Wednesday, July 31, 2019

“Nature and the Physical World”

Most common attitudes and behaviors today on nature greatly evolved during the Romantic Era. Before, in some European countries, people don’t usually celebrate any occasion related to nature. But today’s society, because Romanticism evolved, it greatly affects our perspective and approach towards nature. When talking about nature in the Romantic Era, Rousseau is an important figure. He is the man who loves to be associated with nature. He would usually walk and explore nature related sites, climb mountains, and just simply communicate with nature. Rousseau is man of sensitivity, mood and even paranoia. In his time, he explored the agonies of love and the sentimental aspect of it. Love is the most popular feeling celebrated in the Romantic Era. This is known before as a relationship between two individuals and up to now; we use this as a common definition of Love. As we all know, when we encounter Romanticism, it reflects European society. Before, Europe is surrounded by tragic happenings, emotions not being expressed freely, and places where usually killings would take place. But now, it is safer, less hazardous, and even very much beautiful to explore. Mountains and forest or deep woods are no longer places to be afraid of. Instead these are places that are awesome to commune with nature and to be enjoyed and pondered on. Storms on the ocean are now being used as one of the most interesting subject on paintings, musical tones, poems, and writings. Before, things such as ocean storms, lightning, deep woods or mountain views are often being feared. No one would dare to draw closer to these things in fear of losing their lives. Another reason is the supernatural beliefs of people that these things were left unexplored. In the Romantic Era, romantics did not just arouse the sensitivity of emotions, but also it aroused the sensitivity to nature. People have come to realize that communicating with nature could improve one’s lifestyle and belief. Nowadays, people would explore nature and its wilderness, and they usually feel the overwhelming calmness and relaxation that it provides. It has proven that the shift in attitude towards nature is powerful and really can offer long-lasting serenity and positive perception within self. Another important figure during the romantic era is William Wordsworth. Romantic Era in poetry is centered with man’s relationship with nature and the fascination of man with Mother Earth. For Wordsworth, the definition of Romanticism is the passionate relationship towards nature and its wonder and wilderness. In his time, the word â€Å"pantheism† was stated. Because Wordsworth made to reflect his naturalistic attitude in his works, modern Pantheists described it now that God is called life of all, nature, earth and the universe. Pantheists have deep admiration and respect of all living things around us, even the forces outside the earth or in the universe. But Wordsworth did not focus mainly on these things. What he focused on is the appreciation and love for beauty and exquisiteness of Mother Earth and nature. Wordsworth, just like Rousseau, would often go for walks, exploring the beauty of life around us. He would also climb mountains and the most common is his paying attention to the things related to nature that an ordinary individual would often miss in his everyday life. What he often witnessed when he is outdoors, was the overall feeling of calmness and serenity in times of agony and loneliness. We could tell that the love, peace and comfort that Wordsworth is getting from nature is actually the feeling we get every time we call for God. In the Romantic Era, we could probably come across an identical observation, because during this time Industrialization is also emerging and became one of the most attended things by people. Probably, just like Wordsworth, people would also love to go out of the city and search for peace and quietness in one place; just like what Mother Nature provides. These things were what poetry is during these times and even up to now. People tend to find a place where they can relax and be away from all the hard works, materialism, and aristocracies. A place where they can celebrate life and enjoy living as a free individual. In Wordsworth time, nature as described to provide these things would not probably be accepted; for a reason that during these times Church controls almost everyone and everything. Maybe people have tried but it was not socially accepted and anyone who must have caught doing this was branded as deviating from what society’s norm is dictating. Rousseau and Wordsworth, as well as some other Romantic poets and figures, have only one inspiration; Mother Nature and all the living things surrounding us. The paintings, poems, pictures and writings done during these times will probably make us realize how important it is to be away, even for sometime in the materialistic world. These things will also be our heaven in seeking comfort, peace and calmness within ourselves. Jut like poets and figures in the Romantic Era, we will perceive nature as the only thing that will give us no worries no matter what we lose, no matter what the circumstance is. It is the only thing that others cannot get from us, because it will just stay within us; in our hearts and in our minds. References: http://www.wsu.edu/~brians/hum_303/romanticism.html http://www.customessaymeister.com/customessays/Poetry/3389.htm   

