Wednesday, July 31, 2019

Impact of the Internet in Our Life

Available online at www. sciencedirect. com Computers in Human Behavior Computers in Human Behavior 24 (2008) 2005–2013 www. elsevier. com/locate/comphumbeh Impact of the Internet on our lives: Male and female personal perspectives Ann Colley *, John Maltby School of Psychology, University of Leicester, Henry Wellcome Building, Lancaster Road, Leicester LE1 9HN, UK Available online 30 October 2007 Abstract Gender di? erences in Internet access and usage have been found in a number of previous investigations. The study reported here extends this work by providing an analysis of the impact of the Internet on men’s and women’s lives.A content analysis of 200 postings from men and 200 from women, on the topic of ‘‘Has the Internet changed your life’’ invited by a news website, was undertaken then examined for gender di? erences. Results showed more women’s postings mentioned having made new friends or having met their partner, renewin g old friendships, accessing information and advice, studying online, and shopping and booking travel online, while more men’s postings mentioned that the Internet had helped or given them a career, positive socio-political e? ects, and negative aspects of the technology.The results are interpreted as supporting the view that the Internet represents an extension of broader social roles and interests in the ‘‘o? ine’’ world. O 2007 Elsevier Ltd. All rights reserved. Keywords: Internet; Gender; Gender roles; Gender di? erences 1. Introduction ‘‘The Internet is my job, my high street, my supermarket and my international social playground’’ (Female participant 63). Usage of the Internet continues to increase worldwide. In the UK 57% of households now have access, in comparison to 46% four years ago (National Statistics, 2006).The * Corresponding author. Tel. : +44 (0) 116 229 7188; fax: +44 (0) 116 229 7196. E-mail address: [ema il  protected] ac. uk (A. Colley). 0747-5632/$ – see front matter O 2007 Elsevier Ltd. All rights reserved. doi:10. 1016/j. chb. 2007. 09. 002 2006 A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 Digital Future Project in the US has found that 78. 6% of Americans went online in 2005, with an accompanying increase in the amount of time spent per week on the Internet (Centre for the Digital Future, 2005).A number of factors have been found to relate to access and use, including socioeconomic variables, demographic variables, and education (e. g. Bimber, 2000; Wasserman & Richmond-Abbott, 2005). One signi? cant area of research over the last decade has investigated the impact of the Internet upon di? erent social groups and inevitably work on gender di? erences has been at the forefront, with concerns about the presence and impact of a ‘‘gender gap’’ in Internet access and usage. A number of investigators (e. g. Sherman e t al. , 2000) have investigated this gender gap in Internet use.Bimber (2000) found gaps in both access and use among US adults, and concluded that, while access di? erences can be accounted for by socioeconomic and other factors that a? ect women and men di? erentially, the gap in use was due at least in part to gender-speci? c factors such as the male stereotype of computers, cultural associations between gender and technology and gendered cognitive and communication preferences. However, there is growing evidence that the gender gap in access is closing or has closed with more women coming online, and that the gap in use of the Internet is still present but may also be closing (e. . Cummings & Kraut, 2002; Ono & Zavodny, 2003; Wasserman & Richmond-Abbott, 2005). There continues to be a gender gap in usage in the UK: the latest ? gures from adults in a nationally representative sample of UK households show that 40% of women had never used the Internet in comparison with 30% of men , and 55% of women had used the Internet within the 3 months prior to the survey in comparison with 65% of men (National Statistics, 2006). In addition, there are further gaps in the frequency and nature of use that appear to remain (Odell, Korgen, Schumacher, &Delucchi, 2000; Ono & Zavodny, 2003; Wasserman & Richmond-Abbott, 2005). One of the issues that was highlighted early on in investigations of the gender gap, concerns the negative e? ect of the link between the Internet and computer technology. This area grew from work on gender di? erences in computer attitudes and use more generally, which showed more negative computer attitudes (Durndell & Thomson, 1997; Whitley, 1997), lower female self-con? dence and higher computer anxiety among females (McIlroy, Bunting, Tierney, & Gordon, 2001; Todman, 2000).The possibility raised in the literature was that girls and women were being discouraged from using the Internet because of its delivery via a computer interface, and because of t he association of the kinds of operations required to interact with it with traditional masculine technology. Indeed, computer attitudes and Internet attitudes have been found to be linked (Liaw, 2002; Schumacher & Morahan-Martin, 2001), and experience using the Internet has been found to predict both (Liaw, 2002). Durndell and Haag (2002) found higher computer self-e? acy, more positive Internet attitudes, longer Internet use and lower computer anxiety among male than female students, and gender was independently linked to Internet experience. Similarly, Joiner et al. (2005) found that a signi? cant relationship between gender and use of the Internet remained, after controlling for Internet identi? cation and Internet anxiety. This may be due to a number of other factors, and Joiner et al. suggest that self-e? cacy and expectancy of success may be fruitful areas to pursue. In addition, it seems that there are di? erential e? cts of experience upon anxiety in using the technology am ong men and women: Broos (2005) found that experience decreased anxiety among men but had little e? ect for women. Alongside investigations of the gender gap in use of the Internet, there is a growing body of research on di? erences in the use of the Internet for di? erent functions by males A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 2007 and females. This is a crucial area to pursue in order to understand the gender gap, since amount of use is inextricably linked to the functions erformed and the bene? ts of them for an individual. The number of potential functions of the Internet is very substantial and the activities are diverse. The current top Internet activities in the US are e-mail (top), general sur? ng, access to news, shopping, reading entertainment news, ? nding information about hobbies, online banking, accessing medical information, instant messaging and accessing information about and booking travel (Center for the Digital Future, 200 5).The available evidence points to variations in exploiting these functions of the Internet by its male and female users: women are more likely to regard it as a tool or means to an end, while men regard it as technology to play with and master (Singh, 2001; Turkle, 1984). For example, Tsai and Lin (2004) found gender di? erences in perceptions of the Internet among adolescents: males perceived its use as a source of enjoyment or ‘‘toy’’, while females took a more practical approach and perceived it as a ‘‘tool’’, ‘‘technology’’ or ‘‘tour’’ (providing the ability to navigate around di? rent sites and people). One area of Internet use that has attracted attention among investigators is interpersonal communication. This is due to the association of functions facilitated by electronic communication with the expressive and communal aspects of femininity, such as the potential for use in self-expression and the facility to communicate readily with family and friends. Thus, it was expected that women might engage with the Internet for such purposes, despite having lower self-e? cacy in relation to computer use.Jackson, Ervin, Gardner and Schmidt (2001) predicted that women would use e-mail more and men use the Web for information more, based on the greater interpersonal orientation of women and greater task orientation of men. This prediction was supported in a large sample of Anglo-American undergraduates, even after computer self-e? cacy, loneliness and depression were controlled for. Wasserman and Richmond-Abbott (2005) found that women use e-mail slightly but not signi? cantly more than men but that men use chat rooms more. A similar ? nding was obtained by Sherman et al. 2000) who found higher participation in chat groups among men, but higher e-mail use among women, and these di? erences remained among successive cohorts of students in the late 1990s, despi te generally higher use of the Internet. Women’s preference for e-mail and men’s for chat rooms re? ects the di? erent purposes of the two types of communication: e-mail facilitates personal contact with friends and family, while chat rooms can be anonymous and provide an arena for the display of power di? erentials present in society more generally (Wasserman & Richmond-Abbott, 2005). There are some null ? dings with respect to gender di? erences in e-mail use (e. g. Joiner et al. , 2005; Schumacher & Morahan-Martin, 2001), but methodological di? erences between studies may account for such disparities. With respect to other uses of the Internet, there is evidence that some of these too are gendered. Men are more likely to use game web sites (Joiner et al. , 2005; Sherman et al. , 2000; Weiser, 2000), download material (Joiner et al. , 2005; Teo & Lim, 2000), browsing or seek specialist information (Jackson et al. , 2001; Joiner et al. , 2005; Teo & Lim, 2000; Weiser, 2000). These ? dings provide additional support for the notion that men’s use of the Internet is more task-oriented than women’s, and the tendency for women to use e-mail more accords with their greater interpersonal orientation (Jackson et al. , 2001). They also support the male ‘‘toy’’ versus female ‘‘tool’’ distinction (Tsai & Lin, 2004). The research literature on gender and the Internet suggests that gender stereotypes play a powerful role in this as in other areas of human activity. Sherman et al. (2000) concluded 2008 A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 hat we need to appreciate that ‘‘online behaviors and attitudes are extensions of o? ine social processes and relationships’’ (p. 893). If that is the case, what impact has the Internet had on the everyday lives of the men and women who use it? With respect to women, Morahan-Martin (2000) concl uded that it has brought both promise and peril. The perils are an inevitable consequence of the features that empower – freedom of expression and free access to information, since these also permit the ampli? cation of behaviors and perspectives that support the gendered power di? rential. What has been its impact upon men? Is the Internet just another arena in which gender is performed? The empirical research reviewed here has focused upon usage and patterns of usage, rather than impact from the point of view of the user. The purpose of the data analysis reported here is to provide a picture of the impact of the Internet on the everyday lives of men and women. 