy payment options and reduced waiting time adds to positive social trends. The trends and preference in public transportation are increasing rapidly. Technologically, the digital payment gateways, GPS-enabled locations help the commuters and drivers to opt for third-party taxi booking apps. The smartphones are GPS-enabled allowing the users to request and book a taxi. Technology transforms the taxi industry as the mobile apps are beneficial for both the taxi drivers and commuters. Legally, Third-Party Taxi Booking Service Providers Act 2015 plays a critical role as it pressurizes the taxi associations and drivers. The drivers are penalized with money or imprisonment if they violate Environmental Protection and Management (Vehicular Emissions) Regulations. The third-party taxi providers offer both taxi and non-taxi booking services that make it compulsory for them to register under the Act. Naturally, the government aims to maintain air quality standards in Singapore as the climate change is making the society vulnerable. The National Environment Agency makes efforts to create awareness among the public. The climate change in Singapore can cause sea-level rise, periods of drought and flash floods, risk the biodiversity and greenery, increase endemic diseases, and vulnerable affect food security. Target Market and Competitive Analysis Target Market Analysis The market can be segmented as follows: Demographic Segmentation- The market can be segmented into different age groups such as 16-21, 22-35, 36-50 and 50 and above. The Singaporean market can be segmented into low-level, middle and upper-level income. The third-party taxi booking apps can be segmented for both men and women as gender segmentation. Lastly, the market can be segmented for people qualified high school, graduate, post-graduate and doctorate (Wong, Szeto Wong 2014, pp. 73-81). Geographical Segmentation- Singapore is a developed country; the geographic regions shall be divided into semi-urban and urban regions. The geographical locations can also be divided as densely populated regions such as corporate areas, airport, or residential areas (Wedel and Kamakura 2012, p 4). Behavioural Segmentation- The behavioural segmentation can be defined on the basis of benefits sought, usage rate, and readiness to avail service, brand loyalty and occasions to purchase. The taxi services can be availed regularly, and the benefits sought may be in relation to payments, convenience and reduced waiting time (Aarhaug Skollerud 2014, p 279). Psychographic Segmentation- The psychographic segmentation can be measured on the basis of lifestyle, values, opinions and attitudes. Ola Cabs services can also be treated as a symbol of status- lower class, middle class and upper class. The attitudes of the people can be equated to that of choosing comfort and luxury (Hakam, Wee Yang 2015, p 145). Based on the above criteria, the differentiated targeting strategy can be pursued. A combination of various market variables can be chosen to target a relevant target segment. Demographically, the target market can be chosen for the people belonging to the age group 22-35. The people belonging to this age group are usually office goers. Mainly, women are targeted for introducing service in Singapore. The middle level income are targeted a Singapore has large population of middle class. The middle class is also ASEANs biggest economy (Ting 2016, para 8). The education level is selected as at least a high school graduate. Ola Cabs is an online booking app that requires basic knowledge for running and operating the mobile application. Geographically, the target regions are selected as the densely populated areas. The busiest areas in Singapore such as corporate areas, residential and airport shall be targeted. The dense population is present in these areas due to which there is high demand in the urban regions (Wedel Kamakura 2012, p 4). Based on behavioural segmentation, the target market is chosen for the people who are looking forward to seek benefits from the third-party taxi booking apps. Not only shall the service be beneficial to customers, but also the taxi drivers. The commuters shall enjoy convenient travelling and hassle-free payments, the drivers shall enjoy a larger pool of customers. The Singaporeans are facing shortage of cabs, and the problem of commutation can be solved with more number of taxis available in the peak hours or heavy downpour (Reed 2015, para 4). Based on psychographic segmentation, the lifestyle of the consumers can be defined. The people availing third party taxi booking apps are the people living a convenient or luxurious lifestyle. It is inferred that online cab booking services are for the people who do not wish to struggle for regular commutation (Cross, Belich Rudelius 2014, pp. 531-536). Since more than two distinct market segments, differentiated marketing can be followed in which attempts shall be made to appeal multiple market segments. Differentiated marketing strategy shall be used as the market conditions are same for every taxi company. There is a need to design products with special characteristics for achieving competitive advantage within the market. Ola Cabs can create different marketing campaigns targeting the above mentioned market segments. The marketing campaign can be designed for the benefits sought, convenient lifestyle, reduced waiting time for office goers and safety for women. The demand for taxis is mainly arising from the above mentioned segments (Toften Hammervoll 2013, pp. 272-285). Every taxi service aims to provide reliable, safe and timely commutation. The positioning statement for Ola can be to provide economical, safe and quick transportation for providing comfort to the commuters (Parkinson, Baker Moller 2016, p 237). Figure 1: Positioning Map Source: Created by Author Competitive Analysis Ola faces competition from both direct and indirect competition. The direct competitors are the most popular taxi services in Singapore are Uber and GrabTaxi (Wei 2015, para 1). The indirect competitors are the other transportation networks such as buses, private cars, conventional taxis and trains. About Uber and GrabTaxi The first Asian country to welcome Uber was Singapore. Additionally, Singapore is the first place to experiment with cash payments (Newsroom.uber.com 2016, para 1). Also, it allows payment via credit