Tuesday, July 30, 2019

Asia Pacific Breweries

International Business Environment Project GROUP PROJECT: ASIA PACIFIC BREWERIES LIMITED (APBL) Prepared by G&T Consultancy (TZ02): Benjamin Jethro Neo Czaraim Suganob Carreon Michelle Oh Hui Ling Ratchadakorn Wongphothiphan Valerie Ng Shi Min Yap Yi Jun Prepared for: Ms. Ng Lay Khim, Linda Date of Submission: 18th July 2012 TABLE OF CONTENTS 1. Company and IndustryOne of the main components of the beverage industry is Alcoholic drink; an example of a company that produces alcoholic beverages, namely Beer and Lager is Asia Pacific Breweries. Listed on the Singapore Exchange, Asia Pacific Breweries Limited (APBL) is one of the key players in the beer industry Asia Pacific Breweries, formerly known as Malayan Breweries Limited (MBL) in 1931 is a joint enterprise between Heineken International & Fraser and Neave. Its present name was given in 1990.As of today, Asia Pacific Breweries also operates a broad global marketing network, which extends across 60 countries and is supporte d by 30 breweries in 14 countries, namely Singapore, Cambodia, China, Indonesia, Laos, Malaysia, Mongolia, New Caledonia, New Zealand, Papua New Guinea, Solomon Islands, Sri Lanka, Thailand and Vietnam. Asia Pacific Breweries also offers their consumers a wide range of brands, be it global, regional or local, which suit the taste of various beer drinkers; boasting a wide range of choices, including Tiger Beer, Heineken, Anchor Beer, Baron’s Strong Brew, ABC Extra Stout and Bintang Beer.Their beers are brewed under the supervision of Heineken technical experts, who can call upon countless years of experience of European brewing excellence. Using only the finest ingredients, maintaining the most stringent brewing standards, and conducting over 200 quality checks during the process. This scrutiny over production of APB beers has reeled in many awards while their breweries are among the forerunners in their respective markets. 2. STRENGTHS AND WEAKNESSES 2. 1 StrengthsTiger beer, the prize brand of APB, was the winner of the UK's Brewing Industry International Awards, the most esteemed award in the brewing industry 1998. The brand won a Gold medal in the International Style Lager category in the 2010 World Beer Cup; and silver medal in 2010 World Beer Championships. Anchor Beer was presented a gold medal in Selection Mondiale in 2010, a gold medal by Australian International Beer Awards in 1998, on top of several other honors. Since beer sales mostly relied on quality and tang, the higher quality standards of APB beer, makes APB standout in the competitive brewery business.APB's Tiger and Heineken brands scores on the point of identity and thus have a strong brand image. A part of one of the few establishments in Singapore, APBL set up the Asia Pacific Breweries Foundation (APB Foundation). This foundation provides financial aid to causes in Creativity Development, achievements in Human Excellence and Humanitarian Awards. APBL plays a significant role in gi ving back to the communities in which they operate. Being socially responsible, each of them renders support to the various educational, social and environmental causes in the respective countries.Through its endless efforts towards community and environment protection, APB continues to build a long-term relationship and good rapport with its customers. 2. 2 Weaknesses Although the US market is mounting at a slower rate compared to certain Eastern European and Asian markets, lack of presence in this market puts the group at a disadvantage as compared to some of the other great players in the industry. Since large beer consuming countries provide possibility for volume and revenue expansion, a modest presence in these markets results in a drawback for APB.The anticipated sale of APBL’s 50% owned Heineken-APB (China) Pte Ltd to China Resources Snow Breweries Limited would not be going through due to an unreachable agreement with CRSB. 3. OPPORTUNITIES AND THREATS 3. 1 Opportuni ties With a rise in disposable income and alcoholic beverages more widely accepted by its people, Asia had its potential as a profitable market. APB operates primarily in Asia Pacific, which grew at a compound annual growth rate of 5%, reaching a figure of $112. 2 billion in 2009. To maximize on their Asian opportunity, APB has ventured into New Caledonia and Indonesia. In FY2010, hey came into possession of Heineken International's 65. 1% interest in PT Multi Bintang, Indonesia and also Heineken’s 87. 3% interest in Grande Brasserie de Nouvelle Caledonie, New Caledonia. The group also received beer brand Bintang and its trademarks rights. The acquisition allowed APB to launch their other popular beer brands easier as it gave them a firm consumer base in Indonesia and New Caledonia. APB is extending its brand portfolio by adding more flavors and varieties. They acquired Bintang and Number One, from Indonesia and New Caledonia in FY2010. The group also introduced some other ne w brands in the same year.Laos has its local beer Namkhong; New Zealand was introduced Monteith's Crushed Pear Cider while Tiger Crystal was presented to Vietnam and, as a limited edition, to Malaysia. APB attracts consumers of distinct tastes by presenting new brands every now and then. 3. 2 Threats Beers belongs to one of the highly taxed commodities globally; especially high in the countries APB operates in. Per liter of beer was imposed an excise duty of S$70 in Singapore, the single largest market of APB. New Zealand also increased excise duty. This caused DB Breweries, the New Zealand division of APB to increase its prices by 3%.Higher prices are a result of higher excise rates. APB, known for being a cheaper option of premium brands, may lose its current consumers if excise rates continue to rise and cause APB to set a higher price for its beer brands. Alcohol companies have received criticism on their advertisements and thus, countries set a legal ban on spirits advertisemen ts on TV and radio; on broadcast advertisements which associate alcohol with children or leisure, or promoting alcohol abuse; as well as on sponsorship of TV and radio programs by companies mainly concerned about alcohol production.These rules would hinder APB’s development, as its awareness in the consumers would decrease. Beer has been linked with negative health issues. Among people, there is a general negative perception about beer having an effect on the body fat and cholesterol. On the other hand, wine is considered a healthier option to other beverages. In matured markets like Western Europe and North America, beer is losing its field to wine, as there is an increase in consumers’ preferences for healthier alternatives. Wide variety of alcohol products available readily and extensive advertising is also bringing a negative impact to beer sales. . KEY CUSTOMER (GROUPS) & COMPETITORS Key customer groups Business to Customers APBL has large consumer base due to its wide variety. Tiger beer, among all the brands is the most famous international brand with largest number of consumers. Tiger Beer targeted the vibrant young Asian adults; Tiger also launched Tiger Crystal Lite, a softer-flavored Tiger Beer to cater consumers especially the Chinese who prefer lighter taste. Likewise, Heineken and Gold Crown targets young Asian adults in Thailand, New Zealand, Vietnam, China, Singapore, and Malaysia.Anchor, which offers consumers with international, affordable quality brew, is more successful in Hainan, Cambodia and Vietnam. Everyday drinkers in Singapore and Malaysia are appealed to Anchor while Cambodians and Singaporeans in their 30s-40s are appealed to stouts including Guinness, Extra Stout and Amber Stout. Baron’s Strong Brew had European as its loyal customer base appealing those who favor strong alcohol taste. Business to Business The company has a strong market share in various countries within the Asia Pacific Region.It also boas ts that in the UK, Tiger Beer can be found in more than 8,000 premium bars, clubs and distribution outlets in major cities. APBL’s products can be found in almost any shop that sells alcoholic beverages in the countries it has expanded to. Competitors Asia Pacific Breweries’ faces many competitors in the industry, namely in Breweries, beverage manufacturing, alcoholic beverage manufacturing, bars and nightclubs and restaurants, bars and food services. APBL’s local and overseas competitors include Carlsberg A/S, whose company perates in Europe and Asia. Asahi Breweries, Ltd, Suntory Group and Kirin Holding Company, Ltd, which primarily operates in Japan. SABMiller, which primarily operates in Americas, Africa, Asia and Europe. The Philippines-based company: San Miguel Corporation and China Resources Enterprise Limited based in Hong Kong. Kirin Brewery Company, Limited is engaged in producing alcoholic beverages, soft drinks, food products and pharmaceuticals thro ugh its subsidiaries. SABMiller is engaged in producing and distributing beer, malts and carbonated soft drinks.Likewise, Suntory Group primarily operates in the non-alcoholic and alcoholic beverages, food products and the food services business segments. Carlsberg, a renowned competitor, is also engaged not only in the production, marketing and sales of beer, but also produces soft drinks, energy drinks and bottled water. San Miguel Corporation, yet another renowned competitor, also engages in the production of beverages and is involved in other business segments such as food and packaging products, power generation and distribution, mining, fuel and oil, infrastructure, telecommunications, management and development of real estate properties. . EXISTING OPERATIONS OF COMPANY 5. 1 Entry modes used for expansion Joint Ventures Asia pacific breweries preferred mode of entry is Joint Ventures. For example, in Singapore, Asian Pacific Breweries started out in Singapore as a Joint Ventu re between Heineken International and Fraser and Neave in 1931 and was known as Malayan Breweries Limited. Asia pacific breweries also used joint venture in Cambodia, China, Laos, Malaysia, Mongolia, Thailand, Vietnam, Indonesia and New Zealand. In Cambodia, Asian Pacific Breweries formed a joint venture with Progress Import and Export, which formed Cambodia Brewery Ltd.In China, Asian Pacific Brewery formed a 50-50 joint venture with its shareholders, Fraser and Neave, Limited and Heineken in China known as Heineken-APB (China). APBL also engaged in a joint venture with Laos: Asian Pacific Breweries opened a brewery in Laos through a joint venture with the Government of Laos and SBK Consultant Ltd. Malaysia’s Guinness Anchor Bhd was a result of the merger of Guinness Malaysia Bhd and Malayan Sdn Bhd whose parent company is the current Asian Pacific Brewery. In Mongolia, Asian Pacific has formed a 55-45 joint venture with MCS Holdings LLC.APBL also entered Thailand, Vietnam, Indonesia and New Zealand via Joint Venture. In Thailand, Asian Pacific Breweries entered Thailand, to form a joint venture with Thai Life Insurance Company Limited and Thai Pure Drinks Company Limited. Similarly, In Vietnam, Vietnam Brewery Ltd. , (VBL) was formed by a joint venture between Saigon Trading Group (SATRA) & APBL. Finally, In Indonesia, APB participates in the Indonesian beer market via PT Multi Bintang Indonesia Tbk (MBI). Acquisitions In 1955, APB entered Papua New Guinea by acquiring a stake in the brewery, which has been the sole beer brewer in Papua New Guinea since 1983.Further expanding their foothold in the South Pacific, APB entered the beer market of Solomon Islands with a majority  stake in Solomon Breweries Limited (SBL). Merger In New Caledonia, APB entered the beer market of New Caledonia via Grande Brasserie de Nouvelle Caledonia (GBNC). GBNC was formed in 1974 as a result of a merger of two breweries in the territory of New Caledonia. Partnership In Sri Lanka, APBL formed a partnership with Sri Lankan-based Anandappa family group and associates and MBL Offshore Limited, a wholly owned subsidiary of Phoenix Beverages Limited, which is a leading beverage group from Mauritius, to form APB Lanka.Please refer to Appendix A for APB’s shareholdings in the various countries 5. 2Types of operating issues or problems encountered Operational issues: When expanding into foreign countries, the scale of investment and exports increases. Large amount of capital is needed for venturing into new markets, resulting in the company having fewer budgets to channelize into other new markets or other development areas like R&D. Additionally; customers in different market have different standards, forcing APBL to consistently adapt the flavor to suit to local’s tongue.The unexpected fluctuating exchange rate incurred loss as seen when â€Å"APB suffered a paper loss of S$37. 9m & S$14. 5m in 2008 & 2009 respectively. â₠¬  APBL experiences currency risks due to contractual cash flow invoice in another currency. There is potential currency mismatch in investing countries like Vietnam and Mongolia. For example, APBL invests in USD but revenue generated comes in VND. High agricultural products price resulting from natural disasters also happens in overseas production subsidiary would increase cost of beer production.There might be political and economic regulatory uncertainties in investing market that delay the business operation or high entry barrier in some country as government restrict foreign investment scale or the sales of beer. Economic problems: Due to increase in prices of agricultural products such as wheat and barley, this increases the cost of beer production as well. APBL had to absorb this increase in cost of production, which will be bound to induce negative effects such as an increase in selling prices of beer to offset the higher cost of production.This might lead to potential loss of customers. Also, the value of the firm may be affected by unanticipated and volatile changes in the exchange rates on home currency. For example, the depreciation of Tugrik led to an exchange loss of $ 5. 