Friday, January 31, 2020

Segmentation Essay Example | Topics and Well Written Essays - 250 words

Segmentation - Essay Example The alternate subgroup requires packaging services for their shipping items. The items are usually large or fragile, and they require expert packaging services to clear them from any liability. Shipping customers are mostly those buying or selling items through the internet. Those who require packaging, additionally, most likely are too busy to spare some time and would rather pay for the packaging service. The Mail Box customer segment involves those customers who require Private Mail Boxes. This need for Private Mail Boxes can be brought about by different reasons. They include legality issues, convenience of location, hours of operation, amongst others. Mail Box Customers also prioritize convenience over most other things. Mail Box shipping station services use real street addresses and deliver and pick up mails right at the customer’s doorstep as opposed to the Post Office. Additionally, those who move around a lot are offered a permanent mail address at the shipping stations to avoid the loss of their mails. This customer segment involves customers who require a fax transmittal service, for receiving or sending a fax but do not own or are unable to access a fax machine to meet their service requirement. This segment maintains a stable demand for fax transmittal services even with the advent and development of the email

Thursday, January 23, 2020

The Importance of History and Culture in Amy Tan’s The Joy Luck Club Es

The Importance of History and Culture in Amy Tan’s The Joy Luck Club   Ã‚  Ã‚   The impact of history and culture on an individual's life is tremendous. History plays a large role in forming an individual because it helps them develop morals, ideals, and goals in life. It begins the process of finding an identity. The past is never forgotten because it leaves marks on ones life as a scar does to ones body. It may go unseen physically, but the emotional effects it produces last a lifetime, and can continue on for generations to come.   Ã‚  Ã‚  Ã‚   The women in the novel, The Joy Luck Club, deal with all of the good and the bad that their history and culture have to offer. At times they experience difficulties because the mothers and daughters, although they are as one, share different cultures, while their history is the same. Ying-Ying St.Claire is the mother of Lena, who is a Chinese-American women. Lena and her mother don’t see eye to eye at all times because of the fact that they were raised in different cultures.   Ying-Ying grew up in China in a very well-to-do family. At first she had very few worries, other than being obedient. Her Amah once told her, â€Å"You don’t need to understand. Just behave, follow your mothers example (Tan,66)†. As she grew older, she had to prepare for her future; a life of following future husbands orders and taking care of her husbands family. Chinese women would do this because it was expected of them. They would care for their husbands parents so th at when they were old they would be taken care of as well.   Ã‚  Ã‚   Ying-Ying learned everything, all of the lessons and life’s meanings, from her mother. Her mother learned everything that she knew from her own mother, as well as through experiences from her own... ...all Chinese, and the daughters are Chinese-American. The mothers grew up in a more strict environment and followed the rules by the book. They were taught by their mothers, how to act, who they were, and what being Chinese meant. The daughters in this story grew up in a more relaxed world, where being an individual was accepted and appreciated. No one was punished for being themselves in America. For the women in this novel, finding their true identity was one of the most important things. By using their cultural background and discovering who their mothers were, they were able to find their true selves in the end as well giving them a complete sense of identity.    Work Cited Tan, Amy. The Joy Luck Club, Ballantine Books, 1989    Thi Do, Thuan. â€Å"Chinese-American Women in American Culture†, available at http://www.ics.uci.edu/~tdo/ea/chinese.html, 1992.

