Model Individual Winning Business Proposal for the Homeland Plastics Case

Model Individual Winning Business Proposal for the Homeland Plastics Case

Author’s Name

Institutional Affiliation

Model Individual Winning Business Proposal for the Homeland Plastics Case

To: Project Manager Date: April 27, 2012

From: [Student Name],

Re: Proposal; Homeland Plastics should suspend its operations in Ramina

Background. As a result of the concerns raised in regard to environmental issues relating to Homeland Plastics, it is essential to appreciate that it is a universally accepted foundational concept of business that the primary principle of Homeland Plastics is to maximize profits. Although, there is nothing erroneous with profits maximization, the unceasing pressure for maximum profits may create several ethical problems for Homeland Plastics’ operations in Ramina.

Proposal. Taking into consideration the ethical issues, I suggest that Homeland Plastics suspend operations until it complies with the water emissions guidelines established by Finland’s Ministry of the Environment (MEF). On the other hand, the alternative would be to relocate to Vyborg, where the established water emissions guidelines are less stringent. However, taking into consideration the cost of doing business between the two locations, I hereby propose that Homeland Plastics relocates to Vyborg.

Reasoning. I hereby suggest that, in the best interest of Homeland Plastics, it would be more appropriate to comply with water emissions guidelines established in Ramina. This would however, bring about the issue of business ethics. Business ethics may be largely extraneous for the majority of managers, since it fails to offer any convenient advice. On the other hand, as a chemical engineer, I am of the opinion that moral philosophy, has a propensity to value altruism, the concept that an individual ought to do good, since it is appropriate, or will be of advantage to others, but not since the individual will profit from it. Homeland Plastics is duty bound to protect the environment it operates in, but on the contrary, business ethics may conflict with profit maximization. From a business ethics perspective, externalities permit companies such as Homeland Plastics to contaminate environmental habitat or result in human heath concerns. It ought to be comprehensible that if an externality causes harm to the environment or harms a person, then that externality is an obvious infringement of ethics. However, a number of senior managers in Homeland Plastics may not appreciate the ethical repercussions of the externalities and ecological damage. While all stakeholders in this issue realize Homeland Plastics is rather of a black box in this proposal, the consequence is still an awkward blurring of the confines between the profit maximization, and the quest of self-interest. For instance, the confines between altruism and self-interest, interests and ethics, economic realities and ethical demands, financial and moral costs, and ethical imperatives and profit motives are not readily distinct at Homeland Plastic’s case.

On the other hand, Homeland Plastics’ senior management is bound by fiduciary responsibility.  Fiduciary responsibility in this regard applies to the responsibilities of Homeland Plastics corporate directors to implement the best interests of the company. If the directors of Homeland Plastics construe this mandate narrowly, then there would be a short-range focus on profits that would ultimately harm both the business and society. The unevenness arises from the reality that profit maximization is obliquely justified. It is constructive to note that this predicament is one that business ethics would share with legal principles.

The best next steps: It is essential to note that, the concern with competitive markets that Homeland Plastics engages in, and the market-clearing prices, is not merely an abstract, philosophical hypothesis concerning what may justify the drive for profit-maximization. The whole legal structure of Homeland Plastics, in conjunction with the pertinent regulatory environment, should be organized in a way that would promote competition, as well as the exact category of competition that is liable to produce market-clearing prices.

Men happier than Women in Work-Life balance

(Name)

(Instructors’ name)

(Course)

(Date)

Men happier than Women in Work-Life balance

This article examines one of the most controversial topics regarding employee productivity in the replace. As researchers would argue, a number of factors ranging from motivation to gender affect productivity in the workplace. More specifically, the article draws attention to how an employee’s gender may affect productivity in the workplace. As the article explains, men are more likely to maintain a proper work-life balance than their female counterparts. A survey carried out by the Captivate Network on more than 670 employees illustrated that whereas men are 25% happier at their respective workplaces, women are 75% more happy when in their homes. This, in turn, implies that women are happier when away from their jobs as compared to their male counterparts. A closer examination of the issue reveals that, because women are happier at home, the likelihood of productivity being affected by their personal lives is very high. This further illustrates the inability of some employees to balance their personal and professional lives.

In relation to human resources, this article reflects one of the most imperative human resource practices regarding the provision of a work-life balance for their employees. Human resource personnel need to provide their employees with the opportunity to balance their personal lives and their works, without straining these employees. The effects of having a poor work-life balance is serious especially for women and human resource professionals need to design programs that will allow the provision of these. Employees who lack the necessary balance in their private and professional lives are affected both psychologically and physically. This will in turn affect their productivity in the workplace, as it reduces an employee’s concentration to his or her duties in the workplace. Human Resource professionals are, therefore, urged to develop an organization culture and environment that supports work-life balance for employees. This can be attained through the provision of a number of benefits for the employees, which are solely aimed at promoting a good work-life balance.

This article is relevant for HR professionals because it draws on a topic that demands a considerable amount of input from the human resource department in any organization. This is because it is the human resource department that is charged with the duty of ensuring that the output of each employee in the workplace, regardless of gender, is at its maximum. It also assists in creating awareness in human resource professionals on the different employee demands based on gender. By recognizing these differences, HR professionals can create programs that promote work-life balance, so that a particular gender of employees do not feel that their duties and responsibilities in the workplace strain their personal lives. Sequentially, HR personnel, together with the other managers in the organization need to develop policies regarding the maintenance of a proper work-life balance for employees. This should, however, be done in a way that considers both genders, without having an inclination towards one particular gender of their employees. After all, the human resource department is also charged with the responsibility of promoting workplace equality and fairness. Some of the ways in which HR professionals can guarantee a work-life balance for their employees include creating weekly schedules, taking breaks during the day, proper time management, as well as, taking vacations.

Link:

http://www.hrreporter.com/articleview?articleid=11155&headline=men-happier-than-women-with-work-life-balance-survey

Midterm Paper on Flame

Midterm Paper on Flame

Author’s Name

Institutional Affiliation

Midterm Paper on Flame

Abstract

This midterm paper focuses on addressing Flame as the selected significant cybersecurity event that has happened in the last 10 years. Flame was malicious software used for hacking classified information that occurred in 2012, causing substantial damage to intelligence in the Middle East. This paper examines the causes of Flame as an advanced cybersecurity incident, along with related threats. Furthermore, it delves into the vulnerabilities exploited by perpetrators, besides offering an account of its outcomes. The paper also considers changes to cybersecurity policy because of this malware attack.

Overview of the Cybersecurity Event

In 2012, hackers purportedly working with the United States National Security Agency partnering with the Israeli government developed and disseminated a nation-state-sponsored malicious hacker software called Flame, Skywiper, or Flamer(Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). This modular computer malware was advanced spyware intended to conduct cyber-espionage in Middle Eastern nations. The primary target was Iran as the attackers were interested in the intelligence surrounding the country’s nuclear program (Nakashima, Miller, & Tate, 2012). Eisenstadt (2016) and Knapp and Langill (2014) affirm that the motive was espionage by stating that while Flame was possibly a more sophisticated derivative of Stuxnet (a 2010 malicious computer worm intended for sabotaging and destroying computer systems), its intention was cyber-espionage and network reconnaissance.

Flame was discovered by security researchers from Kaspersky’s Lab, National Computer Emergency Response Team of Iranian MAHER Center, and Cryptography and System Security Lab at Budapest University of Technology and Economics (Gostev, 2012; Hoffman, 2012; MAHER Center, 2012). All these researchers agree that Flame was the most advanced, complex, and sophisticated malware strain ever developed. Flame targeted computers that were running on Windows OS, whereby it infected specific computers in homes, universities, and government institutions and agencies mainly Middle Eastern countries (Holt, Bossler, & Seigfried-Spellar, 2017). This spyware worked as a cyber-espionage tool that granted backdoor access to files in any system connected to these computers, which enabled the remote recording of network traffic, video conversations, and audio files, data theft, and capturing of keystrokes (Gostev, 2012; Zetter, 2012). Skywiper’s complexity and utility also allowed it to activate Bluetooth functions of infected computers to allow the logging of data from nearby Bluetooth-enabled mobile devices. Also, this malware could easily be rubbed from the infected systems when it became public to eliminate evidence of any infections (Holt, Bossler, & Seigfried-Spellar, 2017).

Causes of the Cybersecurity Event

Flame was not caused by an accidental result but rather by two specific causes: the failure to maintain adequate controls and an active cyber-attack.

Inadequate Security Controls

The Middle Eastern counties whose computer systems were targeted and infected failed to implement and maintain sufficient, state-of-the-art controls on their systems. Experts from Kaspersky Lab, who discovered Flame, established capability and technical gaps between the U.S. arsenal and the tools utilized by other nation-state groups (Cimpanu, 2019). These gaps are an indication that the controls deployed by the Middle Eastern nations for detecting potential cyber-attacks and cyber threats were inadequate. Also, Knapp and Langill (2014) acknowledge that Skywiper/Flame had remained active for years before being discovered. During this time, it was being used in mining sensitive data and returning such data to contemporary and sophisticated command-and-control (C2) infrastructure with 80 domain names. Also, it utilized servers that shifted between multiple locations in Germany, Hong Kong, Latvia, Malaysia, Poland, Switzerland, the U.K., and Turkey (Knapp & Langill, 2014).

