Wednesday, October 30, 2019

Project Managing Marketing Essay Example | Topics and Well Written Essays - 3250 words

Project Managing Marketing - Essay Example In other areas, health reforms are being pushed by health organizations to encourage healthy living that advised people to avoid fats and to eat only healthy foods. As these issues are closely linked to the operations that would eventually affect profitability of the KFC, a change of marketing plan that definesits corporate responsibility to its stakeholders is needed. Corporate social responsibility (CSR) has been defined as â€Å"the concept that an organization has obligations not just to conduct its business and adhere to legal guidelines, but also to look out for the welfare of â€Å"†¦Ã¢â‚¬ ¦. the community, and society at large† (ecomii, N. d.). CSR is also viewed as a PR device to gain good favor from customers, and in some point refers to corporate ethics and good governance. As such, a new marketing plan is designed in order to improve the image of the KFC and increase its profitability. This will address the ethical problems in use of caged chicken and a chang e of direction that illustrates KFC markets and the strategies it is going to use to continue to attract customers and to create a solid revenue system for the company. In effect, this marketing plan is a strategy that determines exactly what the market wants – and coming up with a plan that will satisfy its wants. Organizational structure Kentucky Fried Chicken (KFC) is well known restaurant chains when it comes to chicken. The company’s headquarters are found at Kentucky (where it derived its name) in the U.S. As per company record, KFC has over eleven thousand restaurants located in over eighty countries of world. Some of the countries served outside U.S. are UK, China, Thailand, Kuwait, Spain and Barbados, Puerto Rico, Pakistan and many others. The major product of the company is chicken served in various forms such chunky chicken hot pie, chicken fillets, chicken sandwiches among others. KFC has a total of 300 sets of menus being served in its outlets. As part of YUM! brand that operates a global restaurant system, KFC teams up with other restaurants like Pizza Hut and Taco bell brands (About Us). 1.1. Vision The vision of the marketing plan is to provide customers the ultimate satisfaction of eating healthy foods and to provide choices that respond to their tastes and budget. KFC does this by giving customers options between organic and non-organic chickens in the menu that customers can easily order in many KFC restaurants found worldwide. Management will be committed to the success of the plan and is willing to spend for the necessary resources for its successful implementation; that the marketing plan is in the context of the organization’s overall business plan and that the people in the organization down to the supply chain will share a similar view to the marketing function. 1.3. Objectives The overall objectives of the marketing plan is to create a new corporate image that projects KFC as sustaining ethics in animal welfare as part of its corporate social responsibility to its stakeholder and ultimately increase its profitability Replying to the demands of PETA and other animal welfare pressure groups, the use of organic chicken is proposed along with the standard chicken menu used by KFC in its restaurants. Advantages in using organic chicken are: it is healthy, tastes better and safe to eat. An organic chicken, as opposed to caged chicken, is not fed