Wednesday, January 15, 2020

Modern Technology Has Brought the Resurgence of Identity Theft Essay

Identity theft is one crime that has spawned from technological advancements. Criminals have developed numerous strategies on how to steal confidential and personal information. Dealing with identity theft may be a challenge since law enforcement personnel may not be fully competent in handling the cases since they may lack the required skills to be able to deal with such a crime while private people and even businesses have lost much because of this type of crime. The number of cases of identity theft has been constantly on the rise; however, the prevalence of the crime may as well be blamed on modern technology itself. Modern technology has brought about many conveniences for ordinary people and even for identity thieves. From only less than 10,000 reported cases of identity theft in 1999, the figure steadily climbed reaching around 50,000 in 2003 and more than 80,000 in 2006 (Infocycle, 2007). In the United Kingdom, credit card fraud has also been consistently increasing. In 2007, over 7,000 credit cards and debit cards were either lost or stolen. CPP Card Protection has indicated a 77 percent increase in credit card fraud compared to the figure on 2006 (Experian QAS, 2008). According to a study by Gartner, identity theft claimed 15 million victims in 2006 alone. The US Justice Department has recorded 226 cases of identity theft in 2005 but in the first half of 2006 alone, there were already 432 cases. The FBI also indicated that it is working on 1,587 cases relating to identity theft (ITRC, 2007). Preventing identity theft may not be as easy as it seems. Joel Reidenberg and Lawrence Lessig said concentrating on the â€Å"architectures of control† to prevent identity theft is the way to go. Solove, on the other hand, indicates that â€Å"architectures of vulnerability† should also be considered in addition to â€Å"architectures of control†. According to Solove, shaping architectures should be the focal point in the protection of privacy and not on remedies and penalties. He noted that architectures often provide a vulnerable point that identity thieves take advantage of. It is this lack of security that identity thieves are able to use a person’s personal information. He suggests that a public identification system be created as a solution to the problem (Solove, 2003). It is exactly new technology that produces these architectures and they are greatly flawed since many people can still bypass its security functions evidenced by the prevalence of identity theft on the Internet. Identity theft has gained much notoriety in the advent of buying and selling on the Internet. However, identity thieves can still use the old methods for obtaining personal information. Common methods are stealing wallets or mails, looking through residential trashcans or business dumpsters, posing as someone legally permitted to access personal information such as credit reports, or bribing their way to get the information (Newman, et. al. 2005). A phishing scam is another method of getting personal information out of a person. The Anti-Phishing Workgroup indicated that there are only 4,564 phishing websites in July 2005 but the number increased to 23,670 as of July 2006. A study at the University of Indiana also indicated that 14 percent of phishing scams are successful which contradicts the Gartner report which indicates only a three percent success rate. The Gartner research also found out that financial losses from phishing scams were $137 million in 2004 rising to $2. 8 billion in 2006 (ITRC, 2007). The fight against identity theft may be considered rather ineffective since law enforcement personnel lack the necessary resources to combat such a crime which is computer-related. Britz indicates that this kind of crime requires law enforcers to have knowledge of computers and other digital stuff. It may be noted that many law enforcement agencies do not have well-trained personnel to handle such cases. These personnel may also be acting several capacities at a given time. Computer technology has increased at an exponential rate as did technology related crime and this would require that law enforcers be trained to effectively handle such crimes (Britz, 2004). As technology improves, security is being compromised and this can be proven by the increasing number of identity theft crimes. While it is true that online banking and other services on the Internet provide much convenience, it also provides lesser risks of capture for identity thieves. Law enforcers could do little do prevent identity theft or to investigate such since not all of them have the capacity to do so and identity thieves are improving their arsenal of identity stealing techniques. Technology might also be considered as the root of the prevalence of identity theft. Even as identity theft was not considered a crime before 1998, it has existed for a long time. Modern computing and telecommunications technology has once again popularized identity theft since identity thieves can better elude law enforcers compared to going to a bank and making a transaction using stolen information (Arnold, 2000). Legislation has always tried to address cyber crime, but it is challenging for lawmakers to keep up since technology quickly evolves and cyber crime evolves with it. A good approach would be improving security measures, educating users, adopting a vigilant approach in combating cyber crime and a police force that is well-equipped to handle such crimes (Alaganandam, et. al. , 2005). Identity theft and other cyber crimes are also classified as white-collar crimes, thus, offenders do not receive harsh penalties. They can even use the money plundered to pay for their defense and they serve at least only one year in prison (Arnold, 2000). Identity thieves must be dealt with harsher penalties since they operate on a much larger scale today and are even comparable to bank robbers only less inclined to being caught and given much less media attention. The number of cases of identity theft is increasing at an exponential rate but this could most likely be blamed on modern technology especially since the Internet has become commercialized. New technology comes with new opportunities for identity thieves to gain access to personal information and using it for personal gains. Legislation can address this problem but it would prove to be a challenge since identity thieves are finding new ways of how to steal personal information as technology develops. Legislation must also address this by rendering harsher penalties for cyber criminals as they operate just like ordinary criminals, the only difference is that they work discreetly and have not been given media attention. Also, the victims do not really know that they have been victimized until after some time the thieving takes places. References Alaganandam, H. , Mittal, P. , Singh, A. , & Fleizach, C. , 6 December 2005. Cybercriminal Activity. Retrieved September 7, 2008, from sysnet. ucsd. edu/~cfleizac/WhiteTeam-CyberCrime. pdf Arnold, T. 2000 June. Internet Identity Theft: A Tragedy for Victims. Software and Information Industry Association. Retrieved September 7, 2008, from www. siia. net/software/pubs/iit-00. pdf Britz, M. (2004). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ: Pearson Prentice Hall. Experian QAS. 22 August 2008. Holiday Fraud Threat. Retrieved September 3, 2008, from http://www. qas. co. uk/company/data-quality-news/holiday_fraud_threat_2614. htm Identity Theft Resource Center. 30 April 2007. Facts and Statistics. Retrieved September 3, 2008, from http://www. idtheftcenter. org/artman2/publish/m_facts/Facts_and_Statistics. shtml Infocycle. (2007). Government Bodies Must Play Their Part in Securing Against Identity Theft. Retrieved September 3, 2008, from http://www. infocycle. co. uk/index. php? option=com_content&task=view&id=43&Itemid=43 Newman, G. & McNally, M. 2005 July. Identity Theft Literature Review. Retrieved September 3, 2008, from http://www. ncjrs. gov/pdffiles1/nij/grants/210459. pdf. Solove, D. (2003). Privacy, and the Architecture of Vulnerability. Hastings Law Journal, 54. p. 1227. Retrieved September 3, 2008, from http://ssrn. com/abstract=416740