card. Uber launches new features according to the changing demand trends. The company engages with driver-partners for understanding the consumers and improving services (Newsroom.uber.com 2016, para 6). GrabTaxi or Grab is one of the most popular cab services in Singapore. Grab offers cashless payment offers making travelling easier. Grab is continually optimizing its features and putting it to the best use of users. Grab provides efficient customer service assuring speed, safety and certainty (Tung 2015, para 5). It also provides limousine vehicles for targeting luxurious customer base (Auyong 2014, para 9). Product Features Uber drivers use GPS that is considered better than the Singaporeans (Reed 2015, para 6). The cab is easy to get at busy and peak time and during rains in comparison with other cab services (Reed 2015, para 8). Uber offers a range of cars with different prices from low cost to premium such as UberX, UberXL, UberEXEC, EXECLARGE, and UberTaxi (Uber.com 2016, para 2). GrabTaxi offers a Flash feature which breaks the boundaries between private cars and taxis. The feature helps in getting a ride quicker thereby opening up a large pool of drivers. It offers an intense competition to the private cars and taxis (Waal-Montgomery 2015, para 1). Various car options are provided for economical and luxurious travelling such as Economy, Premium, 6-seater Economy, 6-seater Premium and 13-seater cars (Grab.com 2016). Price There is a pricing war between GrabCar and UberBLACK as both the cars cover limousine fleets. In Singapore, the charges for S$38 flat rate for trips with a distance below 4kms and the price above S$50 is treated as flat (Hong 2014, para 24). However, UberBLACK charges a minimum fare of S$12 and the price increases according to distance and surge pricing (Hong 2014, para 24). Going by the consumers behaviour, GrabCar appears to be cheaper in longer journeys and off-peak hours. However, Uber claims that it is cheaper than its competitors considering the distance covered (Hong 2014). Promotion Both Uber and GrabTaxi use social media and direct mails to promote and advertise their brands. Both use different promotional offers for free rides and discounts to attract the customers. The coupon codes are available at multiple websites that helps in attracting a large consumer segment (Twitter.com 2016). Porters Five Forces Model For understanding the growth and attractiveness in the transport industry, the Porters five forces analysis can be considered at the macro-level. Five Forces Analysis High/ Low/ Moderate Analysis Threat of New Entrants Moderate The capital required for starting up the business is low. For booking an online taxi service, the customers do not require any membership. The app can be used for free due to which switching cost for customers is low. The low switching cost for consumers make it easy for the new entrants to enter the market. However, the government regulations act as barrier in the industry. Also, it is difficult to find experienced and skilled drivers (Beiker 2015, pp. 139-151). Threat of Substitutes High The increasing petrol prices may influence the commuters to travel through other cheaper transportation such as trains and buses. Other than public transportation, the private cars or car-sharing companies are a threat for taxi services. The traditional taxi services other than the third-party booking apps are also a threat. The cheap price and easy availability of other transportation modes could be risky for Ola (Cohen Kietzmann 2014, pp. 279-296). Bargaining Power of Buyers Low The switching cost of customer is low as there are other modes of transport available. The business model and operations set new expectations for the customers. With greater access to substitute products and convenience, it is easier for the customers to switch to other companies. As the prices are fixed, the buyers do not hold much power in bargaining. The customers are likely to be price sensitive due to which they would choose whatever falls cheaper or convenient to them (Magretta 2012, p 42). Bargaining Power of Suppliers High The main suppliers of Ola are car dealers, fuel and skilled drivers. Ola does not own any vehicles. The business model is dependent on the partners as they would outsource labour and assets to individuals who are willing to use their web application. Car dealers have low bargaining power as there is a large pool of dealers available offering high end model at low prices. The fuel suppliers have moderate bargaining power as prices are regulated by the government (Haufler 2013, p 7). Intensity of Rivalry High GrabTaxi and Uber have established a high market share in the Singaporean market. Currently, price is not a differentiating factor in competition as the people are more inclined towards timely service, comfort and luxury. With the low entry and exit costs, the companies do not have to own the fleet of cars. Other indirect competitors are the substitute rivalries such as buses, trains and traditional taxis (Harding, Kandlikar Gulati 2016, pp. 15-25). Target Market Entry Strategy The products and services of Ola in Singapore shall not be different from that of India. Singapore is economically stable that makes it easier for the organizations to enter. As both the countries are Asian, the cultural elements are similar. Scale Ola can make strategic commitments that would have a long-term impact and presence in the market. The strategy for large scale shall be adopted. Significant amount of resources shall be required for finance, personnel and marketing. It would be easier to attract customers with large scale entry as marketing would enable a wide reach. It would also challenge the existing or potential rivalries from entering into the market. The entry mode shall change the nature of competition in the market as it would enable in gaining a greater market share. A small-scale may limit the reach because of which large scale entry can be adopted (Samaha, Beck Palmatier 2014, pp. 78-98). Mode Licensing can be followed as an arrangement between Ola and Singaporean government to run its operations (Laufs Schwens 2014, p 1110). Ola requires a huge number of cars requiring significant investment. It is a flexible work agreement that can be turned in favour of both Ola and the car companies. This strategy can help in obtaining extra income and