Saturday, December 28, 2019

The Prevalence Of Homelessness And Homelessness - 1699 Words

The Prevalence of Homelessness In this textual analysis, I’m going to discuss the prevalence of homelessness in the United States. I’ll be using three songs from popular culture that focus on homelessness. Different artists perform these three songs: Avril Lavigne, Bob Dylan, and Nirvana. I’m going to address the values that people who are homeless may have, according to what each artist conveys through their song lyrics. Throughout the lyrics in each song, it seems like the artists are attempting to communicate to the public that homelessness is a serious issue that nobody is immune to. The values that I have gathered are bravery, hope, and perseverance. I have chosen this topic because over half a million people are homeless, the government has limited resources to help those who are homeless, and some cities are making homelessness illegal. This topic is important to me because nobody is immune to homelessness, which is terrifying and unfortunate. This topic should be important to others because homelessness is a serious problem and it seems like we tend to treat people who are homeless like they re not human beings. Some people think that if a person who s homeless wants to truly change their situation, they would simply get a job. There’s clothing assistance available for people who are homeless; having access to a resource like this can help people who are homeless by providing them with appropriate clothing for job interviews. Approximately 44% of people who areShow MoreRelated How Many People are Homeless? Essay1591 Words   |  7 Pagesis misleading. In most cases, homelessness is a temporary circumstance -- not a permanent condition. A more appropriate measure of the magnitude of homelessness is therefore how many people experience homelessness, not how many people are homeless. Studies of homelessness are complicated by problems of definitions and methodology. This fact sheet describes definitions of homelessness, methodologies for counting homeless people, and recent estimates of homelessness. Additional resources for furtherRead MoreCauses Of Homelessness1405 Words   |  6 Pagesthey all share in common are the factors why a specific type of population became homeless. The interrelation of homelessness and mental illness are informed by many factors such as; the lack of support, extreme poverty, substance abuse, lack of affordable health insurance, and lack of affordable housing. The homeless population shares different struggles when dealing with homelessness and mental illnesses because there are not enough resources for them to be able to come back to their normal selfRead MoreEssay about The United States Homeless Population879 Words   |  4 Pagespopulation continues to grow rapidly. Homelessness has been a public health issue for many decades. Often times these individuals feel as though society has turned a blind eye to them. This at risk population is seen by society as lazy or chose to live a life on the streets, but if one would examine this population closely would see that there is more to this at risk population than what society has labeled them as. The forces, which affect homelessness, are multifaceted. Social forces such asRead MoreThemes Of Homelessness992 Words   |  4 PagesThe Problems and causes of homelessness are closely intertwined, with many of the problems of homelessness also sharing common source with the causes of homelessness. Narrative comments are included. There are three central themes that are highlighted in the cases. Mental health plays a large role in the cause and problem of homelessness as displayed by Stephanie’s experience as â€Å"her parents asked her to leave home. Stephanie had suffered from anxieties and bipolar†. Abusive relationships are alsoRead MoreThe Homel essness And Substance Abuse1436 Words   |  6 PagesRunning head: DIVERSITY​1 Diversity: Homelessness and substance abuse Centell Brown Kelley Peterson SW- 751 Perspectives/Chemical Dependency Professor R. Chaisson, PhD., LCSW, BACS Southern University at New Orleans December 10, 2014 Abstract ​Homelessness and substance abuse are often two problems that continue to be linked together. According to the Substance Abuse and Mental Health Administration (2011), research conducted in the past five years indicates thatRead MoreHomelessness Is Becoming An Epidemic1566 Words   |  7 PagesHomelessness in Persons with Persons with Schizophrenia Homelessness is increasingly becoming an epidemic in North America as many cities grabble with this menace. According to the Canadian Observatory on Homelessness, about 35000 Canadians are homeless on a given night, while 235,000 Canadians experience homelessness in a year. According to the Canadian Observatory on Homelessness Homelessness Research Network, â€Å"homelessness is described as the situation of an individual or family without stableRead MoreHomelessness Is The Issue And Problem Of Homelessness1567 Words   |  7 PagesHomelessness Defined: A key issue society currently faces is the issue and problem of homelessness. In January of 2016, approximately 549,928 American individuals were experiencing homelessness (HUD’s 2016 annual assessment, 2016). Most research concerning homelessness agrees that definitions of homelessness vary and that there are several challenges researchers encounter while attempting to study homelessness due the transient nature of homelessness along with other inconsistencies and barriersRead MoreThe Effects Of Homeless Conditions, Drug Abuse, And Mental Illness1464 Words   |  6 Pagesconditions, self-medication