2. Method 2. 1. Participants and data collection On 24th July 2006, the BBC News website posted a topic for discussion on its ‘‘Have Your Say’’ discussion section (http://news. bbc. co. k/1/hi/talking_point/default. stm), with the title ‘‘Has the Internet changed your life? â€⠄¢Ã¢â‚¬â„¢. The invitation issued to prospective contributors was to post personal stories about life in the digital age and how the Internet has changed their lives. The majority of contributors to this site used names rather than pseudonyms. There were substantially more postings from men, but the site was monitored until there were 200 postings from female contributors, then these together, with 200 postings randomly selected from among the male contributors were downloaded for analysis.The sample came from approximately 1200 postings during the period 24th July and 4th August. Selection for analysis was only undertaken if the name of the contributor was unambiguously male or female. The majority of the postings (92%) gave the town or country of origin, with 48% of the total postings being from the UK, 25% from the US and Canada, 7% from mainland Europe, and the remainder from the rest of the World. 2. 2. Data coding A content analysis was undertaken to derive category frequencie s for analysis.Coding was undertaken based upon content categories derived both from the existing literature and from a sample of the postings. These categories were: 1. Easy and cheap contact with family and friends (through e-mail, instant messaging etc. ) 2. Made new friends (through chat room, discussion forum, etc. ) 3. Renewed contact with old friends/family 4. Met partner/spouse (through chat rooms, dating sites etc. ) 5. International news sites 6. General information acquisition/research 7. Therapeutic/medical advice 8.Support for those with access/mobility problems 9. Entertainment (music, radio, movies, games, hobbies) 10. Travel booking A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 2009 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Online education Trading Banking Shopping Job enhancement (increased e? ciency/? exibility) Job hunting Assisted career path Job in industry Studying online Socio-political e? ects (global access to information, democ ratization of information, bringing humanity together) 21. Negative e? cts (pornography, phishing, spam, viruses, bad use of time, addiction, reduction of face-to-face contact, availability of illegal items, proliferation of uncensored information, etc. ) Reliability of coding was established in a 20% sample from the postings. Across all categories this yielded substantial agreement (Cohen’s Kappa = 0. 78), with no individual categories yielding ? gures below the substantial range (Landis & Koch, 1977). Gender di? erences were then examined using v2 tests. 3. Results Gender di? erences were found in the frequency with which a number of the categories were present in the postings (see Table 1).Chi square tests revealed that a higher proportion Table 1 Frequency of appearance of coding categories by gender Category Contact with family and friends Made new friends Renewed contact with old friends/family Met partner/spouse International news sites General information acquisition/ research Therapeutic/medical advice Support for access/mobility problems Entertainment Travel booking Online education Trading Banking Shopping Job enhancement Job hunting Assisted career path Job in industry Socio-political e? ects Negative e? ects * ** % Men 25. 0 10. 0 4. 0 8. 5 9. 5 25. 5 2. 5 4. 0 12. 5 1. 5 2. 0 3. 0 6. 12. 5 6. 0 1. 5 12. 0 12. 0 12. 5 31. 0 % Women 30. 5 20. 5 20. 0 22. 5 19. 5 36. 0 7. 0 5. 0 10. 0 6. 0 6. 5 7. 0 7. 0 20. 5 7. 5 3. 5 4. 0 6. 0 5. 0 21. 0 v2 (1) n. s. 8. 53** 5. 50* 14. 97** 8. 07** 5. 18* 4. 48* n. s. n. s. 5. 60* 4. 98* n. s. n. s. 4. 63* n. s. n. s. 8. 70** 4. 40* 7. 05** 5. 20* p < . 05. p < . 01. 2010 A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 of women’s postings mentioned having made new friends, having renewed contact with old friends or family members, having met their partner or spouse online, access to international news sites, being able to ? d information easily, accessing medical or ther apeutic advice, studying online, booking travel online and shopping online. A higher proportion of men’s posting mentioned that the Internet had played a role in their career path, that they had found employment in the industry, positive socio-political e? ects and negative aspects of the Internet. 4. Discussion The ? ndings from this study extend those of existing research on Internet usage by providing information on what men and women perceive as important to them. In some cases the ? ndings accord with the usage data, while in others they do not.With respect to interpersonal communication, our ? ndings show no di? erence in the frequency with which Internet-assisted contact with friends and family was cited as being an aspect of the Internet which had changed the lives of men and women. It is worth noting however, this was the second most frequent category occurring in postings from both sexes. Studies of usage have produced a range of results on gender di? erences in the use of e-mail, although on balance the ? ndings have suggested slightly more or signi? cantly more use by women (e. g. Sherman et al. , 2000; Wasserman & Richmond-Abbott, 2005). Our ? dings suggest that the impact upon men’s and women’s lives may be similar, although of course there may be di? erences in the way in which men and women enact relationships electronically (Boneva, Kraut, & Frohlich, 2001). Di? erential impact is evident in women’s higher frequency of mention of using Internet sites to make new friends, meet partners and renew old acquaintances, supporting the notion that women’s interpersonal orientation will in? uence their Internet behavior (Jackson et al. , 2001). This ? nding is of interest in the context of men’s greater usage of chat room sites found by Sherman et al. 2000) and Wasserman and Richmond-Abbott (2005), although our content category was not speci? c to chat rooms alone. It is nevertheless possible that men and women use such sites for different purposes and gain di? erent kinds or rewards from them: our data suggest that women place greater value on the facility to expand their social networks, whereas it is possible that men’s motives may be more mixed. Wasserman and Richmond-Abbott’s suggestion that men may be more likely to use them to play interpersonal games and display power may be relevant here, and accords with ? dings that men are more likely to be dishonest in chat room interactions (Whitty & Gavin, 2001) and lie about their sex, education, income and occupation (Whitty, 2002). There is a growing literature on the nature of online relationships and the characteristics of those who participate in them (e. g. Cheng, Chan, & Tong, 2006; McCown, Fischer, Page, & Homant, 2001) and it would be pro? table to examine gender di? erences in motivation to engage in interpersonal behaviors on the Internet in more detail. The most frequently cited positive e? ct overall was the abil ity to access general information on the Internet, although it was present in a higher proportion of women’s than men’ postings. This result contrasts with the usage ? ndings (Jackson et al. , 2001; Joiner et al. , 2005; Teo & Lim, 2000; Weiser, 2000), but supports the notion of women’s more practical approach and stronger perception of the Internet as a ‘‘tour’’ (Tsai & Lin, 2004), which may also explain their more frequent mention of news sites. The women’s more practical approach is also evident in their higher frequency of mention of accessing A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2005–2013 011 online education, therapeutic advice, booking travel and shopping. However, gender differences were not present in other practical uses such as trading, banking and accessing sources of entertainment. In order to explain the pattern of ? ndings, it is necessary to take into account the broader context of g ender di? erences in social role demands and accompanying gender-related traits (e. g. Eagly, 1987; Eagly, Wood, & Diekman, 2000), in which the domestic vs. external distinction di? erentiates the focus and interests of women and men. Our data suggest that this distinction may underpin the impact of the Internet on men and women.The Internet in? uences women’s lives more than men’s in facilitating new interpersonal interactions, providing access to information from the domestic sphere, and facilitating the purchase of goods, and in? uences men’s lives more than women’s by providing employment or assisting career development. In addition there was greater evidence in the postings from men of awareness of the global impact of the technology, for example, ‘‘Never