9M. Political problems: When venturing into Mongolia, there were various benefits and risks encountered by APBL. Some political risks encountered were that the political system lacks transparency and corruption level is high.When venturing into Indochina, there was similarly a high level of corruption in the government coupled with a high tax regime of 45% which decreases the profit margin of APBL due to the higher expenses incurred from the high tax regime. Legal problems: Asia Pacific Breweries’ financial manager, Chia Teck Leng is currently serving 42 years in prison as a result of swindling S$117 million from a Scandinavian bank, two Japanese banks, and a German bank across a period of four years to make up for his gambling addiction.This is reflected as the lengthie st jail term given for the biggest case in commercial fraud in Singapore to date. Chia was charged with using underhand means to extort foreign banks of about S$117 million, criminal breach of trust of S$53 million, money laundering, and encouraging his girlfriend Li Jin to use a forged passport. He was imprisoned on 2 April 2004 after pleading guilty to 14 charges. 6. FUTURE EXPANSION PLAN 6. 1 Selected countries and reasons for expansion Reasons for venturing into Spain The Spanish culture is known for drinking a lot of beer.If APB ventures into Spain, it can be assured of a big market to introduce its products to. But despite the presence of many other beer companies in Spain, APB is a cheaper alternative compared to other beers, which will thus attract many consumers. Furthermore, it is known that good beer is a sign of a good restaurant. If APB can satisfy its customers’ standard of ‘good beer’, it can definitely boost the reputation of restaurants that cate r APB to its customers. In addition, foreign beers are very rampant in Spain. This shows that the Spanish would welcome foreign beers.Thus, this ensures that APB products will have higher chances of being accepted by the Spanish. Barcelona is also known to be a ‘Drinker’s Paradise’. However, there have been negative feedbacks about the type of beers offered in Barcelona bars, which does not complement the drinking environment in Barcelona. Hence, if APB products can satisfy the Spanish, this will up the profit that bars make from selling beers, which will in turn benefit APB in the long run. From 2009 to 2012, the economy of Spain met with a downturn, and almost a quarter of Spain’s workforce was unemployed.APB can now make use of the unemployed as labor for APB in Spain. Reasons for venturing into Australia The wine industry has expanded rapidly but Australians will always be known as beer drinkers, even rivaling the likes of Germans. Therefore, if APB ve ntures into Australia it will also have a large market of consumers to introduce its products to. Coupled with the fact that APB is a cheaper beer alternative, there is a high chance that many consumers will turn to APB to satisfy their demands. There are also various Beer Festivals held in Australia on a regular basis.Such Beer Festivals include ‘The 7th Annual Australian Beer Festival’ which attracted a large crowd of over 10000 people with 24 Australian brewers and over 100 Aussie beers present during the festival. Such Beer Festivals are definitely a good avenue to increase the reputation of APB at a large and quick scale if APB were to venture into Australia. In addition to Beer Festivals, there is also the presence of beer competition such as the ‘Australian International Beer Awards’. This is yet another platform for breweries to showcase their premium beer and brewing excellence.All these platforms reflects the Australian’s interest in beer d rinking and thus this is definitely a good reason for APB to venture into the Australian market and grab its own customer loyalties and build its reputation in Australia. More importantly, the economy of Australia is one of the most developed, modern market economies in the world. In 2011, the Australian economy was the fastest growing advanced economy in the world, with a GDP of approximately US$1. 6 trillion. This means that the Australians are earning more than the worldwide average.The IMF in April 2012 predicted that Australia would be the best performing economy in the world over the next two years. With such a boosting economy in Australia, APB should venture into Australia. Australia has also entered into many FTAs with ASEAN countries and Australia is also a member of various international organizations such as APEC and WTO. This puts Australia in a very good position to make foreign trading with other countries, granted support from these organizations 6. 2 Identification of sub-factors used for expansion Political-Legal factorsSub-factors used: Country risk ranking, political stability ranking, legal regulatory ranking, corruption index and political transparency index and ease of doing business ranking. Political and legal forces greatly impact the success of a company expanding into a foreign environment. It comprises of three main pillars. They are government regulation; laws that restrict the amount of trade freedom a foreign company has in a host country. The Government bureaucracy provides the foreign company with the legal license to conduct business activity in the country and political stability.Economic factors Sub-factors used: GDP growth rate, GDP Growth Projection, Purchasing power parity, Per Capita Income, Inflation rate, Exchange rate stability and presence of competitors. Economic factors refer to whether the country is favorable in terms of its economy. It is a significant factor considered when expanding, as economic factors will greatly affect the success of the company in that country. Social Cultural factors Sub-factors used: Education level, Language, Religion, Income, Age and Ethnic distribution and attitude towards time. The social culture in every country is different.The language, attitudes towards business, religious beliefs, traditions, and customs varies greatly from country to country. Managers must be aware of the differing cultures and specific taste of each country and tailor their products to suit their individual cultures. By doing so, it raises the level of competiveness and demand for that product in that market. Geographical factors Sub-factors used: Accessibility to raw materials, agricultural products available, natural hazards, climate, percentage unemployed in labor force, minimum gross annual wage rate, land area, lease period of land, cost of land & terrain.Geographic features in every country heavily influence the rate and pace at which a foreign company can expand in the host country. Surface features such as navigable rivers and flat plains aids travel and contact with others, hence accelerating the productivity of the company. However, countries with topographical features like treacherous mountain ranges, deserts and large bodies of water may discourage communication. This affects consumers’ product needs and wants, hence requiring managers to be extra particular about their preference. Technological factorsSub-factors used: Availability of Digital Network Infrastructure, Internet penetration rate, Presence of legal framework for intellectual property and presence of e-banking structure. Technological advancement varies extensively throughout the world. Most firms would expand into a new market only if there is demand for its product or if the technology and infrastructure there can support its existing production operations. A country with the latest technology and infrastructure would mean lower costs for the company that is intending to ente r into that market. 6. 2. Political/Legal Factors Factor| Spain| Australia| Country Risk Ranking| Risk ranking of 61. 83| Risk ranking of 82. 25 ? | Political Stability Risk Ranking| With a Political Instability Index of 5. 5, Spain is ranked 104th in the world. | With a Political Instability Index (PII) of 3. 6, Australia is ranked 154th in the world. ?| Legal Regulatory Risk Ranking| Overall assessment of Spain is B, 30. | Overall assessment of Australia is A, 18. ?| Corruption Index & Political Transparency Index | With a Corruption Perception Index (CPI) of 6. 1, Spain is ranked 30th in the world. With a Corruption Perception Index (CPI) of 8. 7, Australia is ranked 8th in the world. ?| Ease of Doing Business Ranking| Spain achieved a rank of 44. | Australia achieved a rank of 15. ?| In terms of Political-Legal factors, Australia is more favorable as it is better than Spain in terms of Country Risk Ranking, Political Stability Risk Ranking, Legal Regulatory Risk Ranking, Cor ruption Index & Political Transparency Index and Ease of Doing Business Ranking. 6. 2. 2 Economic Factors Factor| Spain| Australia| GDP Growth Rate| 0. 8% (2011 est. )| 1. 8% (2011 est. ) ? | -0. 1% (2010 est. )| 2. 7% (2010 est. )  ? | Purchasing Power Parity| $1,413,468 million (2011)| $914,482 million (2011) | Per Capita Income| $32360 (2010-11)| $65477 (2010-11) | Inflation Rate| 3. 1% (2011 est. ) ? | 3. 4% (2011 est. )| | 2% (2010 est. )  ? | 2. 8% (2010 est. )| Exchange Rate Stability| Euros (EUR) per US dollar – 0. 7107 (2011 est. ) 0. 755 (2010 est. ) 0. 7198 (2009 est. ) 0. 6827 (2008 est. ) 0. 7345 (2007 est. ) > Less stable| Australian dollars (AUD) per US dollar – 0. 9694 (2011 est. ) 1. 0902 (2010) 1. 2822 (2009) 1. 2059 (2008) 1. 137 (2007) > More stable ? | Presence of Competitors| Yes. There are strong competitors but not so many brewery companies ? | Yes. There are strong competitors and various microbreweries companies. Tense competit ion| In terms of Economic factors, Australia is more favorable because it is deemed better in five out seven sub-factors. From the comparison table, we know that Australia’s economy is more stable and more favorable for business as compared to Spain because it has a higher GDP Growth Rate and Projection, a lower Purchasing Power Parity and a higher Per Capita Income.Furthermore its Exchange Rate Stability is also more stable. 6. 2. 3 Social Cultural Factors Factor| Spain| Australia| Education level/ Literacy rate| 98. 5| 99. 98 ? | Language| Castilian Spanish (official) 74%, Catalan 17%, Galician 7%, and Basque 2%  | Majority: English 78. 5%, Chinese 2. 5%, Italian 1. 6%, Greek 1. 3%, Arabic 1. 2%, Vietnamese 1%, other 8. 2%, Unspecified 5. 7%  ? | Income Distribution| * 10% Rich (25. 2% of income) * 80% Middle Class (72% of income) * 10% (2. 8% of the income)| * 10% Rich (25. 4% of income) * 80% Between the two (72. % of the income) * 10% Poor (2% of the income. ?| Attit ude towards time| The Spaniards are typically a laid back group of people, with a relaxed sense of time| It is expected of an individual to be punctual in any occasion ? | Age Distribution| 0-14 years:  15. 1%15-64 years:  67. 7%65 years and over:  17. 1%| 0-14 years:  18. 3% 15-64 years:  67. 7%65 years and over:  14% ? | It is more feasible to expand into Australia because its Social Cultural factors are more promising. It has a higher Education level and Literacy rate, which means the citizens in Australia are more employable.In terms of Language, majority of Australians speak English thus dispelling any language barriers. Australia’s attitude towards time is also more advantageous for the business. 6. 2. 4 Technological-Infrastructure Factors Factor| Spain| Australia| Secure Internet Servers| 285| 2003? | Internet users (per 100 people)| 65. 8| 75. 9? | Presence of Legal framework for Intellectual Property| Copyright Law of SpainSpanish Patent and Trademark Of fice| Australian Property Law ? | Presence of e-Banking Infrastructure | Top 8 country, 46% utilization ? Top 10 country, 44% utilization| It is also more practical to expand into Australia because it is better in terms of the Technological-Infrastructure sub factors. In order for an international business to experience ease in communications between countries, its technological factors must be superlative. By analyzing the various sub-factors, we know that the Internet users (per 100) and Secure Internet Servers in Australia is much higher. 6. 2. 4 Geographical Factors 1 Factor| Spain| Australia| Natural hazards| Periodic droughts, occasional flooding and volcanism ? Cyclones along the coast; severe droughts; forest fires volcanism| Climate| Temperate; clear, hot summers in interior, more moderate and cloudy along coast; cloudy, cold winters in interior,  partly cloudy and cool along coast ? | Generally arid to semiarid (low precipitation); temperate in south and east; tropical i n north| % Unemployed in Labour Force| 20. 065%? | 5. 233% | Minimum Gross Annual Wage Rate (International Dollars)| $11,426. 00 ? | $20,027. 00| Land Area (sq. km)| 505,370| 7,741,220 ? | Terrain| Large, flat to dissected plateaus surrounded by rugged hills ? | Mostly low plateau with eserts, fertile plains in southeast| Upon comparing both countries’ Geographical Factors 1, Spain is more favorable. This is because it is less prone to natural hazards and its climate is more conducive for setting up a plant. They also have a large unemployment rate, which APBL can take advantage of if they chose to expand into Spain. 6. 2. 