and Homelessness. Depending on the severity of the psychiatric disorder, circumstances can lead to a homeless situation or nomadic lifestyle. It will also cover issues like how these influences affect societal issues such as crime violence, abuse, health troubles and communication difficulties with others due to the problems that these individuals have with their thinking process. Key words: Drug abuse, Mental illness, Self-Medication, Homelessness We must bringRead MoreHomeless Veterans Are Becoming More Prevalent Of The United States886 Words   |  4 Pagesveteran is an individual who lives on the streets, in abandoned buildings, vehicles, encampments, shelters, or transitional housing (Veterans Today, 2013). As a matter of fact, homeless veterans do not have a permanent residence under their control. Homelessness in general includes those who fit what Martha Burt, et al. (2004) called â€Å"street homeless†, which they defined as single adults who spend a lot of time on the streets; and the â€Å"chronically homeless†, which they defined as â€Å"being disabled and eitherRead MoreThe Negative Effects Of Family And Family Homelessness1270 Words   |  6 PagesFamily and child homelessness has been a major social problem within the United states since the 1980s (Bassuk). According to the U.S. Department of Housing and Urban Development, it is a problem that affected 79,446 family households in January 2010, a nd over 1.5 million children between the years of 2005 and 2006. Family and child homelessness is a genuine issue that although has increased to 37% of the overall homeless, and is said to have reached an â€Å"historic high† (Bassuk), it has not been discussed

Friday, December 20, 2019

Asian Paints Global Expansion Strategy - 7628 Words

Global Expansion Strategy Executive Summary Asian paint is the market leader with 49% of market share in Indian decorative segment and maintains its position among the top ten players in the world. It is only Indian company operating in India having supply chain management supported by i2 technology. The report also talks about the market share of Asian paint in decorative as well as industrial segment and its growth.The report we made for demostration present condition of Asian paint market in India and new expantion of market accross border.we analysis asian paint Traget marketing and marketin mix and describe about the Global trend and present situations as well as divest and invest return from diffrent countrys.It†¦show more content†¦There are painting lips, online shades cards, cost calculation (based on floor area and number of rooms0 dealer locator and a short of other innovative ser vices. From the perceptual map we can understand that Asian paints, have wider range of products for all type of customers consisting of different income levels. It has a product range from Royal Emulsion, Priced 250-400 which is targeted for up market buyers. Hpcolilen is a product which is targeted for high income and upper middle class \ people. For lowers income group it has UTSAV, TRACTOR EMLSION which priced vary from 40-100 Rupees. These products are mainly targeted to Rural customers. In Industrial segment companies position is relatively weak here Werolac paints captured more than 50% market share. In this segment Asian paints have products like Apcomin synthetic enamel which is used for industrial coating, and Apco synthetic power which is used in automobile sector. In this segment also Asian paints faced stiff competition from Berger and ICI Paints. Bajaj automobiles in the main customer of Asian paints in automotive sector. Asian paints limited with its three business units decorative, industrial International business is one of the largest paint company in India. It has a sell over 300 million liters of paints in 2005-06. Significantly the group has crossed the Rs.3000 crores turnover mark a preset mile stone for the company. Products and itsShow MoreRelatedAnalysis of Asian Paints Limited Essay789 Words   |  4 PagesAsian Paints Limited is an Indian chemicals company which manufactures a wide range of paints for decorative and industrial use. Its vision is â€Å"to become one of the top five decorative coatings companies world-wide by leveraging its expertise in the higher growth emerging markets. Simultaneously, the company intends to build long term value in the industrial coatings business through alliances with established global partners.†2 Asian Paints is Asia’s third largest paint company, with a turnoverRead MoreEdmondson2139 Words   |  9 PagesASIAN PAINTS (INDIA) LIMITED The siege is over, and the time has come for the leader to sally forth into greener pastures. Even as the paints industry is emerging from the shadow of recession, Asian Paints (India) Limited (APIL), is mixing  new  shades to emerge with winning colors. Says their Managing director: With proper planning and a comprehensive approach to issues, we intend to keep pace with the growth of the industry. APIL is actually targeting a growth rate that is higher than the 9 toRead MoreEdmondson2152 Words   |  9 PagesASIAN PAINTS (INDIA) LIMITED The siege is over, and the time has come for the leader to sally forth into greener pastures. Even as the paints industry is emerging from the shadow of recession, Asian Paints (India) Limited (APIL), is mixing  new  shades to emerge with winning colors. Says their Managing director: With proper planning and a comprehensive approach to issues, we intend to keep pace with the growth of the industry. APIL is actually targeting a growth rate that is higher than the 9Read MoreMarketing Plan of Asian Paints