Before its discovery, Skywiper existed in multiple modules that include Flame, Gadget, Frog, Munch, Suicide, Telemetry and Gator, Weasel and Jimmy, and Viper. As Knapp and Langill (2015) suggest, each of these modules had its capabilities that remained undetected until 2012, when the Skywiper module was discovered. For instance, Flame could handle routine AutoRun infections. Gadget updated automatically, allowing malware to evolve and accept novel payloads and modules. Frog exploited payloads for password theft, Munch exploited payloads able to capture network traffic, and Viper exploited payloads capable of capturing screenshots. Suicide possessed self-determination capabilities, Telemetry and Gator handled command-and-control routines, and Weasel and Jimmy dealt with file and disk parsing (Knapp & Langill, 2014; Knapp & Langill, 2015; Rubenstein, 2014). While Skywiper combined all these capabilities to execute espionage, these security controls and systems of Middle Eastern countries never detected any of them. This provides evidence that the inadequacy of cybersecurity controls of these countries was one principal cause of Flame.

An Active Cyber-Attack

The second major cause of Flame was an active spyware attack by hackers allegedly working collaboratively with the United States and Israeli governments (Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). The active attack was aimed at conducting cyber-espionage, mine data, and gather or steal intelligence about the Iranian nuclear program (Nakashima, Miller, & Tate, 2012). So, Flame was a malicious program planted in target machines to perform cyber-reconnaissance, siphon system information, hijack administrative accounts, grant high-level privileges to the hackers, and physically attack the target systems (Gostev, 2012; Zetter, 2012). So, besides espionage and network reconnaissance intents, physical attacks on targeted systems was also a motive behind this malware. The fact that Flame was a dynamic, smart, and sophisticated attack toolkit development by governments (Bahtiyar, 2016) means that its other cause was an active attack by governments against other governments. Flame’s modular and dynamic nature means that it can evolve into weaponized malware for use in executing more aggressive future cyber-attacks, hence necessitating advanced defense mechanisms for cyber-space protection (Bahtiyar, 2016; Knapp & Langill, 2015).

The Associated Threats

Flame related to three major threats. The first was a national security threat. The NSA and Israeli governments collaborated in using Flame to conduct cyber-espionage against Iran and other Middle Eastern countries, collect intelligence about Iranian nuclear efforts, and organize a cyber-sabotage campaign against the nuclear program (Nakashima, Miller, & Tate, 2012). This potentially raised national security concerns as the targeted nations could act in retaliation against the cyber-espionage. Cyber-reconnaissance tends to trigger national security threats, especially when sensationalized by the media (Rubenstein, 2014).

The second was the cyber warfare threat. Cyber-espionage conducted using Flame stimulated enmity between the involved parties, which could culminate in cyber warfare intents in the long run. Also, Bahtiyar (2016) and Knapp and Langill (2015) submit that the modular nature of Flame means that it can advance into weaponized malware that can be used in contemporary cyber warfare. For these reasons, politicians have been directing public policy towards combating cyber-espionage to inhibit the perceived cyber-war threat that remains high following the Flame-based attack (Rubenstein, 2014).

The last threat is that of unwanted cyber-surveillance. Flame’s architecture allowed it to be wiped from the infected systems, hence eliminating proof of any infections (Holt, Bossler, & Seigfried-Spellar, 2017). What this means is that the malware could be used to perform unwarranted cyber-surveillance without anyone noticing. This threat can become rampant in the future if such malware versions are deployed in spying stealthily on actors involved in classified government, military, and intelligence developments in different countries, which also has the potential of exacerbating the cyber warfare threat.

The Vulnerabilities Exploited

The hackers using Flame to conducted cyber-espionage exploited four vulnerabilities. The first includes the technical vulnerability of targeted systems that were because of inadequate security controls. Also, technical vulnerabilities emanated from the fact that the computer technology of targeted countries depended largely on foreign-made hardware and software, which made it virtually defenseless, hence exposing it to extreme vulnerabilities (Loiko, 2012). The second involved cryptography vulnerabilities where Flame used zero-day exploits of Windows operating system similar to those exploited by Stuxnet (Bahtiyar, 2016; Goyal et al., 2012; Knapp & Langill, 2014). This allowed Flame architects to exploit weaknesses in terminal server products of Microsoft and inadequate key-management decisions by the firm’s engineers to generate cryptographic seals that falsely certified Flame as a Microsoft product (Fillinger, 2013; Goodin, 2012). Thirdly, Flame exploited AutoRun vulnerabilities similar to Stuxnet to infect the USB sticks of targeted machines. Finally, it exploited print spooler vulnerability similar to Stuxnet, which allowed it to spread to computers rapidly on local networks (Zetter, 2012).

The Outcomes of the Cybersecurity Event

The principal impact of Flame was that it led to the loss of intelligence and highly classified information that was stolen remotely from Iran and other Middle Eastern countries. Another impact was that its discovery exposed governments’ engagements in sponsoring the development of sophisticated malware that can target industries such as the energy industry. The last impact was that Flame sensitized software architects and engineers from companies such as Microsoft to adopt more proactive design security measures to ensure the security of their update and certificate generation mechanisms (Goodin, 2012).

Changes to Cybersecurity Policy Due to the Event

After the Flame attack, no significant changes have been made in cybersecurity management and policy. The only change is the shift in cybersecurity policy on cyber warfare and cyber-espionage. Specifically, Flame sensitized and awakened cybersecurity policymakers to refocus their attention on combating cyber-espionage to curb cyber-warfare emergence (Rubenstein, 2014). Being wary that Flame and similar malware and spyware can be weaponized, these policymakers are pushing for policies that limit domestic and overseas cyber-espionage activities. Policy experts in intelligence in some countries are also considering outsourcing intelligence services to streamline their cybersecurity management functions.

Conclusion

Following the Flame occurrence, three lessons can be learned. Firstly, governments can be behind the development and deployment of sophisticated malware for cyber-espionage, network reconnaissance, and cyber-based intelligence theft. Secondly, not all software updates and OS upgrades are genuine as some could be high-tech spyware like Flame disguised in software updates. Companies like Microsoft should take this lesson seriously. Lastly, companies, institutions, and countries need to always keep their C2 infrastructure up-to-date to increase the chances of detecting when similar malware is trying to infect their systems. Concisely, Flame sensitizes governments to be proactive and tech-savvy in securing their intelligence, classified data files, and confidential government information from theft by other governments.

References

Bahtiyar, Ş. (2016). Anatomy of targeted attacks with smart malware. Security and Communication Networks, 9(18), 6215-6226.

Cimpanu, C. (December 12, 2019). A decade of hacking: The most notable cyber-security events of the 2010s. ZDNet: CBS Interactive. Retrieved March 06, 2020, from https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/.

Eisenstadt, M. (2016). Iran’s lengthening cyber shadow. Policy Paper No. 34. Washington Institute for Near East Policy.

Fillinger, M. J. (2013). Reconstructing the cryptanalytic attack behind the Flame malware (Doctoral dissertation, University of Amsterdam).

Goodin, D. (June 04, 2012). “Flame” malware was signed by rogue Microsoft certificate. Wired Media Group. Retrieved March 06, 2020, fromhttps://arstechnica.com/information-technology/2012/06/flame-malware-was-signed-by-rogue-microsoft-certificate/.

Gostev, A. (May 28, 2012). The Flame: Questions and answers. AO Kaspersky Lab. Retrieved March 5, 2020, from https://securelist.com/the-flame-questions-and-answers/34344/.

Goyal, R., Sharma, S., Bevinakoppa, S., & Watters, P. (2012). Obfuscation of Stuxnet and Flame malware. Latest Trends in Applied Informatics and Computing, 150, 154.

Hoffman, V. C. (May 30, 2012). Meet Flame, the Ebola virus of malware. CIO: IDG Communications, Inc. Retrieved March 5, 2020, from https://www.cio.com/article/2371366/meet-flame–the-ebola-virus-of-malware.html.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, 2 Ed. Syngress.

Knapp, E. D., & Langill, J. T. (2015). Hacking industrial control systems. In Industrial Network Security, 171–207. Doi:10.1016/b978-0-12-420114-9.00007-1.

Loiko, S. L. (May 31, 2012). Russia computer experts who detected Flame malware issue warning. The Los Angeles Times. Retrieved March 06, 2020, from https://www.latimes.com/world/la-fg-russia-flame-cyberwar-20120531-story.html.

MAHER Center. (May 30, 2012). Identification of a new targeted cyber-attack. Iran Computer Emergency Response Team. Retrieved March 5, 2020, from https://www.webcitation.org/682bfkhaU?url=http://www.certcc.ir/index.php?name=news&file=article&sid=1894&newlang=eng.

Nakashima, E., Miller, G., & Tate, J. (June 19, 2012). U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. The Washington Post. Retrieved March 06, 2020, from https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html.

Rubenstein, D. (2014). Nation state cyber espionage and its impacts. Washington University in St. Louis.

Zetter, K. (May 28, 2012). Meet “Flame” the massive spy malware infiltrating Iranian computers. Wired. Retrieved March 5, 2020, from https://www.wired.com/2012/05/flame/.