reaching new markets that would not be possible using other modes. The investment in this strategy is low and Ola can quickly expand without much risk or investment. Ola has limited operations in its home country, therefore licensing is highly attractive option as it is new in international business. The political risk shall also be minimized as the license would be locally owned. Valuable spin off is also possible as there is no danger of nationalisation. The patents are protected and local supplier can secure government contracts (Turnbull Valla 2013, p 293). Timing Ola shall be a late entrant in the Singaporean market as other cab services such as GrabTaxi and Uber exist. Being a subsequent entrant, Ola shall enter with improved products and services. A larger market share can be captured by rectifying the mistakes committed by the earlier entrants. Ola shall require adequate resources and superior marketing techniques for competing. The Research and Development cost shall be low as the operations are already running in India. The company shall focus on making superior product packages and dominate packages. There is less risk involved with a greater chance of return on investment. The unoccupied niche can be captured by Ola. The concept of third party booking apps is known to people; therefore less cost shall be involved in educating (Szulanski, Ringov Jensen 2016, pp. 304-322). The sprinkler strategy or sprinkler diffusion strategy can be used for successful implementation as a high standard of marketing strategies has to be used. This strategy shall help in simultaneous marketing activities targeting different market segments. The strategy shall make full use of competitive advantage and rapid development. Uber and GrabTaxi have acquired a high position in Singapore for which Ola needs to conduct extensive marketing activities (Bhalla 2013, pp. 138-165). Recommendations Product Strategy In India, Ola provides a wide range of product packages for different customer segments. Based on the target market for Singapore, Ola can offer different cars such as Ola Micro, Ola Mini and Ola Prime (Olacabs Technologies 2016). The car would be suitable for one person, two people or more than two people. The product mix strategy can be divided into three levels that would help the product in defining in a better manner. The three levels are: Core product, actual product and augmented product (Oliver 2014, p 41). The core product is related to the benefits and usage. Ola cabs shall resolve the issue of shortage of cabs in Singapore. The benefits offered by the taxi service such as easy payment, reduced waiting time and hassle-free commutation that are sufficient reasons for the Singaporeans to purchase the product (Reed 2015, para 4). The actual product is represented by the quality, branding and style of the products that helps in differentiating it from other competitive brands. Ola can differentiate by adding Ridesharing feature in its mobile app in Singapore. The consumers would be attracted towards the brand as it would prove economical to them (Mohammed 2015, para 10). Additionally, Ola does not provide environmental-friendly cars in India. In Singapore, it could consider running electric cars for reducing cost of fuel and maintenance. All the Ola cars can be painted in white and green as they are in India as it would give a brand identity in presence of hundred other cars (Olacabs.com 2016). The augmented product can be determined by the services offered and customer care. Ola can provide night services for the convenience of customers. The product packages can also exclusively offer airport pick-up and drop that would be beneficial for the customers who do not own a car or are visiting the country for a specific purpose. The customer care services shall be beneficial to the customers for handling their grievances or any other assistance (Oliver 2014, p 41). Pricing Strategy The pricing strategy for Ola can be defined using a combination of pricing structures. The pricing strategies are similar for the entire taxi industry. The services can be defined as three-part structures, base-fare, price per kilometre and price per minute. Alternatively, the pricing can also be defined as a fixed price for any trip within a particular area, price linear to mileage, differential pricing at different times of the day (Zeng Oren 2014, p 1135). The different cars offered by Ola carry different prices. The pricing can be varied ranging from economical to premium based on the cars hired by the commuters. The Micro shall be priced the least, Mini shall charge slightly higher prices but less than Prime, and Prime can charge premium prices. The availability and advantages offered shall vary depending on the prices offered by the cars (Zhang Ukkusuri 2016). The prices can be charged as base fare and additional charges based on distance or time travelled. For longer distances, Ola can charge based on distance covered while for shorter distance, prices can be charged per minute travelled by the commuter. Additionally, Ola can charge higher prices at peak hours as there is high demand of cabs while people are going or leaving from their offices. During heavy rainfall or circumstances where the cabs would be high in demand, surge pricing can be applied where the services can be availed by the people not looking to compromise on convenient travelling (Zhang Ukkusuri 2016). Place or Distribution Strategy Place or location plays a critical role in the taxi business. Ola must focus on busy streets such as corporate areas where there is heavy rush of people. Also, the taxis shall be lined up near airports and railway stations so that when a customer wishes to book a cab, Ola can be available at the quickest. If Ola does not make its presence visible at the busiest locations, the competitors such as Uber and GrabTaxi would be preferred by the travellers thereby losing market share. Ola must run its cabs across the city and halt at places where there is a high chance of people looking to book cabs (Wright Nelson 2014, pp. 147-161). Not only the busiest locations but the residential areas where women or kids have to commute and are looking for convenient travelling must be strategized by Ola. The niche market segments shall be covered by Ola as women have to regularly travel to supermarkets and carry the heavy packets home. Ola