Impact of Music on the Cold War

(Name)

(Instructors’ name)

(Course)

(Date)

Music in the Cold War

Characterized by military apprehension, economic competition, and political conflict, the cold war was the term used to refer to the relationship established between the US and the USSR after World War II (Whitfield 377-392). Accordingly, these two states engaged in various proxy wars as they differed in their governance of each respective state. The two states considered themselves as sworn enemies and they were determined to outdo each other in relation to the ways in which the two states were run and governed. Though the cold war is considered as one of the political wars that characterized this period, researchers argue that the war between these two states was beyond political and military competition.

According to research studies, the cold war was also a cultural war with the states involved fighting for the sustenance of their different cultures. Because of the wars, the two states feared the possibility of cultural delusion in their states, and for that reason, they embraced the use of various artistic forms to help prevent this (Whitfield 377-392). Though many argue that the cold war had a significant effect on the culture and lives of the citizens in these states, others argue that the impact was vice versa. That artistic components such as music, literature, and film had effects on the cold war itself (Rosen 1). More specifically, music is considered to have had the most significant effect on the cold war. This is because, out of all other artistic elements and components, music was the most exploited, and more music groups and musicians came up with various compositions that impacted the cold war. Accordingly, researchers argue that music composed during this time had significant impacts on the cold war including augmenting the wars and conflict during this time, as well as, reducing and possibly bringing to an end the tension that was experienced during this time (Rosen 1). In essence, music had a great impact on the cold war, which is the subject of this paper.

This paper examines the impact of music in the Cold War. Specifically, the paper examines music as a weapon of war, music a cultural expression, music as a diplomatic tool, and music as a source of encouragement.

Impact of Music on the Cold War

In order to understand the impact of music on the cold war, one must consider the various ways in which music was used and exploited during this time. A closer examination on the exploitation of music during the cold war reveals that music was used in four key ways, including as a weapon, as a form of cultural expression, as a tool for diplomacy, as well as, a source of encouragement (Schmelz 3-16). These uses of music can be divided into two main broad categories to illustrate the impact of music on the cold war. These categories include the impact of music on the augmentation of the war and the impact of music on the reduction and end of the war.

Escalation of the War

Increasing and accelerating the war is the first impact of music on the cold war. Musicians and other musical composers established various musical compositions are considered as having been responsible for the escalation of the cold war during this time. This is because the states at were used their musical compositions weapons of war and forms of expression, thus increasing the disparities between the states at war (Whitfield 377-392). By increasing the disparities between the states, music indirectly fuelled the war between the states, as the two states fought to express their cultures through music.

Music as a Weapon of War

As previously mentioned, the cold war was largely influenced by music and other artistic forms of expression. Music impacted the cold war in various ways, with one of the ways being fueling war between the two states. According to Cusick, music during the cold war was used, not only as a weapon of war, but also as a weapon for torture (Cusick 1). The first use of music as a weapon of war and torture was demonstrated by the US troops in 1989. As a strategy for inducing a Panamanian surrender, the US troops played loud music as a form of weaponry known as “acoustic bombardment” (Cusick 1). As researchers explain, acoustic bombardment was a form of war attack in the battlefields that was considered to have a negative effect on those to whom it was being imposed. Specifically, this form of war weaponry was said to be an alternative to other lethal methods of armament. This is because, this type of weapon was used for torturing enemy troops through sensory deprivation and sexual humiliation, thus fostering more an increment of battle and war in between the states at war (Cusick 1). Using music as a weapon of war encouraged an increase in war and conflict because it prompted retaliation from enemy troops who were initially subjected to this form of weaponry. When prisoners were captured, they would also be subjected to various musical compositions that were designed to force them into revealing the secrets of their home troops. Detainee interrogations during this time were highly characterized by playing of music, which had a psychological effect on those under interrogation. This, therefore, illustrates how music fuelled wars and conflict during the cold war.

Music as a Cultural Expression

Evidently, music was and still is primarily used as a form of expression for the composer and his people. Musical compositions during the cold war were highly characteristic of cultural expression and attitudes (Whitfield 377-392). For that reason, most of the music composed during this time was created to reflect the different cultures of the people and communities in the society during this time. Though the composition of music as a form of cultural expression has a positive connotation to it, its overuse in the period during the cold war transformed these forms of music into political idioms (Whitfield 377-392). This transformation saw the escalation of the cold war because most people used music to express their political ideologies regarding the cold war. Music that was used for political expression slowly took over the society, and it in turn saw the increase of political protests in the different states. Using music as a form of cultural and political expression was is considered as a way through which music impacted the cold war as it promoted negative thinking in individuals under the name of “freedom of political expression”. Most people believed that they had a right to their political thought, and because these thought differed across cultures, the possibility of fighting among each other increased because of these differences. For that reason, music can be said as to having impacted the cold war by escalating the war into new levels that were not existent before.

Curtailing the War

Research studies on the impact of music on the cold war also identify the curtailing of war as one of the impacts of music on the cold war. Though music may have played a role in increasing the war, researchers and historians also argue that music composed during the cold war had a significant effect on the reduction of the cold war. Musical compositions were used to discourage the two cultures that were at war with each other form going into war. Instead, such music spoke for the need for peace between the US and the USSR, by educating individuals on the importance of maintain peace with each other. In addition to this, such music was also used to illustrate the disadvantages of going to war and the negative effects that this had on the society at large. Two main uses of music have been identified with relation to curtailing the war including the utilization of music as a diplomatic tool and as a source of encouragement.

Music as a Tool for Diplomacy

Music was also exploited as a diplomatic tool during the cold war. As Fosler-Lussier explains in her article, musical compositions were used for the enhancement of the image of the cultures that were at war with each other (Fosler-Lussier 1). Specifically, the US utilized various forms of music such as jazz and folk music to enhance America’s image to the rest of the world. Accordingly, the US state department deployed American musicians to various parts of the world to perform various forms of music as a way of illustrating their diplomacy during the Cold War. These musicians played the role of cultural ambassadors as they used their music to reach out to the different populations of the world and spread their message across (Eschen 55). They met various groups and populations and educated them on the culture of Americans, as well as, their thought regarding the cold war. By doing this, music was used to discourage war between the states, thus bringing to an end the cold war that had had a significant effect on the society at the time.

Music as a Source of Encouragement

The period during the cold war also saw the composition of musical pieces that were solely aimed at encouraging people during their trying time at the war (Cortright 12). Musical compositions were used to encourage the military soldiers as they went to war and after they came back from war. Such musical compositions encouraged these soldiers that they would come out as victors from these wars, thus urge them to march on to their success. Contrastingly, there were various musical compositions that encouraged the need for peace and stability, thus discouraging the states from going to war with each other (Cortright 37). Such music inspired these states to stop fighting with each other and embrace peace and harmony for a better future and society for the generations to come, thus reducing the possibility of individuals engaging in war. By encouraging people to stop engaging in war, music impacted the cold war through curtailing the cold war and its effects on the states at war.

Work Cited

Cortright, David. Peace: A History of Movements and Ideas, UK: Cambridge University Press,

2008. Print.

Cusick, Suzanne G. Music as torture / Music as weapon. 23 March 2006. Web. 7 December

2011. <<http://www.sibetrans.com/trans/a152/music-as-torture-music-as-weapon>>

Eschen, Penny M Von. Satchmo Blows Up the World. Jazz Ambassadors Play the Cold War.

Cambridge, MA: Harvard University Press, 2004. Print

Fosler-Lussier, Danielle. American Musicians in Cold War Cultural Diplomacy. 15 January

2006. Web. 7 December 2011.

<<http://mershoncenter.osu.edu/expertise/force/musiciandiplomacy.htm>>

Rosen, Charles. Music and The Cold War. 7 April 2011. Web. 7 December 2011.

<<http://www.nybooks.com/articles/archives/2011/apr/07/music-and-cold-war/?pagination=false>>

Schmelz, Peter J. Introduction: Music in the Cold War. The Journal of Musicology,

26.1(2009): 3-16

Whitfield, Stephen J. The Cultural Cold War As History. West Virginia Quarterly Review,

(1993): 377-392.

