Thursday, December 26, 2019

Most of the leaders are running ethical companies, but...

Most of the leaders are running ethical companies, but there are some of businesses running unethical companies that caused company to break down for some reasons. One of the problems of this is that some of the leaders lied, and they act in a manner that is entirely unlawful or wrongful. Much more often, employees break ethics rules because top executives tend to act in an unethical behavior. Moral compass is anything which serves to guide a persons decisions based on morals or virtues which means it is a natural feeling that makes people know what is right and wrong and how they should behave. While personal ethics are how people make moral and ethical decisions. When we look into successful leaders that used unethical behavior to do†¦show more content†¦Kozlowski became scandalous for his lavish lifestyle, and he was summoned for tax fraud with respect to purchases of fine art. Mr. Kozlowski was convicted of fraud and grand larceny for misappropriating more than $400 mill ion of Tyco’s money for his personal use, including buying a $6,000 shower curtain and throwing a lavish birthday party for his wife on the island of Sardinia (Dealbook, 2008). Kozlowski was involved in with Chief Financial Officer (CFO) Mark Swartz. Kozlowski, Swartz, and Belnick stole $600 million dollars from Tyco International through their unapproved bonuses, loans, and extravagant company spending (Obringer, 2005). Three of them worked together to misuse company funds, shareholders’ interests in the company. The actions or behavior of the leaders in Tyco International Company is said to be unethical in terms of utilitarianism. Utilitarianism means providing the greatest benefits or happiness for the greatest number. Tyco International had embezzled funds worth more than 600 million U.S dollars. This act is a conflict of interest as Kozlowski and his partner satisfy their selfish interests instead of considering the needs of the organization.. In order to fulfill self interest and luxurious life, the leaders embezzled the company funds that should be used to manage the company in the best interest of shareholders and stakeholders. Here, Kozlowski only care about the self-interest instead of consideringShow MoreRelatedEthics and Profits of an Organization843 Words   |  3 Pagesprofits. Most of the corporations in the United States that are in existence were started on the basis of profit making. This means that the main reason why the corporations exist is so that the owners can get re turns from their investment. Business ethics involves the application of ethics to business behavior and the decision making process in the business setting. The connection between business ethics and decision making comes about as a result of the considerations that leaders in businesses putRead MoreBusiness Ethics and Social Responsibility Essay1471 Words   |  6 Pagesbehavior social context. Ethical behavior conforms to individual beliefs and social norms about what’s right and good. Unethical behavior conforms to individual beliefs and social norms about what’s wrong or bad. Business ethics refers to ethical or unethical behavior by employees in the context of their jobs. Ethics are talked about frequently and addressed in the news when unethical decisions are found. Sadly, people do not hear about ethics when others are engaging in ethical behavior on a daily basisRead MoreStarbucks Strategy1531 Words   |  7 Pages Running head: STARBUCKS’ STRATEGY1 Dr. Shavers Assignment 1: Starbucks’s Strategy Modern Management Strayer University October 21, 2014 Submitted by: RUNNING HEAD: STARBUCKS’ STRATEGY2 Starbuck’s Coffee is a multi-billion dollar company. It was founded in 1971 in Seattle, Washington. It was a single store located in the Park Place Market area of Seattle. The idea started with three friends, Jerry Baldwin, Zev Siegel, and Gordon Bowker. They opened a small shop and beganRead MoreThe Importance of Ethics and Values in Business Sustainability1050 Words   |  4 Pagesconduct of an activity and values are the judgement of what is important in life. Businesses are often tempted to make short‑term gains by turning a blind eye to what’s right. Despite codes of conduct, regulatory omission and ever‑increasing public pressure, many firms routinely ignore ethical considerations. Some even claim that a business simply needs to abide by the law without concerning itself with broader ethical issues. Yet such disregard can undermine the wider economy and, in time, cause irreversibleRead More Business Ethics Essay1591 Words   |  7 Pageswrong, justice and virtue. To business, ethics is a tool to examine principles and moral or ethical problems that arise in a business environment. Therefore, business ethics can be both a normative and a