Royale Emulsion5236 Words   |  21 PagesCOURSE: MARKETING PLANNING EVALUATION OF MARKETING PLAN OF ASIAN PAINTS Product: Asian Paints Royale Emulsion Prepared by: Abhishek Jain 10P122 10P134 Under the Guidance of Dr. Avinash Kapoor Debjit Ghosh Deepika Mangla 10P136 Kandarp Suchak 10P144 Kartik Luthra 10P147 Naveen Kr. Jindal 10P153 2 CONTENTS OF THE REPORT 1. Acknowledgement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 2. Objective†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦4 PAINT INDUSTRY IN INDIA.....................................Read MoreProject Report on Paint Industries12365 Words   |  50 Pagesâ€Å"A STUDY OF MARKETING STRATEGIES ADOPTED BY VARIOUS PAINT COMPANIES† A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF MASTER OF BUSINESS ADMINISTRATION (M.B.A.) SUPERVISED BY: - RESARCH SCHOLAR’S:- PROF. DEEPAK TALWAR NISHANT KARDA PARESH CHOURASIYA (MRead MoreSwot Analysis Of Holden And General Motors Group1632 Words   |  7 Pagesmanufacturing industry †¢ A swot analysis (strengths, weaknesses, opportunities and threats) of the company †¢ Marketing objectives and target market for Holdens various products and services †¢ Marketing strategies that Holden has implemented †¢ The Successes and failures of these marketing strategies †¢ Conclusion S.W.O.T. Analysis STRENGTHS: - domestic market - reduced labor costs - experienced business units - Strong backing of General Motors has added momentum to growth Read MoreCase Study On Indian Finance998 Words   |  4 Pagesto the Nifty hitting the record breaking point of reference of 10,000. Be that as it may, yesterday the organization detailed 12% decrease in merged net benefit to Rs 664 crore for the June quarter of the current monetary. HDFC Bank detailed 20% expansion in net benefit for the quarter finished June 30 yesterday remained the second pointwise benefactor in driving the file to record highs. One of the main household contract loan specialist Indiabulls Housing Finance yesterday announced a 25% bounceRead MoreProject Report on Consumer Behaviour and Satisfaction on Asian Paints10217 Words   |  41 PagesExecutive summary This project was done at â€Å"Asian paints ltd, Bangalore† gaining an in depth knowledge of marketing analysis of consumer behavior and satisfaction. Marketing is the widest term and can not be learnt in few days or years, many of the organizations before appointing the sales executives, check the ability of the candidates who are capable to sell the products/services, but still many of organizations fail in following their sales and loose grip on the market. If at allRead MoreHow Does Quality Enable Manfield For Be A Niche Player?1767 Words   |  8 Pages1. How does quality enable Manfield to be a niche player? Before we discuss quality as an enabler of Manfield s niche player strategy, we need to understand the essence of being a niche player. According to Porter s generic strategies, companies can create a competitive advantage and compete by strategically positioning itself as a cost leader slashing costs to achieve maximize value as customers perceive or as a benefit leader (differentiator) distinguishing its product/service offerings soRead MoreKh The Powerful And Efficacious General That Khan1401 Words   |  6 Pagesrose to power under the strong leadership of Kublai Khan. The powerful and efficacious general that Khan undoubtedly was, his led his troops to countless illustrious victories during his rule. These included Europe, Persia, and many Central / Eastern Asian entities, expanding along the Silk Road over a time spanning most of the 13th century (Prawdin). This close-to-manic thirst for land continued long after his death, carried on by his grandson Genghis Khan, to eventual ly create the largest empire known

Thursday, December 12, 2019

Advantages and Disadvantages of Using Social Networking in Car Sales

Question: Discuss about the Advantages and Disadvantages of Using Social Networking in Car Sales. Answer: Introduction Social networking can basically be defined as the use of websites or other applications found on electronic devices to interact, share, and socialize with other people who have the same interest. Due to advancement in technology, social networking has been at its peak with many people using it daily to achieve different goals. Many people use social networking to sell or advertise their products while others use it to advertise their services. By use of social networking, many companies have achieved their goals and hence making it one of the best methods to use for any company to increase profits. There are many sites which teach how to carry out social networking and be successful and many people enroll in those sites to sharpen their skills. The first social media site was developed in 1997 and was in existence till 2001 and it was called the six degrees (Holmes and Oloughlin 2014). Since then it has experienced a gradual development and has advanced. This study is designed to evaluate the advantages and disadvantages of using the social media sites for car sales. Many customers who want to buy cars base their search on social media sites and in a research done it was found that many of their car buyers want the social media to evaluate the type they want and the cost associated with that type (TyreeHageman et al. 2014). This research will evaluate the advantages and disadvantages of using the social networking in car sales. Research objectives The main objective of this study is to evaluate the advantages and disadvantages of using social media for car sales. The following are the other secondary objectives of the study. To access