Wednesday, October 30, 2019

International Business Entity of Gap Inc Assignment

International Business Entity of Gap Inc - Assignment Example Almost 12.4 % of all business establishments in US are involved in the retail industry and the gross margin of the industry is between 31% and 33%. There is stiff competition in the retail industry and this has seen the sales of Gap Inc drop significantly. Apart from the drop in sales, the company has also been experiencing a decrease in the number of customers. This prompted the company to explore strategies of improving on their sales. The company adopted some measures such as markdowns, aggressive promotion and product campaigns among others. This has caused a recent improvement in the sales of the company though slight. A financial analysis of Gap Inc is critical at this time to determine the financial soundness of the company. Financial analysis is the process of selecting, evaluating and interpreting information from the financial statements of a company in order to obtain information for decision-making. Financial statements have to be interpreted in order to make sense to dec ision makers in the firm. Financial analysis makes sense out of the financial statements and this enables decision-making. Financial statement analysis is therefore a very important tool for the success and growth of an organization. It provides information for decision making either outside or inside the organization. The main tool used to carry out financial analysis is the ratio analysis. ...data include the press releases about the economy or industry performance and economic data such as the gross domestic product (Block & Geoffrey, 2009). It is important for the financial analyst to make a careful selection of relevant data for analysis. All data must be obtained before beginning the process. There are numerous financial ratios. A ratio is an expression of quantitative relationship between elements (Helfert, 2001). Financial ratios are classified into various categories such as liquidity ratios, profitability ratios and activity ratios among others. These ratios are classified based on the information they provide for decision makers of the company. Gap Inc. Mission The mission statement of Gap Inc. is that the firm never stops moving. The firm takes many talented, passionate and dedicated workers across the world to deliver the products of the firm and enable customers have their expected and wonderful shopping experience. Financial Ratio Analysis 1. Ratios measuring the Liquidity of Gap Inc. The ratios are vital for the operations of the firm since they help in determination of the ability of the corporation from meeting its daily operations. Gap Inc. is expected to have high liquidity in order to assure its stakeholders of continued operations. Therefore, high liquidity ratios are favorable for the corporation. These assets are also known as liquid assets and they include cash, bank deposits, stock, and notes receivable among others (Vance, 2002). a) Current ratio Current ratio is the ratio of current assets to current liabilities and it is an indicat or of the ability of a company to meet current liabilities using current assets.

Monday, October 28, 2019

Risk & Return Essay Example for Free

Risk Return Essay What are investment returns? What is the return on an investment that costs $1,000 and is sold after 1 year for $1,100? Investment returns is the expectation of earning money in the future on the amount of money invested. The return is the financial performance of the investment. The return is the difference between the amount invested and the amount you are returned after said investment. There are two ways to show return on investment. 1. By dollar return. Amount to be received – Amount invested = $1,100 $1,000 = $100 in return The problems with expressing returns in dollars, you don’t know the size of the investment for that dollar return and you don’t know the timing of the return. 2. Rate of Return or percentage returns Amount received – Amount invested / Amount invested = $100 / $1000 = . 10 = 10% The rate of return â€Å"standardizes† the dollar return by considering the timing b. (1) Why is the T-bill’s return independent of the state of the economy? Do T-bill’s promise a completely risk-free return? Beta coefficients are the weighted average of its individual securities’ betas. You will add each securities beta to find the portfolio’s beta. i. Suppose you have the following historical returns for the stock market and for the company P. Q. Unlimited. Explain how to calculate beta, and use the historical stock returns to calculate the beta for PQU. Interpret your results. See attached. Calculate betas using historical data. A regression line is fitted through the points of the market returns (x-axis) and company’s returns (y-axis) and the slope of that line provides an estimate of the stock’s beta.

Saturday, October 26, 2019

McDonalds: Evolution of the Food Industry Essay -- Management

McDonald's: Evolution of the Food Industry History McDonald's has had a global impact on the food industry. McDonald's developed a revolutionary idea known today as fast-food. This impact began in 1930 when Maurice and Richard McDonald left New Hampshire seeking to make a fortune in Hollywood, started up a drive-in restaurant in San Bernardino. Unlike so many other food-service operations at the time, McDonald's came up with new ideas that turned the usual slow paced dinner into a finely tuned engine. McDonald's offered only a nine-item menu with burgers, French fries, shakes, and pies. They also eliminated seating, and used paper and plastic utensils instead of glass and porcelain. Like Henry Fords assembly line, McDonald's incorporated this idea into their food service, letting them serve hamburgers in less then sixty seconds. The menu was extensively cheaper then competitors which due to the above changes. Although the McDonald's business was doing well, it wasn't until 1954 when Ray Kroc saw the operation that it started to develop into the McDonald's of today. Ray Kroc was a fifty-two year old milk-shake machine salesman at the time and decided to check out McDonalds due to their odd order of eight milk shake mixers for one restaurant. Most of Kroc's customers purchased only one milk shake mixer, and a max of two. Kroc was curious to see what kind of operation needed the capacity to churn so many milk shakes. What Kroc saw that day in 1954 when he pulled up to McDonald's was like nothing he had ever seen. Kroc is quoted as saying "This had to be the most amazing merchandising operation I'd ever seen." Although the McDonald brothers were content with their restaurant, Kroc saw the future and where this idea ... ...'s now knows how important cleanliness is to customers in deciding where to eat. Another interesting look into the future of McDonalds is the ability to bring your laptop into the restaurant and surf the internet while you eat. This new technology brought by McDonald's is in hope of attracting new customers and building customer loyalty. The target of this move is aimed at the younger generation, and the business person on the go. McDonald's has already built a few of these innovative restaurants in early 2003. McDonald's has also opened a few of the innovative restaurants called McCafe. These new cafà © type shops will not resemble that of any other normal McDonalds. The customers will get to choose from premium coffees, muffins, pastries, bagels, and McMuffins. McDonalds believes that the McCafe will do well because of the popularity of McDonald's breakfast.

Thursday, October 24, 2019

Domestic Violence Speech

Domestic Violence Against Women Introduction On May 2, 1982, Michael Connell visited his estranged wife Karen and their son Ward. Karen and Michael had been separated for more than a year but were seeing each other. A friend of Ward’s also visiting and the four of them were going on a picnic. They never made it. At around noon, Karen staggered from the house, bleeding profusely from the neck. She collapsed into a neighbor’s arms, gasping that her husband had stabbed her and was still in the house with their 5 year-old son and his friend. The South Pasadena Police arrived on the scene to investigate. After several attempts to make contact with Michael or the children failed, they contacted the L. A. Sherriff’s SWAT team. The SWAT team, using a bullhorn, requested anyone inside the house come out. Two boys walked out of the house with their hands up, pleading, â€Å"Don’t shoot; we’re the good guys. † The SWAT team forced entry into the house at about 3:00. They found a man lying on the bathroom floor. He had massive slash wounds to his neck area and a stab wound to his chest. The wounds were self-inflicted. Michael Ward Connell was dead. At the same time, Karen was undergoing an operation at Huntington Memorial Hospital. She had lost seven pints of blood, and her vocal cords had been severed. Her young son Ward had saved her life by jumping on his father’s back and hitting them, screaming, â€Å"Don’t hurt my Mom! † The coroner’s report stated, â€Å"Decedent apparently had marital problems with his wife for quite some time. † Karen and Ward had been residents of Haven House, a refuge for battered women and their children. The Story that Shocked the Country At 12:05 a. m. n June 13, 1994, Nicole Brown and Ronald Goldman were found with their throats slit and heads partially decapitated outside Brown's Bundy Drive condominium in the Brentwood area of Los Angeles, California. Her two children, Sydney (age 8) and Justin (age 5), were asleep inside in an upstairs bedroom. O. J. Simpson and Nicole Brown Simpson had divorced two years earlier. Evidence found and collected at the scene led police to suspect that O. J. Simpson was the murderer. Nicole had been stabbed multiple times through the throat to the point of near decapitation; her vertebrae were almost severed. Simpson was arrested and charged with the double murders. Three days later Simpson was arraigned and pleaded not guilty to both murders. During the trial prosecutors argued that Simpson killed his ex-wife in a jealous rage. The prosecutors opened it case by playing a 9-1-1 tape of Nicole Brown Simpson expressing fear that Simpson would physically harm her. The prosecuting spent the opening weeks of trial presenting evidence that Simpson had a history of physically abusing Nicole. However, after nine months of lengthy testifying and cross examinations O. J. Simpson was acquitted. The drama and tragedy of woman abuse will touch most of us, at some time in our lives, in a very personal way. This could happen directly as a result of our own intimate relationships with lovers or through the experience of some family members and or friends. Whether or not we have been raised in an abusive family environment, we are almost certainly going to have close contact with, and be affected by, someone who has. Domestic violence is on the rise in most countries around the world. Domestic violence is perpetrated against women in most cases. Every 15 seconds a woman is battered. Two to four million are abused each year and 4,000 of them die. Every 45 seconds someone in the United States is sexually assaulted. Domestic violence can be easily distinguished as being a disease which spreads rapidly and occurs in all religious groups, all races, relationships and to people of all ages. The roots to domestic violence lie in the soil of the patriarchal family. The belief that wives are the possessions of a male â€Å"head of household† who should control the behavior of all other family members is deeply embedded in social traditions. You may say to yourself this type of crime could never happen to me. To help determine if you have been a victim unaware let’s define domestic violence or sometimes called intimate partner violence (IPV) to determine if you or someone you know or love has ever been a victim of domestic violence. Domestic violence as defined by The U. S. Office on Violence Against Women (OVW) is a â€Å"pattern of abusive behavior in any relationship that is used by one partner to gain or maintain power and control over another intimate partner. The definition adds that domestic violence â€Å"can happen to anyone regardless of race, age, sexual orientation, religion, or gender†, and that it takes many forms, including physical abuse, sexual abuse, emotional or psychological abuse, and verbal abuse. Type of abuse To gain a better understanding of these different types of forms that abuse may have let’s characterize the most common ones in detail: Physical abuse is abuse involving contact intended to cause feelings of intimidation, pain, injury or other physical suffering or bodily harm. It often includes hitting, kicking, biting, shoving, restraining, slapping, punching, choking, and other types of contact that will result in physical injury to the victim. Physical abuse can also include behaviors such as denying the victim of medical care when needed, depriving the victim of sleep or other functions necessary to live, or forcing the victim to engage in drug/alcohol against her will. Sexual abuse is any situation in which force is used to obtain participation in unwanted, unsafe, or degrading sexual activity constitutes sexual abuse. Forced sex, even by a spouse or intimate partner with whom consensual sex has occurred, is an act of aggression and violence. The National Coalition Against Domestic Violence reports that between one-third and one-half of all battered women are raped by their partners at least once during the relationship. Furthermore, women whose partners abuse them physically and sexually are at a higher risk of being seriously injured or killed. Emotional abuse is defined as any behavior that threatens, intimidates, undermines the victim’s self-worth or self-esteem, or controls the victim’s freedom. This can include threatening the victim with injury or harm, telling the victim that they will be killed if they ever leave the relationship, and public humiliation. Constant criticism, name-calling, and making statements that damage the victim’s self-esteem are also common forms of emotional abuse. Often perpetrators will use children to engage in emotional abuse by teaching them to harshly criticize the victim as well. Emotional abuse includes conflicting actions or statements which are designed to confuse and create insecurity in the victim. These behaviors also lead the victim to questions themselves, causing them to believe that they are making up the abuse or that the abuse is their fault. Emotional abuse can include humiliating the victim privately or publicly, controlling what the victim can and cannot do, withholding information from the victim, deliberately doing something to make the victim feel diminished or embarrassed, isolating the victim from friends and family, implicitly blackmailing the victim by harming others when the victim expresses independence or happiness, or denying the victim access to money or other basic resources and necessities. Verbal abuse is a form of abusive behavior involving the use of language; it is a form of profanity that can occur with or without the use of expletives. Abuses can ignore, ridicule, disrespect, and criticize others consistently, manipulate words, falsely accuse, make others feel unwanted and unloved, threaten economically, isolate victims from support systems, demonstrate Jekyll and Hyde behaviors, either in terms of sudden rages or behavioral changes, or where there is a very different â€Å"face† shown to the outside world verses with victim. Why does she stay? People who have never been in an abusive relationship may wonder,† Why doesn’t she just leave? † There are many reasons why a woman may not leave an abusive relationship. She may have little or no money and have way to support herself or her children. She may reach out for help and find that all the local domestic violence shelters are full. She may not be able to contact friends and family who could help her. Or she may worry about the safety of herself and her children if she leaves. But if she does leave, victims often lack specialized skills, education, and training that are necessary to find gainful employment. In 2003, thirty-six US cities cited domestic violence as one of the primary causes of homelessness in their areas. It is also reported the one out of every three homeless women are homeless due to having a domestic violence relationship. Laws and Regulations Education concerning domestic violence has come a long way, but it still has a ways to go. The response to domestic violence is typically a combined effort between law enforcement, social services, and health care. The role of each has evolved as domestic violence has been brought more into public view. Domestic violence historically has been viewed as a private family matter that need not involve the government or criminal justice. First passed in 1994, the Violence Against Women Act (VAWA) made domestic violence and sexual assault crimes. The VAWA created new punishments for these crimes and gave agencies helping victims more funding to improve their services. In 2000, the VAWA was re-authorized, meaning that Congress and the president agreed to renew the law. In addition to re-authorizing the law, stalking and dating violence were added to the list of crimes covered by the law. Also, more funding was added for legal aid programs for victims. If you’re a victim of abuse or violence at the hands of someone you know or love. Get immediate help and support. The National Domestic Violence Hotline can be reached 24 hours a day, 7 days a week at 800-799-SAFE. Conclusion everyday world could it be you, your roommate, your best friend or neighbor. if you’re a victim of abuse of violence at the hands of someone you know or love get immediate help and support. You’re not alone. The National Domestic Violence Hotline can be reached 24 hours a day, 7 days a week at 800-799-SAFE. Sometimes its hard and confusing to admit that you are in an abusive relationship or to find a way out. There are clear signs to help you know if you are being abused. If you person you love or live with does any of these things, it’s time to get help: * Monitors what you’re doing all the time * Criticizes you for little things * Constantly accuses you of being unfaithful Prevents or discourages you from seeing friends or family, or going to work or school * Gets angry when drinking alchol or uses drugs * Controls how you spend your money * Controls your use of needed medicines * Humiliates you in front of others * Destroys your property or things you care about * Threathens to hurt you, the children, or pets, or does hurt you (by hitting, beating, pushing , shoving, punching, slapping, kicking or biting) * Uses or threatens to use a weapon again st you * Forces you to have sex against your will * Blames you for his violent outbursts