must be lined up near supermarkets so that the taxi services are instantly available for the ladies. Ola would only be available through digital channel and not the local hiring as it would not solve the problem of shortage for targeted market segment. Additionally, Ola can offer outstation services by taking its customers across town that is a unique strategy and different from its competitors (Rayle et al. 2016, p 169). Promotion Strategy A campaign can be designed with the slogan Taxi- Anytime! Anywhere! A combination of various media or channels can be applied for promoting Ola. The different elements such as advertising, sales promotion, sponsorship and direct marketing shall be beneficial in marketing Ola. Advertisement would be paid attracting a large mass of people through television, radio or newspapers. Other forms of advertisements such as web pages, brochures, billboards and direct mail can also be used. Press releases can be used to create positive publicity and influencing media outlets. Sponsoring major events shall help in attracting attention and increasing brand visibility (Shimp Shimp 2012). Another strategy is using direct marketing tools in which the targeted customers shall be influenced using telemarketing, emails, and customized letters and text messages. Ola can educate its customers about its various benefits and uses targeting women and the specified target group. Using sales promotion, Ola can offer free rides to the new users. Ola can encourage its customers to refer the service to their friends for which a code shall be provided. When the new users enter that code, they can be offered discounts or free rides. Contests can be conducted by Ola where the winners shall be given rewarded with special discount coupons. Additionally, the customers may also be upgraded with rides in times of non-peak hours where the premium cabs are available in the nearby areas of the users. For example, if the customer books an Ola Micro, he may be upgraded to Ola Mini or Ola Prime and would be charged for Ola Micro. This shall motivate the consumers in making repeated purchase (Aro kiasamy 2012, p 1-11). People Strategy People are the most important element as they enhance experience of the consumers. Ola must hire the right staff and train them efficiently. The people at Ola must be focused at five areas- Reliability, Assurance, Tangibles, Empathy and Responsiveness. These elements play a critical role in customer satisfaction. The customer service representatives must be hired who are hold good communication skills. Additionally, the drivers hired to drive the Ola cabs must be experienced. They must be trained for being hospitable to the commuters. Personality development training must be given to the staffs so that the customers would be assured of high quality services. The customers make perceptions and judgments based on the interaction with the representatives of an organization (Huang Ford 2012, p 359). The Millennial heavily focus on efficient customer service. The drivers must be provided with training regarding usage of GPS, learning about routes in Singapore, confirming or rejecting a ride, knowledge of the famous tourist spots and overall in-depth knowledge. People act as the interface between the company and the customers. Induction shall help in introducing the organizational culture to the staffs. Training must be provided both on-the-job and off-the-job. The commuters may initiate a conversation with the cab drivers to know about the locality for which the driver must be knowledgeable and answer to customer queries. Customer interaction and service would add value and satisfy maximum consumers (Huang Ford 2012, p 359). Process Strategy Process is a critical element in which value is delivered. A number of processes can be adapted by Ola for adapting to the needs of its customers. The processes include both direct and indirect activities. The direct activities shall add value at customer interface through the services. The indirect activities are supported at the back office before, during and after the services are availed. When a customer books a cab, the server at the back office connects with the driver available at the nearby location. The details and pick up location are shared with the driver according to which he would reach the location and pick up customer (Taxi Singapore 2016). After entering destination, the driver shall travel to the destination. The customer shall select the payment mode through cash, wallet or card. The money is automatically paid in case of wallet and card. In case of cash payment, the amount is collected by the driver. The back-office shall then provide the drivers commission. The c ustomer can be given an option of feedback and rating at the end of his ride. The process must be efficient as it is the organizations main offering (Taxi Singapore 2016). The entire process shall be run through internet and online booking. The benefits of cost-saving and time- reduction can be availed. The entire system shall assist Ola in delivering the service. The customer and driver shall also be given each others contact number for communicating as required. The driver would assure in making the customer reach his destination point safely (Taxi Singapore 2016). Physical Evidence Strategy A few tools of the physical evidence in the marketing mix can be described using ambience, perceptions and the other factors that can be witnessed. The physical evidence can be analyzed by the place where service is being delivered. The cab arrival at the location would act as physical evidence. A few other tools that would change consumer perception are the condition of taxi. The taxis must be modern, air-conditioned and should have comfortable seats. These factors would affect the consumer perception just by looking at it or while experiencing it. After the ride is completed, the receipt would be flashed on the consumers smartphone. Additionally, an email can be sent for the records of consumer (Lovelock 2014). Conclusion It is concluded that Ola has a great opportunity in the Singapore market. The taxi industry is expected to rise more in Singapore. The above report focuses on product or service launch decisions. The differentiated targeting strategy can be followed. A combination of various market segments can be chosen to form one. Mainly, women are targeted for