the attitude of customers towards social networking in regard to car sales. To determine if there is an increase in car sales contributed by social networking. To research if many car dealers prefer the use of social networking to market the product or not To evaluate if the use of social networking has positively or negatively impacted the sales of cars. Project scope This study will be based on the use of social networking for car sales and will not include any other form of car sales. Also, the study will majorly focus on the advantages and disadvantages of this method of car sales. The study will be carried out globally by use of the online survey. Literature review The use of social media has impacted many businesses in the world. Since the development of social networking from 1997 many businesses have experienced development and have gained a lot of profit due to its use. From that time many companies have transformed from analog to digital marketing whereby they use the internet to market their products (Shaw 2014). Other companies like Amazon and Alibaba have based their sales on the internet only and hence becoming more successful. Also, social networking has not been left out in advertising the services many people or companies offer. The social network analysis This is the process of investigating the structure of networks based on the graph theory to know how well or bad the structures are (Scott 2017). It involves analysis of people or things in the network based on sociology to know the attitude or the perception of those people and the things present in the network at that time. This analysis has its origin from sociologists who lived many years ago like George Simmel and Emile (Mc Carty and Molina 2015). The method of analysis was used early 20th century and its main goal was to analyze the relationship between social groups. This analysis is also in existence today and it helps those people who want to use social networking understand the best methods to adopt for them to be successful. In addition, social network analysis makes it possible for any marketers to know the best market and the best buyers to target. It is done by qualified statisticians who have knowledge in sociology and who can understand the attitude of people in a goo d way. How to carry out Social marketing in the best way There are many factors which one should consider before they start social media marketing. The first factor is the social media measurement. Social media measurement includes the use of analysis tools like surveys to measure the available market before you engage into the marketing strategy. This helps in understanding the investment which should be included in the marketing strategy. Another factor is the social network aggregation which includes the measurement of the best sites which have the target population. This helps in understanding which site one should do more advertisements. Another factor to consider before you start social networking is the cost associated with the advertisements so as to avoid loss and other related unnecessary costs. This helps in reducing the losses which may occur. Advantages of social networking There are many advantages associated with social networking. The following discusions will highlight some of those advantages and explain how they are important. High speed and efficiency Social networking has made communication very easy since one can communicate with another person who is far away in just a few seconds. In a recent research, it showed that communication speed had increased more than three times due to the availability of social media sites like facebook, twitter, and emails among others (Chu and Du 2013). Due to the increased speed, many companies make sales very fast and also customers find it very easy to get the items they want. Reliability Many people value the use of social media for easy access to commodities. They argue that it is more reliable and less expensive as compared to other forms of travelling cost and other associated costs have been minimized. This makes it very easy and more reliable hence making many people and companies adopt the system of social networking. Disadvantages of social networking Social marketing also has some disadvantages. The first disadvantage is cybercrime. Due to development of technology cybercrime has also increased and this has led to the loss of confidence as many people fear to be victims of this crime. Many sites which do online marketing are viewed as scams and hence people dont want to be associated with them. Cyber security has failed to control cybercrime (Broadhust et al. 2014). Cybercrime is sometimes carried out by the people who also practice cyber security hence making it very hard to curb the vice. Another disadvantage of social networking is lack of knowledge in the field. Many people when they hear social networking they think that it is easy and that they should jump into it without even consulting (Carins and Rundle 2014). When they join and invest in it they end up getting loss due to lack of knowledge. The attitude of people is another disadvantage. Many people are ignorant and they believe that social marketing or anything related to the internet is not good and is composed of many vices which should not be accepted in the society. This makes it very hard to convince them to join social media platforms and hence those people may be the targeted customers for a certain commodity and if that happens then the dealers may lack customers if social marketing id the only method to advertise their products. In addition, many people may not be willing