Wednesday, October 23, 2019

Determination of the amount of dissolved oxygen Essay

Topic : Determination of the amount of dissolved oxygen in a water sample by iodometry-the winkler’s method. Objective: To determine the amount of dissolved oxygen in a water sample by iodometry- the winkler’s method. Apparatus: volumetric pipette, 3 conical flask, burette, burette clamp, Pasteur pipette, reagent bottle, conical flask stopper, retord stand, white tile Materials: 2 ml manganese sulphate solution, 2 ml alkaline-iodine solution, 0.025M sodium thiosulphate solution, 2ml concentration sulphuric acid, starch solution Procedure 1. When sampling water, care must be taken to ensure that a good representative sample of the water to be analyzed is obtained. For most purposes, this includes attention to dissolved gases. Therefore, the water sample should be taken in a clean bottle which must be filled to overflowing and tightly sealed with stopper without introduction of air. If the water is sampled from a tap, it must be allowed to run for at least 5 minutes prior to sampling. For this purpose, you may collect the water into a 1 L reagent bottle fitted with a stopper. 2. The stopper is removed carefully from the conical flask and 2 mL of the manganese sulfate solution is added, discharging the reagent from the tip of a pipette put well below the water surface. Stopper is replaced. 3. Similarly, 2 mL of the alkaline-iodide solution is introduced. 4. The stopper is placed in the bottle, be sure that no air becomes entrapped. Some overflow may occur. The content is mixed thoroughly by inversion and rotation. Manganese hydroxide is precipitated and will settled on standing. 5. When the precipitate has settled, 2 mL of concentrated sulfuric acid is introduced with the tip of the pipette well below the surface of the solution. 6. The stopper is replaced and mixed until the precipitate dissolves completely. The dissolved oxygen now liberates free iodine from the potassium iodide present. 7. Pipette 200 mL of the acidified sample into a 500 mL conical flask and titrate with 0.025 M sodium thiosulphate until the solution becomes pale yellow. 8. Add a few drops of starch indicator and continue the titration to the disappearance of blue color.  (If the blue color doesn’t appear after adding starch, repeat the titration and adding starch before start of titration ) 9. Repeat the titration twice. Treatment of data: Titration number 1 2 3 Final volume (cm3) 18.0025.5018.50 Initial volume (cm3) 10.0018.0025.50 Volume used (cm3) 8.007.507.00 Average volume of titrant required for titration = 7.50 cm3 Calculation Concentration (ppm) of dissolved oxygen in the water sample. Mol of S2O3 2- used=0.0001875mol Mol of S2O3 2- =0.000046875mol Mass of O2=[0.000046875Ãâ€"2(15.999)]=1.4999mg 1000ml of tap water=7.5mg O2 Concentration of DO in water sample=7.3mg/L Discussion: The Winkler test is used to determine the concentration of dissolved oxygen in water samples. Dissolved oxygen (D.O.) is widely used in water quality studies and routine operation of water reclamation facilities. An excess of manganese (II) salt, iodide (I–) and hydroxide (OH–) ions is added to a water sample causing a white precipitate of Mn(OH)2 to form. This precipitate is then oxidized by the dissolved oxygen in the water sample into a brown manganese precipitate. In the next step, a strong acid is added to acidify the solution. The brown precipitate then converts the iodide ion (I–) to iodine. The amount of dissolved oxygen is directly proportional to the titration of iodine with a thiosulfate solution. Iodemetry reacts directly, fast and quantitively with many organic and inorganic substances. Because of its relatively low, pH independent redox potential and reversibility of the iodide/iodine reaction, iodometry can be used both to determine amount of reducing agents and of oxidizing agent. In my first titration, initial reading is 10.00 and final reading is 18.00. The titrants used is 8.00. In my second titration, initial reading is18.00 and final reading is 25.50. The titrants used is 7.50. In my third titration, my initial reading is25.50 and my final reading is 18.50. The titrant used is7.00. Adequate dissolved oxygen is necessary for good water quality. Oxygen is a necessary element to all forms of life. Natural stream purification processes require adequate oxygen level in order to provide for aerobic life form. As dissolved oxygen levels in water drop below 5.0mg/L, aquatic life is put under stress. The lower the concentration, the greater the stress. Oxygen levels that remain below 1-2mg/L for a few hours can result in large fish kills. Total dissolved gas concentration in water should not exceed 110 percent. Concentration above this levels can be harmful to aquatic life. Conclusion: The concentration of DO in tap water is 7.5ppm.

Tuesday, October 22, 2019

The History of Riverview essays

The History of Riverview essays Riverview Park was an amusement park that ran from 1904 to1967. It was Chicagos first amusement park. It was billed as the worlds largest Amusement Park throughout its 64-year popularity. To many it was a rite of passage and their earliest child hood memories. It was a place of fabulous family outings, a magical kingdom where good friends could go for a terrific time, and eventually a romantic spot. Riverview was located on Western and Belmont Avenues in Chicago. It was surrounded by the Chicago River and Lane Tech High School. The Der Nord Chicago Schuetzenverien, a spin-off group of the Kriegs Verein of Chicago, purchased the land bounded by the Chicago River and the above avenues in order to use it as a shooting range. They later changed their name to the North Chicago Sharpshooters Association. The 22-acre park was dubbed Schuetzen Park by the Germans, and Sharpshooters Park by the locals, who began asking the private association if their grounds could be rented for picnics . Around the turn of the century, the Sharpshooters Association dissolved and two members purchased the land. The two members were Wilhelm (William) A. Schmidt, a baker, and his partner George Goldman. Wihelm Schmidt put in swings and some rides for the ladies and children and Riverview was born. After it had opened Wihelms son George began to expand the park with ideas he had picked up in Europe from such parks as Tivoli Gardens. He suggested that they add rides to grounds and with the help of a financial backer Riverview became a full-blown amusement park in 1904. With the opening of the new Riverview Amusement park came three substantial rides. The three great rides were the Strat-O-Stat plane, the Carousel, and The Chutes. The first ride, the Start-O-Stat was also known as the Aero-O-Stat Plane. It was a plane that circled around the center tower and began to pick up speed and height as the rid...

Monday, October 21, 2019

Facebook Author Pages Is It Still Worth Your Time

Facebook Author Pages Is It Still Worth Your Time A Facebook Author Page, Still Worth It? Facebook’s decision a few years ago to limit page owners’ â€Å"organic reach†- and force them to pay to reach their followers- saw many authors getting frustrated at the dwindling number of fans who saw their posts. Several decided to shut down their Facebook author page altogether and switch to an â€Å"author profile†, a dangerous tactic as Facebook has strict rules about profiles and in particular profile names.As indie author Jerry Stoute puts it: â€Å"First you work your tail off to get followers, then Facebook bleeds you to reach them through boosting. How about Facebook allow all your posts to be seen by your followers?†Is Facebook being unfair? Should you really bother growing a fanbase there if you have to pay to reach it afterward? The short answer is yes. For the long answer, we actually did a bit of research on different Facebook writing groups, asking authors how and why they keep a Facebook author page.But I'll only reach 10% of my fans†¦You might not reach everyone of your fans when you post something on your Facebook author page, but this is the same on other big social networks. Your tweets are seen by only a fraction of your Twitter following - not that Twitter hides them, but they soon get buried under hundreds of other tweets in your followers’ feeds. The same goes for Pinterest, or Instagram.So, sure, say you’ll only reach 10% of your Facebook followers, that’s still something you can take advantage of. The way Facebook’s algorithms work to show users content is through analyzing what content you interact with. The more a given user will like, comment or share your updates, the more they will keep seeing them.This means that these 10% you will reach will be your true, core Facebook fans. You definitely want to stay in touch with those, as contemporary romance author Christine Claire MacKenzie explained to us: â€Å"FB is the number one place I connect with fans. FB is where readers reach out to me. It's a slow process to build a valid reader base of rabid fans, but it's well worth the effort.†How can I increase my  Facebook Author Page reach?How about, instead of reaching 10% of your fans when posting, you reached 50%? You don’t necessarily need to pay for that, you just need to make Facebook happy. In the end, Facebook works pretty much like Amazon. If it detects that users have a positive interaction with your content, it will reward you by showing it to more. So, though the standard â€Å"reach percentage† is around 10%, you can multiply it quite easily by consistently posting text, images, videos and links that you know your audience is going to enjoy and share.Let’s take the example of author Rebecca Howard. Her Facebook author page has close to 4,000 people on it and she tells me each post is now seen by about 50% of those folks. â€Å"If I can encourage comments on it or get a discussion going then that number rises. It just takes time to learn how to adapt to the changes and make them work for you. This post of mine, for instance, has been shared 99 times and seen by more than 14,000 people. Didn't pay to boost it.† As with any way to reach or interact with readers, Facebook posting is a trial and error thing. Of course, there are some basic tips and guidelines for maximizing engagement, like posting images, keeping descriptions short and sweet, asking questions to spur a discussion, sharing useful links, keeping self-promotion to a minimum, etc. There are even professional studies out there on what types of posts (image, link, video, text) have a higher average reach percentage.Though you should certainly strive to follow this advice, in the end it is all about finding what your audience wants to see. And there is no other way to do that but to try as many things as possible: offer a giveaway, host an author QA event, post an excerpt or a short story, post a picture with a quote, organize a poll for your fans to choose your next character’s name, etc. There are countless things you can do! Of course, if you fall into the routine of posting the same stuff every day, then your reach will p rogressively decrease because no one will engage with your posts. I like this example Joanna Penn gives in her last podcast interview:â€Å"I just did just a normal post on Facebook and I posted some pictures. I went to a cemetery, Highgate Cemetery, last weekend. I got the most engagement ever on my fiction Facebook author page with these pictures of graves. And I was like, ‘Oh, my goodness. My audience likes graveyards and cemeteries.’†More often than not, your audience will have very similar likes and dislikes to yours - after all, they’re your readers, right? But you might have to think â€Å"outside the box† to find those.  I imagine that sounds like a lot of effort to go through to reach even 50% of followers that you acquired. And if you want to reach more, yes, you have to pay.I thought social media were free†¦Surely, giving money to Facebook can’t be fair? Maybe not, but if you look at the alternatives, you won’t find any better. Here’s what author Alexis Dubief wrote me when I asked her that question:"As writers we're supposed to avoid cliche, but when it comes to connecting with readers, there is no such thing as a free lunch. Email is, and deserves to be, the gold standard of connecting with readers. But email costs money (Mailchimp and Aweber both start charging when your list grows above 2,000 people) and even then, only 30% of your subscribers will open your email messages. So perhaps we need to let go of the idea of 'free' and focus instead on 'cheap and effective.'" This â€Å"business† mindset is one that many independent authors have adopted, shifting the focus from â€Å"cost† to â€Å"return on investment†. As we have seen in previous interviews with Nick Stephenson and Mark Dawson, Facebook provides an advertising platform like none other, mostly because of how granular you can get in your targeting.So, sure, you have to pay a bit if you want your posts to reach all your followers. But you can also pay to reach many more potential readers, and attract traffic to your website for amounts as low as $.01 per click.Below is a screenshot of one of Alexis’ campaigns to support a post. It was seen by over 40k people and she only paid for clicks. She set it both for the post to reach her current fans and to reach people who fit her target criteria but were not fans of her Facebook author page. Have a look at the cost per clicks†¦ As she  puts it: â€Å"Do you know where else I can get highly targeted traffic that cheaply? Yeah, neither do I.†Of course, we’re not saying that every author should keep a Facebook author page, post regularly, and pay to boost some of their posts. Nor that everyone will have  the same  costs per click as Alexis. It vastly depends on your target audience, how active they are on Facebook, and how much testing and iteration you do.The point here, however, is that you shouldn’t shy away from a platform just because it changes its rules, or suddenly seems â€Å"unfair†. Keep a cold head, do the math, and see if they work in your favour. More often than not, on Facebook, they will.Do you use your Facebook author page as a marketing tool? Have you been discouraged by Facebook's "pay to play" change? Or do you pay to reach your audience? Leave us your thoughts in the comments below!