introducing service in Singapore. The busiest areas in Singapore such as corporate areas, residential and airport shall be targeted. The commuters shall enjoy convenient travelling and hassle-free payments, the drivers shall enjoy a larger pool of customers. Ola faces intense competition from the most popular taxi services in Singapore are Uber and GrabTaxi. Ola can make strategic commitments that would have a long-term impact and presence in the market. Licensing can be followed as an arrangement between Ola and Singaporean government to run its operations. Based on the target market for Singapore, Ola can offer different cars such as Ola Micro, Ola Mini, and Ola Prime. The pricing can be varied ranging from economical to premium based on the cars hired by the commuters. Ola must focus on busy streets such as corporate areas where there is heavy rush of people. Sponsoring major events shall help in attracting attention and increasing brand visibility. Induction shall help in introducing the organizational culture to the staffs. The taxis must be modern, air-conditioned and should have comfortable seats. References Aarhaug, J. Skollerud, K., 2014. Taxi: Different Solutions in Different Segments.Transportation Research Procedia, 1(1), pp.276-283. Arokiasamy, A., 2012. The Effect of Marketing Mix and Customer Perception on Brand Loyalty.IOSR Journal of Business and Management, 4(2), pp.1-11. Auyong, H., 2014.Tech in Asia - Connecting Asia's startup ecosystem. [online] Techinasia.com. Available at: https://www.techinasia.com/grabtaxi-eat-comforts-lunch [Accessed 6 Jun. 2016]. Beiker, S., 2015. EvolutionRevolutionTransformation: A Business Strategy Analysis of the Automated Driving Industry.Road Vehicle Automation 2, pp.139-151. Bhalla, M., 2013. Waterfall Versus Sprinkler Product Launch Strategy: Influencing the Herd.The Journal of Industrial Economics, 61(1), pp.138-165. Cohen, B. Kietzmann, J., 2014. Ride On! Mobility Business Models for the Sharing Economy.Organization Environment, 27(3), pp.279-296. Cross, J., Belich, T. Rudelius, W., 2014. How Marketing Managers Use Market Segmentation: An Exploratory Study.Proceedings of the 1990 Academy of Marketing Science (AMS) Annual Conference, pp.531-536. Feng, Y., 2015.Unemployment Rate in Singapore. [online] DollarsAndSense.sg. Available at: https://dollarsandsense.sg/unemployment-rate-in-singapore/ [Accessed 10 Jun. 2016]. Giam, G., 2015.Debate on Third-Party Taxi Booking Service Providers Bill NCMP Gerald Giam | The Workers' Party. [online] Wp.sg. Available at: https://www.wp.sg/debate-on-third-party-taxi-booking-service-providers-bill-ncmp-gerald-giam/ [Accessed 6 Jun. 2016]. Grab.com, 2016.GrabCar - Grab Singapore. [online] Grab Singapore. Available at: https://www.grab.com/sg/car/ [Accessed 6 Jun. 2016]. Hakam, A., Wee, C. Yang, C., 2015. Lifestyle Segmentation of the International Tourists: The Case of Singapore.Proceedings of the 1988 Academy of Marketing Science (AMS) Annual Conference, pp.142-146. Harding, S., Kandlikar, M. Gulati, S., 2016. Taxi apps, regulation, and the market for taxi journeys.Transportation Research Part A: Policy and Practice, 88, pp.15-25. Haufler, V., 2013.A public role for the private sector. Washington, D.C.: Carnegie Endowment for International Peace, p.7. Hong, K., 2014.Uber, Easy Taxi, GrabTaxi Battle It Out In Southeast Asia. [online] The Next Web. Available at: https://thenextweb.com/asia/2014/08/12/the-war-uber-faces-how-its-battling-grabtaxi-and-easy-taxi-in-southeast-asia/#gref [Accessed 6 Jun. 2016]. Huang, J. Ford, J., 2012. Driving locus of control and driving behaviors: Inducing change through driver training.Transportation Research Part F: Traffic Psychology and Behaviour, 15(3), pp.358-368. Laufs, K. Schwens, C., 2014. Foreign market entry mode choice of small and medium-sized enterprises: A systematic review and future research agenda.International Business Review, 23(6), pp.1109-1126. Lovelock, C., 2014.Services marketing. Englewood Cliffs, N.J.: Prentice-Hall. Magretta, J., 2012.Understanding Michael Porter. Boston, Mass.: Harvard Business Review Press. Mohammed, R., 2015.The Taxi Industry Can Innovate, Too. [online] Harvard Business Review. Available at: https://hbr.org/2015/02/the-taxi-industry-can-innovate-too [Accessed 7 Jun. 2016]. Newsroom.uber.com, 2016.Four Ways Uber Makes Life Easier With Cash. [online] Singapore. Available at: https://newsroom.uber.com/singapore/four-ways-uber-makes-life-easier-with-cash/ [Accessed 6 Jun. 2016]. Newsroom.uber.com, 2016.Singapore. [online] Singapore. Available at: https://newsroom.uber.com/singapore/ [Accessed 6 Jun. 2016]. Olacabs Technologies, 2016.Ola cabs Fare in bangalore | Taxi fare in bangalore | Cabs Fare Calculator in bangalore. [online] Olacabs.com. Available at: https://www.olacabs.com/fares [Accessed 7 Jun. 2016]. Olacabs.com, 2016.Book a cab in India| Hire a City Taxi at lowest fares| India's largest cab network | olacabs.com. [online] Olacabs.com. Available at: https://www.olacabs.com [Accessed 7 Jun. 2016]. Oliver, R., 2014.Satisfaction: A behavioral perspective on the consumer. Armonk, N.Y.: M.E. Sharpe, p.41. Parkinson, S., Baker, M. Moller, K., 2016.Organizational buying behaviour. London: Macmillan, p.237. Rayle, L., Dai, D., Chan, N., Cervero, R. Shaheen, S., 2016. Just a better taxi? A survey-based comparison of taxis, transit, and ridesourcing services in San Francisco.Transport Policy, 45, pp.168-178. Reed, C., 2015.9 reasons I love Uber in Singapore. [online] Singapore Business Review. Available at: https://sbr.com.sg/transport-logistics/commentary/9-reasons-i-love-uber-in-singapore [Accessed 6 Jun. 2016]. Samaha, S., Beck, J. Palmatier, R., 2014. The Role of Culture in International Relationship Marketing.Journal of Marketing, 78(5), pp.78-98. Shimp, T. Shimp, T., 2012.Advertising, promotion, and other aspects of integrated marketing communications. Mason, OH: Thomson/South-Western. Szulanski, G., Ringov, D. Jensen, R., 2016. Overcoming Stickiness: How the Timing of Knowledge Transfer Methods Affects Transfer Difficulty.Organization Science, 27(2), pp.304-322. Taxi Singapore, 2016.Taxi Booking. [online] Taxi Singapore. Available at: https://www.taxisingapore.com/taxi-booking/ [Accessed 8 Jun. 2016]. Tegos, M., 2015.GrabTaxi and Hailo go legit in Singapore, UberTaxi could be next. [online] Techinasia.com. Available at: https://www.techinasia.com/grabtaxi-hailo-lta-singapore-seems-legit [Accessed 10 Jun. 2016]. Ting, G., 2016.Southeast Asia's middle class is diverse, confident, and growing richer by the day. [online] Futurereadysingapore.com. Available at: https://www.futurereadysingapore.com/2016/quartz-bulletin1.html [Accessed 6 Jun. 2016]. Toften, K. Hammervoll, T., 2013. Niche marketing research: status and challenges.Marketing Intelligence Planning, 31(3), pp.272-285. Tung, Y., 2015.4 strategies GrabTaxi is using to make GrabCar competitive in SE Asia. [online] e27. Available at: https://e27.co/4-strategies-grabtaxi-using-make-grabcar-competitive-se-asia-20150612/ [Accessed 6 Jun. 2016]. Turnbull, P. Valla, J., 2013.Strategies for international industrial marketing. London: Croom Helm. Twitter.com, 2016.Uber Singapore (@Uber_SING) | Twitter. [online] Twitter.com. Available at: https://twitter.com/uber_sing [Accessed 6 Jun. 2016]. Uber.com, 2016.Drive or Ride with Uber Singapore. [online] Uber.com. Available at: https://www.uber.com/cities/singapore/ [Accessed 6 Jun. 2016]. Waal-Montgomery, M., 2015.GrabTaxi adds Flash button for instant rides, mandatory ratings, e-receipts hub, and business ridetags. [online] VentureBeat. Available at: https://venturebeat.com/2015/12/01/grabtaxi-adds-flash-button-for-instant-rides-mandatory-ratings-e-receipts-hub-and-business-ride-tags/ [Accessed 6 Jun. 2016]. Wedel, M. Kamakura, W., 2012.Market segmentation: Conceptual and methodological foundations. Boston: Kluwer Academic, p.4. Wei, T., 2015.Singapore regulates third-party taxi booking apps | SingaporeLegalAdvice.com. [online] SingaporeLegalAdvice.com. Available at: https://singaporelegaladvice.com/singapore-regulates-third-party-taxi-booking-apps/ [Accessed 6 Jun. 2016]. Wong, R., Szeto, W. Wong, S., 2014. Bi-level decisions of vacant taxi drivers traveling towards taxi stands in customer-search: Modeling methodology and policy implications.Transport Policy, 33, pp.73-81. Wright, S. Nelson, J., 2014. An investigation into the feasibility and potential benefits of shared taxi services to commuter stations.Urban, Planning and Transport Research, 2(1), pp.147-161. Zeng, C. Oren, N., 2014.Dynamic Taxi Pricing. [online] Dx.doi.org. Available at: https://dx.doi.org/10.3233/978-1-61499-419-0-1135 [Accessed 7 Jun. 2016]. Zhang, W. Ukkusuri, S., 2016. Optimal Fleet Size and Fare Setting in Emerging Taxi Markets with Stochastic Demand.Computer-Aided Civil and Infrastructure Engineering.

Sunday, December 1, 2019

Integrative Network Design free essay sample

Riordan Manufacturing is a global plastics manufacturer. Their products include plastic beverage containers produced in Albany, Georgia, custom plastic parts produced in Pontiac, Michigan, and plastic fan parts produced in Hang Zhou, China (UOPX, 2013, p. 1). Riordan’s research and development is in San Jose, California (Corporate Headquarters). Riordans main customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (UOPX, 2013, p. 1). Team B and associates were task by Riordan to analysis Riordan’s WAN and add a wireless Network to Riordan Manufacturing, also to analyze and update Riordan’s Internet security in each of the locations and provide documentation for security policies and procedures. What is a wireless network and what are the benefits of going wireless. With the current wireless technology, Wi-Fi is everywhere; one can connect to the Internet by going to coffee houses, airports, hospitals, hotels, and homes. Businesses can stay connected to their coworkers and customers without being tied to their office desk by using wireless networks and Wi-Fi hotspots. We will write a custom essay sample on Integrative Network Design or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Wireless local-area network (WLAN) allows personnel to connect to their computers without wires or cables. A wireless network uses radio waves to connect and communicate within a certain area to mobile devices. If someone needs a document while attending a meeting in the conference room or one needs to access the inventory list from the warehouse. A wireless network allows one to access the company’s Internet and retrieve documents on their mobile devises without leaving the meeting or going back to their office. Benefits of Wireless Networking The benefits of company’s going wireless include convenience, mobility productivity, and ease of set up, scalability, security, and cost. Mobile devices in today’s society are equipped with Wi-Fi technology and able to connect to a WLAN. Convenience: employees can access securely to their company’s network resources from any location within their coverage area. The coverage area normally is the office building but is able to expand to other company facilities. Mobility: employees are connected to the network when they are not at their office desk. People in meetings can access documents and applications with their mobile devices. Salespeople can access the company’s network from any location. Productivity: employees accessing their documents and applications are the key to get the job done, and it encourages teamwork. Customers also have access to the company’s Internet using a secure guest access to view their business data. Ease of setup: business do not have to run cables through the facilities, installation is quick and cost-effective. WLAN’s make it easier to for hard to reach locations to have connectivity to the network. Scalability: with businesses expand, company’s need to expand quickly along with their network. Wireless network expands with the current existing equipment. Security: the success in controlling and managing secure access to a business’s wireless network is very important. Security managers must be knowledgeable with the advanced Wi-Fi technology and needs to provide vigorous security protections to protect their data, but only giving permission to who need access. Cost: businesses that operate with and WLAN, reduces wiring costs during office upgrades. How Riordan Manufacturing can use a wireless Networking Company’s using a wireless networks are boosting productivity and encourage data information sharing. Employees can wander throughout the building using mobile devices and still have constant access to documents, e-mails, applications, and other network resources required to do their jobs. Employees using wireless LAN can travel throughout