2LETTER FROM BIRMINGHAM JAIL BY MARTIN LUTHER KING

LETTER FROM BIRMINGHAM JAIL BY MARTIN LUTHER KING

Student’s Name

Institutional Affiliation

Course

Professor’s name

Date of Submission

Letter From Birmingham Jail by Martin Luther King

Martin Luther King Jr, who served as a minister and an activist of civil rights, wrote the Letter from Birmingham Jail in April 1963, while he was still in prison. He had been arrested for civil disobedience after engaging in a peaceful protest against segregation which was prevalent in Birmingham city. The letter addresses the racial segregation and all the injustices that the black community in the US was facing. The letter was in response to the criticism which had been addressed to King by eight clergymen who considered King’s and his fellow activists’ actions as unwise and untimely. King addressed the concerns of the clergymen about his action using a formal tone. The primary audience of King’s letter were the clergymen and other white moderates who were against the black community movement. This essay provides a comprehensive discussion of what was included in King’s Letter provides the author’s key arguments and personal thoughts about the letter.

There are three main issues presented in the letter. Firstly, King addressed the clergymen’s concern that it was not his place as outside to interfere with Birmingham city. Explaining why he was in Birmingham; King gave three reasons why it was appropriate for him to engage actively in Birmingham’s civil rights despite him not being a permanent resident. He first explained that he was the president of the Southern Christian Leadership Conference (SCLC), which operated in all Southern states. He further stated that his organization was sharing staff, financial and educational resources with its affiliates, and a few months ago, the affiliates in Birmingham had requested them to engage in a nonviolent protest, which they agreed to. Therefore, he was in Birmingham because he had organizational ties there. Secondly, he stated that he was in Birmingham because of the injustice there. He explained that he was in Birmingham to seek freedom for all and respond to the call of aid. Lastly, King claimed that he was in Birmingham to deal with injustices since injustices in Birmingham were a threat to justice everywhere.

Secondly, King addressed why Birmingham needed to demonstrate. He claimed that the black community had no alternative but to demonstrate since the need for justice in the city was urgent. According to King, the main reason for the demonstrations were that Birmingham was the most segregated city in the US, with high records of brutality among the black community, blacks being treated unjustly in courts, and the existence of many unresolved cases of the Blacks’ homes and churches in Birmingham, which the political leaders had refused to negotiate. King explained that he and his organization had acted responsibly and adhered to the four basic steps to be followed during a nonviolent campaign. The first step entails gathering facts. King explained that he, together with his group, had reviewed and confirmed the existence of segregation in Birmingham. The step is negotiation. Birmingham and his team had negotiated with the leaders of the economic community in Birmingham, and several promises were made. However, these promises were never fulfilled. The third step is self-purification. King and his team had conducted inner reflections and workshops of non-Violence. The fourth action is direct action, the nonviolent protest that King had been arrested for taking part in.

Lastly, King expressed his intentions during the peaceful protests in the letter. The main aim of their direct action was to establish a scenario that would inevitably open doors for negotiations. King further went ahead to address the critics from each of the clergymen. He addressed the critics in the letter why the action was untimely. Addressing this critic, he explained that the city had waited for over 340 years for their God-given and constitutional rights, and it was now time to act. He also addressed the clergy’s concern that he and his team were willing to break the law. He stated that he would be on the frontline, urging people to obey the just laws. However, he would openly advocate obeying unjust laws. Laws in Birmingham were unfair, and King would not advocate for them to be obeyed. He also explained that he had been greatly disappointed by the white moderates who preferred a negative peace that involves a lack of tension to positive peace characterized by justice. He also argued that White moderates were more devoted to order than justice. King also addressed the criticism that although their actions were peaceful, they precipitated the violence. He compared such thoughts with condemning a man who has been robbed because his custody of money hastened the act of bribery, which he considered illogical. Additionally, King addressed the clergymen’s concern that the direct action in Birmingham as extreme. He expressed great disappointment that his fellow clergymen would consider his nonviolent efforts as those of extremists. In his defense, he stated that oppressed individuals would not be oppressed forever, and their desire for freedom had to be attended to. He further insisted that it was better for his actions to be considered extreme for the cause of justice than standing by and watching injustices to continue. King also refutes the clergymen’s claim that laws of segregation should be fought in courts and not in the street. Supporting his argument King explained that only through direct action could push the white majority to confront the racism issue and engage in a true dialogue. King addressed all the concerns of the clergyman in a detailed manner and explained the reasons behind the direct action.

In my opinion, King utilized his letter to address the concerns of the clergymen and make his judgment. Additionally, although King was mainly addressing the clergymen’s criticisms, he was also reaching out to the whole nation to stop racial injustice by successfully showing how injustice anywhere threatens justice everywhere. Furthermore, using pathos, ethos, and logos made his speech more effective. The use of biblical allusions also allowed King to develop analogies concerning the biblical figures, justify the peaceful protests, and solidify his arguments. Finally, the fact that King closes the letter using a hopeful note indicates that the Black community will attain the equality and freedom are fighting for.

2nd Corinthians 127-10

Name:

Professor:

Course:

Date:

2nd Corinthians 12:7-10

Introduction

The bible passage from 2nd Corinthians 12:7-10 written by the Apostle Paul is titled ‘The Thorn in the Flesh.’ Paul wrote the second book of Corinthians to the church in Corinth, giving them advice on various matters concerning their faith and Christian life. To reinforce his message, Paul used his own life as an example. The purpose of this paper is to compare the passage based on three different versions of the bible: the New International Version, the New King James Version and the Common English Bible. Additionally, the paper will interpret the meaning of the passage, and its application to Christian life.

Investigation

Literary Questions

The bible passage is part of Apostle Paul’s letter to the church in Corinth. Paul wrote to the Christians in Corinth to encourage them in their journey of faith and Christianity. In the letter, Paul addresses the Church directly using the first person, using his own experiences. He explains that God sent him a ‘thorn in the flesh’ lest he begin to trust in himself and become proud.

The passage fits in quite well with the verses that come before and after it. Verse 6 of the New International Version states that “Even if I should choose to boast, I would not be a fool, because I would be speaking the truth. But I refrain, so no one will think more of me than is warranted by what I do or say….” This gives a background as to some of the reasons that may lead Paul to conceit (Barrier 4). God had revealed so much to Paul, such that he could afford to boast about his revelations. Verse 7 then goes on to explain how God also sent Paul some challenges to keep him dependent on God and keep him from pride. Verse 11 that comes after the passage explains that Paul’s trails did not make him any less inferior to other apostles.

Grammatical Questions

There are some differences in the wording of the passage in the three translations, and these may affect the interpretation of the passage. Verse 10 in the three translations uses some different words:

I delight in weaknesses, in insults, in hardships, in persecutions, in difficulties (NIV)

I’m all right with weaknesses, insults, disasters, harassments, and stressful situations (CEB)

I take pleasure in infirmities, in reproaches, in needs, in persecutions, in distresses (NKJV) (Biblegateway)

The New King James and New International Versions each state that Paul delighted and took pleasure in his challenges, while the Common English Bible uses a different phrase, ‘I’m all right.’ This shows that Paul merely endured his suffering, while the other two say that he was happy to suffer.

The wording of the different problems that Paul went through is also different, and this might make a person interpret them more lightly in one version as compared to the others.

The structure of the passage varies in the three translations, mainly in the words used as explained. However, the three passages retain the same words in speaking about God’s grace being sufficient through suffering, and also when Paul says that how weakness is what makes him strong.

Historical Questions

The historical background of the passage is that it was written after Paul had visited the Church in Corinth, and had his authority challenged. The members if the Corinthian church even went as ass far as to insult him, and Paul wrote to them to express his disappointment. However, in the latter parts of the letter, he speaks of his joy upon learning that the Corinthians had repented, and that he culprits had been identified. Paul’s letter to the Church at Corinth carried the message that even in the face of persecution, he rejoiced because God’s grace remained sufficient through all difficulties.

Verse 10 of the passage is based on the background of the history of the writing. Paul speaks of weaknesses, insults, hardships, persecutions, and difficulties. Before Paul converted into Christianity, he had been one of the biggest persecutors of the Christian Church. However, after God appeared to him, Paul become one of the strongest apostles and for this reason, God revealed many things to him (Schellenberg 518). Some people felt that Paul had too much authority, and this is why he was insulted by the Corinthian church. Aside from the Corinthian Church, he had also faced a lot of persecution from different quarters, for example he had been thrown into jail, stoned, beaten and endured other sufferings. These kinds of challenges are what Paul refers to in Verse 10. All of these challenges are from the ‘messenger of Satan’ as Paul states.

Theological Questions

The main message of 2 Corinthians 12:7-10 is that God’s grace is sufficient for Christians no matter how great their suffering might be. In addition to many persecutions from enemies of the Church, Paul was also insulted and challenged by fellow Christians. Paul was trying to tell his critics and persecutors that even in the face of attacks, he remained steadfast in his faith. He asserted that times of weakness led Christians to rely even more on God, therefore making them stronger (Moss 321).