Business Practices and Tactics

Business Practices and Tactics

Student’s Name

Course and Code

Instructor

Date

Business Practices and Tactics

Introduction

The primary aim of every business today is to ensure attainment of maximum profits for the stakeholders and owners while keeping up with expectations on corporate social responsibility. In order for a business to get and stay profitable, Osterwalder and Pigneur (2011) found that several practices are required including heavy investments on the people and resources in order to improve productivity, marketing strategies, excellent customer service, and attracting and retaining top talent. In all activities and approaches, a business is required to have growth, efficiency, profitability, survival and stability. However, recent business strategies and tactics have revealed a slight variation from traditional business concepts. Today, the issue of sustainability and eco-friendliness have become a global concern, turning businesses into advocates of greener strategies, as a way to conserve the environment while keeping the traditional aims of every business. In the agricultural sector, companies such as Monsato and their main product, Roundup, have continued to dominate the herbicide market using tactics and practices that are unconventional. In this report, an article by Four Corners presented by ABC News In-depth (2018) will be reviewed from a dynamics of systems and positioning your studies approach. The business activities and practices employed by the organization reveal that the global business sector is constantly testing boundaries and ideas in an attempt to identify new ways of retaining growth, efficiency, profitability, survival and stability.

Analysis of the News Video

In a detailed informative piece on modern agricultural practices, ABC News In-depth (2018) provided an expose titled “the secret tactics Monsanto used to protect Roundup, its star product.” In this article, several emerging issues were presented including; the benefits of using herbicides for both crop and livestock farmers, the costs of not using such products in farming, the impact of the product on the environment, and the effect it has on users especially in relation to safety concerns and the idea that the product causes various forms of cancer. In the depth of the video, the main issue is not founded on the above-mentioned issues but rather on the way Monsato focuses its strength and power to protect its key product. The article reveals how the company, in a syle similar to other multinational institutions, denies, frustrates, and attempts to conceal all allegations relating to its star product being unsafe for human and environmental use. Despite overwhelming evidence from severe health issues amongst users to scientific proof of its dangers, the company remains adamant that the product is safe and tested scientifically to ensure that it has zero negative consequences to people and the environment.

For farmers in Australia, Roundup has offered so many benefits over the years, including reducing the cost of farming and the losses associated with alternative measures to weed control. However, these benefits have been clouded by a recent revelation of negative health consequences for users. The news article is very objective as it begins by presenting praises of the product from the farmers. It then introduces several controversial issues including the fact that the product, Roundup, could be responsible for several cases of cancer. In America, a grounds maintenance worker exposed to high levels of Roundup per day is shown to have developed a rare form of skin cancer, leading to a lawsuit where he is awarded millions in damages. All through, Monsato maintains that the allegations are false and even proceeds to fight the court decision. What follows is a series of practices with an intention of burying the main issue and presenting the cases where farmers have had health issues as isolated incidents. In a dynamics of systems and positioning your studies perspective, the next section will provide a thorough analysis of the matter.

Dynamics of Systems Theory

The systems thinking theory recognizes the need to test ideas on social systems similar to how the same is done in engineering and other scientific concepts. Systems thinking begins by defining a system as a collection of different parts that together form a group (Baporikar, 2020). As these parts interact, the sum of its individual parts act in a system or structure. System thinking examples in the business world include the stakeholders, the business structures and frameworks, the processes, and the culture. Combined, Oliveira et al. (2020) note that the practices that are used in a system thinking create either healthy or unhealthy cultures. Therefore, in a process of looking at how things are influenced or influence each other in a whole, the systems thinking approach can be used to explain the business practices that Monsato applied in protecting its product and how farmers in Australia and America also interpreted the same.

Monsato’s attempts to conceal the issue of Roundup as a harmful product and its business practices including indirect influence on political parties through funding reveal a number of processes in efforts that influence outcomes. Monsato reveals a set of practices and habits in the corporate world within a structure that is based on the belief of control and profit maximization regardless of the consequences to users. The systems thinking approach is described by Jaaron and Backhouse (2018) as a system that observes the whole, focuses on relationships, looks at structures, explores interdependence, dynamics, and reveals complexities. By applying this point of view, Monsato’s strategy can be analyzed as one that involves expanding the company view to consider larger numbers in many interactions in order to attain growth, efficiency, profitability, survival, and stability.

Monsato’s strategy as presented in the news article is a display of a systems thinking. The main features of a systems thinking are noted by Mambrey et al. (2020) to include a consideration of both the short and long term implications of strategy, an understanding of the big picture, observes the changes in a system over time including trends and patterns, recognizes behavior as a result of a system structure, and identifies the circular nature and implication of relationships. There is a strong relationship between Monsato, its product, and the customers (users of Roundup). In the relationship, there are clear trends and patterns relating to use, expectations, and a realization of the effects. The video highlights the different stages of the relationship beginning with the acknowledgement of the benefits of using Roundup, followed by a phase of uninterrupted consequences, and later a realization of the costs of using the product. From Monsato’s perspective, assumptions are constantly tested, including a consideration of every possible outcome before acting, identification of leverage points, and a focus on structure. Monsato understands the interdependencies as well as the causes and effects of the relationship it has with various stakeholders including other companies in the industry, the government, political parties, and users. The decision to fight the court verdict and the constant denial of the health effects of the product also point to how Monstao understands the need to retain structure in order to maintain its perspective and leverage points.

Positioning your Studies

In business, like every other sector, perspectives have a huge role to play in determining outcomes. Competing paradigms and points of view have been present since time immemorial. What is considered a mainstream model may not exist in a different part of the world. The same is true for perceived benefits of a product versus its costs and effects. The concept of mental models is defined by Magzan (2012) as a key determinant in what people see. What is present in a business setup may not be aligned to what people/stakeholders see. Based on the Senge model, what is seen is not usually factual but an individual interpretation based on expectations and demands (Nejad et al., 2012). For example, the perspectives of Monsato and the various farmers in America and Australia regarding the benefits of Roundup do not match. For the farmers, there are hidden costs associated with continued use of the product. For the company, their product is of high quality, tested, and beneficial to all users. Ultimately, mental models create sense making and perception in a manner that influences how one approaches an issue as evidenced in the ABC News In-depth (2018) article.

In a mental model approach, Kara and Ertürk (2015) acknowledge the need to create a sense-making structure in an attempt to give meaning to experience. The process involves questioning the situation regarding the occurrences, the differences, and the reasons why these issues are present. There is also a need to explore means to respond to situations in a sense-making and perception creating approach. Ultimately, the entire process is noted by Grüter et al. (2018) to influence how people perceive things differently. Monsato’s perception of its star product, Roundup, and the consequences of continued use differs significantly from the point of view of farmers who use the product on a daily basis. It is worth noting that none of the executives who defend the product as safe have ever used it. They rely on scientific tests and other avenues that inform their decision on the product. Gaffkin (2008) looks at theory as an ideation that helps to resolve and understand complex issues including business practices and unethical practices. In the news article, every different perspective makes a claim that is aimed at creating influence and presenting their claims as reliable knowledge.

Understanding of the Topic Based on the Theories

The two theories explored above relate to how entities interpret information and events. The topic of harmful business practices and strategies as explored in the Monsato case study indicates why perceptions, sense-making, and competing mental models are important in showing a need to include methods to support claims. In the systems thinking approach, the article reveals that each of the issues mentioned are interrelated, interdependent, and leads to different outcomes for each stakeholder group. In the mental models, perception, and sense-making approach, the theories highlight that one’s point of view on an issue may not be reflective of facts. In a deeper review of the news article, Monsato’s strategies are somewhat controversial. Nonetheless, the evidenced piled upon the company by the various interest groups does not provide conclusive evidence no whether Roundup is harmful. Despite the moving and emotional narrations from various users of the product, the points of view for the opposing entities do not converge even after court rulings and scientific evidence. Therefore, the topic can be said to be controversial and dependent on one’s understanding of the systems and their mental models.

Conclusion

The discussion intended to analyse an article by Four Corners presented by ABC News In-depth (2018) from a dynamics of systems and positioning your studies approach. The systems thinking approach and the mental models theories have been employed to get a glimpse of the issues addressed in he video. Having reviewed how systems operate and the role of mental models, perceptions, and expectations, the report finds that business activities and practices employed by Monsato reveal that the global business sector is constantly testing boundaries and ideas in an attempt to identify new ways of retaining growth, efficiency, profitability, survival and stability.

Reference List

ABC News In-depth. 2018. The secret tactics Monsanto used to protect Roundup, its star

product | Four Corners. YouTube. Retrieved from https://www.youtube.com/watch?v=JszHrMZ7dx4

Adam V 2004, ‘Systems thinking as a major skill of business students–A new teaching

concept at the University of Zurich, Switzerland,’ The Journal on Systemics, Cybernetics and Informatics, vol. 2, no. 6, pp. 43-47.

Baporikar, N. 2020, ‘Logistics Effectiveness Through Systems Thinking,’ International

Journal of System Dynamics Applications (IJSDA), vol. 9, no. 2, pp. 64-79.

Gaffikin, M.J 2008, Accounting theory: Research, regulation and accounting practice.

Grüter, T., Takeda, A., Rohde, H. and Schafer, A.J., 2018. Intersentential coreference

expectations reflect mental models of events. Cognition, 177, pp.172-176.

Jaaron, A.A. and Backhouse, C.J., 2018, ‘Operationalisation of service innovation: a

systems thinking approach,’ The Service Industries Journal, vol. 38, no. 9-10, pp. 561-583.

Kara, S.B.K. and Ertürk, A., 2015, ‘Mental models of the school principals on

“leadership”,’ Procedia-Social and Behavioral Sciences, no. 174, pp. 2145-2152.