the office building without losing Internet connectivity. Employees having a team meeting or in conference can have the most updated communications, including all documents and applications on the network. Voice over internet protocol (VOIP) technology; also have roaming capabilities in their voice communications. Improved responsiveness Customers require rapid replies to questions and concerns. A WLAN improves customer service or relationships by connecting employees to the data information. Better access to information WLAN’s allow business’s access to all areas in the building without any connectivity issues. WLAN’s are very effective in warehouses, manufacturing plants, and distribution centers. Employees can access inventories and providing accurate figures in real time to management. Easier network expansion Businesses expanding and hiring new employees are easily added the network by the network administrator. Office furniture is easily moved and employees are added or removed to/from the network without issues. Enhanced guest access WLAN’s allow businesses to provide secure wireless access to the Internet for guests or visitors. Hospitals, restaurants, hotels, coffee shops, and other public businesses provide WI-FI to all mobile devices. The IT administrator will need to verify that all the desktop PCs already have the integrated Wi-Fi hardware installed or the PC’s will need to upgraded. Switching to a WLAN does not mean switching changing from ones existing wired network. It is common for businesses to have a wired-wireless network that provides wireless capabilities to conference rooms or in new expanded office spaces. WLAN’s also supports VOIP for the conference rooms. IT managers should be aware of some of the technical aspects of WLAN’s. The WLAN network covers approximately about 3,000 square feet. The range of a wireless router could be affected by walls and cubicles, and the signals are hard to be received in elevators. Other issues IT managers should be made aware of include: †¢Wireless router is shared between 15-20 users per each access point for data, 8-12 for VOIP †¢VOIP quality, wireless routers need to be installed closer together †¢Routers have enhanced coverage when they are installed on the ceiling. Security policies and procedures in a WLAN are very important to consider when establishing a wireless network. Security policies that need to be considered: †¢Data encryption †¢User authentication †¢Secure access for visitors †¢Control systems. To prove that the design meets the data rate requirements, you need to calculate the required data transfer rate for all your networks. Backups over the network must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. To calculate the data transfer rate, use this formula: Required network data transfer rate = (amount of data to back up) / (backup window) the chart below shows the typical transfer rates of some of the more resent network technologies. Table: Network data transfer rates (PowerTech. com, 2010, p. 1) Network TechnologyTheoretical gigabytes per hourTypical gigabytes per hour 100BaseT (switched)3625 1000BaseT (switched)360250 10000BaseT (switched)360025 Here is an example of how to calculate the required data transfer rate for your network: (Symantec Corp, 2013, p. 1) Use the following assumptions: †¢Amount of data to back up = 500 gigabytes †¢Backup window = 8 hours †¢Required network transfer rate = 500 gigabytes/8hr = 62. 5 gigabytes per hour Solution 1: Network Technology = 100BaseT (switched) Typical transfer rate = 25 gigabytes per hour A single 100BaseT network has a transfer rate of 25 gigabytes per hour. This network cannot handle your required data transfer rate of 62. 5 gigabytes per hour. In this case, you would have to explore other options, such as the following; backing up your data over a faster network (1000BaseT), large servers to dedicated tape drives (SAN media servers), SAN connections by means of SAN Client. Performing off-host backups using Snapshot Client to present a snapshot directly to a media server that backups during a longer time window, performs your backups over faster dedicated networks such as solution 2: Network Technology = 1000BaseT (switched) and Typical transfer rate = 250 gigabytes per hour Based on the above network table; a single 1000BaseT network has a transfer rate of 250 gigabytes per hour. This network has much more capacity to handle the backups for this system. To build a backup system for you network; you complete the following. The data transfer rates for your networks must be calculated in order to identify your various problems and potential bottlenecks. (The latest breaking technological solutions for dealing with multiple networks problems and potential bottlenecks are readily available for installation. ) Once the data transfer rates required for your backups are calculated, the rate of transfer must be able to achieve a complete backup of all your data within the allotted time. Then you must determine the most efficient type of tape or disk technology is available to meet your company’s specific needs. Determine the specific number of tape drives needed and the required data transfer rate is going to be for your network. To set the backups needed for your network, (as before) you must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. Then determine the size of your systems ‘Netback up’ image database, exactly how much disk space will be needed to store your entire Netback up image database, the size of the ‘Netback up relational database’ (NBDB), and the required space that will be needed to handle the NBDB. Then calculate how much media will be needed to handle both full and incremental backups, plus you must determine how many tapes will be needed not only to store, but also to be able to retrieve and keep your backups. The next step will be to estimate the size of the tape library your network needs to store your backups and if you need to use robotic library tape slots in order to store your backups. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the  authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. Mobile phones are another threat to Riordan Manufacturing, because there are people that log on to the companies using their phones and many times they forget to close the account. By leaving this account open the company is vulnerable to hackers getting to the companies account and doing a great deal of damage. To prevent these types of things these part will have to be covered in Training through the company and the company will have to have all of their employees with a certain access to have a company phone and have them use only that phone to access the account if necessary. The phones will be protected at all times to make sure that no hacker is getting in to the account through these phones. Also if for some reason the employee wants to take action against the company and give secret information through the phone this should also be known through the company. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The â€Å"SOX requires publicly traded companies to secure information systems to the extent necessary to ensure the effectiveness of internal controls over financial reporting. † (PowerTech. com, 2010, p. 1) Companies must now take into consideration that IT well trained and educated security support teams must be brought into the process to provide protection any leaks or intrusion in order to meet the compliance deadlines. â€Å"Section: 404 of the Sarbanes-Oxley Act have had the highest impact on Information Technology and Security. The IT related issues that cause problems for SOX compliance in the context of Section 404 are generally related to access control of system users. † (PowerTech. com, 2010, p. 1) Without adequate access controls in place, users can perform functions/activities that are in conflict with their job responsibilities are to modify/corrupt financial data. Controls to initiate/record unauthorized transactions commit fraud and cover their tracks. The Sarbanes-Oxley Act in some ways comes off very vague and open to interpretation leaving companies unsure how to handle compliance. The best way to start is to identify significant and potential high risk problems when going through the process, identifying specific systems, data processors, and control links whose integrity could be compromised. Once these problems within the network have been identified, effective controls must be implemented to address these deficiencies, to record their regularity and frequency, and to evaluate them to ensure that the proper set of controls is kept in place protecting system integrity. The Bill was introduced (and named for) sponsors; Senator Paul Sarbanes (D-MD) and U. S. Representative Michael G. Oxley (R-OH), as a reaction to a large number of various scandals that had exposed excessive wrong doing in the corporate world, costing investors billions of dollars and many companies to collapse. â€Å"The act contains 11 titles, or sections, ranging from additional corporate board responsibilities to criminal penalties, and requires the Securities and Exchange Commission (SEC) to implement rulings on requirements to comply with the law. † (SOX-online, 2012, p. 1). The Constructing new data base network for Riordan Manufacturing will have to take all SOX rules, regulations and requirements  into consideration at each step along the way in order to stay within the guidelines of the law. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The importance of explicit enterprise security policies and procedures are necessary in a structured network as we currently have in Riordan Manufacturing Inc. and in any other establishment whereas you depend on sending and receiving data over the internet. If no security policy boundaries would be taken seriously, each and one of us would be leaving ourselves vulnerable to malicious computer hackers, corrupted information sent on emails such as; Trojan horses, viruses etc.. As a growing company, we want to protect and ensure that personal information is not compromised and that company policy security awareness procedures are taken. Once a year all employees at Riordan will be required to complete an online assessment of standard procedures for computer use at the facility. If there are any suspicious cyber crime activities occurring, it shall always be reported immediately to the corresponded employee’s supervisor. Mobile work stations have been limited to company issued wireless devices inside the premises, excluding personal cell phones, smart phones, Mp3 players, portable media players, Laptops, tablets, USB drives or external hard drives. All data is classified and is set into four different categories; restricted/proprietary, confidential, sensitive and public. Employees must act appropriately, to prevent unauthorized disclosure of information unless if you have been authorized to access it, if it is utilized as a legitimate business need or shared with other company employees, then it is considered acceptable to the Riordan security policy. Our proposal of upgrading the current switches to the 24 port Meraki Cisco switch and the addition of MR24 Cisco access points will benefit the security policy of networking operations. The Network Security options, Firewalls (2013) website, both pieces of hardware’s have built in firewall management which will assist the network from intruders degrading our system. The purpose of a firewall is to secure the in house network and from non-trusted networks, by blocking content off the internet. Also knows as a choke point, a firewall provides a particular point of contact, enabling users to browse the internet from approved resources located internally or outside the network. It appears as a solitary address to the open public, providing the user access to the non-trusted network through SOCKS, proxy servers and from network address translation (NAT), while keeping the internal networks address private. This technique minimizes impersonating or cyber attack less likely because the firewall maintains the privacy of your internal networks (Network Security Options, Firewalls, 2013). Although firewalls can be limited to what it can protect, such as files that contain file transfer protocol (FTP), telnet amongst the other possible ways of data corruption but it will not necessarily protect them depending on specific destination of the information being transmitted and if the user decides to encrypt the data. When using wireless technology, this can bring several risks to the Network, because hackers can access any unencrypted wireless devices or access points. Having a Wi-Fi protected network will minimize the chances of anyone breaking into the system.