I find several important principles in the passage. The first is warning against pride when one feels God’s favor upon their lives. The passage tells us about God’s grace that is sufficient for His people even in their darkest hour. The passage also teaches Christians that suffering and difficulties are inevitable part of their Christian journey, and the best thing they can do is to count on God’s grace that is especially manifested in times of weakness. The passage also warns the Church against causing the suffering of fellow members and church leaders. The church should respect its leadership because they have been ordained by God. The church of Corinth felt that Paul had too much authority.

Paul asks God to take his trials away three times, but God failed to do so. This is another sign that Christians should accept God’s will in their lives, even when it is not what they want. Christians must have absolute confidence of God especially in times of problems.

Application

The bible passage from Corinthians is one that I have learnt a lot from. Paul was one of the greatest Apostles, yet his experiences are applicable to the daily life of a Christian. First, Paul fought against pride, something that all Christians must strive to avoid. Paul says that God sent him a thorn in the flesh, to keep him from conceit. Most of the time, Christians begin to get conceited, thinking that God favors them more than others (Ellington 331). This passage has helped me to understand that guarding against pride is a fundamental principle of faith. Another important point I learned from the passage is that sometimes, Christians do not get what they want from God; rather we should trust God to do His will in our lives. Temptations and challenges come to us so that God can give us His strength in our times of weakness. God’s grace is sufficient in all seasons of our lives, but even more so when we experience difficulties from quarters we do not expect. The lessons from Paul’s letter to the Corinthians apply to every Christian even today.

Works Cited

2 Corinthians 12:7-10 “The Thorn in the Flesh” Biblegateway. https://www.biblegateway.com/passage/?search=2+Corinthians+12%3A7-10&version=NKJVBarrier, Jeremy. “Visions of Weakness: Apocalyptic Genre and the Identification of Paul’s Opponents in 2 Corinthians 12: 1-6.” Restoration Quarterly 47.1 (2005): 4.

Ellington, Dustin W. “Not Applicable to Believers? The Aims and Basis of Paul’s” I” in 2 Corinthians 10—13.” Journal of Biblical Literature 131.2 (2012): 325-340.

Moss, Candida R. “Christly possession and weakened bodies: Reconsideration of the function of Paul’s thorn in the flesh (2 Cor. 12: 7–10).” Journal of Religion, Disability & Health 16.4 (2012): 319-333.

Schellenberg, Ryan S. “Paul, Samson Occom, and the Constraints of Boasting: A Comparative Rereading of 2 Corinthians 10–13.” Harvard Theological Review 109.4 (2016): 512-535.

Impact of Technology on an Organization

Impact of Technology on an Organization

Name

Professor

Institution

Course

Date

In adapting to new technology, universities face many challenges. This is in terms of systems for performance evaluation, compensation systems and decision rights. Problems usually arise when people have to adapt to changes. Information has to be communicated as well as processed. Everyone in the university has to have access to information; otherwise it will not function as it is meant to. Universities are in need of technology, which will facilitate their work processes. They have to ensure that they effectively deal with challenges, such as decision authority. The other challenges include how to have proper incentives as well as team work. Some universities are still using a system, which is traditional and in turn, it has made the mass markets become exhausted. Organization structure is affected if it does not employ the use of information technology (Hitt & Brynjolfsson, 1997).

Most of the employees who work in universities, which are traditional, are not happy with changes related to the existing organization structure and coming up with an organization, which is virtual. There is usually a need in universities to ensure that people are united, in order to increase their productivity. The theory of social action is extremely useful in knowing the impact technology has had on the universities. This is because their failures and successes are easily made known. According to Brynjolfsson and Hitt, organizations are forced to obey authority, which is decentralized. The latter is as a result of the impact of Information technology. Furthermore, they believe that transmission of knowledge becomes cheap as a result of IT. Universities are now ensuring that all their departments are connected, in order to increase efficiency. Rights for making decisions are thus allocated to the entire optimum knowledge chamber, which exists (Hitt & Brynjolfsson, 1997).

Centralization in universities is often measured in terms of rationality, which is human or cost based. This in turn affects the level of centralization at the different universities. It is easy to obtain and measure information, based upon effective decision making. The result is that communication costs are economized as well as optimized. In order to obtain information, there is a central agent. It is vital in matters related to cost saving as well as its benefits. The disadvantage is that those involved in decision making especially the central ones are the ones who lose a lot. Decentralization occurs as a result of efficiency, which is induced. Decentralization is affected by the presence of decision makers who are multiple (Hitt & Brynjolfsson, 1997).

On the other hand, Baroudi and Lucbas believe that there is a link between organizational design and IT design. There are many ways, which tasks can be coordinated, as well as be divided in order to increase productivity. The process of organizational design can also be used because it advocates for management decentralization (Lucas & Baroudi, 1994). This means that all the employees working in the university will be involved in decision making. Span control is an element of a variable used in the design process. At the different universities there will be many people in management and they have to report to their heads. In every organizational chart, every employee’s job titles are made known and can easily be altered. The latter can easily be achieved as compared to strategy, culture and behavior. The frame work of social action advocates for constructs, which are key in any university. The most vital aspects of any organization should be technology, structure, tasks and people. Technology plays an essential role in bringing about changes in the universities structure. This means that there is a direct relation between organization form and IT. Relationships, which exist in firms, are due to communications as well as computers. In modern times, universities are seeking to become hybrid as compared to before when they were centralized. This is because a lot of emphasize has been placed on micromarketing (Lucas & Baroudi, 1994).

Universities are adapting to the use of technology, in order to modify their outlook as well as processes. Technology has reduced the number of employees who are employed. This has had a negative impact on the manner, which the university is perceived. Competitive advantage and cost saving is what is often sort by traditional organizations when they choose to incorporate technology into their structure. The universities operation is improved by re-engineering processes. Shifting to models, which are virtual, is what is being done by universities, which are traditional. This is for the purpose of ensuring that responsiveness is improved. Negative impacts are brought about by being slow and with technology this is not possible. For crisis to known before hand, change should be accepted by everyone (Lucas & Baroudi, 1994).

In conclusion, this case study provides a lot of information concerning the advantages of IT in an organization. Organizations, which are traditional, should adopt an approach that is modern in order to improve their performance and processes. Thus, the research by the different authors is extremely beneficial. Almost every organization in the world is being run by technology and this has in turn, brought about increased competition. Consumers are the ones who are benefiting from the advantages of technology.

References

Hitt, Lorin. & Brynjolfsson, Erik. (1997). Information Technology and Internal Firm Organization: An Exploratory Analysis. Journal of Management Information Systems. 14.2, 81-101.

Lucas, Henry jr. & Baroudi, Jack. (1994). The Role of Information Technology in Organization Design. Journal of Management Information Systems 10, 4, 9-23.

Impacts of Cyber Inecurity

Impacts of Cyber Inecurity

Name

Institution

Year

Introduction

Cyber security is one of the major concerns in this fast-growing field of technology. Most people blindly use the technology mainly in communication and social media without taking any precautions to secure their personal information and data. The increased cases of hacking on individuals, companies, and governments is worrying and demands urgent actions to address the issue. More so is the rising cases of theft of personal data from customers and patients where it is then sold on online black markets for billions of dollars. The danger lies in the uncensored exposure of innocent individual’s personal data that is later used to threaten and steal from them on the online platforms. Over the years, the sensitization and public outcry over hacking and insecurity on the online platforms has raised the alarm that is helping combat the problem. However, a huge problem lies within the uncontrolled cases of hacking where millions of cyber insecurity issue are reported. The solution lies in the close collaboration between the governments and tech experts who can help crack down on the perpetrators of these evil acts. Just in 2019 alone, there were more than 2.5 million cases of attempted and successful hacks that mainly targeted customers in the online business and even air travel.

Just the past 8 months, the FBI reported that the Federal Reserve of the U.S. was a victim of almost 2500 attempted hacks. These figures show that the hackers and only criminals have no limits and will do anything to get even to the most secure systems (Kshetri, 2017). Moreover, the government has been called upon to come up with the right systems that will help safeguard the online data of its people that if exposed to the criminals can even pose a national security problem. There is thus a personal and national concern when it comes to issues of cyber security. Another outlook into the issue is the co-relations between the underlying factors that touch on tech security and the usage over its widely spreading reaches (Ekstedt et al., 2015). The internet has become a common tool that is facilitating the sharing of data between individuals, companies, and governments. Through the same avenue, online criminals and inventing ways to bypass this and acquire key personal and financial information from the people. Studies have shown that 2.7 billion dollars are stolen through cyber related hackings from customers and even governments (Kharchenko et al., 2019). These mischievous activities happen with little detection from the cyber security experts who are meant to crack down and stop these acts.