5 Geographical Factors 2 Factor| Spain| Australia| Length of road network| The road network comprises a total of 346,858 km| The road network comprises a total of 913,000 km ? | Number of Airports| 47 Airports | 448 Airports ? | Number of Seaports| 66 Seaports| 214 Seaports ? Preferential Tax Incentives for Foreign Investors| Deductions are readily availabl e for export activities, investment in the environment, R&D, extraordinary profits reinvestment, training, etc. ?| Subjective to the nature and size of the investment project, the relevant Australian State governments may give rebates from payroll, stamp and land taxes on an ad hoc basis and for limited periods. | By analyzing the Geographical factors 2, Australia is much better because it has a longer road network, more airports as well as seaports. This means that it is much more accessible if we expand into Australia. 6. Recommendation, reasons and type of entry mode to use for Australia. Recommendation We chose to enter the Australian market with either a company currently existing in Australia or a company that hasn’t expanded into any other countries, and have similar goals as Asia Pacific Brewery. We have chosen to go with Coopers Brewery Limited, the largest Australian-owned brewery or the largest home brewing equipment producer in the world. Reasons By venturing into Australia with Coopers Brewery Limited, the chances of reducing cost and risk would be higher as compared to attempting to enter the market alone or with external companies.This would be due to the fact that Coopers Brewery Limited has an established name and hence, this allows them to share their experiences with APB, reducing the trouble of setting up their own subsidiary, ultimately reducing the chances of consumer doubt. Therefore, smaller amount of investment is required to put APB’s business into operation. APB need not waste valuable time to set up its own subsidiary or look for ways to enter the Australian market, which it has low international experience or little cultural knowledge of. Knowledge wise, APB would have an advantage when going into joint venture with CoopersBrewery Limited because they possess information and first-hand experience about the local market demand and they know what â€Å"works† in order to satisfy their consumer’s standa rds and preferences. In terms of production capacity, APB would be able to increase its product and sales volume as there might be sharing of staff and production facilities between both brewery companies. They can also share the cost of marketing and advertising their brewery products. APB can now afford to sell its product at cheaper price, thus increasing its competitiveness in the brewery industry within short period of time.Type of Entry Mode to use We chose to enter the Australian market via Joint Venture with Coopers Brewery Limited. Coopers Brewery Limited was established in 1862, by Thomas Cooper at his home in the  Adelaide  suburb of  Norwood, South Australia. Being the utmost powerful beer company in South-Australia, Coopers Brewery Limited would have the largest amount of market shares hence we would be able to penetrate the markets and promote APB’s branding to Australia, as the consumer-producer’s trust is already established.APB can build good rel ations with its new retailers and customers since its joint venture partner already has a reputable brand image, thus this adds on to APB’s credibility without much effort required. Therefore, APB would be able to distribute its product more efficiently through the availability of existing market channels that Coopers Brewery Limited has. 6. 4 Reasons for not selecting Spain. By comparing both countries, and weighing the factors used for expansion, we have unanimously concluded that Spain is not as favorable as compared to Australia.In terms of Political-Legal factors, Spain’s country risk ranking is lower than Australia, which indicates political instability that is unfavorable when setting up a business. Furthermore, Spain’s ranking when it comes to ease of doing business is ranked 44 in the world, a significant inferiority compared to Australia which ranks 15. Economically wise, Spain’s GDP Growth rate is relatively smaller compared to Australiaâ€℠¢s. In terms of Per Capita Income, Spain’s is much lower compared to Australia, which might play a role as to unsatisfactory sales.Furthermore, by comparing 5-year statistics, the exchange rate stability also fluctuates more than Australia, therefore being less stable. By looking at the Social Cultural factors, Spain is less favorable than Australia because of its lower literacy rate and minor percentage of English speaking individuals, Moreover, the Age Distribution in Australia is better than Spain because despite the exact same percentage of people aged 15-64, the youth’s population in Australia is greater than Spain.This means that in the future, Spain’s percentage of 15-64 would be less compared to Australia. This age groups consists of the majority of working individuals, hence, a smaller figure would be deemed as having an adverse effect to the company. Technological Factors also indicates that Spain isn’t on par with Australia. International Busin esses rely heavily on technology for communication. If APBL wants to expand to a country, it would be an advantage if the country’s penetration rate were higher.By comparison from the table above, it is evident that the Internet Users (per 100) in Australia far exceeds Spain’s, which would mean that there are more computer literate individuals in Australia as compared to Spain, which would pave the way for more employment opportunities. Geographically speaking, Spain’s land area is comparatively smaller than Australia. In order to establish a major brewery, a vast land area is required and Australia has more land than Spain, which means that it would be more economical as land isn’t as scarce.The comparison also shows that Spain has lesser Airports, Seaports and a shorter length of road network, which reflects that the accessibility in Spain is inferior to Australia’s. CONCLUSION Our consultant team has found that Australia would be the more promis ing country for Asia Pacific Breweries’ expansion plans. This is conclusive of our results, which were based on a thorough assessment of thirty-six diverse sub-factors, which are instrumental in successful business expansions. Australia was found to be more favorable in twenty-six out of the thirty-six factors.Australia boasts a relatively slight political risk and has low corruption in the country, which provides a conducive and secure environment for Asia Pacific Breweries to conduct its operations in. Furthermore, agricultural produce in Australia is suitable for the brewing of quality beer, thus Asia Pacific Breweries does not need to source for additional raw materials, which would otherwise incur a huge cost. Australia also has a comprehensive web of transport infrastructure, which would greatly increase the efficiency of Asia Pacific Breweries operations, hence cutting costs.The quality of education in Australia is also of a high standard, producing a workforce that is highly literate. A highly educated work force will not only increase work productivity but also the overall competitiveness and capabilities of Asia Pacific Breweries in Australia. The Australian economy shows no sign of slowing down as GDP growth rates are projected to continue increasing through the years. Additionally, the per capita income in Australia is considerably high, which means that the average Australian is comparatively well to do.As beer is a lifestyle product, a strong, robust economy coupled with a high standard of living will be able to better complement and boost the sales of beer. After taking into considerations the abovementioned conclusions, the team here at G&T Consultancy would like to offer a recommendation for Asia Pacific Breweries to expand into the Australian market. APPENDIXES Appendix A: APB’s Shareholdings BIBLIOGRAPHY 1. Asia Pacific Breweries Limited – SWOT Analysis Overview, (2011) Retrieved 20 May 2012, from  http://forum. sh areinvestor. com/forum/showthread. php? 23-Asia-Pacific-Breweries 2.APB: Commences Legal Proceedings Regarding Proposed Sale Of Heineken-APB (China)(2012) Retrieved 20 May 2012, from  http://forum. shareinvestor. com/forum/showthread. php? 23-Asia-Pacific-Breweries 3. Market line, Last updated (2012), Retrieved 22nd May 2012 from: http://360. datamonitor. com. libwww3. np. edu. sg/Product? pid=88B119E4-FAC0-4BA3-B0B8-403ED16218AA&view=SWOTAnalysis 4. Damien Corrigan – Beer in Spain: What to expect in a Spanish Bar (2012) Retrieved 29th May from: http://gospain. about. com/od/fooddrink/qt/beerinspain. htm 5. Beer drinking in Barcelona, Spain, Retrieved 29th May from: http://www. beertutor. om/city_guides/barcelona. shtml 6. Beers of Australia, Retrieved 29th May from: http://www. clickforaustralia. com/BeersofAustralia. htm 7. Australian International Beer Awards, Retrieved 29th May from: http://www. beerawards. com/index. asp 8. The 7th Annual Australian Beer Festival? Saturday 29th & Sunday 30th October, Retrieved 29th May from: http://www. australianheritagehotel. com/beerFest. html 9. Economy of Australia. (2012), Retrieved 12th June from: http://en. wikipedia. org/wiki/Economy_of_Australia 10. Economy of Spain (2012), Retrieved 12th June from: http://en. wikipedia. org/wiki/Economy_of_Spain 11. 11.Singapore, Retrieved 10th July 2012 from: h 12. ttp://www. apb. com. sg/singapore. html 13. Cambodia, Retrieved 10th July 2012 from: http://www. apb. com. sg/cambodia. html 14. 13. China, Retrieved 10th July 2012 from: 15. http://www. apb. com. sg/china. html 16. 14. Indonesia, Retrieved 10th July 2012 from: 17. http://www. apb. com. sg/indonesia. html 18. Laos, Retrieved 10th July 2012 from: 19. 20. http://www. apb. com. sg/laos. html 21. 16. Malaysia, Retrieved 10th July 2012 from: 22. http://www. apb. com. sg/malaysia. html 23. 17. Mongolia, Retrieved 10th July 2012 from: 24. http://www. apb. com. sg/mongolia. html 25. 18.New Caledonia, Retrie ved 10th July 2012 from: 26. http://www. apb. com. sg/new-caledonia. html 27. 19. New Zealand, Retrieved 10th July 2012 from: 28. http://www. apb. com. sg/new-zealand. html 29. 20. Papua New Guinea, Retrieved 10th July 2012 from: 30. http://www. apb. com. sg/papua-new-guinea. html 21. Sri Lanka, Retrieved 10th July 2012 from: 22. 23. http://www. apb. com. sg/sri-lanka. html 24. 22. Singapore, Retrieved 10th July 2012 from: 25. http://www. apb. com. sg/solomon-islands. html 26. 23. Thailand, Retrieved 10th July 2012 from: 27. http://www. apb. com. sg/thailand. html 28. 24. Vietnam, Retrieved 10th July 2012 from: 9. http://www. apb. com. sg/vietnam. html 30. Cambodia Brewery Ltd sales down 10pc in ’09. (2010, 8th February). Retrieved 11th July from: http://khmernz. blogspot. sg/2010/02/cambodia-brewery-ltd-sales-down-10pc-in. html 31. Coopers Brewery, Retrieved 11th July 2012 from: http://en. wikipedia. org/wiki/Coopers_Brewery 32. Rogers, S. (2010, October 26). Datablog. Retri eved 4th July from http://www. guardian. co. uk/news/datablog/2010/oct/26/corruption-index-2010-transparency-international 33. Viewswire. (2010). Retrieved 4th July from http://viewswire. eiu. com/site_info. asp? info_name=social_unrest_table&page=noads 34.Cia – the world factbook. (2012, June 08). Retrieved 4th July from https://www. cia. gov/library/publications/the-world-factbook/geos/sp. html 35. CIA. (2012, February 15). Cia world factbook. Retrieved 4th July from https://www. cia. gov/library/publications/the-world-factbook/geos/as. html 36. European beer guide. (2006). Retrieved 4th July from http://www. europeanbeerguide. net/spanbrew. htm 37. International monetary fund. (n. d. ). Retrieved 4th July from http://www. imf. org/external/country/AUS/index. htm 38. International monetary fund. (n. d. ). Retrieved 4th July from http://www. imf. org/external/country/ESP/index. htm 39.Spain economic statistics and indicators. (2011, August 01). Retrieved 4th July from ht tp://www. economywatch. com/economic-statistics/country/Spain/ 40. Australia economic statistics and indicators. (2011, August 01). Retrieved 4th July from http://www. economywatch. com/economic-statistics/country/Australia/ 41. Retrieved 10th July from http://www. unece. org/fileadmin/DAM/hlm/wpla/publications/restrictionsanalysis. pdf 42. Wikipedia the free encyclopedia. (2011, November 14). Retrieved 10th July from http://en. wikipedia. org/wiki/List_of_minimum_wages_by_country 43. World risk average. (2011, June 03). Retrieved 10th July from http://www. uromoneycountryrisk. com/ 44. Economic Intelligence Unit. (2011, July 15). Retrieved 10th July from http://www. eiu. com/ 45. Trumbic, T. (2011). Retrieved 13th July from The World Bank website: http://www. doingbusiness. org 46. Barrientos, M. (2011, 12 21). www. indexmundi. com/georgia/. Retrieved 13th July from http://www. indexmundi. com/ 47. Executive planet. ( 21:). Retrieved 13th July from http://executiveplanet. com/ 48. Wikipedia. (2012, March 31). Retrieved 13th July from http://en. wikipedia. org/wiki/List_of_countries_by_GDP_(nominal)_per_capita 49. Wikipedia. (2012). Retrieved 13th July from: http://en. wikipedia. rg/wiki/Category:Beer_and_breweries_in_Spain 50. Wikipedia. (2012). Retrieved 13th July from: http://en. wikipedia. org/wiki/List_of_breweries_in_Australia 51. (2011). Retrieved 17th July from The World Bank Group website: http://data. worldbank. org/indicator/IT. NET. USER/countries 52. (2011). Retrieved 17th July from The World Bank Group website: http://data. worldbank. org/indicator/IT. NET. SECR. P6/countries 53. Business Review. (2012) Retrieved 17th July from: http://apb. com. sg/annual-report. html 54. Top Countries for Online Banking. (2010, October 27). Retrieved from http://www. onlinebanking. net/top-countries-for-online-banking/