Tuesday, January 7, 2020

Antigone, Star Wars, and the Good Life - 1559 Words

Sophocles’s play Antigone promotes a good life that, through careful analysis, is very similar to the Stoic theory of the good life. Antigone is a story about the members of the ancient Theban aristocracy vying for control of themselves and others; however, in its core it contains an exploration of the good life, that is trying to investigate what values will allow one to get what they want out of life. A group of philosophers, also of Greek origin, produced a theory of this topic; this group of thinkers is called the Stoics. Concerning the good life they had two main values, from which they believe a good life can originate. The first of the two is finding happiness from inner resources, or trying not to depend on things around you such as wealth or adventure to give you a sense of happiness. The second facet is that of not worrying about things that are out of your control, as there is no use. Antigone brings to stage these topics, and shows characters who either live accor ding to them, and exit with a good life, and others who deny these, and end the play living in a bad life. Therefore the play shows through example, that Stoic values will lead to a positive way of living, and living against the values will lead to you not getting everything out of life. The two main characters in this tragedy are Creon, the king of Thebes, and uncle of the other character Antigone, the daughter of the last king of the same city Thebes. Creon does not live according to the values ofShow MoreRelatedSt. Augustine Of Hippo1280 Words   |  6 PagesPeople are weird. A lot of this is because there are so many, 7.4 billion Homo Sapiens cram themselves onto a damp rock swinging around a star and hurtling through the galaxy. On this rock we are born, grow up, thrive, grow old, and die. In general, this cycle of life has been consistent throughout history. Because of how common this cycle is, it has been subject to repeated attempts at improvement by philosophers and prophe ts of all time periods around the globe. One of the most important of theseRead MoreFire, Furor and Internal War Essay1193 Words   |  5 Pagesfor Aeneas exemplifies the internal turmoil that afflicts individuals when they are deprived of the love that they crave so ardently. Virgil accomplishes this through the incorporation of the symbol of fire and through the platonic metaphor of the war between reason and appetite in his work. Virgil uses the dual nature of fire to depict the change in the disposition of Dido’s relationship with Aeneas. Fire is a common literary symbol for the erotic and passionate attribute of love yet; it canRead MoreEnter Antigone and Ismene from the Palace10899 Words   |  44 PagesAntigone Enter ANTIGONE and Ismene from the palace. ANTIGONE: Ismene, my dear sister through common blood, do you know of any evil from Oedipus Zeus will not perform on us who still live? For I have seen nothing—nothing painful, nothing mad or shameful or dishonorable—(5) that is not among your or my sorrows. And now what do they say? The general has just put an edict over the whole city. Have you heard it? Or have you avoided learning how our friends suffer the fate of foes?(10) Read MoreRay Bradbury s Fahrenheit 4514443 Words   |  18 Pagesexploits these people for his amusement; so that he could have game to hunt. Chapter 5 – Now, Where Have I Seen Her Before? Intertextuality is the interrelationship of different texts and works of literature and how each text is shaped by another. A good example of how texts are created from the ideas and events of other texts is Shakespeare’s tragedy, Romeo and Juliet. The two fall in love, but cannot be together because of their feuding families. The ideas of love at first sight and forbidden loveRead MoreTragic Hero1598 Words   |  7 Pagesthe hero is of noble birth and is more admirable than ordinary men. He cannot, however, be morally perfect because the best plots arise when his downfall is the inevitable consequence of some defect in character (or tragic flaw).The spectacle of a good man dragged to destruction by a single error arouses in the audience both pity and fear, leading to the catharsis, a psychological state through which those emotions are purged; the audience leaves the theater relieved, or even exalted, rather thanRead More The tragic in Antony and Cleopatra Essay3706 Words   |  15 Pagesles faire dà ©tester. (Racine, 1667, Premià ¨re Prà ©face dAndromaque) Aristote, who is very far from asking us to create perfect heroes, on the contrary wants tragic characters, the ones whose unhappiness is the theme of the tragedy, to be neither all good nor all wicked. (...) They must consequently have an imperfect goodness, that is a virtue that is capable of weakness, and fall into distress because of some sin which would make people feel sorry for them and not hate them. This view is exemplified