Sunday, October 20, 2019

History and Development of the Kinetoscope

History and Development of the Kinetoscope The concept of moving images as entertainment was not a new one by the latter part of the 19th century. Magic lanterns and other devices had been employed in popular entertainment for generations. Magic lanterns used glass slides with images which were projected. The use of levers and other contrivances allowed these images to  move. Another mechanism called a Phenakistiscope consisted of a disc with images of successive phases of movement on it, which could be spun to simulate movement. Edison and Eadweard Muybridges Zoopraxiscope Additionally, there was the Zoopraxiscope, developed by photographer Eadweard Muybridge in 1879, which projected a series of images in successive phases of movement. These images were obtained through the use of multiple cameras. However, the invention of a camera in the Edison laboratories capable of recording successive images in a single camera was a more practical, cost-effective breakthrough that influenced all subsequent motion picture devices. While there has been speculation that Edisons interest in motion pictures began before 1888, the visit of Muybridge to the inventors laboratory in West Orange in February of that year certainly stimulated Edisons resolve to invent a motion picture camera. Muybridge proposed that they collaborate and combine the Zoopraxiscope with the Edison phonograph. Although apparently intrigued, Edison decided not to participate in such a partnership, perhaps realizing that the Zoopraxiscope was not a very practical or efficient way of recording motion. Patent Caveat for the Kinetoscope In an attempt to protect his future inventions, Edison filed a caveat with the patent office on October 17, 1888  that described his ideas for a device which would do for the eye what the phonograph does for the ear record and reproduce objects in motion. Edison called the invention a Kinetoscope, using the Greek words kineto meaning movement and scopos meaning to watch. Who Did the Inventing? Edisons assistant, William Kennedy Laurie Dickson, was given the task of inventing the device in June 1889, possibly because of his background as a photographer. Charles Brown was made Dicksons assistant. There has been some debate  over how much Edison himself contributed to the invention of the motion picture camera. While Edison seems to have conceived the idea and initiated the experiments, Dickson apparently performed the bulk of the experimentation, leading most modern scholars to assign Dickson with the major credit for turning the concept into a practical reality. The Edison laboratory, though, worked as a collaborative organization. Laboratory assistants were assigned to work on many projects while Edison supervised  and participated to varying degrees. Ultimately, Edison made the important decisions and, as the Wizard of West Orange, took sole credit for the products of his laboratory. The initial experiments on the Kinetograph (the camera used to create film for the Kinetoscope) were based on Edisons conception of the phonograph cylinder. Tiny photographic images were affixed in sequence to a cylinder  with the idea that, when the cylinder was rotated, the illusion of motion would be reproduced via reflected light. This ultimately proved to be impractical. Development of Celluloid Film The work of others in the field soon prompted Edison and his staff to move in a different direction. In Europe, Edison had met French physiologist Étienne-Jules Marey who used a continuous roll of film in his Chronophotographe to produce a sequence of still images, but the lack of film rolls of sufficient length and durability for use in a motion picture device delayed the inventive process. This dilemma was aided when John Carbutt developed emulsion-coated celluloid film sheets, which began to be used in the Edison experiments. The Eastman Company later produced its  own celluloid film, which Dickson soon bought in large quantities. By 1890, Dickson was joined by new assistant William Heise and the two began to develop a machine that exposed a strip of film in a horizontal-feed mechanism. Prototype Kinetoscope Demonstrated A prototype for the Kinetoscope was finally shown at a convention of the National Federation of Womens Clubs on May 20, 1891. The device was both a camera and a peep-hole viewer that used 18mm wide film. According to David Robinson, who describes the Kinetoscope in his book, From Peep Show to Palace: The Birth of American Film the film ran horizontally between two spools, at continuous speed. A rapidly moving shutter gave intermittent exposures when the apparatus was used as a camera and intermittent glimpses of the positive print when it was used as a viewer, when the spectator looked through the same aperture that housed the camera lens. Patents for Kinetograph and Kinetoscope A patent for the Kinetograph (the camera) and the Kinetoscope (the viewer) was filed on August 24, 1891. In this patent, the width of the film was specified as 35mm  and allowance was made for the possible use of a cylinder. Kinetoscope Completed The Kinetoscope was apparently completed by 1892.  Robinson also writes: It consisted of an upright wooden cabinet, 18 in. x 27 in. x 4 ft. high, with a peephole with magnifying lenses in the top...Inside the box, the film, in a continuous band of approximately 50 feet, was arranged around a series of spools. A large, electrically driven sprocket wheel at the top of the box engaged corresponding sprocket holes punched in the edges of the film, which was thus drawn under the lens at a continuous rate. Beneath the film was an electric lamp and between the lamp and the film a revolving shutter with a narrow slit. As each frame passed under the lens, the shutter permitted a flash of light so brief that the frame appeared to be frozen. This rapid series of apparently still frames appeared, thanks to the persistence of vision phenomenon, as a moving image. At this point, the horizontal-feed system had been changed to one in which the film was fed vertically. The viewer would look into a peep-hole at the top of the cabinet in order to see the image move. The first public demonstration of the Kinetoscope was held at the Brooklyn Institute of Arts and Sciences on May 9, 1893.

Saturday, October 19, 2019

Explain why and how firms become multinational enterprises Essay

Explain why and how firms become multinational enterprises - Essay Example re than one country and so linked that they may co-ordinate their operations in various ways† (OECDS, 2008, p.12) It is the most common way among several by which foreign direct investments are transmitted outward by the home country, or invested inward into the host country. At times multinational firms are described in terms of equity proportion; some jurisdictions peg a multinational as one whose voting rights are 10% owned and controlled by a foreign entity; other dispensations say 50%. The OECD definition is thus an interesting one in that it specified no ownership proportion, but stresses the operational link among internationally engaged organizations in different countries. These internationally engaged firms are systematically different from those domestically oriented; they are as a rule larger and have a more complex organizational structure and processes. Multinationals are thus more complex to manage (Yeaple, 2009). A multinational enterprise (MNE) is, simply put, a business organization the operations of which spans different countries and is intricately linked to its subsidiaries or other subsidiaries of the same mother firm. Therefore, what then makes a firm into an MNE is the nature of its activities, that its activities are geographically expanded across borders under a common ownership. There are times when a stage of the firm’s operations is intended to be performed in another country, for any number of reasons such as greater cost-effectiveness or locating closer to raw material or human resources. But rather than outsourcing that stage of operations to another, domestic, firm, the company instead sets up its own subsidiary or unit in that country to perform that stage of the operations. There are several ways how a company can internationalize its operations: In all these methods, a substantial amount of long-term funds is committed in the productive activity, which infusion is called the foreign direct investment, or FDI. Forms

Healthcare Utilization and Finance Essay Example | Topics and Well Written Essays - 1000 words

Healthcare Utilization and Finance - Essay Example Medicare Part B Essentially, this part covers healthcare services that are not provided for in part A of the Medicare. In Mrs. Zwick’s case, the cost of the different diagnostic tests that she underwent during her hospital stay and time of rehabilitation would be paid for in this part. Medicare Part D This last option of insurance cover deals with payment of the cost of drugs that are prescribed during a hospital stay. The antibiotics that were prescribed during the initial hospital stay will be catered for here. Moreover, the medication that prescribed upon her discharge will be also paid and by extension the walker that she required to walk around. Medicare policies and Reimbursement of Additional Care The policy by Medicare not to pay additional costs emanating from hospital acquired infections means that these cases have to be HAC (hospital-acquired complications) in terms of high cost. This in turn means that a patient with such a problem would have to be assigned to paym ent of higher premiums to cover the whole cost. It is however predicated upon the premise that the complication was due to secondary diagnosis and could have been prevented through utilization of evidence based guidelines. These additional policies of Medicare on hospital acquired infections means that the hospital will not get reimbursement for them (McNair, Luft, & Bindman, 2009). For instance, the antibiotics that were prescribed to her and these drugs were for urinary tract infection (UTI). With UTI being one of the complications that are not catered for by Medicare, then Mrs. Zwick and her daughter would have to pay from their pockets. Ethical Implications for Incurring Costs Related To Her Hospital-Acquired Condition The ethical implication for costs that emanate from hospital acquired infections to the concerned patients is that they have to pay for the additional cost. This is regardless of whether the infection was due to negligence on the part of the hospital or the infect ion just arose spontaneously. In order for clients to be shielded from this, they are forced to pay more so that in the advent that the complications that occur due to a person being hospitalized may be reimbursed by Medicare. Such a proactive move is quite unfair to the payer and the extra charge is quite punitive bearing in mind that these infections are completely out of a payer’s control when they happen. Another ethical implication is that it has to be proved beyond doubt that the hospital acquired infections were not due to negligence on the part of a hospital. This may arduous and quite challenging and it takes time (Zhan, Friedman, Mosso & Pronovost, 2006). Scenario 2 Consolidated Omnibus Budget Reconciliation Act (COBRA) Since COBRA insurance was designed to cover for people who have lost their job due to legitimate reasons, the cover is usually paid by the former employer but it is not subsidized. It follows then that the payments for health coverage premiums are re mitted by the former employer in full and an additional administrative cost of two percent. However, coverage is considered under group coverage which therefore means that the cost of the premiums is still low although they are slightly higher than when the employee was working. Many of the individuals that invoke the COBRA coverage usually have a big time difference between their last day at work and

Friday, October 18, 2019

Gun control Research Paper Example | Topics and Well Written Essays - 1250 words

Gun control - Research Paper Example tance, Arne Duncan, the US secretary of education recently posted on twitter complaining that it is disturbing to admit the fact that many students will have lost their lives before authorities respond with lucrative measures to control gun-related violence in schools. Additionally, in a recent press statement, Obama stated that America should be ashamed of its failure to impose tough gun possession restriction laws. Carter (2006, pp 25), states that some states have legalized gun possession by students and this has posed a challenge in the fight against gun violence in learning institutions. Research has showed that authorities are not fully dedicated to handle illegal gun possession cases. For example, in 2010 a statute was passed in Nebraska State suggesting that legal gun owners to report cases of missing firearms to the local authorities but not underpinned by the federal laws. Gun laws in the United States require abrupt amendment in order to control gun-related violence and en hance peaceful relations among members of the public. Some people argue that gun-related violence is fuelled by both weak laws and the irresponsible character of people in possession of guns. For instance, Possession of guns by minors in learning institutions shows that the existing gun control regulations are weak and defective. Actually, the rise of gun-related violence in learning institutions across America can be ascribed to uncontrolled possession of guns by minors. It is estimated that gun shooting per school week amount to about 1.4 and at least 74 shooting have happened in schools since the 2012 shooting in Newtown. Federal or state laws are not the sole contributors to the increased gun violence in US. Irresponsibility of senior members of the community, especially those with legal rights to own guns, has also contributed to increased shooting incidents. For instance, after investigation of the Newtown shooting, the gun used by the culprit was found to belong to his 52-year

Summary Essay Example | Topics and Well Written Essays - 500 words - 125

Summary - Essay Example Besides, the article provides that the most significant thing in an economy is the expectations by consumers of the business conditions in the future. Moreover, the current forecasts in the economy are dependent on the transition of expectations by the customer (MacKuen). The variances do not have any impact on the prevailing economy. The article, therefore, states the statement that an electorate’s decision on the best candidate in a presidency election is dependent on their current future expectations. If the expectations tend to be positive, rewarding of the presidency occurs. Correspondingly, if the expectations are negative, punishment of the presidency occurs. According to the classical theory of democracy, a good election is dependent on the activeness of a voter. On the other hand, the article negates the point in that the average voter is incapable of meeting the traits as put forward by the theory. The article provides another avenue for arriving at a good election. The only trait to possess is a good election is to come of age is only to have the right interests that have the right justification. The fact will lead to correct voting (Redlawsk). The essay also explains that the estimation of the voter’s determination of making a correct choice is possible although in a reasonable manner. The article puts forward that with such kind of reasoning, the American society in two elections had a seventy-five percent correct vote for the available five candidates who were contesting for the presidency. As a consequence, the availability of a standard measure for correct voting can change the perspective of political science. According to the article, political science would result to the exploration of the factors that lead to the probability of a successful and correct voting. The article bases its argument on the initial survey data of elections that later on were the national studies of elections. The main argument is that the decision of voting

Thursday, October 17, 2019

The Recession And Its Impact On The Economic Essay

The Recession And Its Impact On The Economic - Essay Example The securities later lost value following the US house bubble and mortgages began to default in payment in 2007. The subprime losses that emerged began the crisis, which exposed other risky loans and overpriced assets. An increase in loan losses and the collapse of the Lehman Brothers in September 2008 brought a big panic in the inter-bank loan market. The shadow banking system caused major banks and financial institutions in Europe and US to go bankrupt and suffer huge losses. The crisis was majorly caused by the emergence of shadow banking system that included investment banks and non-depository financial institutions. The systems rivaled the depository system yet they weren’t subjected to regulatory safeguards (Tett & Gillian 2008). The housing bubble burst leading t major losses and default in the mortgage payment. The accumulation of household debt prior to the crisis resulted in balance sheet recession. Consumers started to pay down debts which reduced their disposable income, thus slowing down the economy further. US government policies encouraged home ownership even to people who couldn’t afford it, resulting in lax lending standards, unsustainable increases in house prices an d debts. I support the approach which proposes for a simpler and smaller financial sector in which the size, power, and complexity of the financial system are limited in important ways. A smaller financial sector has the strengths of providing more benefits to the economy. These benefits include a more effective monetary and fiscal policy, increased corporate financing, reduction in market risks and greater integration. A smaller financial sector has the strength and the advantage of influencing the government to develop sound and efficient monetary and fiscal policies.