Mambrey, S., Timm, J., Landskron, J.J. and Schmiemann, P., 2020. The impact of system

specifics on systems thinking. Journal of Research in Science Teaching, 57(10), pp.1632-1651.

Magzan, M., 2012, ‘Mental models for leadership effectiveness: Building future different

than the past,’ Journal of engineering management and competitiveness (JEMC), vol. 2, no. 2, pp. 57-63.

Oliveira, B.G., Liboni, L.B., Cezarino, L.O., Stefanelli, N.O. and Miura, I.K., 2020, ‘Industry

4.0 in systems thinking: From a narrow to a broad spectrum,’ Systems Research and Behavioral Science, vol. 37, no. 4, pp. 593-606.

Osterwalder, A. and Pigneur, Y. 2011, ‘Aligning profit and purpose through business

model innovation,’ Responsible management practices for the 21st century, pp. 61-76.

Business Systems Analysis

Business Systems Analysis

Student’s Name

Institutional Affiliation

Course

Professor

Date

Table of ContentsContents

TOC o “1-3” h z u Table of Contents PAGEREF _Toc110070760 h 2Introduction PAGEREF _Toc110070761 h 4Problem Statement PAGEREF _Toc110070763 h 4Two Technologies PAGEREF _Toc110070764 h 4Business Requirements PAGEREF _Toc110070765 h 5Objectives PAGEREF _Toc110070766 h 5Project Description PAGEREF _Toc110070767 h 5Technology Requirements PAGEREF _Toc110070768 h 6Competitors and Technology PAGEREF _Toc110070769 h 6Mobile Commerce PAGEREF _Toc110070770 h 7Social Computing PAGEREF _Toc110070771 h 7Technology benefit PAGEREF _Toc110070772 h 7Technology Solutions PAGEREF _Toc110070773 h 8Mobile Commerce PAGEREF _Toc110070774 h 8Social Computing PAGEREF _Toc110070775 h 8Recommendations PAGEREF _Toc110070776 h 8Overall Benefit PAGEREF _Toc110070777 h 9Basic Security Considerations PAGEREF _Toc110070778 h 9Security Features PAGEREF _Toc110070779 h 9Third Party Vendors PAGEREF _Toc110070780 h 9Internal Safeguarding PAGEREF _Toc110070781 h 9References PAGEREF _Toc110070782 h 10Table 1 PAGEREF _Toc110070783 h 12Figure 1 PAGEREF _Toc110070784 h 13

IntroductionStyled by Mocha is a small brick and mortar business with a small online presence. We offer designer clothing, shoes and accessories for men and women. We do have a website that only contains a few items from our store. Customers are currently only able to purchase items in our store. This is becoming a big problem because we are not able to reach many of our customers as easily as all our competitors. Our goal at Styled by Mocha is to promote growth with an online presence and provide convenience to our customers.Problem StatementThe business owner is looking for a technology solution that will meet the following key technology requirements: integrating online shopping, managing inventory and shipping, providing order status and online payment processing, facilitating collaboration internally and externally (with staff and customers), managing customer contacts, providing reporting, and being able to use the new technology to manage the current brick-and-mortar processes (sales, payments, inventory, and customer contact).

Two TechnologiesI have identified 2 technologies that will help reach this goal. The first technology is Wireless, mobile computing and mobile commerce. Society today depends heavily on wireless devices which can be used to shop online (Chhonker et al., 2017). Mobile commerce creates opportunities for the business to deliver new services to existing customer while attracting new ones. The second technology that I have chosen is social computing an area of computer science that is concerned with the intersection of social behavior and computational systems (Fernando et al., 2016). Social media is a huge platform for advertising and representation of a company.

Business RequirementsObjectivesTo promote online shopping and shipping by providing order status and online payment processing.

To facilitate collaboration internally and externally (with staff and customers).

To manage customer contacts so as to get reports and feedback.

To create an online platform to be used to advertise the business to online potential clients.

Project DescriptionThe first strategy that needs to be put in place is hiring a virtual assistant. A virtual assistant can provide your company with cutting-edge technological solutions with a human touch. On freelance websites, virtual assistants are widely accessible and reasonably priced, even for tiny firms. They can take on demanding jobs, saving you time and expanding your business. A virtual assistant also comes equipped with social media marketing skills and will therefore help create an online platform (Georgescu, 2018). Secondly, the business owner will need productivity applications. These apps come at no cost and are easy to use. All that is needed is a smartphone mobile device installation. Through the sending and receiving of payments online, web-based payment systems support the growth of enterprises. Web-based payment has made it possible for many firms to reach out to potential clients because of the variety of payment alternatives and their versatility (Tounekti et al., 2019). This is so that you can attract more clients who prefer using a certain web-based payment solution by offering a variety of payment methods.

Another strategy to be put in place is to improve social marketing through advertising. The business can get two model, male and female who will be used to model the clothes on Facebook, Instagram and Tiktok. The platforms will also be used to schedule surveys and questionnaires so as to get customer feedbacks and requests (Evans et al., 2021). Customers are more likely to recommend a business to others when they now that the business listens to their needs. By doing so the business creates a good image to its customers as well potential clients. Hence the business is able to give its competitors a competitive edge.

Technology RequirementsI’ve discovered 2 technologies that will facilitate achieving this objective. Wireless, mobile computing, and mobile commerce make up the first technology. Today’s society is increasingly reliant on wireless gadgets, which can be utilized to do internet shopping (Chhonker et al., 2017). Mobile commerce gives businesses the chance to offer new products to current customers while luring in new ones. The second technology I’ve selected is social computing, a branch of computer science that studies how social behavior and computational systems interact (Fernando et al., 2016). A significant marketing and brand-representation platform is social media.

Competitors and TechnologyThe best well known competitors in the fashion industries are Gucci and Chanel. Gucci however has a competitive advantage. Gucii uses its products to market for the company. Their customers post the products on the various social media platform therefore attracting other potential clients (Romo et al., 2017). They have studied their customers’ behavior and realized that people like posting clothes they look good in. Their products are also of very high quality hence attracting long-term clients. Gucci has made an image for itself such that the whole world knows that it provides quality products. As much as its competitors such as Chanel have good products, Gucci still remains on top.

Mobile CommerceFashion retailer Forever 21 is deserving of high praise for its use of social media. Social media is mostly available smartphones and other devices that can access the internet. Fashion 21 promotes advocacy and engagement in all its social media platforms. According to McCollum, Facebook is used by Forever 21 to present fashion in a fun, compelling, and shareable way. Given the large presence of the brand’s primary customer, which consists of teens who are digital natives, on Instagram, it makes perfect sense (Chhonker, 2017). What better way to foster a relationship with them and encourage them to drop by on the weekend to try the newest item.

Social ComputingA large selection of women’s clothing may be found at Sophie and Trey, an online fashion retailer. Since Sophie and Trey have been working in the online fashion industry for a while, they have demonstrated how fashion companies can use Instagram as a powerful marketing tool (Fernando et al., 2016). Their social media activity and visibility are growing daily, but their Instagram and Pinterest pages have garnered greater attention in terms of marketing. The best aspect of their social media marketing plan is that they continually use various strategies and engage in friendly banter with their customers and supporters

Technology benefitThe fashion companies Forever 21 and Sophie and Trey and gaining massively from their online social media platforms. Their customers can easily order from them online and get their products delivered. They do not have to make physical appearances so as to buy the products (Stephen, 2016). Customers are also exposed to products of variety of types, colours and sizes giving them options to choose from. The social media platforms enable the customers to review the products and offer feedback. This gives the companies information on what to improve on. The companies are also able to use the different online platforms to advertise their products. The target market online is bigger compared to physical advertisement (Stephen, 2016). The companies are also able to monitor their competitors’ social media platforms and scan potential gaps.

Technology SolutionsMobile CommerceHaving smartphones will help for easier communication with clients. The landline phones are not portable and have no access to the internet. With smartphones, one can download apps such as slack and asana which are very profitable for the business (Chhonker et al., 2017). They also have access to social media platforms which makes it easy to advertise and attract potential buyers.

Social ComputingThe technology will help analyze social behavior of potential buyers. By doing so they will understand their needs and the target markets wants and find ways to satisfy them (Fernando et al., 2016). The current target market is both men and women. Conducting studies using surveys and questionnaires can be very effective.

RecommendationsThe technology solution that best suits my business is hiring a virtual assistant who can also be my social media manager. He or she will be able to create online platforms which can be used for advertising, shopping, payments, reviews and feedback. The virtual assistant can also use the different platforms to monitor social behavior and trends. This technology solution will help identify market gaps and potential clients.

Overall BenefitAt Styled by Mocha, the main benefit we hope to acquire from the technology solution is to encourage growth through an online presence in order to benefit our clients and gain a competitive edge (Stephen, 2016). We will also be able to attract more clients hence more sales hence more profits.

Basic Security ConsiderationsSecurity FeaturesIntroducing your business to the online platforms has a lot of advantages. However, everything with an advantage has a disadvantage. The different social media accounts are prone to hacking and other insecurities. The business should consider a number of security features. One of the features is confidentiality (Qayyum, 2021). All employees should handle all passwords and information regarding the online platforms with confidentiality. Unauthorized personnel should have no access to them. The business administration should also perform random audits to ensure that there are no breaches (Qayyum, 2021).

Third Party VendorsThird party vendors also need to be managed by conducting risk assessment to ensure that the potential vendor exceeds the company’s security standards. The risk assessment may be tiring but it is better than hiring a vendor who may not be confidential (Kim & Altmann, 2020).