have so many people been empowered to make a real di? erence and get their message heard’’, (male participant 159).This external awareness is also evident in men’s m ore frequent mention of the negative impacts, ‘‘A disadvantage is the anonymity. . .. idiots can spread their madness, insult others etc. all without fear of being uncovered. A 60-year-old suddenly becomes an 18-year-old and vice-versa’’, (male participant 108). The gender di? erence in relation to negative impacts, however, raises several further possibilities. One may be that women’s greater interpersonal orientation simply results in a tendency to emphasize the good rather than the bad in responding to the discussion issue on the site.Alternatively, women’s more domestic focus may make them less concerned about the broader context and in particular the ‘perils’ of the Internet in relation to power and exploitation (Morahan-Martin, 2000), so ironically, one outcome of the tendency of the Internet to re? ect traditional gender divisions may be to reduce women’s awareness that this is the case. There are some limitations as sociated with using this kind of methodology which are shared with studies of computer-mediated communication in discussion lists (e. g.Herring, 1993), and which relate to the lack of information on the sample. For example, no data on age is available and this may be a relevant variable in relation to impact, since younger users will have grown up with the Internet, while older users will have adapted to its use. However, there is no reason to assume that their distributions among the males and females in the sample should vary and introduce a systematic bias. There is no information available on experience, which may show a gender di? erence since women’s widespread use of the Internet has been more recent than that of men.Whether or how length of experience might in? uence perceptions of the impact of the Internet cannot therefore be answered here but would be a suitable topic for further investigation. Finally, the sample is drawn from those who visit a news website rather than users of the Internet in general so could be regarded as representing a part of the population with a particular pro? le of interests. However, news websites are visited by a signi? cant proportion of the population: this was the third largest use of the Internet in a US survey for 2005 (Centre for the DigitalFuture, 2005) and 35% of a recent sample of UK citizens had accessed on-line news in the last three months (National Statistics, 2006). One signi? cant advantage of using this kind of data is that the areas appearing in the sample of postings are those that spontaneously occur to those submitting them, without prompting from an investigator. Consideration of the advantages and limitations of using the postings as data raises a further gender di? erence, which relates to the acquisition of the quota sample used. There were very substantially more postings on the site from men than women, even when ambiguous 012 A. Colley, J. Maltby / Computers in Human Behavior 24 (2008) 2 005–2013 names were discounted. While this may partly re? ect a residual gender gap in access, it also provides a clear illustration of the di? erent uses of the Internet by men and women, which are attributable to socio-cultural factors and therefore likely to remain (Wasserman & Richmond-Abbott, 2005). Interestingly, Fuller (2004) found that use of the Internet by men and women in the US for political activities, such as accessing information was broadly equal but that women were less likely to post to a political discussion group.It seems, therefore, that it is the opportunity to engage in an anonymous form of interpersonal interaction in which knowledge and power may be displayed (Wasserman & Richmond-Abbott, 2005) that attracts more male postings to sites like the one studied here. The analysis of this sample of postings has produced a picture of what men and women who use the Internet regard as the areas with major impact on their lives. Our content analysis produced a number of gender di? erences which show that the perceived impact of the Internet broadly re? cts the concerns and motivations associated with men’s and women’s gendered social roles. McGert (2000) argued that viewing online behavior as separate from o? ine behavior produces an unhelpful dichotomy, and in order to understand the impact of Internet technology it is necessary to situate it within the gendered practices that impact on people’s everyday lives. Our data support that view and the conclusion of Sherman et al. (2000) that gender di? erences in online behavior will continue for as long as they exist more generally. References Bimber, B. (2000).Measuring the gender gap on the Internet. Social Science Quarterly, 81, 868–876. Boneva, B. , Kraut, R. , & Frohlich, D. (2001). Using e-mail for personal relationships. The di? erence gender makes. American Behavioral Scientist, 45, 530–549. Broos, A. (2005). Gender and information and communication technologies (ICT) anxiety: Male self-assurance and female hesitation. Cyberpsychology & Behavior, 8, 21–31. Center for the Digital Future (2005). 2005 Digital Future Report. Los Angeles: USC Annenberg School. Cheng, G. H. L. , Chan, D. K. S. , & Tong, P. Y. (2006).Qualities of online friendships with di? erent gender compositions and durations. Cyberpsychology & Behavior, 9, 14–21. Cummings, J. N. , & Kraut, R. (2002). Domesticating computers and the Internet. Information Society, 18, 221–231. Durndell, A. , & Haag, Z. (2002). Computer self-e? cacy, computer anxiety, attitudes towards the Internet and reported experience with the Internet, by gender, in an East European sample. Computers in Human Behavior, 18, 521–535. Durndell, A. , & Thomson, K. (1997). Gender and computing: a decade of change? Computers and Education, 28, 1–9.Eagly, A. H. (1987). Sex di? erences in social behavior: A social role interpretation. Hillsdale, NJ: Erlbaum. Eagly, A. H. , Wood, W. , & Diekman, A. B. (2000). Social role theory of sex di? erences and similarities: A current appraisal. In T. Eckes & H. M. Taunter (Eds. ), The developmental social psychology of gender (pp. 123–174). Mahwah, NJ: Erlbaum. Fuller, J. E. (2004). Equality in cyberdemocracy? Guaging gender gaps in on-line civic participation. Social Science Quarterly, 85, 938–957. Herring, S. C. (1993). Gender and democracy in computer-mediated communication.Electronic Journal of Communication 3, http://ella. slis. indiana. edu/herring/ejc. txt/. Jackson, L. A. , Ervin, K. S. , Gardner, P. D. , & Schmitt, N. (2001). Gender and the Internet: Women communicating and men searching. Sex Roles, 44, 363–379. Joiner, R. , Gavin, J. , Du? eld, J. , Brosnan, M. , Crook, C. , Durndell, A. , et al. (2005). Gender, Internet identi? cation, and Internet anxiety: Correlates of Internet use. Cyberpsychology & Behavior, 8, 371–378. Landis, J. , & Koch, G. (1977). The measure ment of observer agreement for categorical data. Biometrics, 33, 159–174. A. Colley, J.Maltby / Computers in Human Behavior 24 (2008) 2005–2013 2013 Liaw, S. -S. (2002). An Internet survey for perceptions of computers and the World Wide Web: Relationship, prediction and di? erence. Computers in Human Behavior, 18, 17–35. McCown, J. A. , Fischer, D. , Page, R. , & Homant, M. (2001). Internet relationships: People who meet people. Cyberpsychology & Behavior, 4, 593–596. McIlroy, D. , Bunting, B. , Tierney, K. , & Gordon, M. (2001). The relation of gender and background experience to self-reported computing anxiety and cognitions. Computers in Human Behavior, 17, 21–33. McGert, L. -J. (2000). ‘Nobody lives only in cyberspace’’: Gendered subjectivities and domestic use of the Internet. Cyberpsychology & Behavior, 3, 895–899. Morahan-Martin, J. (2000). Women and the Internet: Promise and perils. Cyberpsychology & Behavior, 3, 683–691. National Statistics (2006). Internet access. Households and Individuals. London: National Statistics. Odell, P. M. , Korgen, K. O. , Schumacher, P. , & Delucchi, M. (2000). Internet use among female and male college students. Cyberpsychology & Behavior, 3, 855–862. Ono, H. , & Zavodny, M. (2003). Gender and the Internet. Social Science Quarterly, 84, 111–121.Schumacher, P. , & Morahan-Martin, J. (2001). Gender, Internet and computer attitudes and experiences. Computers in Human Behavior, 17, 95–110. Sherman, R. C. , End, C. , Kraan, E. , Cole, A. , Campbell, J. , Birchmeier, Z. , et al. (2000). The Internet gender gap among college students: Forgotten but not gone? Cyberpsychology & Behavior, 3, 885–894. Singh, S. (2001). Gender and the use of the Internet at home. New Media and Society, 3, 395–415. Teo, T. S. H. , & Lim, V. K. G. (2000). Gender di? erences in internet usage and task preferences. Behavior and Information Technology, 19, 283–295.Todman, J. (2000). Gender di? erences in computer anxiety among university entrants since 1992. Computers and Education, 34, 27–35. Tsai, C. -C. , & Lin, C. -C. (2004). Taiwanese adolescents’ perceptions and attitudes regarding the Internet: Exploring gender di? erences. Adolescence, 39, 725–734. Turkle, S. (1984). The second self: Computers and the human spirit. New York: Simon & Shuster. Wasserman, I. M. , & Richmond-Abbott, M. (2005). Gender and the Internet: Causes of variation in access, level, and scope of use. Social Science Quarterly, 86, 252–270. Weiser, E. B. (2000). Gender di? rences in Internet use patterns and Internet application preferences: A twosample comparison. Cyberpsychology & Behavior, 3, 167–177. Whitley, B. E. Jr. , (1997). Gender di? erences in computer-related attitudes and behaviour: A meta-analysis. Computers in Human Behavior, 13, 1–22. Whitty, M. T. (2002). Liar, Liar! An examination of how o pen, supportive and honest people are in chat rooms. Computers in Human Behavior, 18, 343–352. Whitty, M. , & Gavin, J. (2001). Age/sex/location: Uncovering the social cues in the development of online relationships. Cyberpsychology & Behavior, 4, 623–630.

