Reflection and Assimilation Assignment

Reflection and Assimilation
Reflection and Assimilation

Reflection and Assimilation

Order Instructions:

This paper is a summary of all the nursing papers you guys have written for me for the past weeks so it will make sense if the same writer complete this reflection also by going back and using all the resources of the previous papers to complete this paper. the writer should pay close attention to all the requirements and respond to all the questions. It requires a minimum of 7 paragraphs in 4 pages.

Reflection and Evaluation
Reflect upon your new knowledge about nursing research and EBP. Explain how this new knowledge will influence your daily practice? What was your most significant learning? What assignment did you find the most and least meaningful to your understanding of research and EBP? Did you meet the course outcomes?
Your role as an advanced practice nurse is paramount in nursing research. You will be examining studies for evidence which can be taken to the bedside. Without nurses prepared for this, the research-practice gap will continue to widen. You have learned how to generate research questions, whether they are from practice or from the literature. You have learned about various research methodologies, both quantitative and qualitative. Over the weeks, you have analyzed nursing research studies, both quantitative and qualitative. You have touched on collaborative research efforts. You have been introduced to legal and ethical principles in research. You have investigated a clinical guideline and applied it to a practice setting.
Now for the big question: can you now use research to improve practice? Are you able to take the evidence you find in the literature and translate it into practice guidelines which staff nurses will be willing to adopt? Only you can answer this important question.

This paper provides you with an opportunity to reflect on what you have learned during the course. To accomplish this, please create a minimum 7 paragraph written reflection of your personal learning achievements and professional growth as a result of this course. Remember that a paragraph cannot be less than 5 sentences, and it is important that all details be included in this paper as it clearly will demonstrate what you have understood in this course. Use the guidelines below to do your evaluations.

1. Evaluate personal learning achievements pertaining to each course outcomes:
1: Evaluate quantitative research studies through systematic examination of all aspects of a nursing research study.
2: Apply research findings from quantitative studies to nursing practice.
3: Evaluate qualitative research studies through systematic examination of all aspects of a nursing research study.
4: Apply research findings from qualitative studies to nursing practice.
5: Evaluate the body of evidence from nursing research in order to support an evidence-based change in nursing practice.
6: Create a plan for application of evidence to current nursing practice.
7; Reflect on how the learning you achieved in this course will support your success in the final course when you will develop a written evidence-based proposal for a change in nursing practice.

SAMPLE ANSWER

Reflection and Assimilation

Considering all the knowledge gained over the course of the research project, I can effectively utilize research to improve nursing practice. In essence, I am able to take the evidence which I find in literature and then translate it into practice guidelines that nursing staff would be willing to adopt. I have been able to achieve each of the course outcome. These are described below.

I have gained ability and competence to evaluate quantitative research. As a result of the research conducted, I am able to evaluate various quantitative research studies through systematic examination of all aspects of a nursing research study. I am able to effectively assess and critique various quantitative research approaches such as cross-sectional design. I am also able to evaluate grounded theory type of quantitative research, whose purpose is theory development. Moreover, I am able to evaluate ethnography research studies which describe the characteristics of a culture (Beck, 2013). Equally important, I can properly evaluate quantitative case studies, which describe in an in-depth manner the experience of an institution, a community, a group, a family or an individual. When evaluating quantitative research studies in nursing, I have learned the importance of bearing in mind the sampling and data collection methods utilized by the researcher, the variables of the study, the research questions formulated, validity and reliability of data, as well as outcomes of the research.

I have gained the ability to apply research findings from quantitative studies. The research has enabled me to use the findings of quantitative research as evidence in nursing practice. The new evidence gained from quantitative studies could be utilized by managers and decision makers in healthcare organizations to solve challenges they experience within their healthcare facilities, and to improve patient care (Aveyard & Sharp, 2013). In essence, I am now able to understand the utility and meaning of quantitative research results and how they can serve as vital evidence for nursing practice changes. Before the findings of quantitative research can be applied, it is imperative to determine if those findings are valid (Jacelon & O’Dell, 2005). In this regard, thanks to this research, I am now able to determine the validity of quantitative research findings before applying them.