Effect of cyber insecurity on business and customer security

Cyber security has been highlighted as one of the core issues modern business have to address. Almost all businesses today operate within or under a set of full tech systems that involves communication, payments, and customer services (Soomro et al., 2016). This exposes them to the cyber security issues of this age and thus a major setback to their security and stability. One of the underlying factors in this business is the inclusive value and that posed by these cyber security problems on businesses studies shows that at least 45% of modern business receive cyber security threats or hacking attempts every year. The figures have been rising thus showing the agility and increased attempts by the online criminals to penetrate the business files (Ji et al., 2016). A case in point was like the 2015 Yahoo hacking that raised global attention over the security of customer data. Cyber insecurity is harmful to businesses and has an overall effect of cutting down customer loyalty. Cyber security is targeted to become a multi-billion-dollar industry as the risks of hacking continue to rise (Rashid et al., 2018). The exposure of online data from customers who seek online services is offering an outlet for criminals to conduct their activities.

In some extreme cases, cyber insecurity has led to loss of cash where some businesses accounts are hacked and money transferred in mysterious ways. One of the main threats that businesses face is theft of customer data (Hubbard & Seiersen, 2016). Most e-commerce firms across the w rod now have to spend millions of dollars in cyber security to safeguard their customer data as well as finances (Kharchenko et al., 2019). The issue adds to the burden of doing business thus increasing the pressure on the existing value and dynamics of doing business. The threat not only exists among the ecommerce firms but almost all businesses as they are now exposed to the modern technology. The theft of this vital information not only threatens the companies but the customer safety as already seen in the health records scandals around the world. The cyber criminals know that the key to inducing harm to a company is to steal customer data where they threaten to sell the personal information. To online buyers. These risky ad dangerous moves by online criminals are responsible for the rising cases of customer loyalty decline where some cases lead to lawsuits (Shapsough et al., 2015). The end game to these hackings is the increased fear by customers to trade online and the huge financial burden the business has to bear in protecting their customers and data.

Impact of cyber insecurity on government operation

Cyber insecurity has been a major issue at the governmental level with many countries reporting attempted hackings. Online criminals seek to terrorize and steal critical government information and data through its websites and this even poses national security threat (Van Schaik et al., 2017). The U.S. Federal government reports an average of 2500 hackings annually that often come from its rivals like China and Russia. The online criminals have mastered the new way to target the government by using the lower agencies and ministries that are more vulnerable and easier to hit (Tisdale, 2015). The impact of cyber insecurity is very sensitive when it is done to the government as it poses both economic and national security risk that can endanger the stability of a country. One of the key targets for online hackers is the political establishments and state of a country that are the pillars of the country’s stability (Srinivas et al., 2019). For example, the 2016 Russian hacking on the Democratic party in the U.S. shows how the situation can be dangerous when it goes unnoticed.

The impact of the cyber security at a national level is the possibility of conflict between countries that can even lead to war. China is accused of conducting ample hacks on the U.S. treasury that was almost promoting diplomatic chaos between the two giants back in 2014 (Kharchenko et al., 2019). These mischievous online business by government hackers who mainly work secretly for the government can be dangerous and harm relations between countries. Cybercrime has been noted by the UN as a major hindrance to diplomatic relations mainly between the democratic and communist countries. Iran which has been a major concern for many countries has been accused of hiring and protecting its hackers who often target the U.S. these relations that have been derailed by the increased tense atmosphere on the online platforms has stained the links between countries (Soomro et al., 2016).

Cyber security at governmental level also targets the military sector that is a prime source of a country’s security data. Hackers target this prime sector as it can provide the enemy an edge on the weapon development and defense tactics used by its enemy (Hubbard & Seiersen, 2016). The increased cases of hacks on the military departments of other countries has become a major concern for NATO and the UN as some of the global society bodies. The U.S. has even accused China od hacking into its weaponry departments and stealing vital and sensitive data that it uses to gain an edge over its enemy. For example, the U.S. accused China if hacking into its drone development system thus causing a major setback to the underlying and existing diplomatic ties (Shapsough et al., 2015). These acts have even led to some countries calling back their envoys and closing consulates as a retaliatory measure. The effect of cyber security at governmental level can thus be far reaching ad dangerous when not handled in a mature manner. Many governments report cases of hacking in their financial reserves that threatens their security and economic viability (Rashid et al., 2018). Moreover, there is a concern over what and how the measures can be directed to harnessed the right technology to help curb cases of hacking and cyber security.

Impact of cyber insecurity on personal privacy

Cyber security at a personal level has never been more concerning than now at a time when the rate of technology use is rising. There is a major concern over what many people expose on the internet and the safety that comes with this platform (Van Schaik et al., 2017). One of the key aspects of internet security relates to the theft of personal sensitive data that relates to the individual’s life. For example, hackers target the frequent intern users mainly on the social media. Hidden cameras in hotel rooms and spying done on the home-based cameras shows the increasing sensitivity of the mater. cyber security at a personal level has to do with the increasing cases of diverse internet use that shows that technology can be costly to people (Hubbard & Seiersen, 2016). The online hackers who often target social media users have identified a prime field where people pay less attention to their safety. One of the main ways technology is affecting personal security relates to the loss of vital details that can threaten one’s physical security.

Cyber security also shows that many people often lose their credit card details when they shop online or pay for ai tickets. Airports have also been hacked where vital personal data of that belong to travelers is lost and sold by hackers on the dark web (Kharchenko et al., 2019). One of the key shortages of the key concerns over the cyber security is the way personal data can be protected from online criminals who use to it to threaten and extort money. For example, online hacks on personal data is often sold to criminals who use it to carry out financial hacks on the customers. Still, the value of key aspects of online insecurity goes beyond personal information that often touches on what the individuals would use as security in various applications (Soomro et al., 2016). The special media accounts have remained the prime target used by the hackers who capitalize on the reckless intent users. Today, more than 25 million social media accounts are hacked every year that target the young people who pay less attention to their online security. One of the main ways the online hacking threatens the security of individual is like in tracing the location of the individual. Online hackers also target social media accounts for companies and businesses where they steal customer data. Still, these activities are conducted under the radar that often makes it hard for the security personnel to identify the source of the threat (Van Schaik et al., 2017). The common personal information stolen from individuals include the credit card data, photos, personal videos, or even financial records.

Cyber security evaluated the relationship between cyber security and personal safety where key aspects of online safety was addressed. One of the main ways the online security is a major issue as noted in the study is that most people have zero knowledge on their online safety (Hubbard & Seiersen, 2016). The scholar also identified that the value of an inclusive value that is attached to online safety has become a major concern for most people. Most of the online users have increasingly become sensitive to the information they share with their peers. The study also found that cyber security will increasingly become a sensitive issue that is tied to the technology use. Over the years, the need for a robust and strong cyber security system has shown that the world is far from attaining the right security. One of the main ways cyber security is being addressed is by bringing together viable avenues that can help address the right security issues that exist on the online platforms. Theft of online data by hackers is already posing a challenge to businesses that are having to invest millions of dollars to secure customer data (Hubbard & Seiersen, 2016). The study sums up that there is need to have a combined effort that can address rising threats of cyber security to ensure online safety.

Cyber security analyzed the reasons for the rising threats to cyber security mainly at busines and personal level. One of the main ways companies and individual are putting measures to protect their information is by hiring the right experts or programs that can help safeguard their privacy (Shapsough et al., 2015). The major issue here lies in the possibility of a diverse and strong security systems that can help eliminate the problem of data security. Most people who face online security threats have testified that they originate from a single source and this makes it easy to track. However, online hackers have mastered the loopholes that exist in technology use and thus capitalize on these weaknesses to harm or threaten the individuals (Van Schaik et al., 2017). The study concludes that the viability of the online security measures in a bid to upgrade cyber security has to match or be ahead of the various technological gains.

The statement implies that the safety on the online platforms needs to be evaluated regularly to ensure that any loopholes identified is addressed with the right technology. The approach will not only safeguard customer data nut also increase the leverage on the use and safety of the internet and other technologies. Moreover, the increased threats that lie within the online technology like in use of computers and smartphones needs to be addressed by creating the right barriers (Hubbard & Seiersen, 2016). The key to ensuring strong cyber security is to always stay ahead of the online criminals by identifying the key loopholes that they may sue in trying to sabotage and ruin the online business.