descriptive discipline. Ethics is a part of the larger social ethics, and also always affect business development. In other words, business ethics is a factor of determining the fundamental purposes of a company. Marketing ethics is a subset of business ethics. Because in marketing, ethics deals withRead MoreGlobalization And Its Effect On Employment Relations1694 Words   |  7 PagesBackground Literature Review While, there is variety of definitions, the most simplistic is that ‘business models’ describe how companies conduct their business, create value, and generate revenue (Boselie 2010; Breiby Wanberg 2011). With the rise of neoliberalism and globalization, companies such as Enron, Wal-Mart, Lemon Brothers, etc., tells us horror stories of unethical business conducts that ultimately affects all stakeholders involved, including national economies (Lissack RichardsonRead MorePersonal Statement : Leadership Development Plan1158 Words   |  5 PagesSummary to Personal Mission Statement My leadership for the future follows a very distinctive path. As I have worked with multiple organizations and companies, I still have a long way to go for more knowledge and experience in leadership. Leaders always need to train and adjust their skills to the ongoing evolution of economics. I see myself today as a leader that still needs to develop his skills. I teach as an adjunct and work for a finance/accounting firm. In the future, I would like to establish myRead MoreEthical Leadership Challenges in the era of Globalization2367 Words   |  9 Pagesï » ¿Ethical leadership challenges in the era of globalization Introduction Ethical leadership is a phenomenon in the tongues of many, both in the political and business scene. This is a type of leadership that is desired by many because it is believed that it ensures equity, transparency and accountability. Ethical leadership is one that upholds the conventional and non-conventional ethics of the profession. It ensures that one respects the rights and privileges of all subordinates and thus thisRead MoreLeadership Is Not A New Topic970 Words   |  4 PagesStudying leadership is not a new topic. Many books have been written about leaders who take struggling businesses and turn them into profitable organizations. There are numerous examples of effective bosses who specialize in motivating their employees to achieve the impossible while creating a loving bond with the work force. The examples most people find appealing are the ones that portray leaders who demonstrate exceptional management abilities as well as strong interpersonal skills. WhileRead More Leadership Styles : Leadership Style1012 Words   |  5 Pagescompetent manager, effective leader, and executive. The highly capable individual makes productive contributions through talent, knowledge, skills, and good work habits. The contributing team member contributes individual capabilities to the achievement of group objectives, and works effectively with others in a group setting. Competent manger organizes people and resources toward the effective, and efficient pursuit of predetermined objectives. The effective leader catalyzes commitment and vigorous

Wednesday, December 18, 2019

Oedipus the King Essay - 615 Words

Sophocles Oedipus the King In the play Oedipus Rex the main character, Oedipus, has to deal with his predetermined fate and his own nature. He is cursed from the beginning of his life when a soothsayer tells of his fate upon his birth. It is predicted that he will kill his father, and marry his mother, and raise a family. Oedipus was born to Laios and Iocaste who were the king and queen of Thebes. Upon his birth, his parents were shocked at a soothsayer?s prediction of Oedipus?s fate. It was originally said that he would kill his father, marry his mother, and raise a family. Naturally his parents couldnt have this, so they rid themselves of Oedipus by apparently killing him. They gave him to a shepard and told him†¦show more content†¦Oedipus would carry on and eventually end up in Thebes where he was originally born. Oedipus would go on to marry his mother Iocaste, and be looked at as a hero to the community. This would in fact fulfill the second part of Oedipus?s fate. Oedipus would carry on his life in Thebes and have a family with his new wife, Iocaste, who is also his mother. Throughout all of this Oedipus never had the slightest clue he was angering the gods by committing the crimes of patricide, regicide, and incest. The gods placed a plague on the city of Thebes and said that only the plague would be lifted if the killer of the king Laios were brought to justice. At the time still no one knew that Oedipus had killed the king or that he was the son of his wife. Oedipus would carry on a vigorous search for the killer of Laios, although he would be very successful because the person he