Monday, October 28, 2019

IDS compares Essay Example for Free

IDS compares Essay These techniques usually base their performance on two detection paradigms as the main attacks in spite of whether they are network or hot based architecture. Some of these models are the misuse detection models and anomaly detection models. The misuse detection model, the IDS compares the new sequences of the parameters in the input. The application matches the commands of the HTTP protocol where a database of signatures which signify the attacks that have been identified and classified before is known (Aquino et al, 2008). This model revises and improves the disruptive commands when it experiences attacks. The misuse detection model is not the best model to be used and it’s used as an alternative for efficiency in the medium. It can be lead to the new variations of the attacks experienced before to elude the network security. The anomaly detection model detects interruption by searching abnormal network traffic. It detects deviation by finding patterns on data from internet (Aquino et al, 2008). Example The testing of multilayer feed forward network can be done using two layers which are hidden and have15 neurons each and a 5 output neurons for a 5 possible attacks. The network is then equipped with a flexible transmission algorithm with the neurons being sigmoid. After being trained with a dataset of 70 % it reaches a predictable error target of 0. 015 upon completion of the training sequence. When choosing the number of neurons per hidden layer, the calculation is done by subtracting the number of neurons in the output layer from the number of inputs in the system (Aquino et al, 2008). Advantages and Disadvantages Voip protocol is a security system which is designed in such a way that it optimizes the communication of aural by the use of internet (Millions, 2008). Comparing Voip (Voice over Internet Protocol) to other security protocols, there are a number of advantages which makes Voip remain the choice of many in the present world. Therefore, Voice over Internet Protocol is efficient when it comes to their cost. Voip uses public switched telephone network. The IPSec secures the low level system packets in order for the system of computers to be protected over insecure channels which are inclusive of internet and hire lines. Voip can easily add more lines whereas the other protocols cannot. It is hard to break into the safety of the system especially when there is encryption. Once there is power failure phones can still be used (Millions, 2008). Disadvantages There is occurrence of inconveniences in the structure once there is a large torrent of information being transferred in Voip. There is also a possibility of jitter data transfer conundrum occurrence in the system if the right precautions are not taken. Due to difficulty in the relocation of information, this can result to low overhaul superiority. Therefore, this can result into failure of the voice for the final consumers (Millions, 2008). Cryptanalysis Report Organizations are faced with the problem of receiving encrypted messages from their clients. In order to support the clients, organizations need to understand how to decrypt the encrypted messages. In most cases, the management of the organization and the clients usually use a single-key also known as the private-key in the encryption and the decryption of the messages. This kind of encryption is known as symmetrical encryption and is widely used by many people. The original message is usually referred to as a plaintext while the encrypted message is referred to as a ciphertext (Brown, 2007, p. 4). In symmetric algorithm, the same key is used for both the encryption and the decryption process (Vajda, 2003, p.3). The algorithm that the sender uses for changing the plaintext to a ciphertext is known as cipher. Since Charles Smith, a full-time associate in McKay IT service went on a business trip without carrying the logbook of the security protocols, there is need of using the process of cryptanalysis. This is method of code breaking the ciphertext without the use of the private key (Brown, 2007, p. 4). The process by which an original message is encrypted is shown by the formula E (M) = C. in which E is the function of encryption, M is the message and C is the Ciphertext. For decrypting the ciphertext, the receiver needs to use the formula D (C) = M so as to get the original message. In which D is the function of decryption, C is the Ciphertext and M is the original message (Vajda, 2003, p. 1). The algorithms of encryption and decryption use the private key known to the sender and the receiver only. Therefore, the proper formula to use in both the encryption and decryption process is C = EK (M) and M = DK (C) in which K is the private Key (Vajda, 2003, p. 1). Cryptanalytic attacks occur when a person attempts a cryptanalysis of a ciphertext (Vajda, 2003, p. 3). There are different types of cryptanalytic attacks from the sender. But for the purpose of this study, the ciphertext only attack will be used. This is because Charles and I as the consultant only know the ciphertext (Brown, 2007, p. 9). A person can use brute force search in the process of cryptanalysis by trying all possible keys (Brown, 2007, p. 11). Plaintext letter are usually substituted by number, symbols or even other letter to form the ciphertext. In this case, ciphertext that have been sent by the client has been replaced by other letters as shown For an effective cryptanalysis, one needs to know the type of cipher that was used. One should also measure the complexity of the attack to ensure effective cryptanalysis such as complexity of the data. Complexity of the data is the data amount that needs to be decrypted. The complexity of the process also needs to be measured such as the time needed for performing the attack. Lastly, one needs to have enough storage memory for the performing the attack (Vajda, 2003, p. 6). In ciphertext only attacks, given that C1 = Ek (P1) and Ci = Ek (Pi). In deducing P1 and Pi, Ci + 1 = Ek (Pi + 1). In cases, where the ciphertext only is available, it is hard to recover the plaintext. Therefore one can use the cryptanalysis of the Caesar cipher by trying the possible 25 shifts of keys in order to substitute the letters in the ciphertext to get the plaintext (Brown, 2007). One way of avoiding the cryptanalysis is by ensuring that the private key is only known to the sender and the receiver of the message. People should also ensure that while sending the encrypted, they give the sender the hint of the key used. Conclusion Appropriate models of computer security protocols have been proposed all through the discussion. Attacks in the system security protocols can be detected by the use of different models. These models include the misuse detection models and anomaly detection models. The attacks that influence the protocols lead to delays in the security system. Services can be denied through a brute force attack on the server processing speed or the band width. If the security qualification of the server has part of it as authentication value, then the computation is necessary in response to every qualification request which is valid. References Alarcon-Aquino, V. , Mejia Sanchez, J. A. , Rosas-Romero, R. , Ramirez-Cruz, J. F. (2005). Detecting and Classifying Attacks in Computer Networks Using Feed-forward and Elman Neural Networks. Proceedings of the 1st European Conference on Computer Network Defense, EC2ND 2005. Wales, UK: Springer Verlag. Aquino, V. A. , Clavel C. A. , Asomoza J. R, Starostenko, O. , Romero, R. R. (2008). Intrusion detection and Classification of attacks in High-Level Network protocols Using Recurrent Neural Networks. Retrieved December 18, 2008, from http://www.articleworld.org/Technology