Conclusion

Theft of customer data mainly for online companies has come at a huge financial and loyalty cost for the firms. Victims of the cyber insecurity issues continue to rise and this puts more risk to online business. Governments are also facing acute challenges when securing the financial and military data from hackers. The problem shows how deep the issue of cyber security has gone and thus urgent solutions are needed to keep the world secure ad safeguard the integrity of the fast-developing technology. Over the years, efforts and huge amounts of money has been poured to the upgrading of cyber security systems mainly in the governmental platforms that have remained a key target by hackers. For this reason, some progress is being made that is helping bring the issue to some control and thus enabling the problem to put under control. One of the major problems realized in the past two years is the by passing of even the most secure cyber security systems that is raising concern of how best the online platforms can be secured. Studies have showed that most people are now aware of the threat that exists relating to cyber security and thus are taking some precaution to safeguard themselves from this problem. Even with the huge efforts being made, the online hackers are upping their game by coming up with high tech software and programs that spy and bypass the secure systems and this points to a very worrying issue of the preparedness of the tech companies.

References

Ekstedt, M., Johnson, P., Lagerström, R., Gorton, D., Nydrén, J., & Shahzad, K. (2015, September). Securi cad by foreseeti: A cad tool for enterprise cyber security management. In 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (pp. 152-155). IEEE.

Hubbard, D. W., & Seiersen, R. (2016). How to measure anything in cybersecurity risk. Hoboken: Wiley.

Ji, X., Yu, H., Fan, G., & Fu, W. (2016, May). Attack-defense trees based cyber security analysis for CPSs. In 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 693-698). IEEE.

Kharchenko, V., Dotsenko, S., Illiashenko, O., & Kamenskyi, S. (2019, June). Integrated Cyber Safety & Security Management System: Industry 4.0 Issue. In 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 197-201). IEEE.

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038.

Rashid, A., Danezis, G., Chivers, H., Lupu, E., Martin, A., Lewis, M., & Peersman, C. (2018). Scoping the cyber security body of knowledge. IEEE Security & Privacy, 16(3), 96-102.

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F., & Al Ali, A. R. (2015, October). Smart grid cyber security: Challenges and solutions. In 2015 International conference on smart grid and clean energy technologies (ICSGCE) (pp. 170-175). IEEE.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.

Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188.

Tisdale, S. M. (2015). Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective. Issues in Information Systems, 16(3).

Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547-559.

1.Table of Contents

Table of Contents

TOC o “1-3” h z u 1.0Introduction PAGEREF _Toc25936256 h 12.0Methodology PAGEREF _Toc25936257 h 22.1Research Methodology PAGEREF _Toc25936258 h 22.2Research Method PAGEREF _Toc25936259 h 22.3Methods and Procedure for Data Collection PAGEREF _Toc25936260 h 32.4Steps for Data Analysis PAGEREF _Toc25936261 h 43.0Findings and Deliberations PAGEREF _Toc25936262 h 5Table 1:Findings from the Research PAGEREF _Toc25936263 h 53.1 First Strategy PAGEREF _Toc25936264 h 53.2 Second Strategy PAGEREF _Toc25936265 h 73.3 Third Strategy PAGEREF _Toc25936266 h 84.0Summarization and Suggestions PAGEREF _Toc25936267 h 84.1Conclusive Summary and Suggestions PAGEREF _Toc25936268 h 94.2Proposals for Additional Studies PAGEREF _Toc25936269 h 9

1.0Introduction 

As multinational corporations explore more market niches to increase their market shares, the Swedish clothing retail called Hennes & Mauritz, popularly known as H&M, is not lagging behind. Since its establishment in 1947, H&M has grown immensely and is currently the globe’s second-largest apparel retailer relying on over 132,000 employees who run more than 4,500 stores in over 62 countries across the world. The company deals with fast-fashion apparel for virtually all people including kids, teenagers, women and men (Mo, 2015). As part of its expansion processes, H&M entered the New Zealand market in 2016 and is now operating with over five stores across the country.

H&M realized a significant decline in its profits for the year ending November 30, 2019, due to specific reasons which could entail its substantial investments in logistic operations and acquisition of digital technology (Abaño, 2019). The company made such massive investments to ensure speedy deliveries, upgraded mobile apps amongst other related processes with the aim of improving product selection and shopping experience for its clients. Although the decline in profits is based on company-wide operations and gains, H&M’s revenue from the New Zealand market could have contributed significantly due to the absence of online sales operations. Since the company is yet to establish a website for New Zealand, customers have to physically visit its stores to select and purchase their clothing (Nadkarni, 2019). Consequently, this study is based on the assumption that New Zealand clients endure lots of difficulties while shopping in H&M. Hence, as unsatisfied customers, the target market makes fewer purchases, a practice that attracts low sales and profits. Therefore, this report analyzes and evaluates various strategies that H&M could employ to encourage more convenient and exciting shopping experiences.

This document has three major sections. As one of the sections, the methodology is employed to present suitable approaches for finding an answer to the research question. The next section presents findings and discussions from the chosen literature. Finally, summarized details regarding conclusions and recommendations feature in the last section. 

Methodology 

This section presents a comprehensive explanation and analyses of methodology that were employed in this study. Precisely, section 2.1 offers details regarding applied research methodology. Moreover, section 2.2 presents the research method. Still, statement of the methods and measures of data collection comprise section 2.3. Finally, the method and procedures of data analysis constitute section 2.4.

2.1Research Methodology 

This study would rely primarily on qualitative methodology to collect a vast amount of data related to the subject under study. Qualitative research serves as a suitable approach for conducting this type of study since it encourages collection of enormous amounts of subjective data, hence facilitating the development of better decisions (Silverman, 2016). The author would endeavor to establish the meaning of various aspects, including activities, images, and related issues, by employing their skills, knowledge, and competencies. Accordingly, this type of study is appropriate for understanding human behaviors.

Since this study strives to determine, analyze, and evaluate various strategies that H&M could employ to realize improved shopping experiences by its varied categories of customers, qualitative research is essential to ensure better decision making.

2.2Research Method 

This study would rely on a qualitative content analysis (QCA) approach to analyze and evaluate strategies that H&M could employ to realize better customer experiences. Accordingly, the writer would analyze, assess available data and generate related information that would inform the establishment of conclusions and necessary recommendations. The author would rely on their critical thinking skills to analyze and evaluate available information with regards to operations of H&M. Still, QCA acts as an appropriate tool since it enables the researcher to systematically analyze and retrieve critical content from the available resources and establish useful themes (Mayring, 2014). Since the researcher would be dealing primarily with non-numerical data, QCA acts as the most appropriate tool for summarizing the voluminous content and developing more meaningful understandings about the subject.

2.3Methods and Procedure for Data Collection 

This research study would rely primarily on secondary sources of data because they (secondary sources) are relatively cheap and reliable sources of information (Hox & Boeije, 2005). Since secondary data serve as one of the most readily available types of data, the researcher would employ their competence and skills to critically read and analyze relevant resources. Moreover, the use of secondary sources of data acts as an essential practice since it promotes acknowledgment and appreciation of great work that other academicians and scholars have accomplished. Consequently, the study would rely on the most relevant and readily available resources to gain vital information that could provide foundation and support for its claims.

Secondary sources of data that would be employed for this study could entail company websites, academic books, annual reports, and research articles (Clark, 2013). Accordingly, information that would be collected from such resources includes the benefits that H&M would realize upon adoption and utilization of an online sales platform in Australia, impacts of employing and developing its employees, and the effects of establishing a customer-centric culture. Consequently, the author would critically read, analyze and evaluate data from the resources to gain insight regarding the alternatives that H&M could embrace to improve shopping experiences amongst its clients.

 Besides, data for this study would be collected systematically. First, the author would identify and find relevant resources. Specifically, certain aspects that revolve around the theme of customer experience would be considered to streamline the search processes. A research study should rely on the most appropriate resources to adequately respond to the research question. Thus, sufficient judgment would be employed to ensure that quality resources are used in this study.

Secondly, the researcher would critically read, analyze, and evaluate information from the selected resources. The researcher would collect critical points, make summary and inferences that are essential for the next sections of the paper.

2.4Steps for Data Analysis 

As stipulated in section 2.2 above, this study would rely on Qualitative Content Analysis. Accordingly, both descriptive and interpretive analyzes would be used (Zhang & Wildemuth, 2009). Even so, the process of analyzing data would comprise various steps. First, the researcher would code the collected data to understand applicable themes. Coding is an excellent tool for classifying qualitative data into useful categories to facilitate data analysis. Thus, the researcher would conduct intensive and extensive studies to gain a sufficient understanding of the different kinds of data analysis for appropriate coding exercises. The main reason for coding the data is to acquire a summarized version of data for better extraction of required data (Zhang & Wildemuth, 2009). Thus, coding is essential for this study because the author would deal with large volumes of data. 