was looking for was himself. In the end Oedipus would finally find out it was himself he was looking for. When his wife committed suicide, after realizing it was actually Oedipus who she had married, the soothsayer was trying to explain whom the killer of Laios actually was. Oedipus never had control over his fate because it was all predetermined in the telling of the soothsayer at the beginning of his life. Oedipus had no clue that it was his father he was killing when he killed Laios, nor did he have any knowledgeShow MoreRelatedOedipus The King Of Oedipus868 Words   |  4 Pageschallenge that waits upon one. Confidence overpowers cockiness. The cocky trait is heavily represented in the story â€Å"Oedipus the King† (c. 430 B.C.) by Sophocles. In the story, Oedipus the king of Thebes has the cocky trait and it results in torture for life. Oedipus’s arrogant personality shows throughout the story as he tries to find the killer of the former king of Thebes, his father. Oedipus tends to deem himself as a god throughout the story which plays a big role in interaction with people around himRead MoreOedipus The King : Oedipus1328 Words   |  6 PagesOedipus the King Oedipus had a lot of different character traits both good and bad. He had a good conscience; he cared deeply for the people in his life and protected them. He was very empathetic, smart and a dependable man who lived his life with great integrity. He was an honest man with strong moral principles and lived a righteous life. He found it difficult to live anything less than a righteous life; when he realized what had become of his life, his guilty conscience consumed him. He was filledRead MoreOedipus The King Of Oedipus1019 Words   |  5 Pageswhat makes Oedipus actions in his quarrel with Teiresias and also throughout the play so dramatically compelling, is the fact that the audience knows the outcome of the story. We know Oedipus fate even before he does, and there is no suspense about the outcome itself, instead, the audience anxiously awaits Oedipus to reveal his fate unto himself in his desperate quest to rid his city of the terrible plague, or maybe even more so, to simply d iscover his own unfortunate tale. Oedipus is relentlessRead MoreOedipus the King1125 Words   |  5 PagesOedipus the King by Sophocles is about Oedipus, a man doomed by his fate. Like most tragedies, #8220;Oedipus the King#8221; contains a tragic hero, a heroic figure unable to escape his/her own doom. This tragic hero usually has a hamartia or a tragic flaw which causes his/hers#8217; downfall. The tragic flaw that Sophocles gives Oedipus is hubris (exaggerated pride or self-confidence), which is what caused Oedipus to walk right into the fate he sought to escape. Pride like that of Oedipus hadRead MoreOedipus the King1065 Words   |  5 PagesSophocles’ use of irony is amongst the greatest of all time, as demonstrated masterfully in Oedipus the King. He displays both ambition and understated humour by using irony in diverse ways, both cosmic and dramatic, as well as verbal irony to add a greater level of wit. Every word spoken holds great symbolic weight and those words contribute to a narrative that reflects the gods plans. Adversely the work of Johnathan Swift takes the form of a social satire, combining economic arguments with a sociopoliticalRead MoreOedipus the King1164 Words   |  5 Pagesmen of high reputation and good fortune such as Oedipus.† This attitude, commonly found in men of high station is not specifically identified as pride in the case of Oedipus and, indeed, different readings can place Oedipus’ great flaw in a number of areas. It seems as if Sophocles intended to emphasize the more common interpr etation of Oedipus’ flaw being excessive pride, but other interpretations, such as Pier Paolo Pasolini’s 1967 film Oedipus Rex, present other possibilities as the main characterRead MoreOedipus the King773 Words   |  4 PagesThe Greek drama Oedipus the King, written by Sophocles, is regarded as one of the most perfect tragedies ever written. The tragedy Oedipus the King is highly esteemed partly due to its use of dramatic irony. Dramatic irony means that facts or events, which are not known to the characters on stage or in a fictional work, are known to the audience or reader. Sophocles uses dramatic irony to demonstrate how little the protagonist really knows. The main dramatic irony in Oedipus the King contrasts Oedipus’sRead MoreOedipus The King, Or Oedipus Rex1249 Words   |  5 Pagesmost famous probably being Sophocles’ Oedipus the King, or Oedipus Rex. For a play to be considered a tragedy, it must have a tragic hero. According to Aristotleâ €™s definition of a tragic hero, they must be a decent moral person, of high social standing who eventually meets with a tragic downfall, of their own doing, suffering more than deserved, and realizing