Just summary article Essay Example | Topics and Well Written Essays - 250 words

Just summary article - Essay Example Another problem that is presented in the article is perceived discrimination or prejudice. Taiwanese students are said to be the ones greatly suffering from this perception. Moreover, the length of stay again has an effect on this issue. As the students stay longer in the country, they come to learn more about the language and therefore their perceived discrimination lessens as they communicate more with Americans and know more about their American ways. Lastly, homesickness is seen as one adjustment issue that foreign students face. Research studies show that American freshmen showed lesser signs of homesickness compared to foreign students and this is affecting their social activities as well as their coping with the demands of college life, not to mention a new life in a new country. As the researcher proceeded with the study, it was found out that there are things that need to be considered for further studies such as the subjects. Most of the studies used in the article included undergraduate and graduate students. The concern of the author is for a study to be concentrated more on undergraduate students for a comparison if there is a correlation of the issues mentioned above with the age of students. de Arajao, Abrahao Andre. (2011). â€Å"Adjustment Issues of International Students Enrolled in American Colleges and Universities: A Review of the Literature†. Higher Education Studies. Vol. 1. No. 1. Retrieved

Wednesday, October 16, 2019

The Recession And Its Impact On The Economic Essay

The Recession And Its Impact On The Economic - Essay Example The securities later lost value following the US house bubble and mortgages began to default in payment in 2007. The subprime losses that emerged began the crisis, which exposed other risky loans and overpriced assets. An increase in loan losses and the collapse of the Lehman Brothers in September 2008 brought a big panic in the inter-bank loan market. The shadow banking system caused major banks and financial institutions in Europe and US to go bankrupt and suffer huge losses. The crisis was majorly caused by the emergence of shadow banking system that included investment banks and non-depository financial institutions. The systems rivaled the depository system yet they weren’t subjected to regulatory safeguards (Tett & Gillian 2008). The housing bubble burst leading t major losses and default in the mortgage payment. The accumulation of household debt prior to the crisis resulted in balance sheet recession. Consumers started to pay down debts which reduced their disposable income, thus slowing down the economy further. US government policies encouraged home ownership even to people who couldn’t afford it, resulting in lax lending standards, unsustainable increases in house prices an d debts. I support the approach which proposes for a simpler and smaller financial sector in which the size, power, and complexity of the financial system are limited in important ways. A smaller financial sector has the strengths of providing more benefits to the economy. These benefits include a more effective monetary and fiscal policy, increased corporate financing, reduction in market risks and greater integration. A smaller financial sector has the strength and the advantage of influencing the government to develop sound and efficient monetary and fiscal policies.

Tuesday, October 15, 2019

Psychoanalytic Film Theory Essay Example | Topics and Well Written Essays - 2250 words

Psychoanalytic Film Theory - Essay Example Using Lacanian and Freudian psychoanalytic terms, Mulvey examined how women are portrayed in cinema, as she analyzes the â€Å"male gaze† and its aspects of pleasure and nonpleasure (309). Mulvey's essay can be asserted as a historical document, due to her examinations of the pleasurable and controlling dimensions of â€Å"vision† that several disciplines studied before her and extended after her work. She argued that the â€Å"unconscious† of the patriarchal system has projected itself unto the film narrative. The male gaze had perilously affected the discourse between the dominant and dominated sectors of society, where political binaries of man/woman and active/passive are present. This paper will discuss the reasons why feminist film scholars adopted psychoanalytic film theory. It will also use feminist psychoanalytic spectatorship theory in studying Hitchcock’s Rear Window (1959). Feminist scholars adopted the psychoanalytic film theory, because the l atter aims to examine and depict gender identity using cultural, instead of biological, concepts that are present in films, so that the exclusion of women in dominant film discourses can be identified and dismantled for purposes of political empowerment by breaking the domination of the male gaze and reversing spectatorship from male to female gazing. Rear Window (1959) depicts scopophilia through sexual stimulations of visual pleasures and narcissism, and its pervasive use of the sexual objectification of women, where the film sees them as sources of both pleasure and nonpleasure. Psychoanalytic film theory Feminist film scholars, during the 1970s, were interested in analyzing the diverse forms of gender oppressions that relegated them to a â€Å"secondary† social and political status (Kaplan 1238). Their takeoff was the â€Å"cultural,† and not the biological, aspect of negative female experiences, where cultural semiotic systems present relationships in how women ar e seen and consumed in films and in societies where they live in. These scholars noted that the â€Å"objectification† of women, which limited their desires and objectives, could be the root cause of their oppressed conditions in real and reel life. Spectatorship theory asserts that the spectator generally refers to the male spectator, who wants to see and â€Å"control† women, because of the visual pleasures that the feminine form can provide (Sherwin 174). Psychoanalysis broadens spectatorship theory by unlocking the unconscious impulses that drive the male gaze (Mulvey 305). Thus, it could be seen that ideological feminism has strongly driven psychoanalytic film theory (Kaplan 1238). The primary appeal of psychoanalysis is that it presented a concrete framework for understanding preexisting conventions of women from the patriarchal perspective (Mulvey 305). It is a fitting theoretical framework for the budding feminist film theory, which still needs conceptual found ations. Freud and Lacan, in particular, provided terms and processes that can help explain how the male unconscious embeds itself unto society through its dominating gaze (Mulvey 305). The â€Å"erotic† processes of â€Å"seeing† have a direct impact on consuming the female form, and they also have implications on how women are portrayed in narrative films (Mulvey 305). Lacanian theory argues that films present a â€Å"mirror image† that underlies symbolic infrastructures (McGowan 28). The â€Å"gaze† represents the male â€Å"imaginary† and this imaginary builds the illusions of pleasures and nonpleasures (McGowan 28).