to join social media platforms because they dont have the instagramtime or they dont know how to join them. Others may not be willing to join them and hence making it hard to do the social marketing. Social media and car dealers Many car dealers have adopted the use of social networking to carry out their business. Many of them use social sites like Facebook, Instagram, twitter, and other sites to do advertisements. In the process of carrying out the advertisements, they are also able to know their competitors (Armstrong et al. 2014). They use these platforms to upload new models so as to attract customers (JelenChick et al. 2013). Though the networking is used to get customers it also makes them aware of the best seasons to carry out the marketing. The car dealers post pictures on those sites and the people who are attracted end up sharing those pictures on their pages hence making them visible to other people. Through this process, much people are reached and hence making the business grow at a high rate. In a situation whereby a customer buys, the dealers may ship the car to the customers residence area hence making it easy for him or her get the product fast. This leads the customer to recommend much more people to shop with that dealer. This is one of the most important factors which have made car dealers to be motivated to use social networking to carry out their business. The platforms also benefit from these transactions and they become popular hence they also grow and accommodate many customers. Based on this information, it is very important to carry out a study to access the advantages and disadvantages of social networking for car dealers and that is what the study is based on. Research questions The primary research question of this study is What are the advantages and disadvantages of using social networking on car sales? The following are the other research questions of the study. What is the attitude of customers towards the use of social networking in regard to car sales? Is there an increase in car sales contributed by social networking? Do many car dealers prefer the use of social networking to advertise their cars? Has social networking positively or negatively impacted car dealers? Research hypothesis H0 customers have negative attitude towards social networking in regard to car sales Ha customers have a positive attitude towards social networking in regard to car sales H0 there is no increase in car sales contributed by social networking Ha there is increased car sales contributed by social networking H0 many car dealers do not prefer the use of social networks to advertise their cars Ha many car dealers prefer the use of social networks to advertise their cars H0 social networking has negatively impacted car sales Ha social networking has positively impacted car sales Research methodology Research methodology is the process which is used to collect data and analyze it so as to be able to make business decisions based on the data (Mackey and Gass 2015). This methodology should be scientific and verifiable. Also, it should be empirical and based on mathematical and statistical models. The following discussion will explain the methodology of this study. Research type This research will be a quantitative research. There are twelve steps which should be followed while carrying out a quantitative research. The following is a discussion of the twelve steps of a quantitative research. The first step is the formulation of the research problem. The researcher comes up with the problem which he or she wants to base the study on. The problem should be empirical and researchable (Brihla 2016). It should also be a real problem and which when researched on can benefit people. The second step is the formulation of the research objectives. In this step, the researcher comes up with the objectives he or she wants to meet after the research (Ramdhani et al. 2014). There follows the step of the scope of the study. in this step, the researcher explains well where the research will be conducted and gives a justification as to the chosen area to carry out the study is of interest. There follows the step of developing the research hypothesis which will be proved either wrong or correct by the data collected in the process of carrying out the research. The research hypothesis should match with the literature review and the objectives of the study so as to make them scientific hence making the research verifiable and reliable. The hypothesis should also be testable. The next step is the literature review. In this step, the researcher critically evaluates the existing literature under the topic of study. This gives the researcher a solid background of the topic and also enables him or her to be able to identify the gaps in the literature (Abbatielo et al. 2015). Then it follows the step of coming up with a research design which will be used in the study. In this step, the researcher comes up with the design of the study and explains why he chose to use it. The next step is the selection of sample size. The researcher explains the participants who will be included in the study and why they will be included. He or she also explains why the sample size has been decided to be a given number (Hesse-Biber 2013). The sample size is the main determinant of a study and should be selected carefully. Then it follows the process of data collection. In this step, the researcher collects data in the defined rules of the study. The data is then presented for analysis. in the step of analysis it where the data is transformed to digital and analyzed to make its information