After coding, the researcher would critically analyze and interpret the data to determine their meaning and importance. Accordingly, it would be relatively more comfortable for the researcher to adequately describe and explain the varied strategies under study. Thus, critical thinking skills would be employed to determine the most suitable strategy for encouraging better shopping experience in the H&M company.

3.0Findings and Deliberations

This section of the report offers results that the researcher attained from the study. Moreover, the findings would be discussed regarding the operations of H&M.

Table 1:Findings from the ResearchStrategy

Focus Result

First strategy Use of retail online sales and marketing

Promotes a convenient shopping experience and more satisfaction among customers

Second strategy Train and develop sales staff Attracts more professionalism and quality service provision

Third strategy Offer discounted prices for most of the apparel Makes it more affordable for the clients to purchase the clothing

 

3.1 First StrategyThe first strategy that would be recommended for H&M company is the establishment and use of the internet for retail online sales and marketing as well as home deliveries. This approach focuses on the determination of the most suitable technology that H&M could utilize to market and sell its products over the internet. Since the firm has spent massive amounts of money in purchasing and upgrading Mobile App that could facilitate online sales and marketing, it would be relatively more comfortable for the H&M to introduce the approach in New Zealand. Moreover, the company should invest other additional funds in establishing and running a suitable online platform that is tailored for the New Zealand market. Though the strategy could appear costly in the short-run, H&M would reap massively in the long-run when customers would realize great shopping experiences. Some clients could even make some purchases that could otherwise be unplanned for following the capacity of the online platform to promote and convince customers to acquire particular products (Dawson & Kim, 2010). Consequently, online sales and marketing would attract lots of benefits to the firm and its clients by encouraging more marketing and shopping convenience.

The company’s varied clients would enjoy lots of convenience by shopping through an online platform. Precisely, the customers would select and pay for their preferred clothing at the comfort of their households and other suitable places. Consequently, the customers would avoid the otherwise tedious and challenging physical visits and movements in H&M’s stores. Moreover, the clients would enjoy relative ease while determining and comparing the prices of their desired products (Lee & Lin, 2005). Thus, shopping online is relatively easier and more comfortable.

Besides, the customers would avoid the otherwise tiresome and time-consuming processes of travelling and ferrying their products when H&M offers delivery services. As part of the package, H&M would have to deliver its products to the customers, probably at some extra cost. It would not make sense for the firm to offer online services and expect the clients to collect their products at its physical stores. Hence, the company would provide home deliveries to attract more satisfaction amongst the customers though it could be a costly practice.

As a result, H&M’s clients would be dealing primarily with interactive online platforms rather than human beings. Consequently, the company could offer high-quality services since technology tends to encourage consistency in service provision. Thus, the company could rely on a fewer number of salespersons while making massive marketing campaigns and sales processes (Patterson, 2007). Still, the firm would drastically limit the number of physical movements for purposes of sales and marketing. Therefore, online sales and marketing would significantly improve the firm’s traditional sales model.

3.2 Second Strategy H&M could employ the second strategy, which focuses on training and development of sales and marketing employees to encourage more professionalism and provision of high-quality services (Tahir et al., 2014). Courteous salespersons with exemplary professional conduct would offer quality services to the company’s clients. Accordingly, the firm could opt to conduct certain training and development sessions to impart more information and skills in its workforce, particularly the sales and marketing team. Consequently, the employees would appropriately handle their clients, thus attracting more satisfaction regarding their shopping experiences.

Moreover, well-trained and competent employees tend to be more efficient while handling their roles (Tahir et al., 2014). Consequently, customers would realize satisfaction through time-saving owing to the speedy and highly-efficient sales team. Still, the well-trained sales force would exhibit more persuading and convincing capabilities by leveraging their skills to the sales and marketing processes. Besides, the employees would be more helpful to the customers with regards to the provision of essential information such as qualities, prices, and benefits of using specific clothing. Subsequently, clients would be making more informed purchase decisions with fewer strains.

Nonetheless, the customers would encounter huge costs while travelling, selecting and purchasing their clothing. The clients could be forced to travel long distances, walk within the firm’s stores, and endure long queues to acquire their products. Besides, the customers would physically select and compare different types of clothing and their prices, a practice that is tiresome. Fortunately, the clients would enjoy the personal services and courteous interactions with the company’s employees. However, the clients might not realize maximum satisfaction following the above-mentioned challenges.

3.3 Third Strategy The other alternative that H&M could employ is to sell some of its clothing is clothing at reduced prices. Lowering the prices of certain products could encourage customers to make more purchases due to higher affordability (Möller & Watanabe, 2010). Moreover, proper pricing could serve as one of the most effective ways of attracting more market share and increasing sales when there is tight competition. As part of sales and marketing strategies, H&M could endeavor to attract more satisfaction and convenience amongst its clients by offering its apparel and related services such as deliveries at discounted rates.

However, the practice of lowing prices could attract negative impacts on the company’s reputation. Some of the firm’s clients could perceive that H&M has compromised the quality of its products (Amaldoss & Jain, 2005). Thus, it would not be advisable for the company to lower prices of its products since it is dealing with fashion clothing, products that are usually meant for the high-class people with lots of money to spend. Such category of people could be willing and ready to pay well to acquire their clothing in convenient ways. Still, H&M could continually realize low prices or even losses by offering its products and services at reduced prices. Since the firm is striving to increase its profit margins, a suitable strategy should encourage more sales at relatively reasonable prices. Hence, the company should not lower its prices beyond particular limits to attain its target profits.

4.0Summarization and Suggestions  

This section offers advice and conclusions regarding the most suitable strategy that H&M should adopt to attract better shopping experience by its clients. Moreover, some suggestions for future research studies are provided.

4.1Conclusive Summary and SuggestionsFindings from the discussions above reveal that the use of retail online sales serves as the most suitable approach for encouraging better shopping experience at high convenience. The overall benefits of using online platforms for marketing and selling the products outweigh the costs of acquiring and running applicable technologies. Consequently, it is recommended that H&M introduces the use of online marketing and sales in New Zealand to facilitate more convenient shopping experiences by its clients. The firm should rely on an online platform that is tailored to the New Zealand market.

Fortunately, this approach would favor H&M since it (H&M) has already invested heavily in the acquisition of appropriate technologies and logistics (Abaño, 2019). Consequently, the company would incur some extra amounts of money to introduce such services to the New Zealand market. Luckily, this strategy would benefit the company and its clients by facilitating more convenient sales and marketing practices and shopping experiences for the sales team and clients, respectively.

4.2Proposals for Additional StudiesAlthough the discussions suggest that the target clients, comprising the high-class persons, have lots of money to spend, certain assumptions prevail. Such a group of people could be willing and ready to spend lots of money to acquire specific products and services. Therefore, further research should be conducted to determine if clothing constitutes such products and services. Besides, it is recommended that the approximate amount of funds that this group of persons have at their discretion and are willing to spend on luxurious apparel be determined to facilitate informed pricing.

References

Abaño, J. (2019). H&M blames decline in profits on online investment. Retrieved 29 November 2019, from https://insideretail.co.nz/2019/02/05/hm-blames-decline-in-profits-on-online-investment/‌

Amaldoss, W., & Jain, S. (2005). Pricing of conspicuous goods: A competitive analysis of social effects. Journal of Marketing Research, 42(1), 30-42.

Clark, G. (2013). 5 Secondary data. Methods in Human Geography, 57.

Dawson, S., & Kim, M. (2010). Cues on apparel web sites that trigger impulse purchases. Journal of Fashion Marketing and Management: An International Journal, 14(2), 230-246.

Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary.

Lee, G. G., & Lin, H. F. (2005). Customer perceptions of e-service quality in online shopping. International Journal of Retail & Distribution Management, 33(2), 161-176.

Mayring, P. (2014). Qualitative content analysis: theoretical foundation, basic procedures and software solution.

Mo, Z. (2015). Internationalization process of fast fashion retailers: evidence of H&M and Zara. International Journal of Business and Management, 10(3), 217.

Möller, M., & Watanabe, M. (2010). Advance purchase discounts versus clearance sales. The Economic Journal, 120(547), 1125-1148.

Nadkarni, A. (2019). H&M opening in Westfield Newmarket in December. Retrieved 29 November 2019, from https://www.stuff.co.nz/business/116036659/hm-opening-in-westfield-newmarket-in-decemberPatterson, L. (2007). Marketing and sales alignment for improved effectiveness. Journal of digital asset management, 3(4), 185-189.