Monday, July 29, 2019

An Analysis of Langston Hughess Poetry

An Analysis of Langston Hughess Poetry Essay Two of Mr.. Hughes poems, l, too and Democracy, one expresses feelings from an African American mans point of view at a time when they werent allowed to have a voice to have a point of view. The other poem basically saying they would never see democracy with the huge cloud of injustice that rises. In Hughes poem l, Too, the speaker is not an individual as the word l implies. In fact, the l represents the African-Americans as a whole living in the United States. Hughes also writes l am he darker brother instead of we are the darker brothers is no accident. The use of the word l as to not using we are words of a lonely individual, who doesnt see a winning chance. The speaker says They send me to eat in the kitchen, enforcing they are the enemies. As used in this poem, the first-person voice highlights the weakness of the African-American people. However, this is not the only way that Hughes uses l in his poetry. The speaker claims that he, too, sings America. He is the darker brother who is sent to eat in the kitchen when there are guests visiting. However, he does laugh and he eats well and grows bigger and stronger. Tomorrow, he will sit at the table when the guests come, and no one will dare to tell him to eat in the kitchen. They will see his beauty and be ashamed, for, as he claims, l, too, am America. The poet is trying to elaborate the feeling of being seen as nothing to taking it day by day, and becoming something to unapproved eyes. Hughes published l, Too, Sing America in 1945, a good ten years or so before the start of the Civil Rights Movement in the United States. Racism and prejudice was normal in the US at the beginning of the 20th century much more than they are now and so Hughes poem envisions a day in which whites and blacks will eat at the table together, in which black citizens will be truly classified as equal Americans. In the poem, Democracy Longs expresses that democracy will never come during his time living or ever. He feels that he has as much a right as a citizen to have property just as the next person does. He gets tired of seeing peoples attitudes, such as a whatever happens happens attitude. It is no surprise that democracy in the United States was nonexistent in the early sass and throughout the Jim Crow era, when blacks had no rights. Democracy back then was Just a label not reality and outright biased. Government rule by the people consisted of whites only, excluding all African Americans. In Longs Hughes case, he knows that by birth hes an American citizen. But as a black man in the pre-Civil Rights United States, he sure isnt being treated like one. So somethings got to change. l, Too, Sing America reminisces back to the days of slavery, when African Americans were supposed to be non-visible abort, not actual human beings. The implication of this poem is that not a whole lot has changed since then. In conclusion, Can anyone blame a man for having such a negative view on democracy while living in a racist society? Absolutely not! Thousands of Black Americans had the same feelings. In reality, democracy was one-sided, for blacks were not allowed to be involved with any decision making, voicing of an opinion, etc. Freedom and equality summarize the entire poem, which is what Hughes wanted at the time, to have basic equality for all.

The Theory of Mindshould primates be afforded Human Rights on the Essay

The Theory of Mindshould primates be afforded Human Rights on the basis that they are conscious - Essay Example We laugh and enjoy on good things; feel sad and cry on bad things and adverse moments; we also understand each other; we develop desires. We acquire, improve, and utilize knowledge to develop concepts, principles, laws, and methods. Everything we do and every time we do it we are explicitly aware of our actions. This same uniqueness even created fictional ideas, that man is a special creature that is not part of this world. But this is not the emphasis of this paper. It is assumed here that human is part of the evolutionary process and is a type of creatures with special understanding that was part of the complex evolutionary path. Because of the human awareness, he created and honored the guidelines of morality, which we commonly refer as human rights as a basis of our actions to achieve harmony within the society. But several ideas came out that certain type of primates show some level of awareness that humans claimed. The question whether primates have a theory of mind was started by Premack & Woodruff (1979) and created interest in the studies on cognition with these creatures. Characteristics of the existence of a mind among these creatures are exhibited by several experiments in psychology. Behaviors such as self-recognition, imitation, role taking, deception, perspective taking, and some show of social relationship among their groups were observed and discussed by Heyes (1998). These ideas received a lot of criticisms and were subjects for scrutiny and verifications. Debates are even widespread about the subject. The growing popularity of the idea that primates do think and have a theory of mind created a somewhat weird question within the society. Should primates be accorded human rights on the basis that they have theory of the mind There are several moral issues associated with such questions. A lot of "what-ifs" can be derived from this idea. If we grant primates the same rights we have, can they be part of our society This question can be addressed by examining the validity of some facts and the associating them in the context of human rights. This paper is primary geared towards finding facts and recommendations to address the human rights issue on primates. The contents will discuss basic principles on "The Theory of the Mind," what it is all about, what are its implications to the human society and its association with defined and accepted social norms and human rights. It will explore the controversial primate characteristics associated with the existence of theory of the mind within these creatures as enumerated and discussed by Heyes (1998). This report, however, is neither an exhaustive review of existing available facts and information about existence of mind in primates nor an elaborate case study on primate's rights. This paper would present the facts why humans recognize common rights in the context of the Theory of Mind and if such characteristic does exist in primates. It is a critical evaluation of available facts based on limited sources and is reflective of ideas as a personal perspective based on critical analyses of certain issues. Scientific views on theory of the mind This section would deal with the principles and information that explains in general terms the theory of the mind and the mechanism involved in the social cognition and the

Sunday, July 28, 2019

Evaluate the current application of Unmanned Aerial Vehicles (UAV) Essay - 1

Evaluate the current application of Unmanned Aerial Vehicles (UAV). Discuss the potential future applications of UAV technology based on current issues - Essay Example Control of the craft is achieved remotely by use of autonomous computer system or use of remote controls from a specific place on the surface. Typically launching and recovering these aircraft is achieved by use of automated systems located at some location on the earth’s surface. Initially, operation of the unmanned aerial vehicles relied on remote piloting but more complex autonomous control system are being programed and used instead (Mark, 2012). Traditionally, these facilities were mostly deployed for use in the military operations but their uses have evolved to include other special operations. Such aspects as firefighting, surveillance, civil application and policing among others are the current applications where the drones are being used to promote efficiency and effectiveness. Missions that are dangerous, gloomy or even filthy require the use of these devices as human control could be putting the lives of some people at risk. This paper seeks to evaluate the current applications of unmanned aerial vehicles and their potential future applications. For years, the use of drones has been associated mostly with military application. As a result of advancement in the use of computers, marked with the advancements in engineering, a number of civil aviation applications are now possibly carried out with the help of drones. Such aspects as land surveying, film shooting and photography, air rescue missions, power inspections and wildlife surveillance among others are possibly carried out effectively with the help of unmanned aerial vehicles (Cosic et al., 2013). Professionals such as medical practitioners are currently employing the unmanned aerial vehicles to deliver medics in arrears that could otherwise not be accessible such as flooded areas. Illegal poaching and hunting of wild animals is possibly monitored with the help of this technology. Other

Saturday, July 27, 2019

The Race Essay Example | Topics and Well Written Essays - 750 words

The Race - Essay Example is a function of the wage they receive" (Romaguera 14) is true, wages in minority neighborhoods may be lower, because they do not need to be higher. If one worker is not productive and is fired, there are many others waiting to take his or her place, who will work for the same wage. Again, the ability to purchase resources is reduced, due to lower income. The same concept can be applied to housing and rent, only reversed. "In 2000, the proportion of African American households that had obtained home ownership was 65% lower than the proportion of white households that had obtained homeownership" (Ohio State University 3). Therefore, the rental owner will seek to charge as much as demand will allow, regardless of race. This means that those living in less affluent neighborhoods may ultimately get less for their money, in terms of rental unit quality, amenities, and space. Social segmentation also affects the distribution of resources. It may not always do so directly, but by altering marketing efforts, based on clustering or categorization of specific geographic locations or types of customers, allocation is indirectly affected. In Asian Social Science December, 2008, Yingchun Guo ( 3-4) explains how clustering works for electric power consumers. The types of customers are divided into four categories. The highest ranking are those that consume more power and have good credit, while the lowest ranking group has less than idea credit and consumes less power. Marketing strategies are likely to focus more heavily on the highest ranking users, where the company stands to make the most profit. Those is the highest ranking group may be offered special rate packages and pricing that is... Ohio State University. Social/Economic Indicators: Comparing Brown Era Racial Disparities to Today." (April 2004). 11 Dec. 2009