Tuesday, July 30, 2019

Future Criminology Essay

The advancements in technology have lead law enforcement officers to the rescue of an abducted child. Couple of decades ago law enforcement agencies did not have the technical resources such as the amber alert system as they do today. Technology has enables the United States of America to make positive changes in socialization of American citizens. Technology has also assisted the United States in preventing domestic terrorism. Law enforcement agencies have spent billions of dollars on technical logical equipment to aid in the defense of the country. Law enforcement agencies place heavy emphasis on advancing communication. As law enforcement officials try to improve communication through technology, criminals are advancing in cybercrimes. Many identity thefts are committed to the internet; scammers employ phishing techniques to gather personal information from people rather than criminals who rob mail boxes in order to gather personal information. As technology advances criminals adapt as well. This paper will display the positive aspect of future crime fighting as well as highlight the negative aspects. The direction of crime fighting has already been displayed by law enforcement agencies who are currently utilizing advanced technology. Law enforcement agencies have shifted focus on to social networks that have no limitations. Cybercrime has become very common in the American culture. In modern everyday life people utilize some source of technical logical communication device, which leaves the door open to advanced criminals. Cybercriminals posses the abilities to disassemble someone’s life, through personal information stored on communication devices. Cyber criminals usually search for social security numbers, names, birthdays, bank account numbers, and pin numbers. The perceptions of cybercrimes are considered to be an evolution of combined advancements in technology as well as identity theft, which has spread throug hout the world. Cybercrime victimizers’, target people who are less knowledgeable to the advancements of technology. Before the internet was created identity theft was as simple as stealing personal mail, and rummaging through trash cans. Cybercrime enables advanced criminals to make a fast profit with less chances of being caught. Computer  hackers have the ability to hack prohibited information such as bank servers, with the overall goal of achieving large amounts of money. Online scams such as phishing for personal information have become the trend among advancing criminals. Cybercriminals are typically known for thievery of personal data while trying to achieve a financial gain. Cybercriminals have designed websites that appear to be legitimate, but actually is quite the opposite. Cybercriminals have been gathering personal information through fake server windows with surveys, or something that would require all your personal information. According to National Crime Prevention, â€Å"An information broker, Choicepoint Inc., announced that an identity thief had hacked into their database and gained access to hundreds of thousands of documents. Some stolen information included full names, social security numbers, home addresses and credit reports (NCP, 2011).† A key to fighting off these advanced online crimes is awareness. One must be aware that the Internet is a powerful instrument and is used in many unscrupulous ways. Police agents currently devote an entire unit toward dealing with cybercrime. Private Citizens must also be proactive when dealing with their identity. For example, be aware of illegitimate companies, which wait for someone to provide his or her personal information. It is always a good idea to install security on computers that scan for hackers and other odd activity. Most important, be cautious when providing personal information to anyone on the Internet. The world we live in evolved to the point that we cannot assume an individual is trustworthy. That may be a sad reality, but taken very seriously. Cyber-criminals and their actions will certainly create social policy implications. For example, crime fighting may soon resemble that of a movie production. Crimes altogether become more technologically advanced, while cyb er-crimes begin to resemble crimes from a sci-fi atmosphere. According to Reyes, a team of researchers from Santa Clara University are developing predictive policing software (Reyes, 2011). Essentially, the high-tech software design is used to stop crime before it occurs. The high-tech software allows advancement and the upper hand on the criminal. The software also allows law enforcement to pinpoint a precise area where speculated crimes may occur. The crime is isolated or completely stopped before the damage begins. The software updates daily and provides current data, allowing police forces to position themselves before any  illegal activity begins. This may sound like an innovative tool that brings only a positive element, however, are these tools a way to cyber-profile individuals and allow law enforcement to make illogical assumptions based on probability? One must be aware that individuals are innocent until proven guilty, not innocent unless they meet a mathematical formula. The advancement in specific crime fighting methods is vital to the changing methods of criminal activity. Criminals are always looking for a ways to benefit themselves, so law enforcement agencies must shift to advance policing in order to stay a step ahead of criminal offenders. Deoxyribonucleic acid (DNA) is a genetic material of a cell’s nucleus, which is a collection program that has become a great precision tool for law enforcement agencies to identify an alleged perpetrator or an alleged victim. The use of the DNA database is well known by society, because of the popular television shows such as Crime Scene Investigators (CSI), and Naval Criminal Investigative Service (NCIS), which have provided society with examples as to how the DNA data base is utilized. The DNA data base is simply a tool to identify alleged criminals and or victims. According to forensic specialist, â€Å"The database may include profiles of suspects awaiting trial, people arrested, convicted offenders and identifying unknown remains and even members of law enforcement (Schmalleger, 2012)†. Biometrics is the science of analyzing biological data such as fingerprints, DNA, voice pattern recognition, retina scans and facial recognition programs for the purpose of human identification. It is quickly becoming the most accurate means to identify individuals. A typical biometric scanner consists of a scanning device, software that puts the scanned info into digital form and compares it against a database (NPR, 2013). Biometrics started back in China in the 14th century. They used ink to stamp young children’s palms and footprints on paper for identification purposes. In most of the world until the late 19th century, identifying a person relied upon a person’s memory or the use of crude drawings. In about 1890 a system was used that relied on certain body measurements to identify criminals. This did not work very well as it was discovered that it was not uncommon for several persons to have the same measurements. This system was replaced by Richard Edward Henry of Scotland Yard, whose fingerprint system provided a very accurate method of identification (Schmallager, 2012). The next generation of smart phones from  the Apple Corporation has a new operating system that moves biometric science into the consumer market. This new system uses a fingerprint scan technology to allow only the authorized user to operate it. Nowadays consumer’s whole lives are contained on phones including personal information, financial and credit information and addresses. Apple purchased a high-tech company named Authentec which specializes in fingerprint technology to develop this technology. This technology along with iris scan programs will surely have great impact on law enforcement agencies such as: who has access to sensitive areas, safes, thumb drives or documents. This may lead to limiting access to firearms and maybe even who can fire a specific weapon (CBC News, 2013). Another new biometric technology that is being used in stores is facial recognition programs. Some upscale stores use these to recognize wealthy or famous customers as they enter a store and relay this to store employees. This program recognizes a specific person entering a store and compares it against a database of celebrities, sports stars and wealthy customers. It also gives the buying histories, clothing sizes and potential new products they may want to the sales persons. This program is strictly voluntary by most stores as the potential VIP customers want to save time or just be pampered. New technology allows two dimensional images to be converted to three dimensional that can make almost foolproof identifications. This technology is being used by agencies in several cities in various ways to passively monitor the public for wanted individuals. Law enforcement has adopted these methods for their own use. It appears that in some cases they are letting the private sector enginee r these technologies then apply them for their own use (CBC News, 2013). Law enforcement needs to stay ahead of these new biometric technologies as criminals are now working on ways to defeat some of these technologies. One way criminals use to obtain a person’s fingerprints is off of a glass surface to gain access to computers or other fingerprint access systems. Another one is creative ways to disguise your face from facial recognition programs (CBC News, 2013). Computer crimes have risen dramatically in recent years. These are usually referred to as cybercrime. Spyware is most often used to gain access to information contained on a computer or computer system. Spyware is defined as software that sends information from a computer to a third party without consent of  the owner that is unwanted, uninvited or annoying. This can come with free software, file sharing applications or even games. Just visiting certain websites, also called drive-by, can install this software without your knowledge. Spyware is designed to find out what a person prefers buys and what they search for on the internet and allow its authors to make money from this information or possibly gain sensitive data from law enforcement or military computers (CBC News, 2013). The Computer Fraud and Abuse Act of 1986 and amended in the 2002 Patriot Act define computer espionage, trespassing and stealing information. These acts say it is a crime to knowingly counterfeit a device that allows unauthorized access to computer or telecommunication system, receive payments from persons with the intent to commit fraud or using illegally obtained credit card numbers (CBC, 2013). The Department of Homeland Security is working on new programs and having success in countermeasures for cybercrimes. In 2011 they prevented $1.5 billion in business losses and made 72 arrests for people involved in sexual abuse of children on the internet. Police agencies have been reluctant in the past to combat cybercrime as it is expensive and time consuming to investigate but some are now getting involved in identity theft, child molesting using the internet to gain access to children and credit card fraud (DHS, 2013). Mandatory DNA collection programs exist in all 50 states in one form or another. Most have laws mandating DNA collection for certain felony convictions and some for juvenile arrests. Some even allow collections prior to convictions as in California. California is being challenged in court by lawsuits by the ACLU. They feel that innocent persons are being forced to provide DNA samples. There is a DNA database called CODIS where agencies can browse data to identify suspects in crimes. This system allows agencies to positively identify or eliminate suspects (Legal Match, 2013). Unfortunately, the reason that law enforcement evolves is often due to an unforeseen tragedy. For example, after the 9/11 tragedy the â€Å"Homeland Security Advisory System† was introduced. It was a color-coded system that communicated a â€Å"terrorist threat level to federal and local agencies and throughout communities. The system was introduced in 2002 by Security Chief Tom Ridge (Reclaim Democracy, 2011). As is often the case when such controversial initiatives are brought forth, mixed views are common. Every U.S. citizen maintained a heightened sense of awareness and  fear in regard to terrorism. In that sense, this initiative allowed for both federal and local agencies to work together toward their goal of eliminating terrorist threats, and allowed a roadmap for daily operations. Threat levels were assigned to each suspect and federal agencies would act depending upon the level of the individual threat by implementing protective measures. Obviously, advocates of this plan argue that it leads to a safer environment because security agencies are adequately inf ormed. However, one must also consider if these measures protect citizens or instill fear in them. One cannot argue that technology and skill levels have not evolved. However, just because the technology and skill exists, does that mean that society is better when they are put into action? One could argue that it is arbitrary to label individuals based on a color code, what does it take for them to move to the next category? One must also be advised that the individuals in charge of determining the color coding system may have had their own political agenda. For example, raising the terror threat level to extreme on the one-year anniversary of 9/11 may have been necessary, but may have been a political move to gain confidence of the public? Some critics argue the system drummed up support for wars and additional federal powers. As security technology continues to evolve one document must not be overlooked, The Security Enhancement Act. While the document design was to improve homeland security and provide comfort to the citizenry, its consequences raise many questions. The act revoked portions of the Freedom of Information Act: in which society posses the right to achieve information pertaining to a friend or family member who is detained by the federal government for any action that can be considered to be terrorism. The American government can mandate whether or not they think citizens deserve information. Also, an individual could lose their citizenship upon â€Å"participating in or providing material support to a terrorist† (Reclaim Democracy, 2011). A vital element of this act is that it would allow the government to force citizens to submit to DNA samples if they are a suspected terrorist. Evolving technology provides a wealth of knowledge and understanding in regard to halting criminal activity. It provides methods that allow for quick response and action and can lead to a safer environment for people. However, one must consider the difference between technological advances and invasion of privacy. There is little doubt that getting a mouth swab for a DNA sample is  an effective method but it is certainly not perfect. It would be foolish not to consider that many DNA samples taint easily by not following procedures. This must be considered because imperfect humans are collecting the data. Also, because of the large amount of samples tested, at what point does the sample become outdated and need resubmission. If an individual submitted to an initial test, is it constitutional or ethical to mandate that they retest? There are constitutional amendments that are discussed and not disregarded because our nation suffered a tragedy. That tragedy must not be forgotten, but it is ill-advised to use one event as a predictor of all future events. That is why law enforcement must be careful when they seek to predict crime before it occurs. If the crime does not occur taxpayer funds go to waste. There is a fine line between protecting society and intruding upon its citizens. There must be awareness that while technology has advanced and aided society, the tests are still administered by humans who may serve his or her own needs over that of society. No matter how far individuals evolve technologically, society must proceed with caution because society may never be able to measure the intent of those operating the equipment. Evolving technology advancements and the future of crime fighting does not come without a fight. There are many individuals who question the intent of ethics of using proactive crime fighting methods. For instance, some individuals may feel that their rights are violated with the use of DNA, the government having access to personal information, and wide databases of information that have the chance of being hacked. It is not the intent of the government to have technology used against society; however, it is possible. Different groups and organizations claim that the use of advanced technology is just the beginning of a new conspiracy act. It is not only the concerned citizens of the United States who struggle with the openness of private information but also international groups as well as policy makers. It is thought that as technology advances policymakers will have to go the extra step to be proactive in the different inventions and programs to cheat or confuse technological advancements. According to Schmalleger (2012) â€Å"Opposing ideological lines have divided our efforts to develop comprehensive anticrime programs. Deep fissures in our social fabric have contributed to conflicting attitudes about crime and its control.† Countries that pride themselves in advanced technology, feared by other  nations. Just as the Bush administrations proved, technological warfare is on the bri nk of mass destructive devices (National Crime Prevention Council, 2012). While many individuals use technology as a way to prevent crime, some countries may ultimately use technology for total destruction. Whether society is fighting cybercrimes, using technology to fight future crimes, using technological advancements to predict crime, or allowing technology to lead the efforts of policymakers, technology has proved to be an advancement that does not come without deficits. Technology can make or break a country, but it can also divide nations and leave room for doubt. As technology advances, the prevention of crimes must also advance. It is not enough to assume that technological programs and breakthroughs will be enough to control crime. Crime control taken seriously and proactive steps taken to keep each breakthrough safe and ethical will wreak many benefits. In conclusion, law enforcement agencies are pointing in the positive direction for combating future crimes. The advancement of technological equipment in law enforcement is designed to enhance communication in aspects of imagery, and audio. Law enforcement agencies are already utilizing advanced imagery to resurrect a crime scene. The resurrection of a crime scene could possibly yield elaborate information leading to the apprehension of the offender. The overall perception in law enforcement will continue to be the same philosophy to apprehend alleged criminals. Technology aids local law enforcement officials in community policing, with surveillance placed in social common areas in aspiration to deter crime; too also act as a witness to committed crimes in the radius view of the camera. Law enforcement agencies will continue to strive for improvements in combat ing crime. References CBC News, (2013). New Apple Iphone Pushes Biometrics into the Mainstream. Retrieved from: http://www.cbc.ca/news/technology/new-apple-iphone-pushes-biometrics-into-the-mainstream-1.1702041 Department of Homeland Security, (2013). Combating Cyber-Crime. Retrieved from: http://www.dhs.gov/combat-cyber-crime Legal Match, (2013). Mandatory DNA Sampling. Retrieved from: http://www.legalmatch.com/law-library/article/mandatory-dna-sampling-in-a-cri