their error too late. In the play Oedipus the King, Oedipus is the epitome of a tragic hero. Oedipus Rex was generally a â€Å"good† person; heRead MoreOedipus The King And Oedipus At Colonus1567 Words   |  7 Pagesworks of Sophocles and particularly evident in Oedipus the King and Oedipus at Colonus, not only exalts the Greek nationalism present at the date of composition but dictates the course of the story, evolving as its tragic hero works through his fated anguish. Hubris, defined as exaggerated pride or self-confidence, is the earmark character trait of Oedipus and perhaps Creon. However, it is the abandonment of his sanctimonious nature that distinguishes Oedipus as a true hero. The theme of the evolutionRead MoreOedipus The King, And Oedipus At Colonus1343 Words   |  6 Pages Oedipus, a play written by Sophocles, has become a staple in the study of a Tragic hero in classic literature. When this was written in the fifth century, theatre was more than a means of entertainment but almost a religious event. Robert Fagles goes even further by saying tha t†theatre was not only a religious festival; it was also an aspect of the city’s political life.† (Fagles) . Greek dramas were presented only twice a year during religious festivals that honored Dionysus, the god of wines

Tuesday, December 10, 2019

Project Overview of Ecommerce Samples †MyAssignmenthelp.com

Question: Discuss about the Project Overview of Ecommerce. Answer: Introduction E-commerce or the electronic commerce is the technique by which the various kinds of commodities and goods are sold by retailers and those goods are bought by the customers over the Internet. The entire transaction of goods is conducted over the Internet along with the transaction of money. There are multiple alternatives to pay for the commodities over the e-commerce site and online payment is one of the alternatives (Brannen, 2017). However, security is the major concern associated with the online payment. The reason for choosing this topic is to highlight the necessity to secure the online money transaction so that the customers can enjoy a hassle-free secure service. The report will showcase the security measures by which the security of the e-commerce site can be established. Project Overview The e-commerce site is developed keeping in mind the individual customers as well as the corporate customers, this help in conducting the business operations and transaction of goods in large volumes. The e-commerce provides various kinds of facilities like non-cash payment, the customers do not have to pay in cash, and they can simply choose to pay via debit card, credit card and via online banking (Creswell, 2013). The customers can get the facility to provide 24x7 services, they can shop at their convenient times, can shop on the go. The online retail stores provide better support to the customers; the customers can keep in touch with the e-commerce industry all the time and get solutions to all their queries. Thus security and privacy are important. The e-commerce giants like Amazon, eBay invests heavy on these e-commerce websites for ensuring the privacy of the customers and the security of the website as well as the company. There is a high risk of security breaches due to the cyber-attacks from the hackers. Thus it is absolute necessity to implement security features to theses websites (Ghosh, 2012). This report will focus on to research the security measures by which the personal sensitive information can be protected and secured. The technology that is used in the e-commerce websites is Secure socket layer (SSL), https, HTTP and Secure hypertext transfer protocol (SHTTP). Secure Socket Layer is widely used convention and is used to conduct the business operations securely and effectively. It is known to provide the security features- non-reputability, validation, encryption and trustworthiness (Davies Hughes, 2014). The https is used for HTTP URLs along with SSL whereas HTTP is used for HTTP URLs and not along with SSL. The Secure hypertext transfer protocol caters secure transactions over the Internet. It assists in authentication of the client by implementing encryption method. SHTTP is incorporated into browsers to cater the routine security over the Internet. Problem Overview The security issue is the main concern for all the online retailers. The intruders can attack the system and make the system and the database of the e-commerce companies and hack the sensitive data of the company, the financial data and the personal details of the customers. If the customers' data gets breached then the data, the privacy of the customers will get compromised. The e-commerce sites can face huge loss, they can even lose the customers base. The cyber attackers generally carry out the malicious activities by incorporating virus in the system of the