Saturday, October 26, 2019

Essay --

Kassandra Rodriguez Professor Goner Abuse in the workplace Abuse in the workplace is behavior that causes the workers any emotional or physical harm. Discrimination, sexual harassment/harassment, violence and bullying are forms of workplace abuse. These actions are not always detectable from each other because they often overlap. Harassment could be discriminatory, bullying could be a form of harassment, and any of these behaviors can lead to violence in the workplace. There are many questions that could be asked about this like, Do men often report sexual harassment? Do minorities report Discrimination? Do men or women really experience violence in the workplace? Violence in the workplace as an threat or act of physical harm toward another person at the work site. the abusers might use verbal abuse or physically assault their victims to intimidate them. A person who threatens a coworker with physical harm is usually considered a ‘typical’ bully. However, the boss or supervisor who often requests an employee to do work or threa tens to fire them also is a bully. Bullies sometimes pretend to ignore their coworkers to make them feel invisible. Bullies also use other tactics to humiliate their victims, such as rumors to spread lies about them or try to sabotage their work. Discriminatory behavior treats workers very unfair usually on the basis of gender, race, ethnicity, religion, sexual orientation, disability, or age. Discrimination is prohibited by federal and state laws. Unfair actions incorporate retaliation, harassment, denying employment and making decisions that affect people in these categories. Bullying, violence and discrimination often are categorized as workplace harassment. Therefore, harassment victims suffer the sa... ...t down and come up with some statistics and go over our data. Now, participant observation is a little different, The main objective of participant observation is to grasp a deep understanding and become familiar with a certain group of individuals. So where would we conduct this? in an office where there are more than 5 people being ran by 1 boss. How long? anywhere from 6 months to a year. We would keep close eye on how the boss/supervisor interacts with their employees. The main goal is to try and see how the working population is treated behind closed doors. Maybe, this study can help change the way people are treated for working hard. Change the way it is handled, make it more serious when someone files a complaint against a worker for sexual harassment or bullying. Would you want your kids to be treated in this manner? so lets try and stop it head on.

Thursday, October 24, 2019

Nurses’ Practice Environments Essay

Purpose: Medication errors remain a threat to patient safety. Therefore, the purpose of this study was to determine the relationships among characteristics of the nursing practice environment, nurse staffing levels, nurses’ error interception practices, and rates of non-intercepted medication errors in acute care hospitals. Summary: LTICs are used in patients of various ages, but are most frequently seen in older adults. LTICs are placed in patients due to a number of reasons such as urinary retention, incontinence, immobility and spinal cord injury. The body’s natural and main defense mechanism against UTIs occurs when voiding, and in the bladder’s wall where antibacterial activity arises. However, when an LTICs are present, the risk for UTIs increase due to reasons such as: exasperation due to catheter parts, pressure caused by the inflated balloon, residual urine in the bladder from the placement of the balloon, and the â€Å"ischemic damage to the bladder mu cosa caused by bladder distention† (Muzzi-Bjornson & Macera, 2011). Essentially, the body’s natural defense is altered, and thus this irritation increases the risk for UTIs. In addition, biofilm formation on the LTIC, also poses a risk for CAUTIs. Biofilm formation on a urinary catheter is a layer of microorganisms on the catheter surface. Ultimately, the longer duration (days) catheters remain in place, the risk of CAUTIs increases. A major problem associated with LTICs and urinary catheters in general, are their tendencies to block and possibly damage the urethra, resulting in an inflamed urinary mucosa. Thus, it is critical to take preventative measures to decrease the risk for CAUTIs for those using LTICs. For instance, these measures include: basic nursing care  especially keeping a sterile environment, intake of cranberry juice or extract, use of appropriate catheter, antibiotics, and oral drug with deactivated/killed bacteria. Nursing Implications: 1. Despite the setting, whether the patient is at home or in the hospital, sterile conditions are vital. Perform hand hygiene and use aseptic technique upon insertion of indwelling catheter. 2. Assess catheters regularly to reduce infection. Keep in mind that catheters should be removed as soon as possible. Remember that the longer the catheters are in place, the greater risk of infections. Also, be aware of patient’s symptoms of CAUTI. 3. Ensure that the catheter is a closed drainage system, and secure the device in place. This will aid in reduction of bladder wall and lining irritation, reduce the patient’s pain, and promote good urine drainage into the collection bag. 4. Obtain urine sample with culture for patients on drug therapy, and monitor/maintain patient’s fluid intake. 5. If not contraindicated, follow orders and give patient cranberry juice and/or extract. Cranberry juice has been speculated to lower urinary pH levels, which impedes bacterial growth. 6. Strictly monitor patient if on prophylactic antibiotics; be aware of dangers/adverse effects. Reference Flynn, L. , Liang, Y. , Dickson, G. , Xie, M. , & Suh, D. (2012). Nurses’ practice environments, error interception practices, and inpatient medication errors. Journal of Nursing Scholarship, 44(2), 180-186.