Sickle Cell Anemia

Sickle Cell Anemia occurs in about 1 out of 500 African American births, and 1 out of 36,000 Hispanic births. It is a lifelong disease, and sometime can be deadly. According to Dr. Whittaker, in our region there are abnormally higher cases of Sickle Cell Anemia, so I found it important to learn more about the disease, what cause it, what are the symptoms as well as the options of treatments for this disease. According to www. invista. com, it is believed that sickle cell disease occurs more often in people from parts of the world where â€Å"malaria† is or was common. Also the coincident of people who carry the sickle cell trait are less likely to catch malaria make a lot of us wonder of these two diseases are associated. â€Å"In the 1940s, E. A. Beet, a British medical officer stationed in Northern Rhodesia (now Zimbabwe), observed that blood from malaria patients who had sickle cell trait had fewer malarial parasites than blood from patients without the trait. † ( innvista) There are researchers have came up with several links between the two diseases. Malaria† is caused by a type of parasite that completes its life cycle in human’s red blood cell. This parasite enters the bloodstream with the aid of a female (Anopheles) mosquito. With individual who has Sickle Cell Anemia, the red blood cell break down when infected with this parasite disallow the development of the â€Å"malaria† parasite. There are others explanation such as: Hb S in Sickle Cell individual leads to the polymerization of hemoglobin and this prevent the parasite from ingest the hemoglobin which it needs for its life cycle, therefore the parasite get destroyed. Also the parasites of â€Å"Malaria† need oxygen for their development however a patient with Sickle Cell Anemia can’t provide them just that, therefore they cannot continue their life cycle. There are still questions regarding the relationship between Sickle Cell Anemia and â€Å"malaria†, but the explanations offered are quite interested. Sickle Cell Anemia is an inherit disease. An individual who has two copies of the trait will inherit Sickle Cell Anemia from the parents. Those people who only have one copy of this trait will become a carrier for Sickle Cell Anemia, and if their husband or wife also a carrier, the disease will keep passing on. â€Å"In Sickle Cell Anemia, the havoc caused by the abnormal hemoglobin s (HbS), results from a change in just one of the 146 amino acids in a beta chain of the globin molecule†( Marieb 642). It is amazing how one tiny change in our body can has such dramatic effect, but on the other hand they all possible; human’s body is extremely complex. The disease has to do with the protein hemoglobin found in human red blood cell. A normal person’s red blood cell has a round, doughnut shape without the whole in the middle; however a sickled red blood cell will take on a crested moon shape, and these sickled cells are fragile and prone to rupture. The normal life span of a healthy red blood cell is about 120 days before spleen takes out the bad ones and the bone marrow replace them. The sickle cells will go bad in only about 10 to 20 days. Imagine the spleen has to work extra hard to get rid of these bad blood cells, and with patients of sickle cell anemia about all of their hemoglobins are bad, therefore spleen has to take out all of them; that’s why these patients have to get their blood transfuse regularly. These sickled cells after got produced by red bone marrow can go back and forth between being normally shaped and sickle shaped until they eventually become sickle shaped permanently. And Instead of moving through the bloodstream easily like normal red blood cells, these sickle cells are very sticky and so they can clog blood vessels. These events interfere with oxygen delivery, leaving the victims gasping for air and extreme pain. Bone and chest pain are particularly severe, and infection and stroke are common sequels. † ( Marieb 642). Sickle cell anemia produces a chronic anemia which may become life- threatening when hemolytic crises, which is the breakdown of red blood cells, which is when bone m arrow fails to produce blood cells. These crises occur under condition of low oxygen, such as during intense exercises, masses of hemoglobin molecules in each red blood cell cut out its normal disk shape. For some individual the â€Å"crises† can last hours, days or even weeks; some has â€Å"crises† once a year, for others they occur way more often. There are several symptoms that can be diagnosed as soon as infant is four months old. â€Å"The clinical course of sickle cell anemia does not follow a single pattern; some patients have mild symptoms, and some have very severe symptoms. The basic problem, however, is the same: the sickle-shaped red blood cells tend to get stuck in narrow blood vessels, blocking the flow of blood† (Bownas, Jennifer). And they are: the period of pain (mentioned above), hand-foot syndrome ( babies with swollen hands and feet), jaundice (yellowish color found on the baby’s skin or/and in the white parts of their eyes), frequent infections, Delayed growth and puberty in children and often a slight build in adults. The slow rate of growth is caused by a shortage of red blood cells. There is also vision problem, because of the eyes not getting enough nourishment from circulating red blood cells, these types of damages can be serious enough to cause blindness if not discover on time. Sickle Cells Anemia is a disease with many complications, and all of them are dangerous for patient’s health. One of which is referred to as ERD (exercise-related death). This scenario happens when a patient with Sickle Cells Anemia attend into a lot of physical practice. â€Å"The possibility that previously healthy young people with sickle cell trait might suffer increased mortality from exercise was first suggested by observations of enlisted recruits in US Armed Forces basic training. A military trainee with Hb AS suffered exercise related hypernatremia during physical training in the field. He only survived a critical illness that included acute renal failure because of dialysis† (Kark, John). And also during that single summer, there were already four deaths among recruiting at this area, all of them were black and had Sickle Cells Anemia. So John Kark, whom is the author of this article, was very positive about the significant risk associate between Sickle Cells and ERD. And I think this is reasonable, because the nature of Sickle Cell Anemia is to decrease dramatically the amount of red blood cell circulating in the human’s body, which will cause the lack of oxygen in multiple organs and muscles in the body. And when an individual with Sickle Cell try so hard on these physical activities and keep pushing themselves forward, it’s hard to avoid damage to the body, which is very unfortunate. Another big complication with Sickle Cell Anemia is infections. Patients of this disease are extremely prone to infection due to their abnormal red blood cells. Recently the screening tests for Sickle Cell Anemia were required for newborns. Before this happen, 35% of infant with Sickle Cell died from infection. The most common bacteria that usually attack these infants are treptococcus pneumonia and Haemophilus influenza which can cause pneumonia, blood infections, or meningitis). A death can occur to these infants only a few hours after the fever. Acute Chest Syndrome is also yet another dangerous complication of Sickle Cell Disease. It is the leading cause of illness among the Sickle Cell Anemia patients. â€Å"Pulmonary disease, manifested as the acute chest syndrome (ACS) is a common complication of sickle cell anemia. It is the second most common cause of hospitalization in persons with sickle cell anemia and accounts for 25% of premature deaths. † (Gladwin, Mark) ACS occurs when the lung tissues are starved for oxygen during a crisis. ACS can be caused from infection that lead us back to Sickle Cell Anemia, to blockage of blood vessels which also remind us of Sickle Cell disease, because of the sickle red blood cells with their crested moon shape, as mentioned earlier, instead of moving smoothly along the blood stream, these sickle cells are very sticky and tend to block the blood vessels. There are a few symptoms that can be recognized such as: high fever, rapid breathing, wheezing or cough, and finally acute chest pain. As of today, the only potential cure of Sickle Cell Anemia is bone marrow transplant. However according to the mayo clinic’s website, it is extremely difficult to find a matching donor and also, the procedure is very risky and can be life threatening. So for treating Sickle Cell Anemia, there are more aims to reduce the pain of the â€Å"crises†. As a result, treatment for sickle cell anemia is usually aimed at avoiding crises, relieving symptoms and preventing complications† (Mayo Clinic Staff). Sickle Cell Anemia victims always have to take antibiotics because of their sensitivity, they are prone for infection. Blood transfusion is an option, with this procedure the patient will get supplied with healthy red blood cells from donors, but this can also be risky, because the new red blood cells also carry with them irons, this can c ause excessive iron build up in patients’ body; so people who get blood transfusion also need others treatments to reduce iron level. A prescription drug called Hydroxyurea is usually used to treat cancer can be use in the severe case of Sickle Cell Anemia for adults; it reduces the frequency of painful crises and may reduce the need for blood transfusions. When one experience â€Å"crises†, it can be helpful to have supplemental oxygen, which provides extra oxygen and help breathing easier. Doctors and scientists still in the lab to experiment some more possible cure for Sickle Cell Anemia patients, hopefully they will be successful in finding a complete ure. Sickle Cell Anemia is a serious lifelong disease. It is hard to live with it, and it is just as hard to live with a loved one that has Sickle Cell Anemia. The â€Å"Health Education Research† of Oxford Journal has done a study on mothers who have children with Sickle Cells in Western Nigeria :â€Å" Financial stress and disease factors were met with confrontation, while family sources of stress were either complained about, accepted or avoided. (Olley, Lydia) Oxford Journal also mentioned that less educated family members (especially the mothers) get in more stress than others â€Å"Higherlevels of stress were associated with less educated and older women† (Olley, Lydia). Hopefully in the near future, there will be more education, counseling about Sickle Cell Anemia to everyone, so we can take care of the patients better, and bring better attitude and hope toward them, because I believe they need that the most especially from a family member. Sickle Cell Anemia Sickle cell anemia is a blood disorder that affects the 11th chromosome which is a hemoglobin gene. Hemoglobin is a protein located in red blood cells (RBCs) that carries oxygen through the body. This disorder is inherited from two parents with abnormal genes that are heterozygous (Rr). This means that both parents who have the trait may pass on the disorder to their offspring. The phenotype makeup is recessive. Those who inherit a normal copy of the chromosome 11 and a mutated chromosome will carry the trait, though would not show any symptoms. Normal red blood cells are soft and flexible to fit thought small vessels.Sickle cell anemia causes these blood cells to stiffen and curve, almost like a crescent moon. The abnormal cells (erythrocytes) become stuck and block a narrow vessel which disables oxygen to pass through and causes pain and damage to organs. Many organs such as the liver and spleen become damaged due to lack of oxygen. When the spleen becomes damaged, patience will ex perience many infections. Pain is also caused by the sickle blood cells becoming caught in vessels called crises. Jaundice (yellowness to eyes and skin) can occur in babies due to liver damage. Sickle cell anemia can be diagnosed by a simple blood test, mostly to newborns.The blood test given to those who weren’t tested at birth is called the hemoglobin electrophoresis. It determines if you have the disease or is a carrier of the trait. It can be treated by blood transfusions from a donor with healthy blood cells, or a bone marrow transplant. Some interesting facts are that: normal blood cells can live up to 120 days, but sickle blood cells live up to 10 to 20 days. When the red blood cells are damaged, the body kills the red blood cells off which causes chronic anemia. African Americans are mostly affected with this disease due to inter-marriage. in 12 African Americans have the trait and 1 in 500 actually have the disease. Also, Sickle cell anemia can be traced back to the Mediterranean and Middle East area. The humid, wet climate attracts mosquitos and the mosquitos transport malaria. Surprisingly, those with Sickle cell anemia are immune to malaria. The last interesting fact is that my mother is actually a carrier of the Sickle cell trait. My older sister and I weren’t affected of the trait because our father didn’t carry any defected chromosome. Unfortunately, my little sister, Joy, is also a carrier of the trait even though her father isn’t affected. Sickle Cell Anemia Sickle cell anemia is a blood disorder that affects the 11th chromosome which is a hemoglobin gene. Hemoglobin is a protein located in red blood cells (RBCs) that carries oxygen through the body. This disorder is inherited from two parents with abnormal genes that are heterozygous (Rr). This means that both parents who have the trait may pass on the disorder to their offspring. The phenotype makeup is recessive. Those who inherit a normal copy of the chromosome 11 and a mutated chromosome will carry the trait, though would not show any symptoms. Normal red blood cells are soft and flexible to fit thought small vessels.Sickle cell anemia causes these blood cells to stiffen and curve, almost like a crescent moon. The abnormal cells (erythrocytes) become stuck and block a narrow vessel which disables oxygen to pass through and causes pain and damage to organs. Many organs such as the liver and spleen become damaged due to lack of oxygen. When the spleen becomes damaged, patience will ex perience many infections. Pain is also caused by the sickle blood cells becoming caught in vessels called crises. Jaundice (yellowness to eyes and skin) can occur in babies due to liver damage. Sickle cell anemia can be diagnosed by a simple blood test, mostly to newborns.The blood test given to those who weren’t tested at birth is called the hemoglobin electrophoresis. It determines if you have the disease or is a carrier of the trait. It can be treated by blood transfusions from a donor with healthy blood cells, or a bone marrow transplant. Some interesting facts are that: normal blood cells can live up to 120 days, but sickle blood cells live up to 10 to 20 days. When the red blood cells are damaged, the body kills the red blood cells off which causes chronic anemia. African Americans are mostly affected with this disease due to inter-marriage. in 12 African Americans have the trait and 1 in 500 actually have the disease. Also, Sickle cell anemia can be traced back to the Mediterranean and Middle East area. The humid, wet climate attracts mosquitos and the mosquitos transport malaria. Surprisingly, those with Sickle cell anemia are immune to malaria. The last interesting fact is that my mother is actually a carrier of the Sickle cell trait. My older sister and I weren’t affected of the trait because our father didn’t carry any defected chromosome. Unfortunately, my little sister, Joy, is also a carrier of the trait even though her father isn’t affected.