Monday, October 14, 2019

Political Psychology Essay Example for Free

Political Psychology Essay Rape victims, survivors of plane crashes, combat veterans, and others who have experienced extremely traumatic events may react emotionally with a posttraumatic stress disorder. This reaction is characterized by involuntary reexperiencing of the traumatic events, especially the original feelings of shock, horror, and fear, in dreams or flashbacks. In addition, victims experience an emotional numbing in relation to everyday events, associated with feelings of alienation from other people. Finally, the emotional pain of this reaction can result in an increase of various symptoms, such as sleep problems, guilt about surviving, difficulty in concentrating, and an exaggerated startle response (Calkins, 1996). The Situation: 9/11   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A more recent example was the 9/11 incident. The safety and protection that was a seal of American social order was devastated by the 9/11 aftermath. The American people who have gone through the bereavement of either of their parents, brothers, sisters, next of kin, or friends may well be putting up now with overpowering anguish. They will want all the emotional assistance they can obtain and they will need an extended recovery period. Life will never look the same again for any oblivious or sentient American people, but the young people who have upheld personal fatalities may need considerable support from qualified, compassionate specialists (Skene, 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The world is not in the slightest peaceful, but at present, there is no security issue taking center stage and the situation in the 9/11 assault is no exception. The 9/11 event had impressed upon America a greater sense of threat at the advent of the new millennium. The 9/11 terrorist attacks incited terror, fury, grief, revulsion, fear, empathy, bewilderment, melancholy, retribution sundry reactions in a nation that was everlastingly changed. To translate the mixed reaction of a private individual in a more politically relevant sense, it is wise to recall how then Senator Edward Livingston could be more important at these times with his words in a debate on the Alien and Sedition Acts: â€Å"†¦we are absurd enough to call ourselves free and enlightened while we advocate principles that would have disgraced the age of Gothic barbarity† (Skene, 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   They may well not entirely come to terms with the intangible theories thrashed out by counselors or on the television newscast but are prone to be directed in their thoughts by a distinct discernment of validity. They may have dealings with a diversity of sentiments and impressions, and their articulation may subsume mimicking or self-deleterious actions as a way of dealing with their retaliation, fury, and despondency. A number of children at this phase may demonstrate a reluctance to speak of their sentiments and thoughts (Dunn, 2001). The Psychology of Situation: Posttraumatic Stress Disorder   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The emotional responses of posttraumatic stress can occur immediately following the disaster in an acute form and subside over a period of several months or can persist, becoming a chronic syndrome often called the residual stress pattern. In other cases, people may show no immediate reaction but may experience a full-blown posttraumatic stress disorder after a delay of months or even years. Clinicians are still discovering veterans of World War II and the Korean War who are displaying residual or delayed posttraumatic stress disorders (Hinkle, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This delayed posttraumatic stress syndrome has been a special problem in the case of Vietnam veterans. The problems of many seemed to be made worse by feelings that they had been rejected by an unsympathetic American public and that they had been betrayed by their government and had spent important years of their lives in a wasted effort (Bornstein, 1994). In a study of Vietnam veterans with combat experience, called the â€Å"Forgotten Warrior Project,† John Wilson, a psychologist at Cleveland State University found that (Kagan, 2004): Their suicide rate was 23 to 33 percent higher than the national average. Of those who had been married when they left the United States, 38 percent were divorced within six months after returning. The rate of hospitalization for alcoholism or drinking problems was high and increasing. About half of them still had some emotional problems related to adjustment of civilian life. Brian Seaward is one of the authors that delved into the realm of stress and its health consequences. Seaward notes that aside from the special life events that may be experienced by almost everyone, the most appreciable part of the list is the concept of change.   This implies that change may be in tandem with stress as being a natural part of modern-day living.   That change is the ultimate source of stress.   â€Å"Change becomes a powerful stressor agent because it necessitates adaptation whether it is perceived as a negative or positive experience† (Calkins, 1996). The important features of posttraumatic stress disorder, according to Seaward, are cognition and stress.   Stress affects cognition as anxiety intrudes on one’s consciousness as demonstrated by his unstoppable pangs of emotion, excessive preoccupation with the threatening situation or person, startling reactions, and other unwanted sensations.   It may also impair memory and attention during cognitive tasks.   It may also enhance attention, principally regarding memories of the stressor but repetitive thoughts can perpetuate stress and make it chronic (Calkins, 1996). Seaward also enumerates the emotional signs of health hassle, which are among others, anxiety, irritability, increased aggression, lack of enthusiasm, depression, alienation, and low self-esteem. Indecision, impaired judgments, lack of concentration, lapses in memory, and absentmindedness are some cases of mental drawbacks caused by health troubles. Seaward also shows that there are individuals who are more prone to health troubles than others.   As a result, the ability to cope with poor health is not the same with everyone. For instance, effective coping with stress depends upon how people go about their day-to-day lives. Lifestyle is a key factor in determining the likelihood of an improved posttraumatic stress disorder (Calkins, 1996). Posttraumatic stress disorder is usually coupled with feelings of sadness, discouragement, and dissatisfaction and usually occurs with other symptoms, such as feelings of worthlessness or guilt, decreased energy, and suicidal thoughts. Just as one can have the flu and bladder infection at the same time, it is quite possible, especially in the milder forms of bipolar disorder, to be both abnormally depressed and anxious at the same time (Dunn, 2001). Survivors of extremely traumatic experiences such as 9/11 are sometimes left with special anxiety problems. Some act as if they have been by the shock of their ordeal. Their interest in life is diminished, and they feel alienated from the people around them. Others develop a tendency to remain constantly on the alert, as if disaster is sure to strike again at any moment. They tend also to startle easily. People who have lived through auto crashes may panic at the sound if cars in the night. Those who have endured a mugging or rape may respond with a start whenever they hear strange sounds, and some former prisoners o war and hostages report similar reactions whenever they hear approaching footsteps (Skene, 2001). Survivors of psychological trauma are likely also to keep reliving their experience. They suffer from nightmares in which the shattering episode is reenacted in all its terrifying detail, and by day they find themselves suddenly overwhelmed by harrowing memories whenever they are exposed to situations that even remotely resemble the original event (Garcà ­a, 2005). There is evidence also that mood disorders are related to disturbances in the brain, to such an extent that the symptoms sometimes appear without any provocation. Neither the depressed individual nor the close family and friends can point to any unusually stressful event that might have caused a depression (Dunn, 2001). The Responsive Behavior of the Young and the Old Posttraumatic stress reactions can occur at any age.   Some people get over the traumatic experience of 9/11 soon enough, but others are troubled by symptoms for years on end. A number of elderly concentration camp survivors broke down completely decades after their ordeal was over when they had to be hospitalized for medical reasons. The experience was sufficiently similar to imprisonment to reopen fully the old psychological wounds (Garcà ­a, 2005). Children endure with bereavement a lot in the vein of adults, but with still not as much of discernment (Garcà ­a, 2005). When taking children in hand, it is imperative to recognize that they almost certainly discern more than what parents grant them credit for. Despite the fact that parents inherently desire to safeguard their children from pain, even the youngest kid understands that something is dreadfully wrong and yearns to grasp why the every adult distraught and in tears. This protective attitude merely serves to deprive the child of a chance to learn more about grief management and coping skills, which are indispensable throughout a person’s life, especially when he or she continues live in the absence of any parent who is supposed to shield them from deep sorrow since it is the parent or any close relative who has passed away (Garcà ­a, 2005). It is essential to acknowledge that every child is inimitable in his or her comprehension of the entire process of death. This discernment hinge on their developmental phase, intellectual skills, teachings by parents, teachers, and significant others, personality attributes, imagery in the media, spiritual convictions, and prior incidents of death induced by 9/11 (Hinkle, 2004). Nevertheless, there are a number of consequential factors that will be useful in comprehending how young people live through and cope with death and its aftermath (Dunn, 2001). Coping strategy of an individual’s behavioral and psychological efforts to buffer or minimize environmental and internal demands of posttraumatic stress disorder. Coping means that the person is â€Å"taking charge of his or her own life and is seeking the resources needed to solve current problems† (Garcà ­a, 2005). Seaward furthers that although the coping strategies used by individuals are often distinct, coping temperaments are to a large extent acquired from the social environment. The manner in which people attempt to resolve stressful situations, the cognitive strategies that they use to downsize threat, and the techniques for handling tensions are largely gained from the groups to which they belong.   A person tries to contain the threat and beat stress in two ways, namely focusing on the problem and on the emotions (Bornstein, 1994).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Other grown-ups are overly wrapped up in their anguish to make an effort to comprehend how the firsthand witnesses of the 9/11 attacks fathom. Other people usually misconstrue the bystander’s demonstration of sentiments, characteristically hold themselves responsible for their fellowmen’s lamentation or rage. Therefore, even though it is likely for the entire people to express their sorrow in the presence of the world, it is essential to impart an elucidation to the terrorist that they can face the future more stalwartly. Discovering how to communicate their anguish, resentment, and apprehension will help Americans to contend with comparable disasters if truly inevitable in the future (Skene, 2001). Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   No question about it; the 9/11 incident was the commencement of enlarged hostilities and vigilance as well. The imagery being broadcast was far too excruciating to behold. Mass terrorism is not a regular crime; it is an enormously terrible crime. Tens of thousands, more or less, are the terrorists’ target to inflict fatality or fear upon, and they are more than determined to rule the world. With continued weak will, no wonder how more people would struggle to stay untreated with posttraumatic stress disorder (Skene, 2001). Attitudes toward those with posttraumatic stress disorder have improved over time. Today, individuals with PTSD are fortunate enough to be treated in hospitals and clinics instead of being out away in prisons or asylums. But they are still far from universally accepted either within the family or community. How they are viewed by others can be critical. It can help determine whether they will recover sufficiently to function in society, or to continue to be overwhelmed by their symptoms and even get worse (Calkins, 1996). For a person with posttraumatic stress disorder, there is no clear-cut organic problem, no violation of basic social norms, and no loss of orientation to reality, but the individual shows a lifelong pattern of self-defeating and inadequate coping strategies aimed more at reducing anxiety than at solving life problems. By mental aberrations or psychological scars, the PTSD patient proves to others that he or she is impotent in the face of a threatening world (Dunn, 2001). Our growing understanding of posttraumatic stress disorder does more than enable society to reclaim its familiar stranger. In making sense of posttraumatic stress disorder, we are forced to come to grips with basic conceptions of normality, reality, and social values. And mind loosed from its stable moorings does not just go on its solitary way; it bumps into other minds, sometimes changing their stability (Kagan, 2004). Many PSTD patients are privately treated at home, while others have learned to conceal their disturbances and not act crazy in public. Still others act out their mental problems in ways that society does not judge as mentally disordered; perhaps joining the hate groups, or engaging in socially acceptable forms of violence. Just as unemployment statistics do not include all those who are chronically unemployed and have stopped looking for work, so, too, statistics on posttraumatic stress disorder omit those who suffer in silence, living a marginal existence on the fringes of society (Hinkle, 2004). Indeed, victims of posttraumatic stress disorder caused by 9/11 are usually beset by extremely difficult psychological and social problems. They are likely to be financially strapped, not only because the therapy can be expensive, but also it interferes with productive work. They tend to be outcasts from both the family and society at large. Often the only persons willing to give them serious attention are their fellow PTSD patients, which do not really help as negativity enlarges (Bornstein, 1994). Under such depressive, circumstance, they need considerable help to break free from prejudiced society and get a fresh start in life. References Calkins, Mary Whiton. (1996). An Introduction to Psychology. The Macmillan Company. Bornstein, Marc H. (1994). Psychology and Its Allied Disciplines. Lawrence Erlbaum Associates. Dunn, Edgar S. (2001). Abnormal Psychology. Resources for the Future. Garcà ­a, Cynthia. (2005). â€Å"Developmental Psychology.† Merrill-Palmer Quarterly. Hinkle, Gisela J. (2004). The Development of Modern Sociology: Its Nature and Growth in the United States. Random House. Kagan, Jerome. (2004). â€Å"The Limitations of Concepts in Developmental Psychology.† Developmental Psychology. Skene, Neil. (2001). â€Å"Sacrificing Freedoms in the Name of Saving Them.† Atlanta: Creative Loafing.

Sunday, October 13, 2019

Photographers of the Old West :: Research History Photography Papers

Photographers of the Old West In a society that is focused on visual stimuli, it isn't uncommon to see a person taking a picture with a camera or making a "movie" with their camcorder. But, in the 1840s and 1850s, life just wasn't like that. If someone said they could make a picture of a mining town or of the route to the West without a pencil or paint people would have laughed at them. Laughing would have been appropriate because photography didn't come into being until 1839. James Horan reveals in his book, Mathew Brady: Historian with a Camera, that it wasn't even called photography then, it was called the "new art" (5). There were very few people who knew what it was to take a picture, or make a picture with light. The only pictures that were around at that time were those that were drawn, painted, or printed from lithographs or etchings. Newspapers didn't have real live pictures that showed the actual things that were written about. The population of America as it was in 1800 didn't know what the "West" look ed like. According to Eugene Ostroff, sketches and paintings were the only illustrations of the West before photography (9). Ostroff tells us that these weren't usually accepted if the painter had taken artistic license (9). All Americans knew were the stories of the people who returned because it was too difficult to live there or the letters from friends and family telling the horrors they saw. So, with the invention of photography, especially the ability to "fix" the image onto the paper or metal plate had a major effect on the expansion to the West because the pictures that were taken showed how the West really was beautiful. Unfortunately, it was a while before the public was able to see the pictures that were taken by the photographers of the West because 1839 was only the very beginning of photography as a profession and a hobby. The first type of using light to make a picture was the daguerreotype. Both Louis Jacques Mande Daguerre and Nicephore Niepce, who passed away before the public was introduced to the daguerreotype, founded this type of picture taking. However, before this Louis Daguerre made a "theater without actors." Beaumont Newhall explains that this was an illusion made by extraordinary lighting effects that made the 45 Â ½ foot by 71 Â ½ foot pictures appear to change as one looked at them (2).

Saturday, October 12, 2019

Justice And Injustice Essay -- essays research papers

In The Republic, the great philosopher Plato attempts to reveal through the character and dialogues of Socrates that justice is better when it is the good for which men must strive for, regardless of whether they could be unjust and still be rewarded. His method is to use dialectic, the asking and answering of questions. This method leads the audience from one point to another, supposedly with indisputable logic by obtaining agreement to each point before going on to the next, therefore, building an argument.   Ã‚  Ã‚  Ã‚  Ã‚  Interestingly about the work of Socrates is that its not known very well, since nothing was recorded during his time. Everything that we know about Socrates has come through the writings of his greatest pupil, Plato. Socrates was a man that revolutionized philosophy and how to approach his surroundings. One of Socrates greatest findings as a philosopher was that he admitted that he knew nothing, which to others, specifically the Delphic Oracle led them to believe that there were none wiser than Socrates. Socrates techniques as a philosopher came about with his abilities to question others. His line of questioning, to see why everything had a purpose drew a crowd of younger people, which leads us to The Republic, where Socrates encounters some questions for him.   Ã‚  Ã‚  Ã‚  Ã‚  Socrates had two young listeners posing questions of whether justice is stronger than injustice, and what each does to a man? What makes the first good and the second bad? In answering this question, Socrates deals directly with the philosophy of the individual's goodness and virtue, but also binds it to his concept of the perfect state, which is a republic of three classes of people with a rigid social structure and little in the way of amusement.   Ã‚  Ã‚  Ã‚  Ã‚  Although Socrates reiterates the concept of justice over and over again it all comes to his discourse on the perfect city-state, which seems a bit off the mark, considering his original subject. However, one of Socrates’ main points is that goodness is doing what is best for the common. It is greater good as opposed to that of individual happiness. There is a real sense in which his philosophy turns on the concepts of virtue, and his belief that ultimately virtue is its own reward. His first major point is that justice is an excellence of character. He then se... ...uite compassionate. Since happiness is the sign of justice, and pleasure is one sign of happiness, then the just person is the happy person. Socrates then equates true pleasure with knowledge, the province of reason and the philosopher.   Ã‚  Ã‚  Ã‚  Ã‚   Within Book X, In The Republic, Socrates argues for the existence of an immortal soul. With this plead, he makes the point that good is that which preserves and benefits. Justice is good, so it therefore preserves and benefits in this life as well as the next. Therefore, even though a man may wish to behave badly when no one is looking, as with the myth of the ring of Gyges, according to Socrates, by behaving justly we will have the most rewards. Eventually, the difficulty with Socrates' arguments is that they rely on associating things on to the next in a chain that eventually leads back to the original proposition. But, the logic of these connections seems built more on assumptions than on objective truth. Thus, within keeping his stance that ultimately what he says is right is right because he is a philosopher, and therefore is by his nature right. The dialectic seems more of a game to get the audience to go along.