Friday, July 26, 2019

The Battle of Somme Research Paper Example | Topics and Well Written Essays - 1750 words

The Battle of Somme - Research Paper Example Anglo-French in nature, the Somme offensive aimed at shattering the powers of Germany. The British army led the allied forces consisting of a major part of British and French army. The German army which awaited them retaliated harshly. The first day of the battle proved the most fatal for the British army. At the end of the day, the British army had lost 60000 of its men (Gilbert, pp65-78). Despite the heavy human loss of almost 1 million from both sides, the British Generals of the time have been criticized for the battle. At the end of the battle, the British army had succeeded in capturing only 12 kilometers from the Germans. The allied forces were still 5 kilometers away from Bapaume which had been termed as a major objective of the battle while Germany was still maintaining much of its frontline. One view however favors the offensive that the battle caused a severe blow to the Germany ultimately bringing its defeat in 1918. At the start of battle, the balance in composition amon g the British and French was 20 British and 13 French divisions. Though majority of the composition was British, it had earlier been decided that the attack on German army would be primarily a French offensive. The German onslaught at Verdun forced the French to depute a huge manpower of its army. The Somme offensive aimed at draining the German forces of reserves and the territorial target was the secondary objective. The Verdun onslaught changed the nature of the Somme offensive completely. The aim had then become to shift German resources from Verdun to the defense of Somme (Doughty, p291). The heavy bombardment was planned to precede the attack which began on June 24. It was believed that the fierce bombardment would destroy the German front line. After the destruction of the front line, the allied forces would become able to walk into the no man’s land and take edge over the Germans. Both the British and French artillery had an equal share in the 3000 guns for bombardmen t. After the bombardment, it was planned that a creeping barrage would lead the advancing infantry towards the front line of the Germans then consecutively towards the second and third trench lines. In addition, Rawlinson’s Fourth army was heavily loaded with arms and ammunitions which had the task of consolidation. During the course, the whole Fourth army would attempt a sudden breakthrough by using the cavalry to catch the gap in the German defense lines. After the possession of the German front line, the plan was that the British army would break through to Cambrai and Douai which meant the breakup of German line into two. 750000 soldiers from 27 divisions went into the offensive. About eighty percent of the army was from the British Expeditionary Force (BEF). The figures comparison favored the attacking allied forces as only 16 Divisions German army defended the battlefield of Somme (Keegan, pp290-292). What Happened? The bombardment began and continued for eight consecut ive days. The allied forces of British and France had however looked down upon the strengths of the German army and its strong arrangements. The bombardment had failed to destroy either of the German front line’s barbed wire or the strongly built concrete bunkers. It was evident that the Germans were alert for all of the enemy’s onslaughts. Besides, the munitions and explosives used by the British were defective. Many of them did not explode.

Thursday, July 25, 2019

Journal Article Critique (Recognizing Heart Failure (ACEIs) )

Journal Critique (Recognizing Heart Failure (ACEIs) ) - Article Example Each stage has relevant information that can be relayed to the patient with the goal in mind of making the patient responsible for the maintenance of his own heart especially in the early stages. Also, the article emphasizes the value of sticking to a medication regimen, consuming a healthy food, as well as exercising as means of preventing heart failure. Heart failure is a disease that afflicts no less than half a million Americans each year according to the article. This makes the disease top the list of diseases that cause mortality. According to the National Heart Lung and Blood Institute heart failure is commonly caused by diabetes, coronary artery disease, hypertension , and diabetes. Nevertheless, the article argues that heart failure can be linked to any of these dysfunction: systolic or diastolic. The aforementioned causes cited by the National Heart Lung and Blood Institute are usually diastolic dysfunction. On order to get a complete evaluation of patients suspected with heart failure, they undergo chest X-ray, an electrocardiogram( ECG) and Echo cardiogram. The initial workup for a patient with suspected heart failure includes lab tests, a chest X-ray, an electrocardiogram (ECG), and an echocardiogram. In addition to this, the Mayo Clinic website cited other tests that may prove helpful such as : stress test, coronary cat hetherization ( angiogram ), MRI or cardiac CT. Each test has a corresponding purpose that may reveal a symptom. For example, angiogram helps in determining the presence or even extent of coronary artery disease. The article extensively discussed the stages outlined in the AHA/ACC guidelines. The first stage which is known as Stage A, is a stage that aims to control the condition of the patient by suggesting interventions such as controlling hypertension. Controlling high blood pressure is crucial in preventing heart failure

Wednesday, July 24, 2019

Critical Review of Meet John Doe Movie Example | Topics and Well Written Essays - 750 words

Critical of Meet John Doe - Movie Review Example After this fake letter was published in the newspaper where Mitchell worked, tremendous reaction on the part of general people followed. This public reaction was noted by the newspaper’s rich and powerful publisher D.B. Norton (played by Edward Arnold). Next, a sinister collaboration starts between Ann, Norton, and other staffs of the newspaper to exploit the sensation created by John Doe’s fake suicide letter. One John Willoughby (Gary Cooper) is duped into this conspiracy and he is asked to play the role of John Doe. At first, Willoughby does this job enthusiastically. But gradually the actual conspiracy is exposed before him. Willoughby has a flux of mind and he starts clinging to the character and mission of fictional John Doe. In doing so, he shakes the very fundamentals of the news media house he was working for and throws a serious challenge before Norton. Ultimately, Willoughby becomes a real John Doe, who successfully convinces people about general good of soci ety and unmasks hypocrites like Norton and his collaborators. Ann also changes side and joins Willoughby in this great mission of John Doe. All during watching this film, I felt that there are several political linkages in this film. However, two most important linkages are being mentioned in this paper. The first one is created with the help of impressions, scenes, and symbols regarding democratic values and community consciousness. The second linkage shows that how one’s personal life and feelings might be used by somebody else to obtain political benefit. 2. In the film Meet John Doe, Capra appears to be consistently pressing ahead with his idealism having ample regard toward the spirit of democracy. After the middle part of the film, contradictions between ideals of democracy and manipulation of the system become the main foci of the film. The scene of the great John Doe Convention speaks about it. The convention is held before a large audience and thousands of people are called on to participate in it. Willoughby, in the meanwhile, finds that Norton wants to exploit the sensation created by the story of John Doe. Norton wanted Willoughby to endorse Norton as a presidential candidate for the federal elections in the garb of John Doe Convention emerging as a political party. This being the backdrop, Willoughby now tries to breakaway from Norton’s control. At this point, Capra creates a marvelous scene at the John Doe Convention. In this scene, with the help of a combination of distant and close shots, Capra shows how desperately Willoughby is going ahead into the crowd and trying to tell the truth about John Doe and Norton. With the help of special effects using montage of crowds repeatedly, Capra creates the impression of Willoughby, a desperate man, trying to communicate with thousands of people individually, intimately, and simultaneously. This scene showing the seemingly impossible task of Willoughby actually exhibits that how confusing in stitutional democracy might become. Emotional and spirited public might fail to identify the real evil behind ambitious politicians. Political propaganda can become powerful enough to overshadow the actual goals of the democratic institution. Consequently, public might go ahead and invite an â€Å"iron hand† (Capra 1941) to rule them as had happened in the countries like Nazi Germany and Fascist Italy. The second most intriguing scene in this film is seen

Tuesday, July 23, 2019

Sarbanes-Oxley Act Essay Example | Topics and Well Written Essays - 500 words

Sarbanes-Oxley Act - Essay Example Examples include WorldCom and Enron companies. According to section 404(a) of the Act, it is a requirement that managements of companies assess their Internal Controls effectiveness and report on the same over financial reporting. Also, Subsection (b) of the same section, calls on independent auditors to attest to the assessments done by the managements. This is regarding Internal Controls effectiveness. The opinion of the study is that it is not too much a regulation. As stipulated by the Securities and Exchange Commissions report, the enactment of section 404 of the Sarbox Act have proven too costly. The outlays are incredibly high to companies, which has led to some attempts at their reduction while upholding effectiveness like the reforms of year 2007. (sec.gov, 2009) However, the cost of implementation is far much less than the 2001-2002 business scandals cost. These are with the inclusion of Global Crossing, Tyco, WorldCom and Enron companies, which shook the confidence of investors a great deal. (Hallberg, 2008 p390) A case at hand to support the argument that, it is not too much regulation is that of the collapsed Enron Company. This is where, in October 2001, Enron company had made public their third quarter earnings report where they purported to have realized an after tax Earnings of USD 1.01 billion. On the same date of reporting, Enron had cut down equity of shareholders by USD 1.2 billion, which it claimed to be the rectification of accounting errors. In November, 2001 the company filed with the SEC Form 8-K, considering the current events. This form 8-K stipulated that Enron would like to restate their financial statements from year 1997 through 2001 June. These statements led to a shocking fall of income of USD 569 million. In the same year, 2001, Enron Company filed for bankruptcy which triggered investigations. (De Vay, 2006 p3) As said earlier, as stipulated by the Securities and Exchange

Affirmative Action Essay Example for Free

Affirmative Action Essay Affirmative action is policies to give special attention or compensatory treatment to members of previously disadvantages group. There is a lot of history and events behind this policy. First, in 1978 the Supreme Court addressed the issue for the first time with the case of Alan Bakke. He was a 31 year old who had been wait-listed for admission by the University of California at Davis. His scores and grades where higher than all the other African Americans so his rejection was declared illegal because they determined his admission by his race. Also, in 1979, the court ruled that a factory and a union could voluntarily adopt a quota system in selecting black workers over more senior white workers for a training program. As a result in 1980, Ronald Reagan, an ardent foe of for affirmative action was finally supported. Following this event, in 1989 the supreme court handed down five civil rights decisions limiting affirmative action programs and making it harder to prove employment discrimination. Lastly, in 1990 Congress passed legislation designed to overrule the Court’s rulings, but President George Bush vetoed it. Then in 1991 Congress made a weaker version of the Civil Rights Act the overruled the Supreme Court rulings which prohibited the use of quotas or affirmative action. The arguments for affirmative action is that there should be a certain number of a race admitted to a college or job. There should be quotas that have to be met with different minority groups. Only the â€Å"superior Caucasian race† should fill the schools or job positions. Everyone else is labeled â€Å"not good enough for the position. † The argument against affirmative action is that it is racist and violates all the civil rights laws we fought for. Everyone should have an equal opportunity to fill the position no matter his or her race, gender, ethnicity, etc. In my opinion, I don’t think affirmative action is needed today. I think it is 100% wrong and racist. Why should my race matter if I get the job or get accepted to a college? It shouldn’t matter, especially if I can work or study just as hard as a Caucasian student. We fought to hard for civil rights in order for this to be acceptable. Reverse discrimination is when a minority is the majority. This mainly happens with groups geared towards that minority. That minority would treat other with affirmative action just like they have probably been treated in the past. For example, college that is historically black will probably accept more African American students compared to any other race. Yes, I believe that reverse discrimination still occurs today. Those minority groups want majority groups to feel what they felt and experience affirmative action. With each candidate I considered his or her grade, scores, and extra curricular activities. I considered their GPA and activities over their SAT/ACT scores because I believe that not everyone is a good test taker. I believe that those tests shouldn’t determine whether you get accepted to a college or not. I don’t think that those scores can tell whether a student is going to succeed in college or not. I think that their GPA and high school grades should determine that. I also think that, that test shouldn’t determine anything because it isn’t fair; it is geared toward Caucasian students. I believe that race should not play any role in whether a student gets accepted, denied, or put on the waitlist. Just because I’m African American and the next student is Caucasian doesn’t mean we are different. At the end of the day both students are applying and attending college to get an education and fulfill their goals and ambitions. Admissions officers should consider how unique a student is and how much they genuinely appreciate education. All colleges should interview their possible applicants because anyone can write anything on a piece of paper. The process is probably really difficult because there are a lot of excellent applicants. Race should not be stated when selecting students for college. I believe that will eliminate affirmative action and other issues. For a college to â€Å"set aside† a certain place for minority groups or to give special treatment to certain groups could mean one of two things in my opinion. First it could mean that they are being racist and believe one group is superior over another. It could also mean that the college is trying to make that student comfortable by giving them people they can relate to. Most minority groups flock together anyway. I do believe that it is wrong for those groups to have special treatment over others because we are all equal. I don’t think colleges engage in this activity today, but they probably have in the past. This probably happened in the past when race played a big factor in everyone’s life. I believe that colleges should make each applicant anonymous when applying so that everyone has an equal and fair chance. Admissions officers should only know the students abilities and accomplishments which will admit them to the school or not. I think that it is very unfair how colleges resort to picking students to attend their schools. I wish this process could change for the better in the future. If a student worked hard in high school and has excellent criteria to attend the school, then why should they be denied over someone whose race is more unique? I believe that we are all equal and we should all get the same treatment no matter our race.