Internal SafeguardingThe company should also input internal safeguarding protocols. These include having screenlocks on all company devices, clearing out old data and updating passwords often (Qayyum, 2021). Employees should also be advised against using public wifi to access company data.

ReferencesChhonker, M. S., Verma, D., & Kar, A. K. (2017). Review of technology adoption frameworks in mobile commerce. Procedia computer science, 122, 888-895.

Evans, D., Bratton, S., & McKee, J. (2021). Social media marketing. AG Printing & Publishing.Fernando, M. D., Ginige, A., & Hol, A. (2016). Impact of social computing on business outcomes. 13th International Cnference on Web Based Communities and Social Media (WBC2016).

Georgescu, A. A. (2018). Chatbots for Education-Trends, Benefits and Challenges. ELearning & Software for Education, 2.Kim, K., & Altmann, J. (2020). Platform provider roles in innovation in software service ecosystems. IEEE Transactions on Engineering Management.MacCollum, C., Pape, H., Romley, N., & Witmer, O. FOREVER 21 CASE STORY.

Romo, Z. G., Medina, I. G., & Romero, N. P. (2017). Storytelling and social networking as tools for digital and mobile marketing of luxury fashion brands. International Journal of Interactive Mobile Technologies, 11(6), 136-149.

Stephen, A. T. (2016). The role of digital and social media marketing in consumer behavior. Current opinión in Psychology, 10, 17-21.

Tounekti, O., Ruiz-Martinez, A., & Gómez, A. F. S. (2019). Users supporting multiple (mobile) electronic payment systems in online purchases: an empirical study of their payment transaction preferences. IEEE Access, 8, 735-766.

Table 1Use of Social Media over the years

FacebookInstagramYoutubeTiktok2017 70% 53% 35% 24%

2018 73% 60% 44% 33%

2019 70% 67% 51% 45%

2020 66% 80% 67% 72%

Figure 1Percentage Profits of Gucci vs Chanel

Figure 1

Academic Writing Genres in Postgraduate Levels Similarities and (3)

Academic Writing Genres in Postgraduate Levels: Similarities and Differences among the varied Genres

By (Name)

Couse

Professor

Institution

State

Word Count: 1976Introduction

Academic writing that serves as one of the compulsory activities of students pursuing their studies at postgraduate level is a somewhat challenging yet exciting experience for students (Petrova 2017). Such forms of writing at a postgraduate level require lots of critical reading, thinking, analyses and evaluations. Subsequently, authors rely on available data and information as baseline for establishing new documents. For instance, research reports depend significantly on existing knowledge by focusing on previously accomplished studies and findings to attain areas that require further research studies as well as information for supporting new ideas. The above-mentioned processes consume relatively much amount of time, hence prompting writers to properly plan and stick to their schedules. Moreover, the different categories of academic writing demand the use of particular structures and supporting evidence for effective communication and better convincing powers. Also, academic writing at postgraduate levels exhibits high-quality by drastically minimizing on various types of errors and mistakes that may entail typos and wrong tenses. Accordingly, students at postgraduate levels should rely on specific skills that entail proofreading and editing, proper planning, writing skills, critical reading, evaluation, analysis, and thinking skills to generate quality academic documents.

Academic Writing Genres in Postgraduate Level

Precisely, there are four main writing genres at postgraduate level which entail essays, research proposals, research reports, and reflective writing. Essay writing entails in-depth exploration, analysis, and evaluation of a given topic. Moreover, essays are written in prose and presented in a continuous structure with the use of connected paragraphs from the introduction, body, and conclusion. Also, essays are grouped into four basing on their purposes; descriptive, argumentative, expository and narrative essays (Solomon et al. 2013). Narrative essays present writers’ stories from certain points of view to attain specific goals. Descriptive essays offer intricate details and descriptions of characteristics and traits of chosen subjects. Expository essays entail critical explanations of subjects’ traits, characteristics, and description. Finally, argumentative essays endeavor to persuade and convince their audience of particular stances and claims.

On the other hand, research proposals are academic documents that strive to explain details about the plan, methodology, purpose, and objective of a research study that could be undertaken in future. Accordingly, writers employ their critical thinking capabilities to elaborate and explain the importance of conducting research studies in chosen subjects as well as necessary resources. Moreover, research proposals do not contribute additional information but endeavor to present existing gaps and the need for necessary research studies (Walonick 2005).

Moreover, research reports are types of academic writing which rely on particular sections which entail discussion, methodology, literature review, finding and discussions, and recommendations and conclusion to present detailed information concerning selected topics. Accordingly, the authors employ their critical reading, analysis, and evaluation skills to develop research reports (Walonick 2005). Writers would find and critically read suitable resources for necessary evidence and development of the literature review sections. Consequently, research reports strive to expand existing knowledge through their conclusions and recommendations.

Final, reflective writing offers detailed responses that a writer develops through their critical thinking capabilities with regards to a given document or situation (Rai 2006). Accordingly, writers critically analyze and evaluate specific life experiences and develop suitable responses. Thus, reflective essays depend significantly on personal emotions, judgment capabilities, and authors’ writing skills.

Similarities

First, each of the academic writing genres relies on evidence to support their points. Different academic writing documents depend on predetermined information to support their ideas and give them authority (Cumming, Lai and Cho 2016). Since critical thinking facilitates the development of personal opinions and ideologies, evidenced and findings from earlier experiments and research findings are crucial in validating and proving such individual inferences. For instance, each type of academic writing relies on either direct quotes or paraphrased versions of other scholars’ findings. Thus, evidence act as qualifiers and validators of all categories of academic documents.

Secondly, all the different types of academic writing adhere to particular order and structures to guide the audience. Every form of academic writing exhibits a specific structure and order to ensure that their information flows smoothly from the begging to the end (Street 2009). Most academic documents rely on the use of three-part approach which entails the use of an introduction, body, and conclusion. Even so, every category of writing has a unique structure and order due to their varied purposes. For instance, research reports rely on sub-sections with the use of sub-titles that entail literature review, findings, and discussions, conclusions, and methodology to extensively elaborate and explain its varied groups of information.

Additionally, each type of academic writing exhibits in-text citations and the use of a reference list to reinforce their points and provide links to areas of further reading. Citations and references are crucial in all academic writings since they attract more value and qualify the documents (Fox, Paine, and Sauterey 2016). References play vital roles in supporting ideas that an individual develops through their critical thinking capabilities. Moreover, writers appreciate previous academic projects through the use of references and citations. Information that other academicians and scholars established contributes significantly to validating and reinforcing claims of a writer. Therefore, references are vital sources of evidence as well as validators and qualifiers of academic documents.

Further, academic writing at the postgraduate level relies significantly on critical thinking capabilities, evaluations, and analysis. Advanced levels of academic writing extend beyond mere descriptions of an idea or subject to include personal interpretations, responses, and conclusions (Andrews 2007). Since virtually every form of academic writing at advanced levels of studies strive to expand existing knowledge, personal inferences and conclusions are essential in contributing to such desired growth. Moreover, educational documents require writers to use reliable findings and facts to develop new information through critical thinking.

Furthermore, each form of academic writing has a specific thesis that acts as their baselines. Theses are vital aspects of academic writing since they act as a guide and controller to ensure that the writer remains within the essential areas of coverage (Toprak 2014). For example, theses dictate the extent of what the writer would cover, the type of objectives and research questions that a writer would use. A well-directed document is relatively easier to understand and read since the audience would have specific expectations. Therefore, academic documents strive to explore, explain, and support particular theses.

Difference

A key difference amongst the varied writing genres is based on the degree of research studies that a writer has to conduct. The amount of research studies that an individual does depends on the quantity of information that is needed (Shim 2005). For example, research reports and research proposals require extensive research studies to attain adequate documents that would be used in the literature review and other sections of the paper. On the contrary, essays and reflection tend to rely on limited but enough sources to support their claims and ideas. Since reflections strive to present personal emotions, interpretations, opinions, and believes about a given subject, they depend primarily on a writer’s critical thinking, evaluation and analysis skills rather than exhaustive research studies. Hence, the extent of research studies differs from one category of writing to the next.

Required Skills

Also, all forms of academic writing at postgraduate level demand advanced research and reading skills. Research skills are essential in ensuring that a writer provides the right and valid information that enriches their wealth of knowledge. Similarly, critical reading enables readers to collect crucial information from a given document. Accordingly, research skills involve intensive and extensive critical analyses and evaluation of available materials to establish the most suitable ones that would be employed in a given piece of writing. For instance, an individual would have to find, read, analyze and evaluate various documents to determine and select the most appropriate sources that would be used to enrich their literature review section (Fox, Paine and Sauterey 2016). Such a practice is highly-involving since the practice of establishing verified, and credible sources consume lots of time and energy. An individual could end up replicating the work of another person, thus generating similar information rather than expanding the existing ones by failing to conduct adequate research studies. Still, a writer should conduct exhaustive research studies to avoid plagiarism while increasing their knowledge for better information development (Bakhtiyari et al. 2014). Thus, research skills are critical in all academic writing.