Friday, October 11, 2019

Persuasive Essay- Ipads in Kindergarten Essay

In 2011, ten years after Maine began issuing laptops to all seventh graders, the Auburn School System launched an initiative to provide an iPad 2 for each of its students entering kindergarten. At a cost of roughly $200,000- representing a 5% increase in the school budget (Opinions Divided†¦) some taxpayers were less than pleased- calling it a complete waste of money. But in Auburn- and schools around the country- trends are emerging and showing the iPad to be a powerful learning tool and a necessary investment in our children’s future. For over a decade, Maine has been at the forefront of integrating technology into public schools and there is no reason to stop now. Despite the high cost to institute this program, Auburn should continue to provide iPads to students entering kindergarten. Auburn is not alone in providing iPads to kindergarteners. In fact, kindergarten students in Maine, Tennessee, and South Carolina have received iPads to supplement their teacher’s instruction. While the iPad cannot replace the human interaction of a teacher, it is a great addition to the classroom, at a time when the teacher to student ratio keeps getting larger and larger. Laura Shaw, principal of Sherwood Heights School recently said, â€Å"When you have eighteen kids in the classroom and you see ten kids, hands raised up, the teacher does her best to get around. But sometimes with the iPads and certain apps the kids get immediate feedback. They know what they’ve done is correct and they can move on, or they know ‘Oh, I need to ask for help,’† (Porter). For example, a child can play â€Å"Feed the Hippos Hot Peppers. † In this app the child counts aloud while feeding the hippo. The teacher can adjust the app difficulty to â€Å"count† or â€Å"add† peppers, depending on the child’s capabilities. When the child answers the problem correctly, the iPad responds with a round of applause; an immediate cue to the child that they were correct (Lemeshow). Initially, Auburn Schools split the children into two groups when first issuing the iPads in 2011. Half of the children received iPads during the first week of school, the other half received their iPads in mid-November; effectively creating a control group to gage learning. Although the study lasted just 9 weeks, the results were promising. When tested, students who received their iPads in the first week of school scored higher in 9 out of 10 areas, compared with children who did not. One area in particular really stood out: recognizing sounds and writing letters. Kindergartners with iPads gained 13. 72 points, compared to an 11. 58-point gain for students who did not have iPads. That difference is significant, said Mike Muir, the Multiple Pathways leader for Auburn schools (Auburn Report: iPads). When pupils use iPads, more learning does not seem like a far stretch. With 100’s of learning apps available for download, teachers are able to customize the iPad and tailor the lesson to the individual child’s needs. This way, advanced children can reach their highest potential without becoming bored while the rest of the class catches up. On the other side, if one or two children are struggling, the rest of the class can move on, while the child receives the help she needs. Sherwood Heights Elementary School kindergarten teacher Susan Lemeshow called the iPads â€Å"one of the most powerful teaching tools I’ve ever used. †¦ I can put her on one book, her on a different level book,† she said of two girls in her class. Pupils are doing the same lesson, â€Å"but at the level they need,† she said (Report Say Giving†¦). So what is the problem? Those who oppose the program site the cost- around $800 per student entering kindergarten- as a major issue and wonder if a kindergartener is responsible enough to handle such an expensive piece of equipment. Others worry children may not learn to read and write properly. Auburn hopes the high level of testing done in the beginning of the school year will line them up for educational grants to relieve taxpayers of the burden from having to foot the bill. At the end of the year, the school system will also be able to compare this year’s kindergarten to previous years, with hopes of even better results. Regarding concerns of the students learning to write, it is important for people to understand that children are not using the iPads all day. The use of iPads is balanced. Students are still using crayons, markers, and traditional books. They are still learning how to hold pencils or crayons, and how to write (3 Auburn Teachers†¦). The iPads are a â€Å"center-based† activity with the children using them in 15-minute increments 2 to 3 times per day. Each iPad has a protective case, and students are not allowed to bring them home (Lemeshow). Providing iPads to students as an educational tool is invaluable. With the iPads children have become excited about learning. â€Å"We are seeing high levels of student motivation, engagement and learning in the iPad classrooms,† said Sue Dorris, Principal of East Auburn School (NooNoo). Children born in today’s world grow up bombarded by technology in every aspect of their lives- except school- so an iPad as a learning tool is appealing to them. It really gets their attention and keeps them engaged. The results are more learning and better test scores. With technology always evolving, newer apps, and programs, the possibilities really are endless. Auburn’s plan is to purchase and iPad for each new pupil entering kindergarten. The iPad will stay with the student from kindergarten through 6th grade. With this plan Auburn hopes to have an iPad in the hands of every elementary student in the district by 2017. If every student is equipped with an iPad, the world of digital text books emerges- which could amount to huge savings. In this digital world, it is not really a question of if we can afford this; but more a question of if we can afford not to? Works Cited Lemeshow, Susan. Telephone interview. 27 Apr. 2012. NooNoo, Stephen, ed. â€Å"Kindergarten iPad Initiative Reveals Modest Literacy Gains. † T. H. E. Journal. 1105 Media, Inc. , 2012. Web. 29 Apr. 2012. . Porter, Tim. â€Å"A School System in Maine Gives iPads to Kindergartners. † Voice of America. N. p. , 23 Nov. 2011. Web. 28 Apr. 2012. . Washuk, Bonnie. â€Å"Auburn Report: iPads Help Kindergartners’ Learn. † McClatchy – Tribune Business News (Feb. 2012): n. pag. ProQuest Central K12. Web. 28 Apr. 2012. . – – -. â€Å"Opinions Divided Over iPads for Auburn Kindergartners. † Sun Journal [Lewiston, Maine] 8 Apr. 2011, Lewiston-Auburn ed. : n. pag. Sun Journal. Web. 28 Apr. 2012. . – – -. â€Å"Report Says Giving iPads to Auburn Kindergartners Increases Test Scores. † Bangor Daily News 16 Feb. 2012: n. pag. BangorDailyNews. Com. Web. 28 Apr. 2012. . – – -. â€Å"3 Auburn Teachers Give iPads High Grade. † Sun Journal [Lewiston, Me. ] 20 Oct. 2011.

Thursday, October 10, 2019

Graphic Design as Main Communication Medium Essay

As multimedia advances to higher stages of development, the significance of graphic design continues to increase. Graphic design was once considers a visual form of art. Over time, it has come to be recognized as form of communication. Art and communication reflect and serve culture. Culture represents the political and economic structure of the society. Therefore graphic design reflects and promotes political and economic systems. This paper attempt to show that graphic design, layout design of the poster and artistic craftsmanship of typography are the main communication media that have served different cultures during different historical eras. Graphic design can be defined from many perspectives. For a layman, graphic design may simply refer to the production of printed, online, and manufactured materials that are visually appealing. Graphic design is reproduced in either large numbers or in gigantic media such as billboards so that it can get the attention of many people. Being a visual instrument of communication, it usually employs an effective combination of graphics and text in order to convey a message. Graphic design is prevalent in both the capitalists and socialist economies. The capitalist use it mainly to sell goods and services while the socialists use it to sell ideas to motivate people to agree with government policies and work for a socialist economy. Whatever the case , the of aim graphic design is to motivate people to act; the information it relays is meant to move people and not just to satisfy the usual thirst for knowledge. Some people include paintings as graphic design but Barnard in the book, Graphic Design as Communication, denies that this is incorrect. Classical paintings merely tell a story. They are being viewed only in the confines of private homes or museums. They are definitely not for popular consumption. Newark, in the book, The Gutenberg Galaxy, states that the coins found in Apollonia, Greece, which was estimated sometime in 450 BC may be considered the earliest products of graphic design. Because it was a form of currency, it was produced in large numbers. It has a prototypical logo and it was made with the use of a metal die, a technological wonder at that time. Jobling & Crowley define graphic design in relation to social structures and the historical context in which such structure exists. Graphic design is shaped by certain society’s beliefs and morals. Jobling & Crowley identify three factors that graphic design constitutes the following: It is produced in large numbers; It should be cheap and graphic design conveys ideas through a combination of words and images. However, Jobling & Crowley argue that not all products of graphic deign are cheap. In fact, some of them are symbolic of wealth and luxury. Newark defines graphic design by focusing on its functions. Graphic design functions as a means of communication. Once the design is able to attract the attention of people, it must be able to explain its message with the minimum use of words, if any. Brand logos explain not only the product but also the quality it possesses. A graphic design becomes the identity of its subject. People begin to relate certain symbols to what they represent. For example, the elephant symbol becomes the Republican Party. These act on people’s emotions and become factors in determining how they feel the market. Knoblauch points out that communication shapes culture. Culture develops by communication and acceptable interaction by the society. In this regard, since graphic design is a medium of communication, it serves culture as well. It passes through many historical eras and different cultures. This is contrary to the common belief that it is just a product of the modern computer technology. Technology is a continuous process and so is its evolution. History has shown that human beings had begun communicating through visuals before oral communication grew. McLuhan notes that Gutenberg press is an important stage in the evolution of graphic design. Invented around 1440 by Johannes Gutenberg, it made possible the mass production of literary material. Bibles were the first material to be produced. Gutenberg used a special character symbols which he developed himself to represent words and common Latin phrases. Gutenberg’s visually attractive typography and lay-out made the Bible more appealing to people, a fact that served well the cultural interests of the Holy Roman Empire . 1700s and 1800s saw further development of graphic design. This was the time that capitalism was developing at a rapid pace. Publishers were in great competition with each other.. Therefore, graphic design was highly improved. At this point came there arose contradictions between publishers and authors. Publishers used graphic design especially on the covers to make it more attractive. The authors feared that this might change the context of the book. This shows that graphic design can either enhance or destroys the context of the ext. Barchas, J. warns us not to make judgment by looking at the cover of a book since graphic design may convey anther meaning. Graphic design is developing further. The advancement of computer and information technology has made it possible for graphic arts to be blended with other media Graphic design has been used tin advertisement. Eisend advises that the advertisers have to create graphic design that effectively sells a product. The graphic design must also be able to convince the consumer to buy only the brand that it promotes. Lindstrom notes that many companies are gradually transforming the traditional billboards into audio-visual displays, which appeal to more senses other than just sight. In conclusion, graphic design can either be a factor to encourage the survival of a social system or it can destroy it to introduce a new one. Reference The given research paper