e-commerce server, by taking control over the insecure network of the e-retailers (Aven, 2015). Trojan horse and the logic bombs are two kinds of threats and take away the sensitive information of the system and the database. Another kind of threat is Denial of Service Attacks and this attack is responsible to take control of one system and disallow the owner to access their own system. This attack is also responsible to shut down one's server and one's system. Another popular attack is a phishing attack. The cyber attackers develop a website which is genuine e-commerce website's lookalike. They simply copy the HTML code and carry out the attack. Besides those threats discussed, there are vulnerabilities too (Lampard Pole, 2015). The vulnerabilities incur due to the attack from the SQL injection, cross-site scripting, customers choosing weak passwords and lots more. The security measures must be applied to mitigate these aforesaid threats and the vulnerabilities related to e-commerce. Understanding of Research Issues The research is based on the three questionnaires- what are the primary security concerns of an e-commerce site, what is the necessity to secure the e-commerce site, what are the ethical issues associated with the e-commerce security (Laudon Traver, 2013). Therefore, the privacy and security, technology related attacks and the ethical issues that will be focused and is the area of research. Security and Privacy: The customers will have to be concerned about the security and privacy. The theft of the customers credentials is the area of concern (Morgan, 2013). The retail industry contains all the personal details of the customers, they also have the bank card details as well, thus the question arises if those sensitive data got breached then the privacy and security of the customers will get threatened. Technology related attacks: The cyber-attack on the e-commerce is carried out by brute force attack, denial of service attack (DDoS), ICMP flood. Ethical issues: The ethical issues are associated with the data mining procedures. The retailers must use the customers data efficiently and should be attentive that it does not hurt any customers or does not make any negative impact on the customers personal life (Segovia, Szczepaniak Niedzwiedzinski, 2013). Also, if those data get breached then the retailers can be in trouble, they will lose customers' base, they will lose the reputation and ultimately they will face a huge loss. The customers must be attentive and should limit their personal data usage. They have also the right not to share the personal information at all. In this way, they can protect the data from getting breached (Time, 2012). On the other hand, if the data are to be used, they must be used ethically and effectively keeping in mind the security and privacy of the customers. Related Work and Proposed Solutions by Authors to Address Research Issues The twelve articles or twelve related works will be highlighted and along with that, the proposals of various authors in regards to security measures of the e-commerce website will be discussed via these twelve articles. The first article details the techniques and the procedures via which the e-commerce websites can be protected and secured. The two models have been discussed the first one is the oriented authorization model and the second one is the oriented authentication model. The oriented authentication model is responsible to protect the e-commerce system from the brute force attack, replay attack and the data sniffing attack (Rane et al., 2012). The authorization model deals with the session hijacking and the bypassing authorization attacks, replay attacks, ID spoofing. The oriented authorization model is also on the basis of providing the customer's permission about accessing the data. Thus it can be concluded that the authentication and authorization are important for the enhancement of the e-commerce activities. The second article focuses on the cryptography technique by which the websites can be protected. This article showcases an algorithm which is fast as well as strong via which the security of the website can be ensured (Maqableh, 2012). The article has proposed about the cryptography that involves the hash functions, that also involves the pseudorandom number generation. HTTPs, SSL and SET protocols have been showcased in the article as well. The e-commerce website if properly encrypted significant benefits can be achieved. The third article demonstrates about the malware and the virus threat that can make any companys system and database vulnerable. The dangerous among them is the Trojan Horse. The Trojan Horse is responsible to block and is responsible to bypass any type of authentication and authorization techniques (Niranjanamurthy Chahar, 2013). The online retail industry has numerous