Still, advanced writing skills are crucial in postgraduate level writing activities. At postgraduate levels, academic writing tends to be more sophisticated since it entails expression and explanations of particularly complex subjects in in-depth and lengthy approaches (Langan 2013). For example, an individual could be required to provide basic descriptions of a chosen topic then offer their inferences and conclusions. Accordingly, a writer should be able to establish a suitable writing structure and style to develop an interesting document that is relatively easy to read and understand. Moreover, writers should use appropriate terms and sentence structures that are relatively easier to understand by avoiding ambiguity while ensuring clarity and simplicity. Also, meticulous referencing, appropriate structuring, proper grammar, apt planning, and drafting of academic documents are critical in promoting quality work. Thus, suitable writing skills are essential in every type of academic writing at postgraduate levels because they enable writers to adequately communicate their messages to the target audience.

Similarly, proper time management and planning is another essential skill in the development of all the varied academic documents. Appropriate time management enables writers to adequately study, analyze, evaluate, and interpret collected data while ensuring that sufficient time is available for writing quality documents (Rani and Mangala 2010). An individual would probably conduct quality analysis, evaluations, and interpretations when they have ample time. Research and critical thinking activities consume relatively lots of time and energy. On the other hand, students at postgraduate levels tend to operate under tight time schedules following the complexity of their studies. Accordingly, an individual should establish and stick to a suitable timeframe that puts into consideration every aspect of the writing processes.

Additionally, all the varied categories of academic writing rely primarily on proofreading and editing to gain adequate quality. Proofreading and editing a document contribute significantly to ensuring that it exhibits all the desired qualities while presenting extremely minimized or not errors (Harwood, Austin and Macaulay 2012). For instance, writers could proofread and edit their work to ensure the inclusion of all the required sections and proper titles/ subtitles while embracing the correct tenses and vocabulary. Well-edited and proofread documents are free of punctuation and spelling mistakes. Consequently, such documents would exhibit high-quality because they communicate effectively while ensuring a smooth flow of information from one point to the next. Moreover, the writers would present full details by ensuring that they provide all the necessary details. Therefore, proofreading and editing are vital tools that are used to refine academic documents to ensure they are of high-quality.

Overall, academic writing at postgraduate level comprises four main genres that entail research proposals, research reports, essays, and reflections. The varied groups of documents tend to be more sophisticated since they demand lots of critical thinking skills to provide valuable information for expanding existing knowledge. The main similarities in the varied groups of writing entail the use of critical thinking and evaluation skills, time management and planning skills, editing and proofreading skills, writing skills, the use of a thesis, and essential reading and research skills. On the other hand, the differences exist in the structures and extent of research studies that are employed to develop the different types of documents. Research papers demand extensive research studies since they focus on literature reviews. On the other hand, reflections and essays tend to rely on limited amounts of research because they depend mainly on critical thinking, analyses and evaluation skills of an individual. Therefore, academic writing at postgraduate levels is more demanding and requires a sufficient understanding of the varied writing genres to ensure quality work.

References

Andrews, R., 2007. Argumentation, critical thinking and the postgraduate dissertation. Educational Review, 59(1), pp.1-18.

Bakhtiyari, K., Salehi, H., Embi, M.A., Shakiba, M., Zavvari, A., Shahbazi-Moghadam, M., Ale Ebrahim, N. and Mohammadjafari, M., 2014. Ethical and unethical methods of plagiarism prevention in academic writing. International Education Studies, 7(7), pp.52-62.

Cumming, A., Lai, C. and Cho, H., 2016. Students’ writing from sources for academic purposes: A synthesis of recent research. Journal of English for Academic purposes, 23, pp.47-58.

Fox, C.W., Paine, C.T. and Sauterey, B., 2016. Citations increase with manuscript length, author number, and references cited in ecology journals. Ecology and Evolution, 6(21), pp.7717-7726.

Gerth, H.H. and Mills, C.W., 2014. From Max Weber: essays in sociology. Routledge.

Harwood, N., Austin, L. and Macaulay, R., 2012. Cleaner, helper, teacher? The role of proofreaders of student writing. Studies in higher education, 37(5), pp.569-584.

Langan, J., 2013. College writing skills with readings. Tata McGraw-Hill Education.

Petrova, O., 2017. Writing as a part of postgraduate training English (Doctoral dissertation).

Rai, L., 2006. Owning (up to) reflective writing in social work education. Social work education, 25(8), pp.785-797.

Rani, E. and Mangala, S., 2010. Need and importance of soft skills in students. Journal of Literature, Culture and Media Studies, 2(3).

Shim, E., 2005. Introductions in research papers: Genre analysis of academic writing. ENGLISH TEACHING (영어교육), 60(4), pp.399-422.

Solomon, A., Nursing, M.O.C.T.I., Bravery, H.E.O., Prompts, A.M.E., Skills, E.O.E., Plan, V.E., Writing, N.S.I.C., Araby, L.E.O., Writing, B.E.T.W., Writing, C.O.E. and Grabbers, P.E., 2013. By the Book. New York Times Sunday Book Review, 26.

Street, B., 2009. ” Hidden” features of academic paper writing. Working Papers in Educational Linguistics (WPEL), 24(1), p.1.

Toprak, F., 2014. The graduate students’ autonomy development in a thesis writing course for postgraduate students at EMU (Master’s thesis, Eastern Mediterranean University (EMU)-Doğu Akdeniz Üniversitesi (DAÜ)).

Walonick, D.S., 2005. Elements of a research proposal and report. Survive Statistics.

Academy of Sports Medicine

0914400Academy of Sports Medicine

Academy of Sports Medicine

Report on the 2020 ConferenceBackgroundThe Academy of Sports Medicine (ASM) conference is designed for ASM members and other professionals working in sports medicine and exercise science. For the past 15 years, the ASM has been organizing and hosting the conference, which has become the premier educational and networking event for athletic trainers, team physicians, physical therapists, physician’s assistants, and other sports medicine professionals. The objectives of this year’s conference were to share and analyze innovations in basic science and clinical medicine for exercise, fitness, health, and physical performance. rightcenterConference HighlightsMore than 550 people registered for this year’s conference in Atlanta, Georgia, to hear 75 speakers over the course of five days. In addition to memberships and sponsorships, the conference is a major source of revenue for the ASM, both directly and indirectly through promotion and word-of-mouth marketing. As the following table shows, the conference generated more revenue for the ASM this year than last year.Source Revenue

Member advance registration $108,000

Nonmember advance registration $19,500

Member on-site registration $12,500

Nonmember on-site registration $6,400

Student registration $625

Total revenue 2020 =SUM(ABOVE) $147,025.00

Total revenue 2019 $135,500

Increase in total revenue $ =B7-B9 # “#,##0” 11,525

Attendee ProfileOf the 15,000 people who have ever attended the ASM conference, most (82%) practice in the United States, with 11% from Europe and 7% from Asia. As in previous years, attendees were divided equally between male and female, with people aged 38–62 making up the majority of the crowd. The following chart summarizes the professional specialties of this year’s attendees.

EvaluationsOrganized events for this year’s conference included the welcome reception, the keynote address, and the scheduled workshops and presentations. Participants were asked to rate the events according to their relevance, innovation, content, and overall value. The following table summarizes the compiled results, with 5 as the highest rating and 1 as the lowest rating.Event Relevance Innovation Content Overall Value

Welcome reception 3 2 2 3

Keynote address 5 3 5 4

Presentations 5 5 5 5

Seminars 5 4 4 4

Workshops 5 4 5 5

About the Academy of Sports MedicineT

371094052705ASM

Innovation and Leadership

00ASM

Innovation and Leadership

he Academy of Sports Medicine is dedicated to leading the field of sports medicine through innovative work in science, education, and medicine. Our mission is to support the aims of sports medicine around the world.

BUSINESS REPORT

BUSINESS REPORT

by (Student Name)

Course Name

Instructor Name

University Name

City and State

Date

Executive Summary

The purpose of this report is to evaluate the negative impacts of dockless bike sharing on communities in Sydney. The report also provides recommendations on solving the issue to encourage the councils to support the dockless bikes sharing companies, including ours. A dockless bike-sharing scheme plays a vital role in the transport sector; it has a promising future for the industry. Recently, Transport NSW, in its draft for Future Transport Strategy 2056, recognizes the bike-sharing scheme as part of the resolution to meeting the transport needs of the people (Pettit, 2017). It also eases congestion on the city roads and reduces carbon emissions (Enriquez & Browne, 2017). However, the councils are complaining of the negative impacts of the dockless bike-sharing. That the dockless bike-sharing scheme negatively impacts their communities, and some councils want to ban bikes. The report evaluated the issue at hand and provided recommendations. Some of the suggestions are the dockless bike-sharing companies should publicize their recycling plan, the councils should integrate dockless bike-sharing into the transport network, and regulate the sector.

Business Report

Introduction

Dockless bike-sharing companies improve riding accessibility. They play a critical role in improving people’s lives in meeting their transport needs and improving their health since the dockless bike-sharing scheme is active transport. It also benefits city planners and policymakers in different ways. However, its dockless bike-sharing system has some of its negatives on the communities, making the councils angry, and some want to ban the bikes. Considering we are part of the dockless bike-sharing operators operating in Sydney, we seek to find reasons that can encourage the councils to support the dockless bike-sharing scheme. Therefore, the report will outline the benefits of the sector and highlight some of the negative impacts on communities and provide recommendations for addressing them.