Monday, July 29, 2019

The influence of leadership style on the interpersonal relationship Essay

The influence of leadership style on the interpersonal relationship between employees and employers - Essay Example This research will begin with the statement that in the view of Bagley, leadership is â€Å"the ability to guide and motivate a group of people to a common purpose.† To this end, Allen defines a leader as one â€Å"who can visualize a better world in the future and is able to convince others to join him or her on the journey.† This is to explain that leadership is all about guiding a group of people towards achieving a common goal. Leadership is needed for the growth of companies, organizations, institutions and even countries. As a matter of fact, a leader’s qualities, style, and strategies can determine to a very large extent, whether or not the people or organization he is leading will succeed or fail. In view of the importance of leaders to succeed in their leadership, however, several leadership styles, strategies, and qualities have been propounded by scholars and philosophers. Based on these qualities and strategies, it is believed that the kind of qualiti es a leader possesses and the sort of strategies he puts in place in his leadership can do or undo his group. To this effect, and based on a number of leadership strategies available in the literature, a number of interview questions were developed and administered on 5 employees in a U.S organization to find from them what they expect from their leaders. These expectations have been grouped into four themes and analyzed in terms of leadership qualities and strategies as propounded in existing literature.... Each section had two major questions. The results obtained from each employee were recorded on separate sheets of papers, after which a qualitative analysis was applied. The qualitative analysis did not involve the use mathematical diagrams, charts and tables. Rather, it made use of objective evaluation of the results in a holistic manner where conclusions on responses were taken judging from what the majority of workers without giving specific numbers as to what each respondent said. Below is an evaluation and report from information gathered in the interview as pertains to each theme. The information have been evaluated and analyzed by comparing and contrasting them to current leadership literature, some of which have been quoted in the report. The influence of leadership style on the interpersonal relationship between employees and employers There are several leadership styles but for the sake of this exercise, three leadership styles were used. These leadership styles are laissez faire style, autocratic style, and participative style. According to Legacee Management System (2011) these three leadership styles fall under the classical leadership style. According to Legacee Management System (2011), â€Å"The laissez faire style implies low control, the autocratic style high control and the participative lies somewhere in between.† Based on explanation of the three leadership styles, the employees were asked which of them existed at their in their organization. From the description of the leadership style that goes on in their organization, it was deduced that four of them pointed to autocratic leadership style where as one pointed to participative leadership

Sunday, July 28, 2019

Costs Essay Example | Topics and Well Written Essays - 250 words - 1

Costs - Essay Example These include research and development whereby they are at the discretion of the managerial team in terms of manipulating them based on an already predetermined period, for instance, quarterly, monthly or annually. Hence, indicating this kind of fixed costs’ flexible nature contrary to the committed ones (Dunn, Sherwood, Stevens & Winston, 2013). Conversely, committed fixed cost, for instance, depreciation refer to long planning costs whose alterations may significantly affect continuity of a given firm. Hence, they are inflexible (Hartman, Vang & Cornwall, 2015). Firms normally rely in this knowledge in their quest to come up with concrete and quality decisions regarding what to produce. For instance, this is quite evident with â€Å"make or buy† situations whereby a given company ought to go for the most appropriate option that will guarantee it heightened profitability. In arriving to the required results, it utilizes all the relayed data contrary to visual fit method, which mostly leaves out some data. This is especially when intending to link certain points of data

Saturday, July 27, 2019

Renewable Energy Wind Farms Essay Example | Topics and Well Written Essays - 1000 words

Renewable Energy Wind Farms - Essay Example With the limited nature of non-renewable resources, alternate renewable energy needs to be harnessed in order to fill the energy gap made as these non-renewable resources are depleted. Renewable energy sources include geothermal, biofuel, wind, hydroelectric, wood, solar thermal as well as and photovoltaic, and biomass sources. Renewable energy production across America varies state by state (Vaseashta et al., 2005). The intent of this exploration paper is to discuss why renewable wind energy is safer, cheaper, and cleaner than cleaner than fossil fuels. In addition, renewable energy production in replacing depleting nonrenewable resources can increase energy independence (at state as well as national level) and reduce risks of climate change associated with energy pollution of fossil fuels. Thanks to advances in technology, wind is becoming the fastest growing energy resource globally. Wind power is environmentally safe and does not produce atmospheric emissions or greenhouse gases (Hau, 2012). The main salient description of wind technology is that it is renewable, free, and can be efficiently captured. Renewable energy is important and meets population needs. This refers to job creation, economic demands, and energy security (Quaschning, 2005). Regarding cost deployment, a few issues have to be taken into consideration, the cost of renewable energy, the capacity of renewable energy and lastly the impact of renewable energy. It is argued that alternative energy is not cheap. When it comes to wind energy, the renewable resources are usually located in remote areas, and it is expensive to build power lines to the various cities. The usage of renewable sources is limited in that they are not always available, for instance, solar power is reduced on cloudy days, calm days reduce wind power and drought reduces water availability for hydropower.

Friday, July 26, 2019

Founding Fathers Essay Example | Topics and Well Written Essays - 500 words

Founding Fathers - Essay Example These visionaries drafted a document that served as an inspiration for democracies worldwide. The founders were keen in ensuring that the government that would take over would be defined by liberties of individuals and the quest of happiness for its citizens who will be accommodated by the government and its systems (Mason and Rauchut, 2008). This is to say that the founders intended to form a government, whose sole purpose was to ensure freedom and prosperity of its citizens. They understood that power came with consequence and that it could be corrupted limiting the liberty envisioned, as is evident in the governments nowadays. This can be traced back to the founding fathers hypothesis that there is a correlation between personal liberties and expansion in the federal government that is negative. Though this growth was viewed suspiciously by the founding fathers, it was inevitable since the society is dynamic necessitating governance changes and growth. Even though it may have a de trimental effect on liberty, growth of the federal government since the time of the founding has been necessitated because conditions today demand that government grow to meet our needs, since governance needs change over time. The idea of government is based on the principle of servitude, in that it is created to serve the people.

Thursday, July 25, 2019

Corporate governance Essay Example | Topics and Well Written Essays - 1250 words

Corporate governance - Essay Example The role of independent directors and non executive directors become significant as they are intended to serve as deterrent in the misuse and abuse of power by the vested interests, especially the senior management of the company. The paper would be broadly rationalizing the role of independent non executive directors within the broader parameter of corporate governance. Corporate governance is based on publicly acceptable values and code of behaviour for the higher echelons of corporate bodies (Haller & Shore, 2005). It can primarily be described as a set of well defined policies, rules and regulations and customs that effectively control the various internal and external processes of the business enterprises. They are, thus intended to create an environment that improves productivity, economic efficiency and protects the interests of various stakeholders through ethically delivered goals (Solomon, 2007; Mueller, 1996). Since the good corporate governance is dependent on effective p olicies and laws, the role of CEO and board of directors becomes crucial ingredient for their efficient implementation. In the various modalities and process that are incorporated within good corporate governance, the role of independent non executive directors in the company’s board has increasingly become key component of the success of the company. The recent cases of abuse of shareholders’ rights in the various countries have brought the role of corporate governance into the prominence. The increased risks to the interests of the various stakeholders have necessitated stringent code of conduct for the higher hierarchy of management. Chief Executive of the firm and board of directors, therefore become intrinsic part of corporate governance. They are endowed with the primarily responsibility for good codes of corporate governance and best practices within the organization that promote accountability. Boritz, (1990) has defined risks as possible loss due to uncertaint y and exposure of the firm from inappropriate investment decision or a commitment. Thus, risks and need for more effective transparency within the system become vital postulates of CG whose implementation is overseen and guided under the strict vigilance of independent non executive directors. Independent non executive directors in the board provide the firm with independent, objective and creative inputs on the various processes and modalities of business operations. As they are basically from outside the organization, they are observed to be equipped with unbiased approach to the issues and factors that could have long lasting impact on the performance outcome of the company. Cadbury report (1992, p33) explicitly states that they bring in ‘independent judgment’ within the board. Their presence on board therefore is designed to discourage the vested interests against financial malpractices and fraud. This is one of the most important criteria that reiterated the import ance of inclusion of independent non executive directors on the boards of the companies. UK has been a leader in setting up a Combined Code of Corporate Governance. UK boasts of a highly developed business environment with a vast shareholders’ base. The various financial institutions, big corporate houses, institutional investors and individuals with