Wednesday, October 23, 2019

Mother Courage and Her Children by Bertolt Brecht Essay

This extract from Mother Courage and Her Children, by Bertolt Brecht, translated by Michael Hofmann and John Willett, is located in the prologue and the opening scene of the play, at a point where the author dispels the myths of chivalry and honour we have about war. The play is set in the thirty years war but was written at the beginning of World War II. The beginning of the play is set in Poland, where a sergeant and recruiting officer are on the outskirts of town standing in the bitter cold. In this extract, we are able to observe a recruiting officer’s troubles in enlisting new soldiers and the lengths in which he will go to gain new recruits. He then complains that there is no honour and upstandingness among humanity. This establishes the character as hypocritical and desperate. The prologue of the play begins with a song telling us of the daily hardships war can bring, not excluding death. The song lacks adjectives, taking a very brief blunt view. It also takes a very disapproving view of war and this is shown through the choice of words. However, the song is delicately laced with humour that lessens the impact the song may have given. It describes the soldiers very impersonally, referring always to them as one group, one army. Small, dispensable objects with no name – joined together. Their belongings are described as ‘lumbering’ and ‘straggling’ which gives the image of a strong animal (bear?), with more brawl than brains. This image is intensified by the next line How can you flog them into battle as you usually flog large animals. This gives the impression that soldiers are mindlessly following the commands of their superiors because loyalty demanded it of them. The second stanza of the prologue talks about soldiers and their empty stomachs before war. It does not specify whether this is because of lack of food or because war is so desolate that they cannot hold their food down. The line Courage has rum with which to lace it talks of giving rum to soldiers so they will not feel anything and since courage is defined as the absence of fear, the soldiers are therefore courageous. The line marching to death is also used. This links with the soldiers being courageous because you have to be courageous to march, knowing that at the end awaits death. The speech by the Recruiting Officer consists of mainly one long rambling sentence. This implies that the brawl is spoken by an uneducated soldier. It also suggests that the military cannot find enough recruits to enlist that it has to put soldiers in positions that they have neither the ability nor motivation to do well. Also, the soldiers may not` have acquired enough training to know how to do their job well. The second half of the speech speaks of the recruiting officer dulling the wits of a potential recruit by alcohol so that he would sign on to become a soldier. The recruit then runs away and the recruiting officer complains of the lack of honour and upstandingness among humanity. This speech speaks of the difficulty of recruiting people to die for their country and because of the lack of availability, they settle for standards well below normal. In the prologue, a rhythm of ABAB CDCD and so on is used. The set rhyming structure is used to capture audience’s attention and to give a rhythm by which to read the poem. This provides a flow from one line to another that keeps the reader interested. The last four lines of each stanza are indented, drawing the reader’s attention and marking it as significant. The author’s choice of diction creates a vivid scene of imagery where soldiers are fighting disease and starvation rather than the enemy. The line With crawling lice and looted cattle shows the poor state of hygiene and health the troops are in. This immediately dislodges the myth that war is all fame and glory. Instead, a vision of unhygienic environment that many soldiers live in during war is created. This extract, especially the prologue, spares no time in easing the reader into the reality of war. Instead, it plunges them into one of the worse aspects of war. The recruiting officer’s speech reveals much about human behaviour which the reader can relate to and this entices them to read on. The extract provides a very good introduction to the book for the reader and effectively summarises the hardships of war. The purpose of this extract is to introduce the reader to various parts of war in a way that will neither alarm nor bore the reader. This is achieved by various literacy features such as imagery, diction and repetition and by the hypocritical speech made by the recruiting officer.