Findings & Discussion

Dockless bike-sharing companies enhance the accessibility of riding. It is because riders can pick and drop off bikes at any public space close to their destination (Enriquez & Browne, 2017; Pettit, 2017). The advantage solves the challenge of hiring the bike by finding the designated docking stations and returning it to a station not close to the rider’s destination (Pettit, 2017). Additionally, dockless bike-sharing operators ease congestion in the city roads and minimize carbon emissions in the cities (Enriquez & Browne, 2017). Mobike, a Chinese bike-sharing company, reports that since its inception in early 2018, people are taking 55 percent fewer car trips. Therefore, the advantage provides a solution to having a sustainable transport system in cities, meaning the sector can be the transport sector’s future.

Moreover, the sector provides a solution to having affordable means of transport to people. The bikes are cheap compared to trains and easy to find (Enriquez & Browne, 2017). They also serve as a vital link in mobility as service (Pettit, 2017). It has health benefits considering it is active transport. Too many people can now tour multiple places hence enhancing tourist experience.

Additionally, the sector provides journey data that the council can use to plan the city and make policies. However, the dockless sharing scheme has brought problems to the community. Now, broken bikes are all over the streets blocking walkways (Enriquez & Browne, 2017). Some are in bins, canals, rivers, graveyards, and backyards, giving headaches to the councils and their communities in getting with the menace (Enriquez & Browne, 2017; Pettit, 2017).

Recommendations & Conclusion

First, dockless bike-sharing companies should publicize their recycling plan and make sure that they recycle the old and broken ones before releasing new bikes. The effort will reduce the broken bikes in the community. Secondly, the council should integrate the dockless bike-sharing scheme in the transport network to improve the last-mile connectivity. Thirdly, the councils should regulate the dockless bike-sharing system and cooperate with the operators to manage bikes from flooding the cities. In conclusion, the dockless bike-sharing scheme can bring enormous benefits and minimal negative impacts through regulations and the relevant stakeholders’ coordination.

References

Enriquez, H. & Browne, K., 2017. Dockless bikes and bike sharing. Are bike-sharing schemes such as Ofo, oBike, Reddy Go and Airbike a good idea? [Online] (updated 15 Dec. 2017). Available at: <https://www.choice.com.au/transport/bikes/buying-advice/articles/dockless-bikes>

Pettit, C., 2017. They know where you go: dockless bike sharing looms as the next disruptor – if key concerns are fixed. [Online] (updated 7 Dec. 2017). Available at: <https://theconversation.com/they-know-where-you-go-dockless-bike-sharing-looms-as-the-next-disruptor-if-key-concerns-are-fixed-88163>

Academic Writing Genres in Postgraduate Levels Similarities and Differences among the varied Genres (2)

Academic Writing Genres in Postgraduate Levels: Similarities and Differences among the varied Genres

By (Name)

Couse

Professor

Institution

State

Word Count: 1925

Academic writing that serves as one of the compulsory activities of students pursuing their studies at postgraduate level is a somewhat challenging yet exciting experience for students (Petrova 2017). Such forms of writing at a postgraduate level require lots of critical reading, thinking, analyses and evaluations. Subsequently, authors rely on available data and information as baseline for establishing new documents. It is very important that students learn to write effectively because it can improve their logical thinking, organization skills and data collection skills. In addition, good writing can lead to better mark and overall impressive performance. This essay will dissect and explain the main genres of academic writing at postgraduate level. Also, it will look at the skills a student needs to write successfully.

Precisely, there are four main writing genres at postgraduate level which entail essays, research proposals, research reports, and reflective writing. Essay writing entails in-depth exploration, analysis, and evaluation of a given topic. Moreover, essays are written in prose and presented in a continuous structure with the use of connected paragraphs from the introduction, body, and conclusion. Also, essays are grouped into four basing on their purposes; descriptive, argumentative, expository and narrative essays. Narrative essays present writers’ stories from certain points of view to attain specific goals. Descriptive essays offer intricate details and descriptions of characteristics and traits of chosen subjects. Expository essays entail critical explanations of subjects’ traits, characteristics, and description. Finally, argumentative essays endeavor to persuade and convince their audience of particular stances and claims.

On the other hand, research proposals are academic documents that strive to explain details about the plan, methodology, purpose, and objective of a research study that could be undertaken in future. Accordingly, writers employ their critical thinking capabilities to elaborate and explain the importance of conducting research studies in chosen subjects as well as necessary resources. Moreover, research proposals do not contribute additional information but endeavor to present existing gaps and the need for necessary research studies (Walonick 2005). Hence, research proposals are established to exhibit and explain reasons why some research should be conducted in a given field of study to attain some missing information.

Moreover, research reports are types of academic writing which rely on particular sections which entail discussion, methodology, literature review, finding and discussions, and recommendations and conclusion to present detailed information concerning selected topics. Accordingly, the authors employ their critical reading, analysis, and evaluation skills to develop research reports (Walonick 2005). Writers would find and critically read suitable resources for necessary evidence and development of the literature review sections. Consequently, research reports strive to expand existing knowledge through their conclusions and recommendations.

Furthermore, reflective writing offers detailed responses that a writer develops through their critical thinking capabilities with regards to a given document or situation (Rai 2006). Accordingly, writers critically analyze and evaluate specific life experiences and develop suitable responses. Thus, reflective essays depend significantly on personal emotions, judgment capabilities, and authors’ writing skills.

Also, each of the academic writing genres relies on evidence to support their points. Different academic writing documents depend on predetermined information to support their ideas and give them authority (Cumming, Lai and Cho 2016). Since critical thinking facilitates the development of personal opinions and ideologies, evidenced and findings from earlier experiments and research findings are crucial in validating and proving such individual inferences. For instance, each type of academic writing relies on either direct quotes or paraphrased versions of other scholars’ findings. Thus, evidence act as qualifiers and validators of all categories of academic documents.

Still, all the different types of academic writing adhere to particular order and structures to guide the audience. Every form of academic writing exhibits a specific structure and order to ensure that their information flows smoothly from the begging to the end (Street 2009). Most academic documents rely on the use of three-part approach which entails the use of an introduction, body, and conclusion. Even so, every category of writing has a unique structure and order due to their varied purposes. For instance, research reports rely on sub-sections with the use of sub-titles that entail literature review, findings, and discussions, conclusions, and methodology to extensively elaborate and explain its varied groups of information.

Additionally, each type of academic writing exhibits in-text citations and the use of a reference list to reinforce their points and provide links to areas of further reading. Citations and references are crucial in all academic writings since they attract more value and qualify the documents (Fox, Paine, and Sauterey 2016). References play vital roles in supporting ideas that an individual develops through their critical thinking capabilities. Moreover, writers appreciate previous academic projects through the use of references and citations. Information that other academicians and scholars established contributes significantly to validating and reinforcing claims of a writer. Therefore, references are vital sources of evidence as well as validators and qualifiers of academic documents.

Further, academic writing at the postgraduate level relies significantly on critical thinking capabilities, evaluations, and analysis. Advanced levels of academic writing extend beyond mere descriptions of an idea or subject to include personal interpretations, responses, and conclusions (Andrews 2007). Since virtually every form of academic writing at advanced levels of studies strive to expand existing knowledge, personal inferences and conclusions are essential in contributing to such desired growth. Moreover, educational documents require writers to use reliable findings and facts to develop new information through critical thinking.

Besides, each form of academic writing has a specific thesis that acts as their baselines. Theses are vital aspects of academic writing since they act as a guide and controller to ensure that the writer remains within the essential areas of coverage. For example, theses dictate the extent of what the writer would cover, the type of objectives and research questions that a writer would use. A well-directed document is relatively easier to understand and read since the audience would have specific expectations. Therefore, academic documents strive to explore, explain, and support particular theses.

Nevertheless, a key difference amongst the varied writing genres is based on the degree of research studies that a writer has to conduct. The amount of research studies that an individual does depends on the quantity of information that is needed (Shim 2005). For example, research reports and research proposals require extensive research studies to attain adequate documents that would be used in the literature review and other sections of the paper. On the contrary, essays and reflection tend to rely on limited but enough sources to support their claims and ideas. Since reflections strive to present personal emotions, interpretations, opinions, and believes about a given subject, they depend primarily on a writer’s critical thinking, evaluation and analysis skills rather than exhaustive research studies. Hence, the extent of research studies differs from one category of writing to the next.

Correspondingly, all forms of academic writing at postgraduate level demand advanced research and reading skills. Research skills are essential in ensuring that a writer provides the right and valid information that enriches their wealth of knowledge. Similarly, critical reading enables readers to collect crucial information from a given document. Accordingly, research skills involve intensive and extensive critical analyses and evaluation of available materials to establish the most suitable ones that would be employed in a given piece of writing. For instance, an individual would have to find, read, analyze and evaluate various documents to determine and select the most appropriate sources that would be used to enrich their literature review section (Fox, Paine and Sauterey 2016). Such a practice is highly-involving since the practice of establishing verified, and credible sources consume lots of time and energy. An individual could end up replicating the work of another person, thus generating similar information rather than expanding the existing ones by failing to conduct adequate research studies. Still, a writer should conduct exhaustive research studies to avoid plagiarism while increasing their knowledge for better information development (Bakhtiyari et al. 2014). Thus, research skills are critical in all academic writing.

Similarly, advanced writing skills are crucial in postgraduate level writing activities. At postgraduate levels, academic writing tends to be more sophisticated since it entails expression and explanations of particularly complex subjects in in-depth and lengthy approaches. For example, an individual could be required to provide basic descriptions of a chosen topic then offer their inferences and conclusions. Accordingly, a writer should be able to establish a suitable writing structure and style to develop an interesting document that is relatively easy to read and understand. Moreover, writers should use appropriate terms and sentence structures that are relatively easier to understand by avoiding ambiguity while ensuring clarity and simplicity. Also, meticulous referencing, appropriate structuring, proper grammar, apt planning, and drafting of academic documents are critical in promoting quality work. Thus, suitable writing skills are essential in every type of academic writing at postgraduate levels because they enable writers to adequately communicate their messages to the target audience.