Religion Research Paper Example | Topics and Well Written Essays - 500 words - 1

Religion - Research Paper Example A shaman is an individual considered as having access to, and power in, the world of malevolent and benevolent spirits, who normally gets into a state of trance during a ritual and practices healing and divination (Kehoe 3). Rituals play a significant role in establishing and sustaining group solidarity. In totemic communities, each descent group has a plant, animal or geographical element through which they claim descent (Baldick 33). Totems are at the peak of ancestor of clans. Clan members cannot kill or devour their totem, except after one year when the clan members assembled for ceremonies in honor of the totem (Baldick 33). Totemism is a religion wherein elements of nature perform as sanctified templates for society through means of emblematic association. They express their religion by using nature as a model for society. Each and every descent cluster has a totem, which inhabits a particular niche in nature. Also, social differences echo the natural arrangement of the environment (Baldick 34). For instance, the Ahimsa of the Hindu doctrine of nonviolence (a religion that is well known to practice Totemism) forbids the murdering of animals. Finally, totems express their religions through intimate association of friendship and defense between an individual and a natural object or a specific animal (at times, between an individual and different species of animals); the natural object can offer unique power to its holder (Baldick 34). Shamanism is comprehended by some individuals to be a prehistoric form of religio-magic or religion practiced by the aboriginals of the northern part of Asia and by all other aboriginals in other areas of the globe (Kehoe 56). This view is held by Kharuzin, Mikhailowski, as well as other Russian scholars (Kehoe 56). Others argue that Shamanism was merely one form of religious expression of the cult of the northern part of

Wednesday, July 24, 2019

Data Analysis Assignment Example | Topics and Well Written Essays - 250 words

Data Analysis - Assignment Example Manually (but randomly) select n (20 ≠¤ n ≠¤ 25) countries (do not use any random selection mechanism) to construct the data set. Enter the observations on each of the four variables corresponding to each country you have selected into a Stata data file and save this file. Your Stata data editor should now show a data matrix with dimensions (n X 4) where the value of n is chosen by you as per the requirement. i Select any one independent variable from the three in your dataset and denote it by X. Denote the dependent variable IN by Y. Use a calculator/software and your sample to calculate ∑X, ∑Y, ∑XY and ∑X2. Use these values to write down the pair of ‘normal equations’ the solutions of which give the constant term and the slope of the Ordinary Least Squares line. (15 marks) iv Construct the multiple regression model by denoting the dependent and the selected independent variables using the roman characters Y, X2, X3 and X4, respectively. For example, if you choose Urban population, Literacy Rate and GDP then you should define the model as Run a Stata regression of the dependent variable Y values on the three explanatory variables you have chosen and a constant. Use the regression output to explain why and how the F-statistic was calculated by the software and how it can be used to test for the overall relevance of the regression model. (30

Tuesday, July 23, 2019

12 month Integrated Marketing Communication campaign for Nike Coursework

12 month Integrated Marketing Communication campaign for Nike - Coursework Example The business will sell Nike brand of products that it produces to ideal customers cover all classes of people (Joseph, Gregory and Thomas, 2011). The products stand unique in the market because of the affordable prices that they will be charged. The owners of the business are professionals in the industry; this was to ensure that their skills can as well be combined in the production exercise. The business has future projects of expanding its operations to the foreign markets and thereby expands the markets of the business to enable the business increase the sales to greater heights and then maximize on the profits. The marketing communication campaign is very much effective in the attracting and drawing of customers to the business, creating a good image of the business and therefore retaining the loyal customers whose loyalty had been won by the business. It is also important to highlight that this campaign is very much aware of the size of the market segment that is within the capture as well as the market segment it intends to sell Nike product to. The market knowledge is very crucial as a mistake made in the location of the target market is almost to near impossible in correcting (Terence and Craig, 2012). This paper delves in the discussion of Integrated Marketing Campaign, (IMC). This can be defined as the measure that the various firms use in attempt to achieve and reach the set targets, missions, goals and objectives that were put in place during the initial stages of planning. In this approach, it is therefore important to highlight that the techniques that will be used by the firms and business institutions are complementary in nature. This is because each method kind of gives another support in one way or the other and they can be used I place of the other as well since they are all geared towards one target. In this

Monday, July 22, 2019

Criminal Justice Essay Example for Free

Criminal Justice Essay In today’s society crime is increasing every day and the types of crime are changing. It seems more and more that crimes of identity theft and organized crime are on the rise. According to the CJi Interactive Media crime is defined as â€Å" conduct in violation of the criminal laws of the state, the federal government, or a local jurisdiction, for which there is no legally acceptable justification or excuse. † That means that â€Å" crime â€Å" depends on where you are. The same behavior may or may not be a crime depending on the state of the actor, time of day, the year, the location of the act, or even the reasons behind the behavior. The government structure applies to the criminal justice system when that a crime only becomes an issue when violating social norms, sanctions, or rights. Law can be defined as a set of regulations determined by a group of people who decide what is right and what is wrong. When these regulations are broken, it creates a crime. Society sees criminal justice as an officer making an arrest or patrolling the streets. Society does not realize that the criminal justice system has a government type structure, has goals, and is made up of three components. These components include the Police, Courts, and the Correction system. Each one of these components has its own function and purpose. The police enforce the law, arrest offenders, decrease and prevent crimes, maintain public order, ensure safety of the public and to protect their rights. The courts conduct fair and impartial trials, decide criminal cases, ensure due process, determine guilt or innocence through jury of peers, uphold the law, and to protect the rights of anyone facing trial by the system. The corrections carry out sentencing imposed by the courts, provide safe and humane custody of offenders, rehabilitate, reform, reinstate offenders back into the community. There are several different choice theories in regards to crime. One theory is the rational cause theory. This theory was developed by Cesare Becarria and is considered the classical school of thought and labels criminals as deviants. It explains how an offender will commit a crime for his or her own benefit or personal gain. The individual knows the act is criminal but the reward outweighs the consequence. Another theory is Sociological Positivism, this theory studies the relationships between public influences and crime. This theory is fueled by a study of social structures within an offender’s environment. Biological Positivism is another theory developed by Cesare Lombroso in the late 1800s and studies the change and physical differences between criminals and non-criminals, saying that some people are born as criminals. One more theory is the Psychological Positivism which introduces that the cause of crimes is rooted in the offender’s mental health stability or in personality disorders. For example, schizophrenia, bi-polar disease, psychopathic personality, and depression to name a few. This theory the individual who may or may not know what reality is. The offender may have a chemical imbalance that does not allow them to know right from wrong and the cause of the crime may be from inside and unavoidable versus a controlled decision. Society sees these views and have studied and applied them still today, but society uses to common models to determine which acts are criminal. One model is called the consensus model. This model is based on a wide variety of people who come together and decide based on their beliefs. There is also the conflict model, it argues that businesses or people of the criminal justice system work against or compete with each other for own personal recognition or glorification to produce and ensure justice. There are many goals of the criminal justice system of today. One goal is community safety, the system is responsible for safety and our children should be able to play outside without fear and families should be able to take evening walks. All citizens pay taxes to law enforcement personnel and view safe communities as a right. Another goal is victim restoration, if the offender is responsible to pay restitution then it will be paid directly to the courts. Then the courts will forward it to the victim. The victims also have the right to speak at the sentencing and may also speak with the probation officer to provide input and request information. The criminal justice system also wants to rehabilitate offenders and reintegrate them back into the community, whether it be on probation or the sentence has been fulfilled. Community supervision can monitor all criminals while helping them to becoming productive members of society. Some people consider the criminal justice as not a system at all. According to the KY government, â€Å"the criminal justice system is an array of agencies and organizations funded and controlled by various governmental and non-governmental entities. † This means that each agency or jurisdiction has its own responsibilities, priorities, and roles to perform and fulfill. The system has other non-government agencies and services that help prevent crime and to make the communities safe. A true system would be that all agencies collaborate together effectively, work together efficiently, and coordinate plans to help reduce crime as a team. Instead, the agencies work separately for personal gain and benefit. You have agencies that trump each other for jurisdiction rights and power. In a perfect system these problems would not exist and I think crime as whole would be a fraction of what it is today.