and get insights from it. The last step is the communication of the findings and recommendation. The researcher in these steps communicates the findings of the research and gives recommendations of what should be done. Research design This is the conceptual framework within which the study is carried on. It includes a blueprint of data collection and analysis (Harrison 2013). This study will use descriptive design where data will be collected by use of a questionnaire based on an online survey. The target population The target population of this study will be online car dealers. The researcher will conduct different sites which sell cars through networking and request them to fill survey questions which will be used for analysis. There will be a designed questionnaire which will be used to carry out the survey. Sampling procedures and sample size The research will include a sample size of 300 participants who will fill the survey questions. However, there will be no sampling method which will be used because the data will be collected online by use of a survey and hence there will be no sample selection. But there will be rules which will guide the participants to be included. Their participants must be car dealers and specifically doing the business online. They should also be willing to fill the survey. The survey will only be posted on sites which are composed of car dealers. Instrumentation The questionnaire will be the only tool for data collection and the questionnaires will be posted online on the sites which are composed of car dealers. The researcher will request them to fill the questionnaires. Once the limit of 300 participants will be reached, the researcher will collect the data and make it ready for analysis. Research limitations This research, has few limitations. The first limitation is that some of the car dealers may not be willing to participate in the study hence important information may be lost. The second limitation is that the data may not be more reliable since it will be collected online and some people may fill the questioners and they are not car dealers. Time schedule This research will be carried on for a period of two months. the following is the time schedule of the study. the first month first week understanding theoretical part of the study second week designing the questionnaire third week uploading the questionnaire to sites of car dealers fourth week monitoring the progress of the data collection online the second month first week retrieving the data for analysis second week data analysis third week communications of the findings fourth week communication of the recommendation Conclusion In conclusion, this study will be scientific and its main goal will be to determine the advantages and disadvantages of social networking for car dealers. The research will be carried out in the car dealers sites so as to get legit information and make it reliable. Car dealers will be requested to fill out the questionnaires so as to get genuine data for the study. References Abbatiello, S.E., Schilling, B., Mani, D.R., Zimmerman, L.J., Hall, S.C., MacLean, B., Albertolle, M., Allen, S., Burgess, M., Cusack, M.P. and Gosh, M., 2015. Large-scale interlaboratory study to develop, analytically validate and apply highly multiplexed, quantitative peptide assays to measure cancer-relevant proteins in plasma.Molecular Cellular Proteomics,14(9), pp.2357-2374. Armstrong, G., Kotler, P., Harker, M. and Brennan, R., 2015.Marketing: an introduction. Pearson Education. Brilha, J., 2016. Inventory and quantitative assessment of geosites and geodiversity sites: a review.Geoheritage,8(2), pp.119-134. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B. and Chon, S., 2014. An analysis of the nature of groups engaged in cybercrime. Carins, J.E. and Rundle-Thiele, S.R., 2014. Eating for the better: A social marketing review (20002012).Public Health Nutrition,17(7), pp.1628-1639. Chu, S.K.W. and Du, H.S., 2013. Social networking tools for academic libraries.Journal of librarianship and information science,45(1), pp.64-75. Harrison, R.L., 2013. Using mixed methods designs in the Journal of Business Research, 19902010.Journal of Business Research,66(11), pp.2153-2162. Hesse-Biber, S.N., 2013. Feminist approaches to mixed methods research.Feminist Research Practice: A Primer, p.363. Holmes, K.M. and O'loughlin, N., 2014. The experiences of people with learning disabilities on social networking sites.British Journal of Learning Disabilities,42(1), pp.1-5. Jelenchick, L.A., Eickhoff, J.C. and Moreno, M.A., 2013. Facebook depression? Social networking site use and depression in older adolescents.Journal of Adolescent Health,52(1), pp.128-130. Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Routledge. McCarty, C. and Molina, J.L., 2015. Social network analysis.Handbook of methods in cultural anthropology. Second edition. Rowman and Littlefield, Lanham, Maryland, USA, pp.631-657. Ramdhani, A., Ramdhani, M.A. and Amin, A.S., 2014. Writing a Literature Review Research Paper: A step-by-step approach.International Journal of Basic and Applied Science,3(1), pp.47-56. Scott, J., 2017.Social network analysis. Sage. Shaw, M., Team Deal LLC, 2014.Internet based e-commerce platform for use by consumers using social networks. U.S. Patent Application 14/334,534. TyreeHageman, J., Kurani, K.S. and Caperello, N., 2014. What does community and social media use look like among early PEV drivers? Exploring how drivers build an online resource through community relations and social media tools.Transportation Research Part D: Transport and Environment,33, pp.125-134.