Likewise, proper time management and planning is another essential skill in the development of all the varied academic documents. Appropriate time management enables writers to adequately study, analyze, evaluate, and interpret collected data while ensuring that sufficient time is available for writing quality documents (Rani and Mangala 2010). An individual would probably conduct quality analysis, evaluations, and interpretations when they have ample time. Research and critical thinking activities consume relatively lots of time and energy. On the other hand, students at postgraduate levels tend to operate under tight time schedules following the complexity of their studies. Accordingly, an individual should establish and stick to a suitable timeframe that puts into consideration every aspect of the writing processes.

Additionally, all the varied categories of academic writing rely primarily on proofreading and editing to gain adequate quality. Proofreading and editing a document contribute significantly to ensuring that it exhibits all the desired qualities while presenting extremely minimized or not errors (Harwood, Austin and Macaulay 2012). For instance, writers could proofread and edit their work to ensure the inclusion of all the required sections and proper titles/ subtitles while embracing the correct tenses and vocabulary. Well-edited and proofread documents are free of punctuation and spelling mistakes. Consequently, such documents would exhibit high-quality because they communicate effectively while ensuring a smooth flow of information from one point to the next. Moreover, the writers would present full details by ensuring that they provide all the necessary details. Therefore, proofreading and editing are vital tools that are used to refine academic documents to ensure they are of high-quality.

Overall, academic writing at postgraduate level comprises four main genres that entail research proposals, research reports, essays, and reflections. The varied groups of documents tend to be more sophisticated since they demand lots of critical thinking skills to provide valuable information for expanding existing knowledge. The main similarities in the varied groups of writing entail the use of critical thinking and evaluation skills, time management and planning skills, editing and proofreading skills, writing skills, the use of a thesis, and essential reading and research skills. On the other hand, the differences exist in the structures and extent of research studies that are employed to develop the different types of documents. Research papers demand extensive research studies since they focus on literature reviews. On the other hand, reflections and essays tend to rely on limited amounts of research because they depend mainly on critical thinking, analyses and evaluation skills of an individual. Therefore, academic writing at postgraduate levels is more demanding and requires a sufficient understanding of the varied writing genres to ensure quality work.

References

Andrews, R., 2007. Argumentation, critical thinking and the postgraduate dissertation. Educational Review, 59(1), pp.1-18.

Bakhtiyari, K., Salehi, H., Embi, M.A., Shakiba, M., Zavvari, A., Shahbazi-Moghadam, M., Ale Ebrahim, N. and Mohammadjafari, M., 2014. Ethical and unethical methods of plagiarism prevention in academic writing. International Education Studies, 7(7), pp.52-62.

Cumming, A., Lai, C. and Cho, H., 2016. Students’ writing from sources for academic purposes: A synthesis of recent research. Journal of English for Academic purposes, 23, pp.47-58.

Fox, C.W., Paine, C.T. and Sauterey, B., 2016. Citations increase with manuscript length, author number, and references cited in ecology journals. Ecology and Evolution, 6(21), pp.7717-7726.

Harwood, N., Austin, L. and Macaulay, R., 2012. Cleaner, helper, teacher? The role of proofreaders of student writing. Studies in higher education, 37(5), pp.569-584.

Petrova, O., 2017. Writing as a part of postgraduate training English (Doctoral dissertation).

Rai, L., 2006. Owning (up to) reflective writing in social work education. Social work education, 25(8), pp.785-797.

Rani, E. and Mangala, S., 2010. Need and importance of soft skills in students. Journal of Literature, Culture and Media Studies, 2(3).

Shim, E., 2005. Introductions in research papers: Genre analysis of academic writing. ENGLISH TEACHING (영어교육), 60(4), pp.399-422.

Street, B., 2009. ” Hidden” features of academic paper writing. Working Papers in Educational Linguistics (WPEL), 24(1), p.1.

Walonick, D.S., 2005. Elements of a research proposal and report. Survive Statistics.

Methods in Behavioral Research



Methods in Behavioral Research

Name:

Professor

Institution:

Course

Date

Chapter 1 Scientific Understanding of Behavior1. Why is it important for anyone in our society to have knowledge of research methods?2. A newspaper headline says that “Eating Disorders May Be More Common in Warm Places.” You read the article to discover that a researcher found that the incidence of eating disorders among female students at a university in Florida was higher than at a university in Pennsylvania. Assume that this study accurately describes a difference between students at the two universities. Discuss the finding in terms of the issues of identification of cause and effect and explanation of behavior. Chapter 2 Where to Start3. What information does the researcher communicate in each of the sections of a research article?Chapter 3 Ethical Research4. Participants in an experiment are given false feedback that they have an unfavorable personality trait or low ability level. What are the ethical issues raised by this procedure? What if participants are given false feedback that they possess a very favorable personality trait or a very high ability level? Are the ethical issues the same, or different? What are the reasons that an experimenter would subject participants to these types of situations? What safeguards should the experimenter undertake? Chapter 4 Studying Behavior5. A few years ago, newspapers reported a finding that Americans who have a glass of wine a day are healthier than those who have no wine. What are some plausible alternative explanations for this finding; that is, what variables other than wine could explain the finding? Explain why it is difficult to identify the cause and the effect in this study, and describe what might be a “third-variable” problem. Describe the importance of experimental control, and how this newspaper-reported finding might be set up as a proper experiment to discover if wine truly has an effect on health.Chapter 6 Observational Methods6. Describe how a researcher would collect and analyze naturalistic observation data of teenage attendees at open meetings of Alcoholics Anonymous.Chapter 7 Asking People about Themselves: Survey Research7. What are some factors to take into consideration when constructing questions for surveys (including both questions and response alternatives)?Please do not write the question, i just need the answers to the question. Please list the number to the question, then the answer. I don’t want you to list the question to save words for the answers.

1.It is necessary that methods of research are known to people in any society. This is because there is a need to ensure that people are informed. In turn, people will be able to live more meaningful lives. The press is involved in ensuring that information of a scientific nature is available to people. The information obtained should be used in an intelligent manner. The processes involved in scientific research, take place in the form of evaluation, formulation, conduction, as well as design.

2.The article sort to give an explanation as to why females, who are in warm places, are more likely to suffer from disorders caused by eating. Furthermore, it was proven that in the Florida University, the females were more prone to this disorder as compared to those in Pennsylvania. The issue in this article is the eating disorders and its relation to females studying in two different universities. The cause of the eating disorders is as result of temperature, which is high in Florida as compared to Pennsylvania. The effect of their being high temperatures is that the females are experiencing problems related to eating disorders. The behavior of the females in the different states as well as the warm weather is the reason for the eating disorder.

3.Every research article has different sections, which the researcher seeks to ensure is effectively communicated. The aim of carrying out the research should be known and this is through the effects of the issues that were raised. The method or procedure followed in determining the purpose of the research is next. At this stage, the researcher gathers useful data to be used in knowing what is the effect and cause of his study. After this comes the stage whereby the researcher comes up with findings as well as results of the research which was carried out. The behavior is known and this is after the data has proceeded to provide meaningful information. An explanation should be given in order to known what the findings mean. This information is critical in knowing the outcome of the research. An evaluation should be conducted to find out the credibility of the research. Each of these stages are essential as they enable those who are reading an article to know the methods, followed in coming up with a conclusion. Lastly, the credibility of the research is shown through the use of the information that has been provided.

4.Ethical concerns are raised when false feedback is given to participants concerning their ability levels, as well as their personality. This is because it is against the rules of ethics whereby, researchers are meant to be truthful, honest, and to ensure errors do not occur. So long as a participant is given information, which is not true, an ethical violation has occurred. This is regardless of whether the information is positive or negative. An experimenter might provide positive feedback if it will benefit them. If the experiment believes that they will not benefit they will give negative feedback. Experimenters should ensure that they follow the policies which exist concerning research matters.

5.There is a finding that those who do not have wine, by the glass on a daily basis are not as healthy as those who do. The other variables, which concern this matter are the way of life, as well as the wealth of the people who take the wine. These variables are known to increase people’s health. Since there are other variables, which affect the health of people, it is difficult to find the effect and cause. A problem of third variable is created whereby; the second and first variables are interfered with. This means it is not possible to confirm the credibility of this research article. In every experiment, the experimentors must be controlled to ensure that they do not provide information, which is not credible. This has adverse effects on people, as it might be interpreted in a negative manner. As a result of this article being published, other experimentors will use the other variables to prove if the information on the first article is true.

6.When using Naturalistic observation methods of research, the researcher will have to observe while at the environment, which is natural. Information is collected at the AA meetings and it cannot be manipulated. The methods, which are suitable, are through observer narratives and tally counts. Data of a sample nature should be collected and this will be used in the analysis. It is important that the teenagers are observed when there are different situations and settings.

7.It is essential that when coming up with surveys, the questions should be accurate. This ensures that those who are to answer know what it being asked precisely. Also, the questions should be relevant to the research. This will assist in coming up with answers which are also specific as well as beneficial to the survey. Other factors include honesty, free from plagiarism, among others.