Case Analysis About E Commerce Law

I. Introduction: In this age of mobile phone shopping, online bookings, web based promotions and social networking, legitimate business transactions and permit applications can now be served via the internet. As early as June, 2000, the Philippine government through the Senate and the House of Representatives approved the E-Commerce Law in recognition of the vital role of information and communications technology (ICT) in nation-building. Known as the â€Å"Electronic Commerce Act of 2000† or House Bill No. 971, the act was passed because of the need to create an information-friendly environment which supports and ensures the availability, diversity and affordability of ICT products and services that provides for the recognition and use of electronic transaction and documents in the country. The bill likewise recognizes the responsibility of the private sector in contributing investments and services in telecommunications and information technology as well as the need to devel op appropriate training programs and institutional policy changes.The House Bill also took cognizance of the human resources involved in the use of ICT, the population capable of operating and utilizing electronic appliances and computers and its obligation to facilitate the transfer and promotion of adaptation of these technologies. But, in order to ensure network security, connectivity and neutrality of technology for the national benefit, information infrastructures comprised of telecommunication networks and information services shall be organized and deployed.E-commerce is a system that includes not only those transactions that center on buying and selling of goods and services to directly generate revenue, but also those transactions that support revenue generation, such as generating demand for those goods and services, offering sales support and customer service, or facilitating communications between business partners. II. Reaction and Analysis of every provision: Declarati on of Policy Section 1 : Short title It names the title of the act which is known as the â€Å"Electronic Commerce Act of 2000†Section 2:   Ã‚  Declaration of Policy. Reaction and Analysis: This provisions explains the content of the policy, which creates an environment friendly to promote the ICT products and services in an affordable way so that it can develop the training programs, policy of institutions, human resources, the labor force, the operations of electronic appliances especially the computer system. It promotes also the technology so that the network security and the connections of technology in the country will be safeguard or protected.It gives benefits to the nation in terms of organizing the arrangement of the country’s information infrastructures and the understanding between communication networks and information services which connects to the global network in a legal act on its systems and facilities. In my opinion the declaration of the policy h as an advantage in our country because it makes the business industry with the use of ICT be a good transactions in global markets that helps our assets and profits increase, that’s a help for our country’s budget.Declaration of Principles for Electronic Commerce Promotion Section 3. Objective Reaction and Analysis: In this provision, It discusses the principles of the E commerce promotion which indicates the role of the government, every government official must be fair in giving shares and allowance in the lack of human resources and secure the common good, their settlements and goals should be done in the future and provide the necessities. The action of the private sector and in making the policy should be compromised.As the role of the private sector, the E commerce development must be widened in market forces and they must pursue a fair competitive market. The International coordination and harmonization will make the government policies that affect the e commerc e to be facilitated in a unified environment for good standards. In Neutral Tax Treatment, it will conduct the transactions in the use of e commerce that must take an unbiased or fair tax treatment in comparing transactions in non-electronic and taxation of e commerce and that must be guided in a least difficult manner.In the protection of the users, they must have privacy or not be exposed with regards to industry led solutions, it shall be agreed with the law that business must be available to the consumers and the business users must not have a disclosure to the public and environment. E commerce awareness points to the government and the private sector, they will inform the society about the ability of the e commerce and the impact of it in economic foundations. The government will provide opportunities to SMES, well it will provide investments in information technologies and encourage capitals for them.The government will also provide skills development for the employees genera ted with e commerce but they should still promote non or formal skills development programs. They will also provide online database for health services, public libraries, in this case I think it will be easier for us to find our needed information. Internet users will have an essential voice in the governance of the domain name system as well as the access to public domain information.All of the principles is informative and useful in a way that our country will have an easier work and life because of technology and a good contribution to our economy. Chapter III – Objective and Sphere of Application Section 3: Objective Reaction and Analysis: In this provision, it discusses the main goal of the law, which pursues a domestic and international dealings and agreements with the storage of information through the use of electronic technology so that the electronic documents of activities will be authenticated.The act also promotes the usage of electronic transactions in governmen t and public to worldwide. Despite these aims and objectives, many are still skeptical on the methods provided under the law to ensure the integrity and security of these electronic transactions. Most of them question the admissibility and weight given to electronic evidence, its authenticity and integrity as well as the manner used to verify the same, and the impact of its legal recognition on the Philippine legal system. Section 4. Sphere of ApplicationIn this section, this act must apply to any kind of electronic data message and document that is utilized in the occurrence of commercial and non commercial activities like what the section 4 stated, which are to include domestic and international transactions. In this section, it tells that the objective of the law must have a good practice and it should be used not only stating these aims but should become true. PART II ELECTRONIC COMMERCE IN GENERAL Chapter I – General Provisions Section 5: Definition of TermsIn these prov ision, it discusses the definitions of terms. The Addressee is a person who is intended by the originator to receive the electronic data message or electronic document, but does not include a person acting as an intermediary with respect to that electronic data message or electronic document. Commercial Activities must be given a wide interpretation so that it will cover the matters from the relationships of a commercial either contractual or not. It refers to the dealings with the rights of intellectual property.It also discussed the definition of computer where in it’s the main source of e commerce activities that provide connecting transactions and databases. I also learned about the convergence where in it is the ability of different network platforms to carry any kind of service; and the coming together of consumer devices. The Electronic data message explained that it is also an interchange with electronic document where in there are information stored by means of elect ronic. The ICT, it a system that is used for processing electronic documents as well as recording the data.Electronic signature refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document. Electronic key refers to a secret code, which secures and defends sensitive information that crosses over public channels into a form decipherable only by itself or with a matching electronic key.This term shall include, but not be limited to, keys produced by single key cryptosystems, public key cryptosystems or any other similar method or process, which may hereafter, be developed. Intermediary refers to a person who in behalf of another person and with respect to a particular electronic data message or electronic document sends, receives and/or stores or provides other services in respect of that electronic data message or electronic document. Non-Commercial Activities are those not falling under commercial activities.Originator refers to a person by whom, or on whose behalf, the electronic data message or electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic data message or electronic document. Person means any natural or juridical person including, but not limited to, an individual, corporation, partnership, joint venture, unincorporated association, trust or other juridical entity, or any governmental authority.Service provider refers to a provider of online services or network access. With help of definitions and terms, it is easier to understand what is e commerce all about and what are the relations of t hese terms to this law, because the law always pertains to electronic people, activities so by this explanation, we will be clarified with the content of the law. Chapter II – Legal Recognition of Electronic Data Messages Legal Recognition of Electronic Data Messages and Electronic Documents Section 6: Legal Recognition of Data Messages Reaction and Analysis:In this provision, it says that every information in the form of electronic data message or document must be approved always in a legal purpose. It says that the person should provide a written information to another person in conversion to electronic data message or document. The non electronic form of data must meet the requirements of the provision of the information and must be the same as the form of electronic data message or document. The operation of the requirement of the law has no limit for the information to be displayed with time or location until a functional equivalent will be implemented.The functional equ ivalent, says that electronic documents can never be the same as paper type, they still have difference. But electronic documents can do the purpose of paper type of documents like for example as a record or database of information from the paper. So I think the electronic data message can hold the paper based document by the person who write, and its still different from each other because the original form of the information is in written form while the electronic data message are in computerized type.Sec 7 Legal Recognition of Electronic Documents Reaction and Analysis: In this provision, it discusses the electronic signatures that are now recognized to be equivalent to the signature of a person on a paper based document, it explains the procedures provided on it like a method used to indicate the party to enter to the electronic document that is needed for his approval through the electronic signature. It is appropriate for its purpose for the electronic document where in it was generated with any agreement.With this situation, It is needed to the said party so that it will go to the transaction with electronic signature while the other party will have an access to verify it and for them to decide to go again with the flow of transaction valid by the same process. Well this serves a good transactions of contracts with use of electronic signatures from person to another person. Sec. 8. Legal Recognition of Electronic SignaturesThis provision examined some important legal issues associated with electronic signatures. I think the government should come out with some legislation. There should be some kind of legislation that should be out in our country that says that electronic signatures are an acceptable form and can legally replace paper-based forms of signature. Then only we businesses may be thinking of using it. Sec 9 Presumption Relating to Electronic SignaturesIn this provision, it explains the electronic signature correlations, it means that this was connected by the person with the intention of signing in the approval of the electronic document but the person depending on the electronic documents finds or notices a defects wich the signature has no dependency will not be affixed. This means that when Person A’s signature is attached to a document, one may presume that it is A’s signature and that he was the one who signed it with the intention of signing or approving the same.I think this is right so as they can easily detect a person’s signature electronically. Section 10 Original Documents It explains that the law requires information to be maintained in its original form, the integrity of the electronic document from the time it was created in its final form is shown by aliunde which means it is an evidence clarifying a document but not deriving from the document itself, otherwise the information is has the ability to be displayed to the person whom it is to be presented. This means that it applies whet her the requirement is in he form of an obligation or the law simply provides consequences for the information not being presented or maintained in its original form. This provision of law will be a great help to those who go to court presenting electronic evidence. While the old prototype could only conceive of original document as being generally single, this covers the way for the existence of many originals as long as the provision’s criteria of integrity and reliability are met. Section 11: Authentication of Electronic Data Messages and Electronic DocumentsThis section explains that the electronic signatures must be validated by proof than a letter associated with an electronic data message or document in a security procedure. And it can detect errors or alteration of communication, The supreme court may adopt such authentication procedures, including the use of electronic notarization systems as needs, as well as the certificate of authentication on printed or hard copi es of the electronic documents or electronic data messages by electronic notaries, service providers and other certification authorities. It provides the rules on evidence.Prone to the different characters of electronic data messages vis-a-vis paper or other objects, authentication procedures will have to be different too. This law requires for electronic data messages to be authenticated by validating a claimed identity of a user, device, or information system. Electronic signatures are to be authenticated by proof that a symbol or character representing the person named t attached to or that an appropriate technology or security was used with the intention of authenticating or approving the electronic document. Section 12.Admissibility and Evidential Weight of Electronic Data Message or electronic document. In this section, it serves as a guide to a data message is allowed in evidence and to how much weight is to be given them . It says that there’s no rule shall render the data message that is not allowed on the sole ground that it is in electronic form or on the ground that it is not in the standard written form. Evidential weight is to be given such electronic document after assessing the reliability of the manner in which the originator was identified, and other relevant factors have been given due regard.Section 13,  Retention of Electronic Data Message or Electronic Document. In this provision, it explains that electronic data message or original form must remain usable for reference and it will maintain the format when it was sent or received, It makes us identify the originator, the addressee which was explained in section 6, it also indicates the time and date of the electronic data message. The person required to maintain the forms can do it in a different way by using the services of a third party. Like for example, the BIR, demands the retention of receipts for at least three years, so that they can audit it.The effect is that this can r elieve business corporations from having to keep the required documents in paper form. It would be a good way to access the receipts and easier to find. Section 14. Proof by Affidavit, This provision also matters in section 12 and 9, it will take for granted to establish by an affidavit given to the deponent. So that it would inform the deponent about the rights of parties. This is useful as the requirements may prove to be more demanding and set in one’s way. Section 15. Cross – Examination.In this section it discusses that in any statement contained in affidavits and shown in courts, are subject to the right of the person against whom the affidavit is executed so that it can test the accuracy and truth of the affidavit by cross-examination, which means the interrogation of a witness called by one's opponent. As I understand,the process of cross-examination is presumed to be necessary because most witnesses come forward to support one side or the other. In the case of the defense, a witness might omit certain information which the prosecution might find interesting or relevant.A prosecution witness might, likewise, omit information. Cross-examination ensures that the trial is fair, and that all information is truly out on the table. CHAPTER III. COMMUNICATION OF ELECTRONIC DATA MESSAGES OR ELECTRONIC DOCUMENTS Section 16. Formation of Validity of Electronic Contracts. In this provision it says that a contract is a meeting of the minds and generally could take whatever shape or form, many of them are still afraid of that contracts entered into electronically may encounter some problems.Many transactions and other forms of trade are now conducted electronically. For example, most people will at least be familiar with, if not frequent users of, ATMs situated outside or inside banks. When a bank’s customer withdraws money or uses an ATM for other purposes, an electronic transaction takes place. More and more business is now done electronicall y, often with the parties never physically meeting each other. Online shops, for example, allow potential customers to browse, select and purchase goods without ever asking a salesperson for advice or assistance.Negotiations, giving quotes or submitting tenders for work may all be done electronically and indeed are. A great deal of information is now passed electronically within organizations and from one organization to another. This all raises a number of legal questions, specifically with regard to electronic contracts. Some of the most important issues include whether an electronic contract is valid, that is, whether it must comply with certain formalities, whether electronic signatures are admissible as evidence of intent and agreement, and what law applies to an electronic contract.Section 17. Recognition by Parties of Electronic Data Message or Electronic document. In this provision, it says that the originator and the addressee of an electronic data message or electronic doc ument, a declaration of will or other statement must not be denied legally, validity or enforceability solely on the ground that it is in the form of an electronic data message or electronic document. Section 18. Attribution of Electronic Data Message.This section says that of the originator if the originator him/herself sent it and it was sent by an information system programmed by or on behalf of the originator to operate automatically. The addressee is used to pertain an electronic data message or electronic document as well as the originator. The addressee must apply a procedure which the originator approved and as the addressee receives the electronic message which results from the action of a person, it will enable to access a method to identify electronic message or document on his own way.An electronic message is deemed to be sent by the originator of the message if it is sent by a person who has the authority to act on behalf of the originator in respect of that message or if the message is sent by an information processing system programmed by, or on behalf of the originator to operate automatically. The notion that one has to physically put pen to paper to sign a contract is now a thing of the past.A person who receives an electronic message is entitled to regard the message as being that of the originator except in instances where he has received notice from the originator that the message was not sent by him or the addressee knew or should have known that the message was not sent by the originator had he exercised reasonable care. Originator doesn’t include Intermediary. For example, Person A uses his yahoo account to send an email message to person B which is the addressee. Here, Person A is the originator & Yahoo is the intermediary. Person A is on vacation.During vacation he has turned his vacation responder on with the following message:â€Å"Thank you for your email. I am on vacation, will reply your mail as soon I get back†. He re, though person A has programmed an information system to operate automatically on his behalf. Still Person A is the â€Å"originator† in this case. Section 19. Error on Electronic Data Message or Electronic Document. In this provision, it explains that the transmission of electronic data message between the addressee and the originator that resulted in error, it will enter to the designated information system or which is not designated by the addressee for the purposes.Section 20. Agreement on Acknowledgement of Receipt of Electronic Data Message or Electronic Document. In this provision the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, in any communication by the addressee will be automated or otherwise any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. The originator has not agreed with the addre ssee that the acknowledgement be iven in particular method, an acknowledgement may be given by or through any communication by the addressee, automated or otherwise, or any conduct of the addressee, sufficient to indicate to the originator that the electronic data message or electronic document has been received. The originator has stated that the effect or significance of the electronic data message e or electronic document is conditional on receipt of the acknowledgement thereof, the electronic data message or electronic document is treated as though it has never been sent, until the acknowledgement is received.What exactly did the originator of the message intend to send? Under the Act, there is a presumption that the electronic message is what the originator intended to send, and the addressee can act on that presumption unless the originator can show that the addressee knew or should have known that the electronic message received was an error. Therefore parties to a commercial transaction have to take precautions to ensure that any messages to be sent contains accurate information and are indeed intended for the recipient.For example, Person A sends an email to Person B asking her that he would like to purchase a car and would like to know the prices of the cars available for sale. Person B in return sends person A catalogue of prices of the cars available for sale. Now this action of Person B is sufficient to indicate to person A (the originator) that his email (i. e. the electronic record) has been received by the addressee. Section 21.Time of Dispatch of Electronic Data Messages or Electronic Documents. In this provision, with regards to the issue of time of dispatch, an electronic message is deemed by the Act to be sent when it enters an information processing system outside the control of the originator. Therefore it would appear that the time of dispatch will be when a person clicks the ‘Send’ button when e-mailing or the ‘Buy/Pu rchase’ button on an online store.An electronic message is deemed to be received when the message enters the designated information system (where there is a designated system), for instance, when a message enters the inbox folder of an e-mail account, or where there is no designated system, when the addressee comes to know about the message. Where the parties agree or the originator requests that receipt of the electronic message is acknowledged, that message will be treated as though it has never been sent until the acknowledgment is received.If the method of acknowledgment has not been agreed by the parties, any acknowledgment (automated or otherwise) or any conduct of the addressee which is enough to communicate receipt, will suffice as acknowledgment. Example of this: Person A composes a message for person B. At exactly 12. 