Sunday, July 21, 2019

Business Plan For Hakuna Matata Coffee Shop Marketing Essay

Business Plan For Hakuna Matata Coffee Shop Marketing Essay Hakuna Matata coffee shop is managed by a team of three individuals. It is a joint of each persons contribution and different ideas and skills which we have expressed our best opinions and interest to achieve the roles of Hakuna Matata. This is a business pursued by three individuals executing the opportunity of opening a coffee shop right in the city centre and to best coffee sellers in the city, we have got the opportunity to be not only the best coffee sellers but also to gain a market share and create market segment and most of all to build a customer relation, the customer could either be a walk in customer or a corporate customer. The major roles of Hakuna Matata are to become the best and most popular coffee shop in the area serving at least five hundred customers daily. The companys objective is to turn profits for every month of operations and maintain a gross profit margin of 60%. Hakuna Matata is specialized in coffee and other value added service is that it provides other beverages like various types of juices and sodas, milk, tea and distilled water bottles and snacks, as coffee would certainly be more attractive with chocolate cookies and some crackers to enjoy the coffee. Each member of the team contributed evenly towards the completion of the business plan. Grace Busara researched on the management, Halimafilsan researched on the financial plan while I researched more on the marketing plan for the business plan. There are a lot of different things that could help the coffee shop be more successful that is by efficient team work within the 3 of us, including our hired staff, these are the waiters and the security guard, which all play their roles, and are part of the coffee shop. Where the team runs smoothly, we make sure that that every process is been taken charge to work efficiently, that is by assigning the tasks equally, so that there is all equal inputting to the coffee shop. It is efficient to do work as a team than as an individual as team work comes up with different ideas and views; we get to know each other more, which could lead us to the success of our coffee shop. By team work the tasks are accomplished efficiently. PROCESS OF IDEA INITIATION Through our research we discovered that there are very few coffee shops in the market, most of which subscribe to the low cost leadership strategy, therefore, Hakuna Matata as an opportunity in the market and by using differentiation strategy it could gain a market share and create its market segment and build a strong customer base. There are tremendous interest in entrepreneurship in Tanzania, inspire of the country being a third world country; we managed to compile the resources needed for an entrepreneurship. We came up with three ideas of small scale business enterprise which would be booming in Tanzania for at least the next five years. The idea of coming up with a business of coffee shop was accepted by very all three members of the team, that is by considering all the positive factors of opening a coffee shop in the city which includes the opportunity which from our research we discovered that there are very less coffee shops in Dar es salaam city and in the market which subscribes to the low cost leadership strategy , where Hakuna Matata can get a chance to use the differentiation strategy whereby we can have an opportunity to gain a market share and also create market segment and build a strong customer base. The idea of a coffee shop business plan came up after a long thinking and analyzing the ideas and views of other proposed business plans which was contributed by the team members. The structure of the business is quickly evolved, like the experiences in the commercial market, that knows how many coffee shops exist in the city and the coffee shops surrounded near by our coffee shop location. It takes much more to operate a coffee shop as such a product, the idea of selling coffee as a beverage, we have to be able to continuously offer what customers are looking for, and therefore we should consider that there is no shortage of consumers for the coffee beverage, as there less coffee shops surrounded within the area. After a lot of brainstorming and doing research of opening a venture in a country like Tanzania, we had come up with several ideas in which we had three best choices, these are the coffee shop, garbage collection and event management planning, all these three ventures seemed interesting to us, but we found that the coffee shop would me more attractive the market. INDUSTRY AND COMPETITIVE The position of Hakuna Matata Coffee Shop fills in the market place, which will be on reason for its success; the coffee shops aim is to accomplish its target by being the best coffee sellers in the city, and to attract every customer by our coffee by providing the best coffee and providing good customer services. The position of Hakuna Matata Coffee Shop will carve out for itself in the market, as it will be opened the whole day till evening, our target customers will be all the surroundings offices, these are The Bank Of Tanzania, National Bank Of Commerce, Azania Bank Limited, FBME Bank Limited, CRDB Bank limited and many other banks surrounding our coffee shop, including also the walking customers and other offices surrounding the location of the coffee shop. Looking at the grid, Hakuna Matata Coffee Shop is the only concept which feels good about its role pf selling and preparing the best coffee in the city, which captures the families and children and all types of genders and ages. It also captures the advantage of relatively short preparation time, and coffee is served. Hakuna Matata Coffee Shop is well positioned to take advantage of the significant opportunities by expanding the industry of providing coffee beverages. The coffee consumption on the rise is dependent on the agricultural sector, whereby there are a lot of coffee farmers but a few coffee beverage sellers in the market, thus Hakuna Matatas bargaining power is high and thus it can acquire large volumes at a low price and the culture of drinking coffee has always been there in the market for example the local vendors who walk around with coffee in a kettle. Hakuna Matatas market is within the metropolitan area whereby the number of consumers is substantially high. Since Tanzania is a tropical area and the need for cols drinks is necessary, thus Hakuna Matata will make its beverages both cold and hot as Dar es salaam city is has a moderate temperature above 28 degrees centigrade, therefore various types of other beverages will be offered, such as soda, tea, distilled bottle water, tea, milk and different flavors of juices. In this same segment the customers are further divided into female consumer who prefer milk tea and coffee which is not strong while the male clients prefer black coffee or coffee that is very strong. Hakuna Matata is targeting two main customers, one is the fixed customers which consists of the office workers, shop keepers, college and university students, whereby this group is the most liquid and consume large amounts of coffee per day, since our fixed consumers have limited time, Hakuna Matata will have store the coffee in the privately owned utensils which can will make it easier to the customers to leave with them as take away. The second target groups are the mobile consumers, these are the daily and new consumers, this group consists of individual who do not have a fixed location such as shoppers, pedestrians, walk in customers and many more. Our competitors are classified into two categories, that is the first priority competitors and second priority competitors, the first priority competitors are the ones which we have used the differentiation strategy, this includes serving coffee at the best quality level. The second priority customers are using the low cost and no frill strategy to gain a market share; this includes the local coffee makers and the street vendors in the city. Currently the completion for coffee as a beverage amongst coffee sellers is not fierce, whereby the seller can enter and leave the market rapidly. Coffee beverage selling is a relatively new industry in Tanzania, as it is not in the culture of Tanzania compared to tea, therefore the industry is in the state of flux, with less market leaders and nationally known providers or widely recognized brands as the other coffee sellers provide coffee which does not meet the taster and the requirements of the consumers. PRESENTATION EXPERIENCEANALYSIS Presetting a business plan helps us and the user to identify the objective of the business and analyze it in a critical manner; it helps us to focus in the feasibility of the business and to identify the chances of growth and success. It also enables to manage the business too accordingly and with a positive attitude. The presentation of the business plan is a way of communicating with your business which defines the purpose and the competition of the business and the management; it identifies the intention of creating a business into reality. it is important to present a business plans as it is useful if we are applying for a bank loan to fund our coffee shop, or trying to get an investor who can come and invest in our coffee shop, this could either be our friends and relatives or the government. The business plan presentation is useful if we are fund raising in general. No one will give us money nor fund as we have not planned your business plan positively as the business plan consists of how much money we need and for what purposes of the business, the marketing plan, the sales strategies, the profit projection. A business plan guides us on how we can raise capital and gives us a road map so we should know where the business is building up and growing. By presenting the business plan it is easy to identify the strength of the coffee shop business, as the demand for coffee increases daily due to our location which is in the city centre, this will also enable us to know who our customers are. We also noticed that coffee beverage is a push product as Tanzania does not have the culture of drinking coffee, though our target customers are mainly, the corporate offices, banks and other large organizations in the city, as coffee could become seasonal due to the weather in Dar es salaam which is humid through out the year. We also fear new entrants in the coffee market which could deploy our venture, although we have fewer competitors. It is very important to plan the business before executing it to reality, this will make us know how the business is going to survive and grow within the specific time, a business without a plan would certainly fail in a short period of time, hence it also enables us to achieve our targets and business goals. ALTERNATIVE SCENARIO Our start up capital is 20 million Tanzania shillings, where each member has contributed 5 million and another 5 million will be taken from FBME Bank limited as a loan. Our assumptions are that we assume a slow growth without recession taking place in Tanzania, we assume that there will be no unforeseen changes in the public health perceptions about our coffee and beverages that we offer to the consumers, we also assume that our finances are going to be sufficient to maintain our projected financial plan and we also assume that it will continue to grow as production increases. Besides coffee shop we also had different ideas on creating a small scale enterprise, researched the market and the environment surrounding us, whereby a lot of brain storming was done by all the three members of the group and came up with three different scenarios which we could create business plans were coffee shop business plan, event management business plan and garbage collection business plan, whereby our last and final choice was the coffee shop business plan. One of the ideas was to open a garbage collection, we researched and compiled the information which was to target the commercial and residential market, we came to know that the competitors are going to be low but the legal and financial requirements will not be able to cop up with our minimum amount of our startup capital. We came to know that there is a political risk in this business as the ministry of health had to approve the standard of our venture. We had come up with three different ideas amongst the coffee shop and garbage collection; we also had done our research on event management. From our research we learnt that event management planning will need a small start up capital and even the costs would be low, the marketing would be much more easier, planning the financials was depending on the event, being three of us it would be difficult to run an event, where a large labor force is required for this venture in order for this business to run well and the even to be successful, due to the large labor turnover, as since it is a new business we would be able to pay our staff. Event management being a high profit margin industry, as everyone would likes celebrations, and a well organized event the venture is highly profitable. This venture requires professional skills and high degree of energy for the execution of the event, it also requires communication, strong networking to be known in the market, excellent public relation is very important and we all three lack experience in events as we do not expertise art and creation of the venues. This two mentioned scenarios, disapproved us from choosing to open the ventures, therefore we choose coffee shop as a venture, as we all had the passion of selling coffee and making coffee in different methods and styles and from our knowledge and experience we finally concluded by opening the coffee shop in the city centre. USEFULNESS OF A BUSINESS PLAN As time passes the business develops. The business plan is a very useful and strategic tool which enables the company to achieve its target and goals within a given period of time, business plans are believed to be attainable if followed accordingly and by planning to reach the targets. The business plan compromises the plan on how to achieve the goals and targets including the management team, the usefulness of the business plan are that it includes the financial plans indicating the profit margin for each year respectively. It also shows the break even analysis. The business plan includes the marketing plan, this enables on how our coffee shop will be useful to the population surrounding the shop The financial plan section is the most important part of the business plan which shows how the ideas are viable and it is a key component in determining wither the business plan is going to be able to attract any investment in the planning of the coffee shop. The financial plan section compromises of financial statements which are divided into the income statement, the cash flow projection and a balance sheet including a brief explanation and analysis of each statement, therefore, the financial plan guides the growth and development of the coffee shop. When starting a venture, seeking additional capital for the coffee shop and setting new business process incase of the coffee shop fails to run, we need to write a plan detailing on how we will mange the resources and requirements which also includes the marketing decisions, the financial projections, a trend of the production demands and also personal needs. The plan reflects on three main constituencies that is the customer, the investor and the producer. A business plan has to be presentable to convince the venture capitalist, which should consists of a number of related issues that relate to the factors such as the critical success of the coffee shop, the human factor, the opportunity, the context and the possibilities of risk and reward, by analyzing these issues a business plan illustrates how the enterprise will seize the opportunity to enter the market and how its stand out amongst its competitors and how it plans to maintain a continuing growth trend. The investor or the per son who would be interested in captivating the coffee ship should see the level of detail before making any financial decision to the new coffee shop. OTHER AREAS For a business plan to be successful and profitable we clearly need to understand the firms customers and strength and completion in the market, it is the owners and shareholders who have to understand the behaviors of the customers and the strength and weaknesses. We should also have the ability to foresight and plan the future of Hakuna Matata Coffee Shop and its future expansion strategies. When it comes to the expansion of the coffee shop we need to know the financial plan which will enable us to how the coffee shop is growing. In order to operate the coffee shop more effectively we will have to manage the bargaining power of the suppliers and to manage the bills and also customer complains, as we need to take this matter into consideration in a calm manner and not to chase away the consumers. We have to show the consumers that we not only serve the best coffee but also our services are to a high standard of customer expectation.