phases and they mainly deal with the delivery phase, the information, the payment phase and the negotiation phase. The phases defined above have various kinds of security measures, various kinds of encryption procedures and various kinds of integrity checks. The article has highlighted the DDoS attacks, unauthorized attacks and the data fraud and the data theft. The article has grandstand on how individuals can protect themselves from all kinds of security breaches. The fourth article highlights the pros and cons of the M-commerce and the e-commerce respectively. The pros are related to the security aspects of the e-commerce sites. The article discusses the credit card related frauds and how one should stay safe from the hackers and data fraud, data theft and the phishing attacks. The security measures which probably can protect them from all kinds of security breaches have been discussed in the article and the security measures are authentication, encryption, non-repudiation and unauthorized access (Niranjanamurthy et al., 2013). The attackers can gain entry to one's system unethically and can modify and delete the data thus the e-commerce sites must be made secure. The fifth article showcases that the online shopping must be conducted in a safe and secure manner, the digital certificate, strong passwords and the secured public key infrastructure. The e-commerce life cycle has been elaborated in the article as well. According to the author, there should be a mutual trust in running the business operations. DDoS has been highlighted as the most disastrous threat. A security framework must be built to ensure security and safety of the e-commerce website. Nowadays all the customers are very much inclined towards the online shopping and the demand is rising (Revathi, Shanthi Saranya, 2015). This protecting the website from all kinds of breaches is the need of the hour. Along with that the confidentiality, privacy and the availability must be maintained. The sixth article showcases that the e-commerce applications can be downloaded to the smartphone and the same kind of effective service can be enjoyed over the phone. The utility of e-commerce apps has been showcased. The flaws have been highlighted as well. The flaws are basically associated with encryption and GPRS authentication. The protocols related with authentication have been discussed along with the encryption mechanisms (Prakash, 2015). The m-commerce activities are increasing and becoming more demanding day by day thus the security measures must be taken into consideration. The seventh article also focuses on the network security issues. According to the article, a well-secured framework model must have the data confidentiality, data integrity and the authentication. The threats which can prove disastrous to the e-commerce websites are unauthorised access, data theft, data fraud, spamming and the DDoS attack (Gautam Singh, 2014). There are also vulnerabilities that have been discussed and along with that risks occurring due to the casualties of the customers have been highlighted. The eighth article has elaborated the various kinds of business operations that the e-commerce industry works on. The author of this article has proposed the server side security model, the client-side security model and also proposed that the data must be transacted in a secured manner (Rane Meshram, 2012). The database module is associated with the watermarking, encryption of data and the digital signature. The ninth article highlights that the e-commerce websites can be secured only by cryptography techniques. The monetary transaction must be made secure by applying security models and the cryptographic techniques. The transactions related to e-commerce contains various kinds of phases like delivery phase, payment phase, information phase and the negotiation phase (Yasin, Haseeb Qureshi, 2012). The article has proposed about the cryptography that involves the hash functions, that also involves the pseudorandom number generation. HTTPs, SSL and SET protocols have been showcased in the article. The tenth article focuses on the various aspects of the e-commerce website like merchant account, payment gateway and the shopping cart (Yusuf Zeki, 2015). A secured e-commerce must have all the required security features and measures like the availability, non-repudiation and the privacy. The major threats which are the area of concern for the e-commerce websites are DDoS attacks, Trojan Horse and various kinds of notable malware and virus attacks. SSL can be an effective tool to cater the security to the e-commerce website. The site must be designed incorporating the security and the privacy parameters. The eleventh article talks about the cards- Master Card and Visa Card. Various kinds of security protocols incorporated within to facilitate secure money