Wednesday, December 4, 2019

Security Management And Migration Platformsâ€Myassignmenthelp.Com

Question: Discuss About The Security Management And Migration Platforms? Answer: Introducation Most modern IaaS infrastructure will offer adequate security features, however, the leasing organization (like Webb) should enforce them in their own resources rather than expect the service providers to do so. Nevertheless, there are key types of security measures to implement: Data encryption its outlined as the main and most important methods of protecting data as it meticulously manages security systems including the access keys as they are thoroughly encrypted. Network encryption most cloud service providers (CSP) will empathize on the encryption of the communication channel to deter interception threats that prey on the vulnerabilities of data transportation. Access control to create accountability, Webbs Stores, must know the people accessing their critical database hosted in the IaaS resources. This accountability is enforced using access control measures that manage users activities. Finally, a security access brokers known as CASBs, these are tools that help administrators to identify and locate risks within the database thus providing a high-end level encryption (Walker, 2015). Benefits and issues of the security features Benefits: First, protection against attacks more so, denial of service attacks that intercept cloud services. Security of the data the features would protect the critical database and its data. Flexibility with good security the users do not worry about server crashes or excessive down time due to traffic congestion. Regulatory compliance these features would ensure Webbs Stores meet the regulatory requirements for financial and personal data (Walker, 2015). Issues: Data privacy most of these procedures would require the users to surrender their personal data which could infringe on their personal and privacy rights. Ambiguity in security roles challenges may arise between the CSP and the store because of the considerations of access control and data ownership. Conflict of security features some security measures may identify others as intrusion thus may regularly disable or slow the entire IaaS infrastructure (Mehtra, 2014). Risks of cloud migration Database risks Security although most CSPs will have better security features than in-house facilities, migrating an entire database to a foreign infrastructure raises the concerns of its security. Furthermore, the database will operate in a different environment where the physical accountability is non-existence on behalf of the owner (leasing party, Webbs Stores). Migration moving an entire database resource to the cloud is a daunting task that requires project-like considerations. Therefore, it requires implementation procedures that might fail. Advanced change the database will have many changes that may affect its functionalities more so, to the end users (Healy, 2015). IaaS infrastructure Security problems IaaS offers excessive control to the user who may fail to implement the necessary security features thus expose the entire structure to attacks. For one, access may be given to unknown and unverifiable parties. Control having excessive control does not necessarily guarantee complete control and thus the subscriber may lose control over the resources hosted in the cloud infrastructure. Downtime when all is said and done, the IaaS platform will require IT resources to operate more so the internet which may fail or have downtime periods. Therefore, it will subject the infrastructure to delays and downtime periods (Healy, 2015). Communication between IaaS (CSP) and Webbs Stores Data security any communication conducted between the IaaS resource and the store may be intercepted through various attack methods such as malware intrusions. Therefore, the subscriber must be aware of this risk and apply the necessary solutions. Data privacy having hosted the data online, the communication between the two parties will mostly involve the access of confidential information stored in the cloud resource. Moreover, the subscriber will regularly update this resource with confidential information which is a serious risk. Record retention the communications are subject to retention requirements which can also be used to compromise the infrastructure if they fell into the wrong hands as they may contain sensitive data including access procedures (Romes, 2013). Backup and archival of records Risks of cloud backups Backing up data Large backup window on-premise backups take shorter windows as the process is conducted using LAN speeds. In fact, the only limitation is on the tapes throughput, however, cloud backups are limited by the internet resources i.e. speeds, bandwidth, and throughput. Therefore, congestions and delays will put the backup procedures at risk particularly when faced by a time sensitive scenario. Small restoration window consequently, when faced with a disaster, the subscribing organization will require all its data at once, an outcome that will be delayed by the access factors i.e. speeds, throughput and bandwidth. Loss of data with the onsite resource (tapes) the user can backup data based on a certain framework e.g. weekly, monthly and yearly. This outcome can help retrieve certain archives based on the users needs, however, with cloud resources, backups overwrite the previous versions. Therefore, older versions of data cannot be accessed if needed (Manes, 2012). Storage of data in the cloud Access risk with on-site resources, storage is closely monitored which ensure the right personnel accesses it. However, with cloud storage, the subscribers depends on the CSP to ensure the data is secure and that the storage is only accessed by them. Storage management consider the number of subscribers supported by a single CSP. Now, due to the number of subscribers, the CSP may fail to isolate the data properly thus leak information from one subscriber to another. Moreover, misconfiguration is a notable risk that may expose the storage facilities to the public at large. System outage unlike in-house resources, a subscriber storage resource is usually subject to downtimes and outages just like any other online resource. Therefore, despite the advantages offered by cloud storage, there is always the possibility of losing access to the data. This outcome