Monday, July 22, 2019

The Law and ICT Essay Example for Free

The Law and ICT Essay Introduction: Since the introduction of personal computers in 1980s, the use of computer technology in schools has mirrored that in western society as a whole. In many western schools, the availability of an internet-connected is considered as a right and a prerequisite for learning; many schools have considered or are planning to move to a ratio of one computer for each student. As computer technology has grown ubiquitous in the spheres of business and industry, a cultural expectation has developed that schools should â€Å"train students for the workplaces of the future†. This expectation has led, in turn, to public policy initiatives focused on encouraging adoption of various aspects of technology. Universities began training teachers to use technology in their classrooms, and governments and businesses alike began pouring money into schools. Though initially referred to by the catch-all term â€Å"educational technology†, reflecting the perspective of many in the research community that computers were another in the long line of tools used in service of technology, the rhetoric began to change in the late 1990s. Researchers and policymakers in the United Kingdom, excited about the prospects of computer technology for transforming teaching and learning, began to use the phrase â€Å"Information and Communication Technologies†, or ICT, to refer to the broad uses of computing in schools (Stevenson, n. p., 1997). Today, though there remain pockets where computer technology is less than pervasive in schools, many consider that schools in developed countries have reached a near-universal level of access to computing technology. Statistics bolster this argument: 99% of secondary schools in the US and UK has computers that can access the internet. The average student-to-computer ratio in UK secondary schools in 2004 was 4.9-to-one, while US schools reported an average ratio of 4.8-to-one in 2002. (NCES 2003, DFES 2004) At the same time the computer technology has become ubiquitous in schools, researchers have begun to examine what role computers should play in the educational endeavor. From early technophiles and champions of classroom-based computing came promises of increased learning efficiency and success for all learners (Papert, n. p., 1980), combined with a perhaps unpleasant notion of teachers being relegated to mere coaches for students’ individualized learning (Callister Dune, p 324-326, 1992). Critics, pointing to the amazing ability of the educational establishment to avoid systematic change in the face of even the most impressive of interventions, were skeptical of technology for a number of reasons (Chadwick, p 35-40, 2002). One result of this rivalry (Reynolds, Treharne, Tripp, p 151-167, 2003) was a proliferation of research comparing educational computing to traditional content delivery; collectively, the work found basically no difference in the educational outcomes of the different delivery methods (Salomon, p 71-72, 2002). Other research has provided significantly more valuable data on how computer technology can be used in educational contexts. Specifically, by combining research in the learning sciences with research in educational computing, researchers have been able to point out clear areas where computers can impact learning in highly positive ways (Brown, p 399 413, 1997). There remain questions, however, about computer technology in schools (Cuban, Kirkpatrick, Peck, p 813-834, 2001; Solomon, p 73- 75, 2002). In spite of growing bodies of research pointing to successful ways to integrate computers into learning environments, many problems exist. Teachers are often ill-prepared and fail to integrate ICT successfully even when they have the necessary hardware and software. Technology programs are often introduced into schools with little preparation and support, thus ensuring that only the most highly motivated teachers will take them up. Technology is often used in support of traditional teaching practices, even though it shows the promise of taking teaching and learning to a new, more learner-centered and thus more effective level (Reigeluth Joseph, p 9-13, 2002). ICT in Schools at UK As it is commonly used in UK schools today, ICT may consist of many technology-based tools which are used for teaching and learning in the schools: personal computers used by the teachers, staff, or students; any software that may run on those computers, whether designed or adopted for educational purposes or not; the Internet including various component applications but specifically the Web; static display technologies such as monitors and LCD projectors or interactive ones such as electronic whiteboards; printers and other output devices; video cameras, digital still cameras, audio recorders, digitized music, and other multimedia production equipment that connects to the computers; and other alternative input devices such as scientific measuring equipment. Perhaps because of how broadly effective computer technology has been in the workplace, or because of how it has changed the way many people communicate with friends and family, there seems to be a tacit assumption that technology should improve the experience of teaching and learning in schools (Tyack Cuban, n. p., 1995). The Function Performed by ICT in the System of Education ICT is capable of and definitely performs a number of functions within a school. The key functions that it can play are academic, ethnic, communal, managerial and professional .If ICT is implemented with a vigilant software and is set up logically, it can absolutely influence numerous areas of school life, such as the extent and intensity of the environment of learning, starting as of a strong perplexity of current practices of teaching to a ongoing development in value, in addition to offering a outstanding opening for the progress and improvement of teachers (Pedro et al. p 2, 2004). Function of Academic Implementation One of the important roles of ICT within the circumstances of school is to present a structure so as to encourage an upgrade and revise educational practices of teaching. Although there have been numerous optimistic results accounted for on a minor level, on a replicable and large scale no innovative sort of breakthrough is evident on account of ICT. However, both students and teachers may avail the benefit of an increased number of learning sources such as web pages and software packages. For effective classroom utilization the teachers would require matter and stuff related to the existing curriculum in addition to comprehensible approaches model patterns. If IT is included as a routine classroom practice the teachers will realize a better learning motivation and even an improved regularity and attendance at school. Thus, teachers could productively make use of this affirmative manner to open up novel educational approaches to involve students in learning activities more actively, rather than making them mere inactive knowledge recipients. (Pedro et al. p 3, 2004) Edifying, Communal, and Specialized Functions The edifying, communal and specialized functions of ICT are implemented principally out of a successful exercise of the enormous quantity of sources of knowledge and obtainable assistance at present for the whole community of education that are the parents, administrators, teachers and the students. Besides, at present the latest apparatus for instance the PDAs, Tablet PCs and science devices, and economical moveable keyboards having ability of text-handling, are definitely assisting teachers the world over. An Internet connected school can speed up interaction and exchange of ideas within the educational community not only on local or national extents but on a global level as well. The academic and learning projects which bring together both teachers and pupils from all over the world could intensify the eminence of the spoken distances, and could enlarge learners’ perspectives through permitting them to get acquainted with people of different ethos and may arouse collective performance and communal communication and interface. Such networks serve as an intermediary for teachers to set up smooth associations amid worldwide schools peers. The teachers might have great advantages by discussing their knowledge, troubles and uncertainties with teachers of other countries in the same field. E-learning is also assuming significance at present among the teachers for offering numerous training modules via Internet, consequently making new resources available for proficient advancement no matter what and where is the workplace of the participants. (Pedro et al. p 3-4, 2004) Organizational/managerial Function The functions performed by ICT in the school management are recognized as not much burdensome and can be successfully integrated into the administrative flow of information about pupils, teachers, syllabus and prospectus, financial plans and potential actions due to the learning scheme pipelines of information. ICT also proves to be an effective source of information for the community such as guardians, parents, investigators and politicians, regarding new policies and other educational reports. They also enable teachers to effectively keep their up-to-date records such as students’ marks and other academic or personal records with the latest upgrading. With the help of preformatted documents they can also generate the complete necessary facts and figures for the parents and management. Significantly, in digital format teachers are able to preserve their topic stuff like worksheets and exercises, lectures outlines, lesson plans, assessment papers and evaluations etc., with easier revision and updating, which could also be shared with other teachers. Actually, the multipurpose   apparatus for instance a CPU, a portable key board or a handheld gadget along with a and a network, may assist teachers in carrying out their   organizational responsibilities, is of course a persuasive reason to convince teachers for ICT training (Pedro et al. p 4-5 2004). However, there is also a growing body of research showing that ICT can have a beneficial impact and has significant potential for education. Not surprisingly, many cognitive scientists have rallied around the idea that computers and computer-aided learning environments can definitely have unique benefits for students if they are used in ways that support student learning (Bransford et al., n. p., 1999). Nevertheless, if not appropriately and vigilantly operated the same beneficial aspects of employing the ICT in schools may turn into extremely adverse situations for the administration as a number of hazards are involved in its usage. The research now moves on to study such hazards and the measures to overcome them.    Synopsis: Potential Hazards    A great number of constructive learning and communal advantages are offered by ICT to young groups, however regrettably it involves some hazards also. Young folks and kids are more susceptible to unknown or even known hazards in any walk of life on account of their mental immaturity and may harm themselves. Similarly while using ICT as well, specifically the Internet they are more exposed to the hazards. Moreover a number of immature individuals might involve themselves in some illegal or inappropriate activities. Several problems and threats may be abridged underneath (E-safety Developing whole-school policies to support effective practice, p 4, 2005). Since a number of problems summarized here mainly speak about ICT exercises not inside the school, but predictably numerous activities are instigated outside of course, but are gradually brought inside the school and are required to be handled by the school management. For example, bullying via chat or text messages will impact upon relationships within school; fanatical internet exploit by a student must affect his performance in the school, and his character variations and common comfort possibly will signify his involvement in improper activities. Though the schools are supposed to have suitable technologies to confine such unacceptable right to use, however one can’t deny the fact that students might lead to use a more complicated variety of handheld appliances within school which may provide them discrete right to use inappropriate resources. Therefore the policies of the schools regarding adequate employ, must contemplate about the equipments possessed by the students. Thus, a great responsibility lies with the school management not only to teach the students, but to educate them with acceptable manners and essential judgment ability which could guide them to continue legally and safely while working on internet and using various technologies. The adolescents habitual of too much internet practice, or occupied in threatening and illegal online behaviors, at times take professional assistance and therapy restore stability in their life whether online or offline. In this regard a vital role may also be played by the school for facilitating suitable assist (E-safety Developing whole-school policies to support effective practice, p 4, 2005). ICT and Fanatical internet Use The young people and children are more inclined to be fanatical while using the internet and its associated expertise. There are certain factors which indicate the level of priority achieved by the Internet in the life of an adolescent, as follows: Wasting of precious study time in online activities; Reducing time of sleep; Declining performance in the school; Bad effects on relationships with family members (E-safety Developing whole-school policies to support effective practice, p 5, 2005). Violation of Copyright Law The law of copy right is applicable on the internet also but is neglected at times by a number of adolescents when they either download music files or exchange them, prepare their academic assignments merely by cutting and pasting other writer’s works, or sometimes the complete project is purchased online available at some cheat sites devoid of considering the inferences and results (E-safety Developing whole-school policies to support effective practice, p 5, 2005). Illegitimate or Unsuitable conduct Teenagers are sometimes caught up in unsuitable, disruptive or illicit activities during employing the latest technologies. They can form online factions or gangs, and then behaviors which they initiate only for fun, for example expressing a disparate view for some other associate of the blog, may sometimes bring very undesirable and serious consequences. Another adverse feature for using the new technologies is online bullying which is supposed to offer an unidentified technique to the bullies who can torture their targeted people any time they want. Pleasure achieved by teasing others is a very dangerous psychological tendency and may lead to other criminal activities. Though such bullying doesn’t cause any physical hazard to its victims but definitely causes mental distress and embarrassment or at times fear when they receive any disgusting or threatening e-mail or text message while chat. Thus, their self-respect and psychological security is injured by this undesirable practice. A number of kids and adolescents get occupied in even more crucial behaviors. Some potential threats could be participation in stealing the identity or involvement in websites of detestation or religious groups, or sale or purchase of illicit or stolen commodities online. There is uncomplicated access available for gambling, sites guiding suicide attempts, buying and selling of arms, sites promoting hacking techniques, and offering formulas of preparing explosives or bombs and recipes of making drugs, cannot be ignored. Youths are often caught up in watching, keeping and owning, preparing and sharing offensive or pornographic descriptions or pictures. Such cases of illegal obscene or immoral racialism may be informed at Internet Watch Foundation or the police (IWF) (E-safety Developing whole-school policies to support effective practice, p 4-5, 2005) Contact with unacceptable resources The kids and adolescents can be exposed to unsuitable stuff either text or images, while using the internet, chat or e-mail. Such stuff could be of detestable or aggressive type, pornographic, supports illicit and unsafe action, or may be simply prejudiced and unsuitable for their age. This is undoubtedly an advantage of the web that it is accessible to everybody but regrettably it has adverse implications when people with severe biased, bigot or racially prejudiced outlooks get opportunities to extend their imprecise vision worldwide. The internet definitely serves a multitude for presenting huge quantity authorized and illegitimate stuff as far as pornography is concerned. Inquisitiveness concerning pornography is a usual element of sexual maturity; however adolescents could perhaps be offended with any of such stuff available online. The lasting effects of such revelation may be unexpected (E-safety Developing whole-school policies to support effective practice, p 5, 2005). Sexual Exploitation and Corporal Hazard The danger of corporal hazard is possibly a seriously upsetting and severe threat related to the internet and supplementary expertise. The unlawful groups make utilize the internet and associated assistance for instance the chat opportunities serve as a contact point for young people. The main objective of these groups is to create and promote such associations with adolescents to drag and involve them in unsuitable sexual abuse. Specific persons are usually targeted through pedophiles, showing a friendly dude with identical hobbies and leisure pursuit to initiate the online relation of friendship. Beginning with simple chat such relationship gradually develop into more closer one with cleverly gaining the trust of innocent youths, conceivably develop some other modes of contact just like the text messages being a preface of personal appointment. There is also a danger that when a child or youth provides personal facts online which may recognize them, and try to meet their online friends thus imposing a threat not only to their own security to their other relations also (E-safety Developing whole-school policies to support effective practice, p 5-6, 2005). School staff’s Illicit or Improper activities It is a regrettable fact that some of the schools staffs have also been found in some unsuitable and unlawful activities while using ICT. Such activities could be watching, sharing and circulating child pornographic or other impermissible stuff through e-mail. Therefore, the responsibility lies with the school management for educating and guiding their staffs to adopt decent online conducts, and vigilantly watching the networks system of the school for confirmation of any unsuitable pursuit. In an evident case of unacceptable pursuit by a staff member must get a penalizing rejoinder from school administration, for example police consultation etc (E-safety Developing whole-school policies to support effective practice, p 6, 2005) The Significance of Guaranteeing a Secured ICT Educational Atmosphere The creation of safe ICT educational atmosphere is the duty of all schools; however most of them are not aware of about how to start it. The schools are showered from different organizations’ ads assuring about their novel technical goods as a solution of all internet security issues encountered by the school. There is no doubt that these products are useful to an extent but can not be employed separately. Such technological sorts of instruments are successful when employed as a part of the framework of a wide-ranging program made for internet security, being summarized as under: Producing a protected ICT education atmosphere requires to comprise: Introduction of a wide-ranging education program for the entire school community ensuring internet security; There should be comprehensive infrastructure with selected duties, measures, strategies and guidelines well understood by the whole school; A useful variety of technological instruments should be made available; The composition of above mentioned constituents may differ from school to school. Apparently, the requirements for a small school with a few computers must be different than those having multifaceted set of connections, for thousands of students. But still, the requirement for above mentioned essential constituents will of course be the consistent (E-safety Developing whole-school policies to support effective practice, p 8, 2005) The Implication of Law: The Governmental Perspective against ICT Misuses With the above discussion it is quite clear now that significance of using ICT in the schools can not be denied on account of its various undeniable benefits, however, looking at the darker side of the picture we have also realized that there is an intense need to overcome the misuse of ICT to save our young generation from its potential hazards, either physical or psychological. Thus, like all developed nations of the world the Government of UK has also made numerous efforts to govern such abuses by imposing several criminal or civil laws. A few of such specifications are recapitulated as under: Protection of Children Act 1978, amended in 1994 by section 84 of the Criminal Justice and Public Order Act; The Telecommunications Act 1984; Malicious communication Act 1988 Copyright, designs and Patents Act 1988; Computer Misuse Act 1990; Protection from Harassment Act 1997; Crime and Disorder Act 1998; Data Protection Act 1998; Freedom of Information Act 2000; Sexual Offences Act 2003; Privacy and Electric Communications regulations 2003; Byron Review Computer Misuse Act 1990 This is the only act imposed only to handle computer related crimes and is effective in determining an incident and is value summarizing in some ensuing corporation records. In a school situation when a misuse incident is evident a reaction strategy is formed and permitted by main judgment officials chosen from within the school, contemplation must be paid to: In case of misuse discovery who will be informed first? Who is going to head the response plan and inspection panel? If there is need of some extent of police involvement or the services of any exterior professional inspection expertise? The concluding and decisive action in executing a successful event reaction strategy is conveying the pertinent strategy and measures all over the school. Training distinctive faculties and picking in-house advocate who may guarantee the carrying out of the policy, and make sure that each one comprehends their responsibilities and necessities for any contingency. As a minimum requirement it is sensible to inform the main faculties and engage them in the initial stage of a case. In this way the commitment to process is ensured. Because of that assurance, the subsequent inspection may attain a buy-in as of everybody concerned and effect in a organized case response (Janes, p 1, 2006). Discovering a Misuse Case After determining the prospective case, the nature of misuse case must be discovered. The police participation is not advisable in any or all cases unless some particular type of crime is involved. The cases of pedophilic nature or which are alleged as planned offenses are needed to be reported. Such categorization of cases may assist in deciding the intensity of reaction and ensuing allotment of suitable means. Isolate the crime setting In the academic world the prime enticement on the discovery of a misuse case is for a speedy glance and the same is definitely the most terrible fault which may endanger some inspection. Fragility of an electronic proof is confirmed, which may easily be amended, smashed or damaged by unsafe treatment or assessment. Hence, particular preventative measures must be adopted in recording, gathering, conserving and investigating such proofs. Unsafe use of such   forensically reliable methods could result in unfeasible verification or an imprecise inference. Therefore, the precise method must be used to protect the reliability of electronic proof. While a computer-based offense is consigned, the computer is well thought-out as an offense outlook similar to any concealed proof and is not interfered with. In the initial stage no change should be made in the state of electronic appliances and their atmosphere. Any interaction might change the content and the evidence might be corrupted (Janes, p 1, 2006). Beginning interviews Each and every probable witness present at the location must be noted preferably by recording the particulars of site, time of access and link with probable conjectures. Collect all helpful information for the purpose of investigation for instance e-mail, set-up and safety of passwords, identity of user and the suppliers of internet service. The notes must be completed with details of all supplementary school belongings which are found with a conjecture, for instance PDAs, cell and mobile phones or laptops. Assembling Verifications Subsequently a specialized computer forensic inspection panel is called upon, whether internal or exterior experts, in order to recognize and protect the probable verification means. Just about positively, inside the academic surroundings the most reliable verification means is suspect’s regularly used computer. If the suspects used computer and the victim’s used computer are accessible must be protected. In case of no such access attention must be paid to the backing tapes and the host computer that is the server by means of which the information might surpassed.   