transaction. Asymmetric and symmetric cryptographic technique along with the hashing technique has been depicted in the article (Khandare Meshram, 2013). The article also depicts about the SDTS algorithm via which transaction of data can be made with ease and security. Again, this article has highlighted the concept of biometric authentication. The twelfth article has elaborated the security risks and threats like DDoS attacks, network sniffing, IP spoofing, consumers can be deceived by the hackers in numerous ways and can fall into their trap (Aggarwal, 2014). The article also talks about the SSL and various other security solutions by which the attackers can be restricted conducting the malicious activities. Conclusion It can be concluded from the above discourse that the financial transactions are conducted via these online retailing websites and security is the major issues. The details of the e-commerce applications have been highlighted in the report. Along with that the security risks, threats and the privacy features have been highlighted in details. The report is based on the research of three questions-the security concerns of the e-commerce website, the necessity for securing the e-commerce website and the ethical issues related to the e-commerce security. The security solutions have been discussed. The twelve articles have been showcased in the report where various authors have given various approaches in related to the security aspects of the e-commerce website. Certain security strategies and security model must be adopted and the employees working in the e-commerce enterprise must be knowledgeable about the security solutions so that they cater the best security solutions to the custom ers and the enterprise. The security aspects like authentication, authorization has been discussed in the report via which the customers can stay safe and secure. References Aggarwal, V. (2014). E-Commerce Security Issues And Solutions: A Survey.International Interdisciplinary Research Journal,2(1). Aven, T. (2015).Risk analysis. John Wiley Sons. Brannen, J. (Ed.). (2017).Mixing methods: Qualitative and quantitative research. Routledge. Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Davies, M. B., Hughes, N. (2014).Doing a successful research project: Using qualitative or quantitative methods. Palgrave Macmillan. Gautam, R., Singh, S. (2014). Network Security Issues in e-Commerce.International Journal Of Advanced Research In Computer Science And Software Engineering,4(3). Ghosh, A. K. (Ed.). (2012).E-commerce Security and Privacy(Vol. 2). Springer Science Business Media. Khandare, N., Meshram, D. (2013). Security Of Online Electronic Transactions.International Journal Of Technical Research And Applications,1(5). Lampard, R., Pole, C. (2015).Practical social investigation: Qualitative and quantitative methods in social research. Routledge. Laudon, K. C., Traver, C. G. (2013).E-commerce. Pearson. Maqableh, M. (2012).Analysis and design security primitives based on chaotic systems for ecommerce(Doctoral dissertation, Durham University). Morgan, D. L. (2013).Integrating qualitative and quantitative methods: A pragmatic approach. Sage publications. Niranjanamurthy, M., Chahar, D. D. (2013). The study of e-commerce security issues and solutions.International Journal of Advanced Research in Computer and Communication Engineering,2(7). Niranjanamurthy, M., Kavyashree, N., Jagannath, S., Chahar, D. (2013). Analysis of e-commerce and m-commerce: advantages, limitations and security issues.International Journal of Advanced Research in Computer and Communication Engineering,2(6). Prakash, K. (2015). Security Issues And Challenges In Mobile Computing And M-Commerce.International Journal of Computer Science and Engineering Survey,6(2), 29. Rane, P. B., Meshram, B. B. (2012). Application-level and database security for e-commerce application.International Journal of Computer Applications,41(18). Rane, P. B., Kulkarni, P., Patil, S., Meshram, B. B. (2012). Authentication and authorization: tool for ecommerce security.IRACSTEngineering Science and Technology: An International Journal (ESTIJ),2(1), 150-157. Revathi., C., Shanthi., K., Saranya., A.R.(2015). A Study on E-Commerce Security Issues International Journal of Innovative Research in Computer and Communication Engineering, 3(12) Segovia, J., Szczepaniak, P. S., Niedzwiedzinski, M. (Eds.). (2013). E-commerce and Intelligent Methods (Vol. 105). Physica. Time, C. (2012). Data Collection Methods.Review of Sociology,17, 225-249. Yasin, S., Haseeb, K., Qureshi, R. J. (2012). Cryptography based e-commerce security: a review.International Journal of Computer Science Issues,9(2), 132-137. Yusuf Mohamed, A., M Zeki, A. (2015). The most principle Security Issues In E-commerce.International Journal Of Scientific And Research Publications,5(12).