can be caused by many factors including the existence of system breaking bugs (Healy, 2015). Retrieval of data Retrieval time the critical concern as the retrieval process may be time sensitive thus delay the application of the said data. While using the cloud resource, the subscribers retrieval process is subject to the factors of accessing online resources which are quite extensive. Cybercrime several serious attacks have occurred in the recent past which outline the risk of using cloud infrastructures. Now, while retrieving data from a compromised cloud facility, the process can be tracked back to the subscriber to infect the in-house facilities. Therefore, a subscriber can deliberately grant access to intruders while having the false assumption that they are retrieving their original data (Sovetkin, 2017). How DR plan is affected by the cloud resource In general, the DR plan considered by Webbs Stores will change into a cloud DR having a virtualization approach. In this approach, the entire server which includes the operating systems, Softwares and system patches will be combined to form a single virtualised structure. Therefore, in case of a disaster, the entire copy including the data lost will be required in a matter of minutes if the single virtual structure is physically acquired from the CSP. This outcome will drastically affect the companys DR plan as it will use fewer resources while meeting the same objectives. Moreover, the virtualization tools and resources will be independent of the hardware resources. Therefore, the software resources such as OS, applications and patches will be transferred from one data centre to another without reloading each and every operational component. Again, this outcome will reduce the overall recovery time used to restore resources in case of disasters. In all, with cloud resources, Webbs backup and restoration strategy will become more cost effective while having a better recovery time. These outcomes will be facilitated by the benefits outlined above and also by the ability to tune the performance of the cloud resources based on the immediate needs (tech, 2017). Cloud access protection IaaS infrastructure AAA strategy IaaS offers excessive control to the user which means there are a lot of resources disposed to the subscriber. The AAA strategy would require the authentication, authorization and accountability of resources. This can be done using verifiable all-inclusive tools available in the market including some that are provided by CSPs. Resource management the organization should monitor all the resources exchanged between them and the CSP in order to verify the security of the IaaS structure. In essence, the resource should not alter in operation (Mehtra, 2014). Ms SQL cloud server instance SQL authentication when the logical server is created for the SQL instance, specific access resources are given including username and passwords. Now, these resources should me made using the best security procedures, for instance, they should be unique having strong and undetectable characters. Firewall this security feature will manage the access given to the cloud instance. This process will be conducted using the access information presented by the users more so, the IP addresses (Microsoft, 2017). Cloud network structure Network management intrusion detection systems should be used to monitor the services offered by the cloud infrastructure. These systems would alert the administration of any access problems/threats thus help mitigate them before they cause any substantial damage. Firewalls similar to the cloud instance, the network structure should only be accessed by verifiable members. This consideration would be made using the firewalls which would also manage the data streams based on a verifiable checklist (Microsoft, 2017). Cloud back-up and restoration structure CASB backup and restoration procedures will involve two different systems and in this case, two different parties will be used. Now, the CASB as outlined before will offer end to end access protection based on the user's considerations. Furthermore, this platform will offer endpoint protection using proxies and verifiable APIs. Encryption also known as tokenization, encryption would ensure that the backup procedures are conducted safely despite that nature of the channels used. Cloud resources will operate within the online platform where security is never guaranteed. Therefore, by tokenizing the backup and restoration data, the integrity and authenticity of the resources are maintained more so after the occurrence of a disaster (Symantec, 2017). References Healy, R. (2015). The Top 5 Risks of Moving to the Cloud. Retrieved 09 September, 2017, from: https://www.annese.com/blog/top-5-risks-of-moving-to-the-cloud. Manes, C. (2012). What are the risks of backing up your business data in the cloud? Disaster recover journal , Retrieved 09 September, 2017, from: https://www.drj.com/articles/online-exclusive/what-are-the-risks-of-backing-up-your-business-data-in-the-cloud.html. Mehtra, H. (2014). Issues and Standards in Cloud Security. Retrieved 09 September, 2017, from: https://www.cse.wustl.edu/~jain/cse571-14/ftp/cloud_security/index.html. Microsoft. (2017). Azure SQL Database access control. Microsoft Azure, Retrieved 09 September, 2017, from: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-control-access. Romes, R. (2013). The Benefits and Risks of Cloud Computing. Cla connect, Retrieved 09 September, 2017, from: https://www.claconnect.com/resources/articles/the-benefits-and-risks-of-cloud-computing. Sovetkin, M. (2017). IaaS Security: Threats and Protection Methodologies. eSecurity planet, Retrieved 09 September, 2017, from: https://www.esecurityplanet.com/network-security/iaas-security-threats-and-protection-methodologies.html. Symantec. (2017). Symantec Cloud Data Protection Security. Symantec, Retrieved 09 September, 2017, from: https://www.symantec.com/products/cloud-data-protection-security. tech, O. (2017). Benefits of Disaster Recovery in Cloud Computing. Retrieved 09 September, 2017, from: https://www.onlinetech.com/resources/references/benefits-of-disaster-recovery-in-cloud-computing. Walker, S. (2015). 5 Benefits of a Cloud Computing Security Solution. TBCONSULTING, Retrieved 09, September, 2017, from: https://www.tbconsulting.com/blog/5-benefits-of-a-cloud-computing-security-solution/.