The accurate particulars about computers are required to be recorded such as model and type, serial number and make etc. For an on computer, details about screen should be recorded or photographed. For an off computer other facts are to be recorded. In case of the presence of other drives, a note should be made for this along with the particulars of their media. As soon as electricity is detached the computer must be preserved in a carton and be shifted to a safer place for further inspection (Janes, p 1, 2006). Representing a Conclusion By taking into account each and every proof at hand, the ultimate phase of inquiry reaches that is to extract a wrapping up. The ending have to be impartial, balanced and established on unquestionable truth. On this concluding phase it is advisable to take expert or legitimate advice to move on in right direction (Janes, p 1, 2006). Data Protection Act 1998 Significant Features to be Considered  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Individual facts have to be acquired impartially and legally. The focus of data ought to be informed the data organizer or concerned establishment; the person representing   the data organizer; the objectives data are intended to be processed for; plus on whom the facts could be revealed. Educational institutions do this for students at the time of registration. Private dispensation of data can be completed only if some particular provisions are fulfilled comprising the subject consent or the legal requirements data organizer. Supplementary provisions have to be fulfilled for dispensing the vulnerable individual data, related with customs, political judgment, and belief, relationship with trade union, physical condition, sexuality or illicit history of the subject.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The personal data is covered by this new Act in either of the forms, manual or electronic such as card indices or paper files, apprehended by a prearranged and pertinent arrangement of filing.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The reasons reported by the educational institution to the commissioner of data protection must be considered while individual data processing. The data Protection Representative must be discussed with while any new dispensation of data.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Keeping the individual data up to date and precise is very essential and must not be maintained and kept longer than the required period.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Suitable safety procedures are to be followed against illegitimate or unlawful dispensation of individual data and in contradiction of unintentional damage, or loss of individual data. This comprises training of staff for data security as an organizational gauge and recurring endorsement of data files in addition to data encryption as technical methods.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The individual data is not allowed to be shifted exterior of the boundaries of the European Economic Area except exclusive releases is employed with the consent of data subject. It may comprise printing of individual data through internet (Mukerji, p1, 2001). Privileges of Data Subject This Act offers noteworthy privileges to persons regarding individual data apprehended in relation to them by data regulators. Such privileges are as follows: A person is allowed to have a copy of his individual data in order to make a subject access request; The data regulator is required assure that they won’t be affected by any specific resolutions as such decisions are established only by an mechanized decision-making course of action; To make sure that no loss or damage is caused to the data while processing; The data processing must be prevented keeping in view the direct marketing as the primary objective; Necessary steps to be taken in case of any damage suffered by the data regulator for an infringement of the Act; Necessary action to be taken for erasing, blocking, rectifying, or destroying any erroneous data; If there is a doubt regarding contravention of a provision of the Act, a request can be made to the Data Protection Commissioner for an inquiry of such matter (Mukerji, p1, 2001).       Freedom of Information Act 2000 Nature of the Act In 2000, the government of UK approved the Freedom of Information Act. In speculation this permits individuals or associations to request information from the state which, unless it falls within one of the exemptions officials must hand over inside 20 days or longer if they require some period to choose whether it should be released. Whitehall gave itself four years to arrange for this significant enlightening modification in UK, open government has frequently been seen as a disagreement in terms, but on January 1, the waiting was over. Consequently, civil servants were active destroying documents and removing emails in an attempt to make sure that they wont be required to discharge them now the Act is applicable. A number of Departments have twice the number of documents shattered yearly (Amory, p 1, 2005). The Types Organizations Under the Act Approximately 100,000 public organizations are distressed. That means the main government ministries, but also every NHS Trust, the Post Office, the police and, more incomprehensibly, the Sea Fish Authority, the Treasury Valuation Committee, the Wine Standards Board, the Covent Garden Market Authority and the British Potato Council. Some public establishments, though, are exempted counting MI5 and MI6, the courts, the National Criminal Intelligence Service and the SAS. (Amory, p 1, 2005). Provisions of the Act All evidenced information such as written accounts, tapes, emails, diaries, letters, and contracts. Merely concerning anything, actually, so long as it doesnt fall within one of the 27 exemptions. Though, these are so extensively outlined that a smart civil servant could put just about any document into as a minimum one grouping. Anything that is commercially private associates to national safety, involves worldwide relations, is individual information about a person, might destabilize the requirement for openness in the formulation of government strategy, might bias the economic welfare of the UK, and is connected to an official analysis and so on. Ultimately, they dont have to offer any matter that would, in the case of central government, cost more than 600 pounds to collect, nor in the case of other guanos, more than 450 pounds .There is no time boundary on the material applied for information (Amory, p 1, 2005). Gathering Information Requests can be submitted to the organizations apprehensive in writing, by email or by fax, relating the information required. There is no need to give a reason for the request. It is also useful to mention if want the material photocopied or the replies sent by post or email. There is no charge for such a autonomy-of-information request and the power must respond inside 20 working days   (Amory, p 1, 2005). Appeal against Refusal An appeal against a refusal can be made to discharge information to a self-reliant arbitrator, the Information Commissioner, who will request for a public interest test. In other words, even if the required material falls within one of the exemptions, he can order it revealed if its publication would be in the public interest. It remains to be seen whether he has the decision to make such an method work in practice, but even if he does; the Prime Minister or any other Cabinet Minister can refuse his pronouncement and hold back publication of the information at any time. This catchall clause, which will apparently be used to avoid any politically susceptible information seeing the light of day, was contentious when added to the Act (Amory, p 1, 2005).    Potential Outcomes Much depends on the information commissioner, Richard Thomas. If he applies the public interest test robustly, some interesting information could find its way into the public domain. For instance, private sector firms involved in Private Finance Initiative contracts are already panicking that there will be requests to see the details of their deals, revealing the enormous and unjustified profits theyve made. The number of ministerial refusals will also be significant, as will the attitude of the courts, which will be able to judicially review such vetoes and could overturn them. The most likely outcome is a brief flurry of revelations, followed by a new culture in Whitehall that avoids committing any sensitive information to paper whenever possible. One other issue is the extent to which the Act will apply to EU documents, as it could allow us to penetrate the obsessive secrecy that surrounds decision-making in Brussels. Sexual Offences Act 2003 The Sexual Offences Act 2003, which received Royal Assent on 20th November 2003, brings wide-reaching changes to current legislation on sexual offences. There are a number of specific sexual offences against children which feature within Part I of the Act. These relate to the rape or sexual assault of a child, sexual activity with a child, and the abuse of a position of trust which leads to a sexual offence against a child, meeting a child following sexual grooming and sexual activity with a child family member. Other offences relate to encouraging, arranging or causing the involvement of a child in prostitution or pornography. Some of these offences are new, while others are set to replace existing offences under, for example, the Indecency With Children Act 1960 (See Schedule 7 of the Act). This article focuses upon a specific area of the Act in order to evaluate whether the Act (hereafter the SOA) is likely to achieve one of the Government’s main aims, of giving children ‘the greatest possible protection under the law from sexual abuse’ (Burney, p 28-36, 2003). The focus of analysis is the creation of a new offence relating to sexual grooming under s.15. This is a significant development, given that research has shown that an opportunity to sexually abuse a child is more likely to emerge following an act of sexual grooming; during which, the individual may convince the child that what he or she is suggesting the child do is both natural and commonplace (Lanning, p 267, 1984). The introduction of this offence also follows calls for such legal reform by both the Internet Taskforce on Child Protection and child protection groups and demonstrates the increased societal awareness of the way in which such grooming can occur via internet chartrooms. Moreover, the dangers of sexual grooming have been recently recognized by the judiciary. In the case of Re Attorney General’s Reference (No.41 of 2000) [2001] 1 Cr App R (S) 372, one of the reasons why the Court of Appeal increased the defendant’s original sentence for indecent assault and making indecent photographs of a child was because he had sexually groomed a vulnerable child with special needs. Increasing the higher sentence, Rose LJ stated that ‘The gravity [of the offence] lay . . . in the grooming of this vulnerable and handicapped boy, over a period of time and the giving of money and other gifts’ (at 375). The first section of this article outlines the new offence of meeting a child following sexual grooming. Section two then provides an analysis of the offence and identifies the reasons why it is a necessary addition to the existing law. A critical analysis of the requirement of proving a harmful ulterior intent in order for the new offence to be made out follows in section three. Finally, section four examines the other new offences under the Sexual Offences Act that could relate to acts of sexual grooming, in order to place the s.15 offence in the context of the wider protection from sexual abuse that the Act seeks to offer children. The issues that this article examines should also be of wider intrinsic academic interest. For example, the analysis of the offence relating to sexual grooming raises the broader issue of the legal identification and demonstration of a harmful intent in a so-called ‘thought’ crime. Moreover, the overriding aim of the article is to address the increasingly pertinent question of how the existing law could be effectively developed in order to offer greater protection to children prior to the actual occurrence of sexual abuse Byron Review A good deal expected Byron Review was made available on 27th March 2008. This review is actually a wide-ranging account that glances at the threats to kids from being bare to possibly injurious or unsuitable matter available to them in video games and on internet. This report signifies the requirements of kids and adolescents and guides about protecting them from adversities while using video games and internet and provides them a protected environment where they are able to enjoy their favorite games and net-surfing (Leading Article, p 1, 2008). The author of this review is Dr. Tanya Byron who is a famous psychologist for children. She has planned a nationwide approach regarding internet security. Dr Byrons main concern is impractical relations threats deforming her insight regarding the issue she is dealing with. The kids and even adolescents are groomed by the pedophiles by means of the chat-rooms, but it doesn’t seem possible. A number of video games involve excessive viciousness and bloodshed which definitely seem to have negative effects upon a child’s psychology. Dr, Byron has been renowned for her constructive strategies presented in a TV serial â€Å"Toddler-taming†, is not in favor of presenting a persuasive argument complete panoply of controls. She suggests that parental groups, nationwide plan, and governmental authorities as a balanced reaction to an issue which is definitely concerns the entire family and not merely the internet. She tries to explain that access to all available information is not the real concern but it is the mental maturity level of the individual accessing and perceiving it. There is a constant shower of suggestions and threats over parents and the title performance of this exceptional disaster in case of any offense. The implicit but recurring inference that parents are required to assume their responsibility to save the life of their children by securing them from any abuse. She believes that now we are on a stage where some rebalancing is required that is to recognize effective parenting doesn’t only mean to provide protection but is also meant to offer some extent of freedom also. (Leading Article, p 1, 2008). The freedom of using internet and surfing online is available to almost all children. Numerous of them utilize it for completing their challenging assignments and there are some others who find it an essential means of knowledge on specific topics and issues. Thus, for a great majority it serves a significant learning aid and a source for exploring the world around. Its equal availability to everyone is also a plus point. It is an unrestricted; un arbitrated liberty, saturated with unpredicted knowledge, smuggled information, tiresome chat, crazy plotting speculations and the uncultivated envisages of minute groups of people for their underground concerns. There is fewer indications, effortless reach plus perhaps hazardously unidentified. Sporadically indecent and unappreciated facts and descriptions are conveyed to individuals. Thus like all scientific discoveries the internet also has both pros and cons (Leading Article, p 1, 2008). This also a segment of life which is handled by the parents very cautiously. The kids have embedded it in life and parents appreciate them to use it for exchange of ideas, searching and investigation. The problem actually lies with the parents who seem to be perplexed with parental controls sort of proposals and are doubtful regarding computer games and their respective ratings. The parents are usually scared for their children using the chat-rooms and assume it as place of trouble, while a majority of children is quite aware about the safety rules. Thus Dr. Byron suggests for training parents in dealing with such problems as she believes that parenting means guiding kids to handle challenging situations and probably risky matters in a secured way. If parents positively understand the situation they can convince the kids in a friendly manner to limit the surfing time and to adopt an inflexible system for video games ratings (Leading Article, p 1, 2008). Conclusion After a thorough research we have realized the negative aspects and all potential adversities while using ICT at schools. We have also studied the measures adopted by the government and the legal support provided to cyber victims in the form of various Acts being imposed from time to time. However, under these Acts an uncountable number of such online culprits are being caught and executed everyday, but with the passage of time and with the development ever increasing technology new devices and techniques are coming in every other day which are being used by evil-minded people for fulfilling their negative desires. Besides all the legitimate support provided by the government it is essential to develop awareness about self security, specifically the children and youths who are generally victimized in such offenses. Recommendations A great responsibility lies on the shoulders of schools as they have the targeted age group. Schools need to formulate comprehensive and secured ICT policies for safer employment. ICT facility offered to the teachers, students, staff and other community members must be completely owned and monitored by the administration. Appropriate guidelines must be provided to all users clearly notifying the extents and limits. It should be generally restricted to activities in relevance with school. There should be vivid information about:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Freedoms  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Privacy  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Suitable use of resources  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Authorization of access  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Unauthorized uses Moreover, an appropriate organizational structure is required to be created in the school management as follows: 1.  Ã‚  Ã‚  Ã‚  Ã‚   The Governing Body: assumes the constitutional duties regarding children safety and decent internet usage. Some of such duties could be:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To develop a consciousness among student about both threats and benefits of ICT usage;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To crate a clear understanding of current school policy regarding ICT usage;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To support the head of the school in handling the media for in case of any offense;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To arrange enough resources for implementing internet security solutions;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To promote internet safety awareness among parents also. 2.  Ã‚  Ã‚  Ã‚  Ã‚   The Head of the School: definitely needs to take keen interest towards the creation of a protected ICT associated learning atmosphere. He/ she may:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Keep the final authority and responsibility of overall ICT security while assigning routine works to the ICT coordinator;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Assure that ICT coordinator is provided with essential resources, time, control and cooperation in performing his duties;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Guide the ICT coordinator to create a culture in the school regarding the internet security in the school  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Inform the governing body about all concerned strategies and issues.    3.  Ã‚  Ã‚  Ã‚  Ã‚   The ICT Coordinator: Any senior teacher with prompt ICT skills may be promoted to this post or a new member be hired to fulfill the responsibility of ICT security supervision. He may:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Plan ICT security guidance programs for students keeping in view the school activities and available resources and support;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Maintain an incident-log regarding ICT security;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Prepare a workshop for parents in conference with other teachers;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Propose for the appraisal of current policy in the light of rising tendencies after examining the log. These are only a few general suggestion, however, every school has its own culture and its management can better decide the measures to adopted in the direction of crating a safe ICT learning environment, the primary concern is to realize its importance in the sequence of priorities. References Amory, Heathcoat. Edward. (2005). How the Information Act Works; Q A. Available at http://www.questia.com/read/5008215484   Bransford, J., Brown, A. L. Cocking, R. R. (Eds.) (1999). How People Learn: Brain, Mind, Experience, and School. Washington, D. C.: National Academy Press. Brown. A. L. (1997). Transforming Schools into Communities of Thinking and Learning about Serious Matters. American Psychologist, 52(4). Burney, E. (2003) ‘Using the Law on Racially Aggravated Offences’, Criminal Law Review, January. Callister, T. A. J., Dune, F. (1992). The Computer as Doorstop: Technology as Disempowerment. Phi Delta Kappan. Chadwick, C. (2002). Why Computers are Failing in the Education of our Children. Educational Technology, 42(5). Cuban, L., Kirkpatrick, H., Peck, C. (2001). High Access and Low Use of Technologies In High School Classrooms: Explaining an Apparent Paradox. American Educational Research Journal, 38(4). E-safety Developing whole-school policies to support effective practice. (2005) Available at: publications.becta.org.uk/download.cfm?resID=25934 Janes, Simon. The effective response to computer crime. Computer Weekly. Available at: eLibrary. Proquest CSA. ROBINSON SECONDARY SCH. 09 Jun 2008. http://elibrary.bigchalk.com Lanning, K. (1984) ‘Collectors’, in A. Burgess (ed), Child Pornography and Sex Rings. Lexington, Mass: Lexington Books. Leading article: The Byron review: Internet angst. Guardian, The. 28 Mar 2008. 36. eLibrary. Proquest CSA. ROBINSON SECONDARY SCH. 10 Jun 2008. http://elibrary.bigchalk.com Mukerji, M. (2001). The Data Protection Act 1998 – A Summary. Available at: http://www.dpa.lancs.ac.uk/summary.htm Papert, S. (1980). Mindstorms: Children, Computers, and Powerful Ideas. New York: Basic Books. Pedro Hepp K. Enrique Hinostroza S. Ernesto Laval M. Lucio Rehbein F. (2004). Technology in Schools: Education, ICT and the Knowledge Society. Available at: www1.worldbank.org/education/pdf/ICT_report_oct04a.pdf Reigeluth, C. M., Joseph R. (2002). Beyond Technology Integration: The Case for Technology Transformation. Educational Technology, 42(4). Reynolds, D., Treharne, D., Tripp, H. (2003). ICT- The Hopes and the Reality. British Journal of Educational Technology, 34(2).    Salomon, G. (2002). Technology and Pedagogy: Why Don’t We See the Promised Revolution? Educational Technology, 42(2). Stevenson, D. (1997). Information and Communications Technology in UK Schools:  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   An Independent Inquiry. London, UK: Independent ICT in Schools Commission