Silverman, D. (Ed.). (2016). Qualitative research. Sage.

Tahir, N., Yousafzai, I. K., Jan, S., & Hashim, M. (2014). The Impact of Training and Development on Employees Performance and Productivity A case study of United Bank Limited Peshawar City, KPK, Pakistan. International Journal of Academic Research in Business and Social Sciences, 4(4), 86.

Zhang, Y., & Wildemuth, B. M. (2009). Qualitative analysis of content. Applications of social research methods to questions in information and library science, 308, 319.

1.Why is the data collection process is so important

Why is the data collection process is so important?

According to Hullett & Preston (2000), Data collection is very important in any project implementation process. Data collection provides information for project managers or leaders of any business or project to make decisions based on statistical facts. We live in an era of data and statistics. Therefore, it is paramount that before engaging in any project, data should be collected to define possible risks, growth opportunities and also to forecast the successful implementation of the project. In addition, data collection helps to identify risks and mitigate against risks.

What can project managers do to protect the quality and integrity of the data collection process?

Project managers can protect the integrity and quality of the data collection process by selecting the right people to collect data. First, the integrity of people collecting data in the field also adds to the integrity of the data (Project Management Institute 2017). Secondly, it is paramount to brief the people who are supposed to collect data on what they are expected to look for and what should be asked or interviewed so that the data collected can have integrity and quality. Furthermore, the quality and integrity of the data collection process can be assured by the sources of the dubious data characters cannot give true information. Therefore, data should only be collected from authentic sources.

Who do you think should be involved in data collection for project risk management? Why?

All stakeholders should be involved in the data collection process. To have wider data that increases the validity and minimizes error margins, all project team members must collect data so that all risks can be exhausted. Leaving out some people in the data collection process will undermine the integrity of the data collection process. Therefore, all key stakeholders should be part and parcel of the data collection process.

What insights can be used in the development of your Risk Management Plan and Risk Register?

The insights that can be used to develop a risk management plan and risk register should include objective data and subjective data. The goal of collecting data in risk assessment is to minimize risk, avoid risk or solve the risk. Therefore, the source of risk, the person responsible for the risk, and the resources needed to solve the risk play an important insight.

References

Hullett, T. & Preston, Y. (2000) Garbage In, Garbage Out? Collect Better Data for Your Risk Assessment. Proceedings of the Project Management Institute Annual Seminars & Symposium.

Project Management Institute (2017). A Guide to Project Management Body of Knowledge (PMBOK@Guide). Newtown Square, PA: Project Management Institute.

Response to Pic 1

Your responses to the questions were clear and straight to the point. The analysis to address why data collection has importantly captured the reasons for data collection in terms of assessing risks, better planning, increasing the project’s success, and developing a better team to control risks. The second question on the quality and integrity of data collection was clearly stated in terms of why data is quality and integrity is important in terms of who should be involved, training of data collection agents, and the importance of the sources of the data collection process. While examining the people who should be involved in data collection, the identification of the project manager to invite all participants to take part in the process is plausible since it is the way to go to have inclusive data. Identification of bias and need to have objective and subjective data to form the insights for risk register and risk management plan.

Response to Pic 2

Your analysis for the question concerning the importance of data collection is candid and well elaborated. You stated the reasons for data collection regarding assessing risks, pointing out how data can help establish a successful business, take reserve process, and develop critical problem-solving steps. On the other hand, while addressing the quality and integrity of data collection, your position that utilizing different data collection tools and choosing the right people via interviews is unique and outstanding because different data collection tools can increase data integrity and quality of data collection data. Furthermore, while analyzing people involved in the data collection process, pointing out to stakeholders, experts, and opinion holders makes much sense since the larger and diverse the team, the better the data collection process. Finally, identifying the insights on what forms part of the risk register or risk management plan both subjective and objective data should be involved is sufficient to develop a sound plan.

Hume on Religion (2)

Hume on Religion

Name

Institution

Year

David Hume, a renown philosopher makes an incredible analysis and digest of who he believed God to be and the general role of religion. The philosopher discusses that religion as the basis to mankind’s link to spirituality has been the fore that has shaped the thinking and actions of many people. In a closer analysis, Hume discusses the role, power, and nature of God in his superior and holy aspects. In addition, Hume assess how mankind has taken and applied religion in all spheres of life as well as the effects of overreliance on religion. Hume argues that mankind cannot determine the fate of nature but rather submits to the forces of religion and the unseen who is God to control the destiny and future of mankind. In this regard, Hume seeks to breakdown the relationship between mankind, God, and nature. The philosophy behind Hume’s arguments is based on his observations, life experiences, as well as the intellectual knowledge on matters of religion. This paper will discuss Hume’s analysis of religion by looking at his philosophies. The essay will break down the core views of Hume on how he perceived God and matters of religion from mankind’s perspective.

Hume holds the thought that religion as the mankind’s platform to reaching God has evolved and taken many paths. He observes that mankind’s actions have not always portrayed God in who he is but gone contrary to the natural law. In addition, Hume states that mankind has misused his place in God’s creation to abide to unknown forces and beliefs thus causing God to draw far from his creation. He also questions the extent to which mankind has gone to abide to the perceived ways and lost paths that are both dangerous and irritating to God. In addition, Hume corrects what he sees as lack of direction among people who even claim to know their supreme God (Graham, 2016). Hume also looks at ethics, morals that are the basis upon which people’s behavior actions revolves. In his view, religion ought to shape and still the right virtual and moral sin a person thus guiding their behavior towards others and God. To elaborate on this, Hume stipulates that mankind as the image of God ought to reflect goodness, morals and wisdom in all his ways. Hume is also concerned over the lack of direction when mankind is approaching God who is by far wise and ought to be respected and feared (Sieczkowski, 2018). Interestingly, Hume also questions why mankind ought to fear the same supreme God who they should call on in times of need. These observations by Hume seem to have evry diverse and yet contradicting direction that fails to abide by their true meaning. Hume appears to hold two beliefs and takes many sides when it comes to the matters of religion and mankind’s relationship with God.

Hume seen as a conservative and a rigid philosopher argues that God as the sole controller of the man’s fate cannot be advised or changed in his decisions. The philosopher bases his argument on the perceived nature and power of God who is also senas the supreme and wise being. According to Hume, there is only one way to define God and that is based on his goodness, power, and wisdom. Hume argues that God as the wise creator has everything lined up and in a perfect way where no man can alter the fate of his destiny (Graham, 2016). In his view of seeking God and worshiping, Hume is quick to claim that God deserves all the attention from mankind. He however discourages the misguided religious beliefs that have led many to belief in a different god. The value of Hume’s ideas is rooted in what he terms as man’s half-baked view of God that has continually derived a different religion altogether.

In his view, Hume acknowledges that man should work hard and still seek God as his guide and provider. The value of religion and relationship between God and man is well analyzed where Hume sums up that man is always reliant on God. He also claims that he does believe in miracles as they are a violation of natural law. In this regard, Hume argues that miracles have blinded many in religion to a point where they are unable to lay ground to what they can do and push their way. The arguments by Hume seems to point to a very concerning aspects of religion that defines man’s role and relationship with God. In his view, Hume argues that mankind as the central pillar of God’s creation has abandoned his role by taking on beliefs that are jot in line the core teachings (Sieczkowski, 2018). He also refers to the need for wisdom over strengths when dealing with matters of religion. The arguments raised by Hume are also tied to the value of religion in shaping man’s view and relationship with God that are supposed to be on holiness and purity.

In conclusion, the views given by Hume are based on what he perceived as the place of religion in God’s-mankind relationship. In order to capture the right tone, Hume states the various aspects of religion that define what God prefers and how mankind has changed the core values of holiness and faith in God. Hume was very unpredictable in his views as he would often acknowledge God’s existence but still challenge some of the arguments about God’s existence.

Reference

Graham, G. (2016). Hume and Smith on Natural Religion. Philosophy, 91(2), 345-360.

Sieczkowski, T. (2018). David Hume and the Naturalness of Religion. Ruch Filozoficzny, 74(3), 75-88.

IFSM-300-Stage-5-UMUC-Haircuts

Case Study Stage 5

Insert Name

Insert Date

Project Description

The project is aimed at seeing the full implementation of an inventory management system, which is meant to keep track of accounts of supplies in store for the continued growth of the business.

The following IT components will be required for the successful implementation of the inventory management system.