Monday, December 2, 2019

Social Class and Alienation

Karl Marx presented two class models of society namely the bourgeoisie and proletariat. The bourgeoisie are the capitalists who are few in number and are the owners of capital. They are also rich, powerful, oppressors, exploiters and they always win elections in democratic countries. Advertising We will write a custom research paper sample on Social Class and Alienation specifically for you for only $16.05 $11/page Learn More On the other hand, the proletariats are the workers, owners of labor and they are the majority in numbers but are powerless since they are oppressed and exploited by the rich and they always lose in election in democratic nations. The proletariat can be described as a class in itself in the sense that they share same objectives and relationships to the means of production, that is, they are laborers who are paid in wages. The two classes are always in conflict with each other because their interests are incompatible. While the bourg eoisie have the interests of maintaining the status quo which ensures their dominance, the proletariats are interested in changing the status quo which deprives them of good life. However, the two classes are not aware of the nature of the circumstances which they live in but assume that the situations which they find themselves in are natural and nothing can be done to change them. This is what Karl Marx calls a false class consciousness. The bourgeoisie are not aware that they are the exploiters while the proletariats are not aware that they are exploited or oppressed, they are also not aware that they are poor but assume that they are naturally supposed to be poor. However; when the proletariats become aware of the reality, that is, when they know that they are exploited by the bourgeoisie, what follows is a revolution. Marx argues that the Russian revolution of 1917 was as a result of the realization of the proletariats that they were being oppressed by the bourgeoisie. Karl Ma rx understood work as alienating. His argument was based on the capitalistic mode of production which has its roots in the industrial revolution of 1600. This mode of production is characterized by the two groups named above that is, the bourgeoisie and the proletariats. According to Karl Marx, the proletariats own nothing except their labor, which they sale at cheap price to the capitalists (Wharton 44-68). The concept of alienation simply means the existence of some dividing forces between things which are essentially supposed to be in harmony with each other. For example, man created and discovered religion, but the same man subjects himself to uncomfortable religious beliefs or practices like refusing to take medicine due to religious beliefs. In this situation, religion makes man to be uneasy, yet it is the same man who creates the religion (Wharton 44-68).Advertising Looking for research paper on philosophy? Let's see if we can help you! Get your first paper with 15% OFF Learn More Marx argued that the ideal purpose of work was to make man happy by enabling him move towards the actualization levels in his life. But due to the capitalistic economy, work is no longer playing its primary function in man, but rather, it is alienating him. According to Marx, man can be alienated in four major ways namely the alienation from the results of labor, alienation from the other workers, alienation of the worker from him or herself and alienation of the worker from working (Wharton 44-68). Alienation from the results of labor happens when man works but he does not have a stake in the products of his labor and only gets his wages, which are way below the worth of the products of his labor. This is what Karl Marx calls exploitation, which creates profits in form of surplus. Paradoxically, the surplus is not attributed to the workers but rather to the capitalists (Wharton 44-68). Alienation from other workers takes place when the worker is transformed into a commodity to be used in the competitive capitalist economy. In this situation, the worker is not viewed as a social being but is tied to his or her work, in which he or she is paid as per his or her output. The execs labor which is not paid for is what Marx referred to as surplus value, which ends up benefiting the owners of the means of production at the expense of the worker. Alienation of the worker from working takes place when the worker is robbed off his ability or opportunity to enjoy the intrinsic value of work. In the capitalistic economy, personal lives are separated from work, meaning that the worker is transformed into a machine. This makes him or her to work for the sake of working, but not as a way of serving other humanity or quenching his passion to work in a certain field (Wharton 44-68). Alienation of the worker from him or herself takes place when the worker is robbed off his objectivity in life. The nature of the work does not allow the worker to do what he or she pleases him. In many cases, the jobs in a capitalist system are very well defined with strict guidelines through job descriptions. Many jobs do not allow the worker to bring in his innovation, creativity and passionate input to the jobs and this only helps the capitalists to attain their objectives in life, without the worker having an opportunity to attain his objectives in life unless he works hard to own the means of production. Works Cited Wharton, Amy. Selected Material From Working In America: Continuity, Conflict, and Change, (3rd Ed.). New York, NY: McGraw-Hill Learning Solutions, 2006.44-68.Print.Advertising We will write a custom research paper sample on Social Class and Alienation specifically for you for only $16.05 $11/page Learn More This research paper on Social Class and Alienation was written and submitted by user Damarion K. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.