00 noon she presses the â€Å"Send† button. When she does that the message leaves her computer and begins its journey across the Internet. It i s now no longer in Person A’s control. The time of dispatch of this message will be 12. 00 noon. Section 22. Time of Receipt of Electronic Data Messages or Electronic Documents.This provision explains that the time of receipt of an electronic communication is the time when it becomes capable of being retrieved by the addressee at an electronic address designated by the addressee. The time of receipt of an electronic communication at another electronic address of the addressee is the time when it becomes capable of being retrieved by the addressee at that address and the addressee becomes aware that the electronic communication has been sent to that address. An electronic communication is presumed to be capable of being retrieved by the addressee when it reaches the addressee’s electronic address.Section 23. Place of Dispatch and Receipt of Electronic Data Messages or Electronic Documents. – How does one determine the location of dispatch and receipt of electroni c messages? The Act deems an electronic message to be sent from the originator’s place of business and received at the addressee’s place of business. If there is more than one place of business, it will be considered sent from the place of business that has the closest relationship with the transaction or in the absence of that, from the principal place of business.In circumstances where the originator or addressee has no place of business, it will be deemed sent or received, as the case may be, at the originator’s or addressee’s ordinary place of residence. Example of this is: person A has entered into contract with a US based company. Company has its server in Brazil. Even if the company has its mail server located physically in Brazil, the place of receipt of the order would be the company’s office in USA. Section 24. Choice of Security Methods. This provisions explains the choice of type or level of security for their own purposes is recognized in this section .But still, this is prior to rules and guidelines which government can declare in terms of e- commerce transaction security. In my opinion, security is perhaps one of the greatest concerns of the millions of users that routinely exchange data over the Web or store information in computers which may be accessed by unauthorized parties. The government should protect the confidentiality and integrity of data being transferred or stored, they need to develop a new standard which defines authenticated encryption mechanisms that provide an optimum level of security.PART III ELECTRONIC COMMERCE IN CARRIAGE OF GOODS Section 25. Actions Related to Contracts of Carriage of Goods. This provision explains that the law is designed to apply to actions on contracts related to carriage of goods. What is figured is that airway bills, bills of lading, receipts, sales, transfers of ownership, and other documents or papers related to carriage of goods by land, sea, or air may now be do ne electronically. For example, buying online gadgets through the net, it is by shipping procedures.Section 26. Transport Documents. In this provision, It follows therefore that electronic documents facilitated and transacted though online basis are as important and valid as that of actual use of paper documents. This is according to SEC. 26 under Transport Documents where the law requires that any action referred to contract of carriage of goods be carried out in writing or by using a paper document, that requirement is met if the action is carried out by using one or more data messages or electronic documents.In almost all electronic transactions, online orders are subject to a verification procedure conducted by the store for their protection as well as customers from credit card fraud or identity theft. This is a normal procedure to verify that the card owner or that order and that ship-to information are legitimate. This process rarely delays an order, and generally requires ei ther a simple call-back which can be done through phone calls or by fax messages. The B store for example stresses the importance of knowing what â€Å"bill-to nformation† on the checkout process means. The bill-to address is the address to which your bank mails your monthly credit card statement. The bill-to address you give the store must agree with the address that the card issuing bank has on file. Then, be sure to provide the correct information, even if the items are to be shipped to a different location. PART IV ELECTRONIC TRANSACTIONS IN GOVERNMENT Section 27. Government Use of Electronic Data Messages, Electronic Documents and Electronic Signature.In this provision, it says that the government must accept retentions and creations of electronic data messages or document like issues in permits, licenses and its approval form and issure receipts in the form of electronic. As well as the government business transactions and it is authorized to adopt rules and regulations in the form of electronic documents. In a short explanation all documents that they will create should be in the form of electronic documents or data messages and authorized by electronic signatures as well. Section 28.RPWEB Promote the Use of Electronic Documents or Electronic Data Messages in Government and to the General Public. In this provision, it explains that RPWEB’s role in the use of electronic documents or data messages. They must be the initial platform of the GII which stands for government information infrastracture to control the electronic online transmission and conveyance of government services to improve better technologies or kinds and electronic online wide area networks utilizing, but not limited to, fiber optic, satellite, wireless and other broadband telecommunications.To sum up, RB web’s major task is to . Interconnect all government offices and units, including schools, colleges and universities, government corporations, as well as those at t he local level, by authorizing the use of savings for Internet access, through any Internet Service Provider (ISP) in their area, to facilitate faster communication and data interchange in government. Interconnect all ISPs through Internet exchanges for greater connectivity among users in the country. Speed up implementation of the telephone roll-out programs, articularly in unserved areas in the country. So that our country will hava a better technology. Section 29. Authority of the Department of Trade and Industry and Participating Entities. In this provision, it enables the DTI to promote and develop electronic commerce as well as to promulgate rules and regulations, provide quality standards or issue certifications in the pursuance of this Act’s intentions. I was very pleased to see this attempt by the DTI to develop electronic commerce in our country.I believe that this act will be implemented for the economic future of the country; electronic commerce and the developmen t of new network-based public services is clearly set to become a major contributor to country’s economic growth over the next decade. The DTI has a very important role to play to ensure that the potential benefits for the public, for SMEs and for government can be realised promptly and in a safe manner. PART V FINAL PROVISIONS Section 30. Extent of Liability of a Service Provider.This provision explains the liablilities of the service provider, It exempts ISPs from liability if they can prove that they had no knowledge of the occurrence of the alleged act, and that they had taken sufficient steps to prevent a violation. However, the existing provision does not clearly prescribe liability limits of service providers. For example, if a person makes a representation to a service provider claiming copyright on the material available on the network, will the service provider be liable if he fails to take steps within a reasonable time to remove the infringing material from the ne twork?If the service provider fails to prevent infringement of copyright in the above circumstances, is the plea of not having knowledge of infringement still available to him? If the service provider removes the material from the network in pursuance to the representation made by a person which later on proves false, will the service provider be liable to the person whose material has been removed? The liability of service providers for copyright infringement must be made more explicit.The act must include sections that address the financial aspect of the transaction, and the relationship between an ISP and a third party, because this is vital to determining the identity of the violator. So that if any person with knowledge of the infringing activity, induces, causes, or materially contributes to the infringing conduct of another, the person can be made liable. In order to be exempt from liability, the act requires the service provider to exercise due diligence to prevent the commi ssion of copyright infringement.The Act does not provide the meaning of the term due diligence. If due diligence means policing each and every aspect of the Internet, it can lead to loss of privacy and can ultimately have a disastrous effect. There is a need for a consensus on the meaning of the term due diligence because the primary function of ISPs is to build the Internet, not to play the role of a policeman. If the behavior of an ISP is reasonable, then that ISP should not be held liable for each and every activity on the Internet as has been held by the court.Section 31. Lawful Access. In this provision, it explains that that access to an electronic file, signature or document shall be limited only to those that are authorized to possess and use it. Electronic keys used for identity and integrity may only be made available to another upon consent of the individual in lawful possession of the key. Section 32. Obligation of Confidentiality. This provision explains that those who obtain access to an electronic key, signature or document not to convey or share the same with another.These two sections are important in that it recognizes that these files are property of an individual and can be possessed only by another upon the consent of its owner. It further recognizes the privacy and personal nature of the key by obliging those who gets to possess it not to share it with others. In my own opinion, the person must receive the information in confidence. That means that he or she must be asked to treat the information as confidential or it must be obvious to him or her that the information is given in confidence.The best way to do that is to ask the person to sign a confidentiality agreement. That is not in itself enough. Precautions must be taken (and seen to be taken) to keep the information secret such as logging documents and disclosures, keeping materials under lock and key and extracting confidentiality agreements. Section 33. Penalties. – The fol lowing Acts, shall be penalized by fine and/or imprisonment, as follows: In this provision, issues in security and penalties are addressed in it.The violations are the ff: hacking, is any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.If the individual commits this violation he will have a fine of One Hundred Thousand pesos and imprisonment of 6 months to 3 years. Another violation is piracy, s the unauthorized duplication of an original recording for commerc ial gain without the consent of the rights owner. They will be punished by a minimum fine of One Hundred Thousand pesos (P 100,000. 00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six months to three years. In my opinion. Penalties like imprisonment are good example of punishing an individual who possess violations and crimes.Section 34. Implementing Rules and Regulations. In this provision, it explains that the DTI, Department of Budget and Management and the Bangko Sentral ng Pilipinas are empowered to enforced the provisions of this Act. Among others, the DTI is empowered to promulgate rules and regulations, as well as provide quality standards or issue certifications, as the case may be, and perform such other functions as may be necessary for the implementation of this Act in the area of electronic commerce.Failure to Issue rules and regulations shall not in any manner affect the executory nature of the provisions of this Act. In my opinion , it is necessary to develop rules and regulations especially in e commerce. We need rules for the settlement of disputes. They also need rules for the organization of their governments. Law is the set of rules that the government enforces through its police, its courts, and its other agencies. It is important to implement rules and regulations so that people can understand what e commerce is and what are the obligations toward this act.Section 35. Oversight Committee. In this provision, it explains that there shall be Congressional Oversight Committee composed of the Committees and Trade and Industry/Commerce, Science and Technology, Finance and Appropriations of both the Senate and House of Representatives which shall meet at least every quarter of the first two years and every semester for the third year after the approval of this Act to oversee its implementation.The DTI, DBM, Bangko Sentral ng Pilipinas, and other government agencies as may be determined by the Congressional Co mmittee shall provide a quarterly performance report of their actions taking in the implementation of this Act for the first three (3) years. Utilizing an oversight committee has several advantages. In my opininion, It is generally much more effective with forming and implementing a new rules and regulations. Also, since the oversight committee is a separate entity, access to classified information such as electronic data messages and documents can be controlled.Since experts are involved, uninformed bias is kept to a minimum. The oversight committee can also operate as a mediating body between the active organization and the public. In this role, the committee can help the public understand what e commerce rules and regulations by publishing reports that communicate the facts in ways the public can understand. The existence of an oversight committee can have an impact on the quality and fairness of fact-finding even before the committee gains access to the relevant information.Gove rnment entities must ensure the standard of their work is acceptable, especially because in the long run it will be more costly and time-consuming if they are forced to go back and correct mistakes when an oversight committee detects errors on the implementation of the act. Section 36. Appropriations. In this provision, It explains that the funds needed to provide the sections 27 and 28 will be charged on the savings of the General Appropriations Act of 2000 in the first year of the effectively of the act. And all the funds for the continuous implementation will be included in the General Appropriations Act.This is important to develop the electronic transactions between the government and to the public and like the section 27 said in order to transact the government business and/or perform governmental functions using electronic data messages or electronic documents, and for the purpose, are authorized to adopt and promulgate, after appropriate public hearings and with due publicat ion in newspapers of general circulation, the appropriate rules, regulations and I think there will be needed funds to implement this. Section 37.Statutory Interpretation. In this provision, it explains that Philippine law on e-Commerce was patterned after the â€Å"UNCITRAL Model Law on Electronic Commerce† adopted by the United Nations Commission on International Trade Law (UNCITRAL) in 1996 the model law is intended to promote the harmonization and unification of international trade law and remove unnecessary obstacles to international trade caused by inadequacies and divergences in the law affecting trade as a result of the information technology revolution.The interpretation of this Act shall give due regard to its international origin and the need to promote uniformity in its application and the observance of good faith in international trade relations. The generally accepted principles of international law and convention and electronic commerce shall likewise be consid ered. Section 38. Variation of Agreement. In this provision, it explains that the variation of agreement is intended to apply not only in the context of relationships between originators and addressees of data messages but also in the context of relationships involving intermediaries.Thus, the provisions of it could be varied either by bilateral or multilateral agreements between the parties, or by system rules agreed to by the parties. However, the text expressly limits party autonomy to rights and obligations arising as between parties so as not to suggest any implication as to the rights and obligations of third parties. Section 39. Reciprocity. This section states that if the other party to a transaction comes from a country that does not grant the Filipino similar rights contained herein, he will not be allowed also to enjoy the benefits of this law's provisions.Section 40. Separability Clause. In this provision it states that any separable provision of this Act be declared unc onstitutional, the remaining provisions shall continue to be in force. To understand generally a separability clause is a clause often included in a legal document (as a contract) stating that invalidation of some sections or clauses in the document will not affect the validity of the remainder. Section 41. Repealing Clause. In this provision, all rules and regulations which are inconsistent with the provisions of this Act will be cancelled legally.Section 42. Effectivity. In this provison, it declares the effectivity of the act wher e in it shall be effective after its publication in the Official Gazette. Conclusions and recommendations: There is high need for such laws to be enforced in order to make sure the balance is maintained between selling and buying along with the right laws. So far the laws such as the limitation of the liability, indemnification, attorney fees, choice of law are the most used and vital ones to make sure that the deals and trading happen legally and gover ned by laws.The electronic buying and selling are the key features of this modern world and internet applications. The way of living is simplified to the core by the extensive and effective applications of the internet and the Ecommerce laws that govern these electronic trading. The modern world is reaping the multipurpose benefits of the internet and its worldwide applications to the maximum. The laws are the heart of any modern day trading or dealing that takes place because they set the way of business and the regulations of the business.When you make any electronic transaction, then you will have to go through the mandatory laws so that they occur under the legal patterns. The limitation of the liability and the choice of the law are vital laws that the ecommerce industry has to go through. As the days pass by, further more laws are going to be implemented in order to make sure the industry and the transactions are under control. Case Analysis about the E Commerce Law Kyle M. Es tanislao SOCULITA 301