A centralized database that contains all information on supplies, including what is already in stores, its count, dates supplied, deficit, names of suppliers, and other relevant details (Gupta, 2013).

Interactive software that connects the database to the users as well as any other third party software.

A new server, on which the database will be hosted.

The successful completion of this project will necessitate the deployment of the following business resources.

An implementation manager, who will oversee the development and implementation of the inventory management system.

An IT team that will be charged with the system development and implementation.

Project Management

The scope of this project has its focus on the accomplishment of a fully functional inventory management system for UMUC Haircuts to keep track of accounts of supplies. At present, there is no existing electronic system that serves this purpose, which means that the system will be developed from scratch.

This project is scheduled to last for a period of 6 months as the maximum time expended for all deliverables to be in place.

In regards to Human Resources, there will be a project team that will be charged with the development and implementation of the system from start to finish, which will be under the supervision of an implementation manager. The implementation manager will be appointed internally.

Financial resources are still under review by the project committee. The financial proposal was presented to the committee for review and approval and the outcomes will be communicated to the project team through the implementation manager.

Upon the successful completion of the project, UMUC Haircuts will have a centralized database, interactive software that connects the database to the users, and new server, on which the database will be hosted. All these will be fully integrated and employees will be trained.

System Development Life Cycle

The phase of SDLC will involve the elicitation of information on user requirements from all relevant persons, especially the owner, managers, and employees.

During system analysis, the user requirements will be documented and presented to the development team. The team will match the requirements to the development process as well as the tools that will be necessary for the development and implementation processes to be completed.

System design will be the third phase, in which the development team will engage in the process of developing algorithms and conceptual models for the system to be developed.

The programming phase will involve coding the various modules identified as necessary for the entire system to be in place.

The testing process will involve testing the modules prior to integration as well as the entire system after integration, during which a sample of end users will be called upon to take tests. Any necessary reviews and corrections will be made after this.

During the implementation stage, the complete system will be deployed and installed on the server and user computers, after which the implementation team will conduct training.

The operations and maintenance phase is continuous and will involve the continued use of the system, with the necessary improvements being identified and made accordingly. Technical support will be part of this phase.

Business Process Changes

All business processes concerned with the supply chain will be affected and will have to change.

Every entry of supply that comes in and out will be entered into the database through the user interface.

It will also be possible to retrieve information on what remains in the inventory from the same interface.

Supplier details will also be available via the same interface.

Employee Training

Employees will have to be trained on how to use the new system, especially how to make inventory entries and how to retrieve records of supplies from the system.

It is also necessary to train end users to deal with simple technical issues in the system, which helps them become even more comfortable with the system (Preston, 2001).

They will, therefore, be trained on how to deal with simple technical hitches of the system in case the support team is unavailable.

It will be important to use the development team for the training processes, as they are the ones most familiar with the system.

Leadership Expectations

The project will meet all user requirements specified during the system analysis phase.

The project will be completed with the stipulated schedule and budget.

Training and technical support will be offered extensively.

Inventory efficiency will be drastically improved.

Defining Success

The system is fully functional and integrated with all computers and any third party software.

Inventory is fully automated.

Users have appreciated the change and there is no resistance.

References

Gupta, S. M. (2013). Reverse Supply Chains: Issues and Analysis. Boca Raton, FL: CRC Press.

Preston, R. (2001). Net Projects Won’t Fly Without End Users’ Buy-In. InternetWeek 858, PG9.

References

Gupta, S. M. (2013). Reverse Supply Chains: Issues and Analysis. Boca Raton, FL: CRC Press.

Preston, R. (2001). Net Projects Won’t Fly Without End Users’ Buy-In. InternetWeek 858, PG9.

Hume on Religion

Hume on Religion

Name

Institution

Year

David Hume, a renown philosopher makes an incredible analysis and digest of who he believed God to be and the general role of religion. The philosopher discusses that religion as the basis to mankind’s link to spirituality has been the fore that has shaped the thinking and actions of many people. In a closer analysis, Hume discusses the role, power, and nature of God in his superior and holy aspects. In addition, Hume assess how mankind has taken and applied religion in all spheres of life as well as the effects of overreliance on religion. Hume argues that mankind cannot determine the fate of nature but rather submits to the forces of religion and the unseen who is God to control the destiny and future of mankind. In this regard, Hume seeks to breakdown the relationship between mankind, God, and nature. The philosophy behind Hume’s arguments is based on his observations, life experiences, as well as the intellectual knowledge on matters of religion. This paper will discuss Hume’s analysis of religion by looking at his philosophies. The essay will break down the core views of Hume on how he perceived God and matters of religion from mankind’s perspective.

Hume holds the thought that religion as the mankind’s platform to reaching God has evolved and taken many paths. He observes that mankind’s actions have not always portrayed God in who he is but gone contrary to the natural law. In addition, Hume states that mankind has misused his place in God’s creation to abide to unknown forces and beliefs thus causing God to draw far from his creation. He also questions the extent to which mankind has gone to abide to the perceived ways and lost paths that are both dangerous and irritating to God. In addition, Hume corrects what he sees as lack of direction among people who even claim to know their supreme God (Graham, 2016). Hume is also concerned over the lack of direction when mankind is approaching God who is by far wise and ought to be respected and feared (Sieczkowski, 2018). Interestingly, Hume also questions why mankind ought to fear the same supreme God who they should call on in times of need. These observations by Hume seem to have evry diverse and yet contradicting direction that fails to abide by their true meaning. Hume appears to hold two beliefs and takes many sides when it comes to the matters of religion and mankind’s relationship with God.

Hume seen as a conservative and a rigid philosopher argues that God as the sole controller of the man’s fate cannot be advised or changed in his decisions. The philosopher bases his argument on the perceived nature and power of God who is also senas the supreme and wise being. According to Hume, there is only one way to define God and that is based on his goodness, power, and wisdom. Hume argues that God as the wise creator has everything lined up and in a perfect way where no man can alter the fate of his destiny (Graham, 2016). In his view of seeking God and worshiping, Hume is quick to claim that God deserves all the attention from mankind. He however discourages the misguided religious beliefs that have led many to belief in a different god. The value of Hume’s ideas is rooted in what he terms as man’s half-baked view of God that has continually derived a different religion altogether.

In his view, Hume acknowledges that man should work hard and still seek God as his guide and provider. The value of religion and relationship between God and man is well analyzed where Hume sums up that man is always reliant on God. He also claims that he does believe in miracles as they are a violation of natural law. In this regard, Hume argues that miracles have blinded many in religion to a point where they are unable to lay ground to what they can do and push their way. The arguments by Hume seems to point to a very concerning aspects of religion that defines man’s role and relationship with God. In his view, Hume argues that mankind as the central pillar of God’s creation has abandoned his role by taking on beliefs that are jot in line the core teachings (Sieczkowski, 2018). He also refers to the need for wisdom over strengths when dealing with matters of religion. The arguments raised by Hume are also tied to the value of religion in shaping man’s view and relationship with God that are supposed to be on holiness and purity.

Demea argues that although God clearly exists, we cannot know his nature, because God’s nature is beyond the capacity of human understanding. In his views, Demea argues that God as the powerful being is at the center of all creation and his relationship with man cannot be changed. He also adds that God is beyond human understanding as his powers and capacity is far more than human beings can understand. Still, Demea does not base his ideas on a single outlook but compares how mankind approaches God and thus draws these conclusions. Demea also looks at ethics, morals that are the basis upon which people’s behavior actions revolves. In his view, religion ought to shape and still the right virtual and moral sin a person thus guiding their behavior towards others and God. To elaborate on this, Demea stipulates that mankind as the image of God ought to reflect goodness, morals and wisdom in all his ways. To add on this, Demea appears to borrow from what he perceives as an extremely powerful God who is beyond human understanding and reach.

I support Hume’s views as he offers firm ideas and shows how religion being a strong pillar in humanity has been exploited and misused. I also support the fact that God is supreme and always a strong aspect in the entire creatin. I would agree with the ideas offered because they are well articulated within the philosophical values of religion. In conclusion, the views given by Hume are based on what he perceived as the place of religion in God’s-mankind relationship. In order to capture the right tone, Hume states the various aspects of religion that define what God prefers and how mankind has changed the core values of holiness and faith in God. Hume was very unpredictable in his views as he would often acknowledge God’s existence but still challenge some of the arguments about God’s existence.

Reference

Graham, G. (2016). Hume and Smith on Natural Religion. Philosophy, 91(2), 345-360.

Sieczkowski, T. (2018). David Hume and the Naturalness of Religion. Ruch Filozoficzny, 74(3), 75-88.