I have also gained the ability and competence to evaluate qualitative research studies. Qualitative research is basically understood as a method of inquiry where the investigator, acting as an instrument for the collection of data, seeks to answer questions regarding why or how a given phenomenon happens (Holloway & Wheeler, 2013). I can properly evaluate several qualitative research designs in nursing research including ethnography, phenomenology, grounded-theory, as well as qualitative description. To evaluate whether or not a particular qualitative study in nursing research is useful, I have learned to critically appraise qualitative research in terms of validity and thoroughness. The main areas to consider when evaluating the qualitative research include: if the research question is clear and substantiated sufficiently; and if the design is apt for the research question. Others are if the sampling method was apt for the research design and research question; if data was gathered and managed in a systematic way; if data analysis was apt; and if the description of findings is thorough.

I have gained the ability to apply research findings from qualitative studies. The research has allowed me to be able to properly understand how I can apply the qualitative research findings by asking several questions, such as what relevance and meaning does the qualitative study have for my practice? The question of what meaning could be made of the findings would have to be examined (Smith & Firth, 2011). The study should produce usable knowledge. The other questions are: does the qualitative research study assist me in understanding the context of my practice? and, does the qualitative research study enhance my knowledge regarding my particular practice? I have been able to understand the generalizability of qualitative findings, considering that findings from qualitative findings are not always generalisable (Holloway, Wheeler & Holloway, 2013).

The project has enhanced my skills of evaluating the body of evidence from nursing research. This research has, to a great extent, helped me to improve on my capability to evaluate the body of evidence from nursing research as regards the subject matter in order to support an evidence-based change within nursing practice. This research project involved extensive review of existing literature on the subject matter with the aim of finding evidence to use to support evidence-based change. It is of note that evidence-based practice is a vital approach in providing the best quality care to patients, as well as the patients’ families. Nursing practice which is based on evidence improves patient outcomes and helps to reduce uncertainty usually experienced by healthcare personnel and their patients alike (Boswell, Boswell & Cannon, 2014). Because of this research project, I can clearly distinguish literature that is based on evidence from traditional literature not based on evidence. In essence, this project has enhanced my ability to systematically search for the most relevant, pertinent and current evidence, and to critically appraise this evidence in order to answer a clinical question. Conducting research helps in providing the essential evidence on which to base nursing practice (Melnyk & Fineout-Overholt, 2011).

The plan for the application of evidence to the current nursing practice entails the following: (i) disseminating the evidence. Evidence would be disseminated through various mediums such as press releases in local newspapers, television and radio stations; publications in recognized journals such as New England Journal of Medicine, Science Journal, and Nature Journal; websites. Dissemination will also take place using posters and flyers; oral presentations; as well as organization/hospital-based and professional committee meetings. The evidence will be disseminated with the aim of reaching the wider nursing community who will apply the evidence-based practice. (ii) Encouraging nurses and other healthcare professionals to adopt and implement the evidence-based practice in their daily practice at their workplace in order improve patient care and safety, and reduce injury or death from falls. (iii) Managing and overcoming any barriers and resistance to adopting the evidence-based practice, for instance by providing training (Giuliano & Polanowicz, 2008).

The learning which I have achieved in this course will support my success in the final course when I will be required to develop a written evidence-based proposal for a change in nursing strategy. This is primarily because I will be better positioned and adequately prepared to develop the written evidence-based proposal for a change in nursing practice considering that I would have already conducted the research project and gained the evidence necessary to write the proposal for an evidence-based practice. This research project has given me the essential information, knowledge and necessary evidence on which to base nursing practice. The learning I attained in this course has improved my knowledge and widened my understanding on the evidence-based nursing practice. This will certainly support my success significantly in the final course when in will develop a written evidence-based proposal for a change in nursing practice.

References

Aveyard, H., & Sharp, P. (2013). A Beginner’s Guide To Evidence-Based Practice In Health And Social Care. Maidenhead: McGraw-Hill Education.

Beck, C. T. (2013). Routledge international handbook of qualitative nursing research. Abingdon: Routledge.

Boswell, C., Boswell, C., & Cannon, S. (2014). Introduction to nursing research: Incorporating evidence-based practice. Burlington, MA: Jones & Bartlett Learning

Giuliano, K., & Polanowicz, M. (2008). Interpretation and use of statistics in nursing research. AACN Advanced Critical Care, 19(2), 211–222

Holloway, I., & Wheeler, S. (2013). Qualitative Research in Nursing and Healthcare. Chicester: Wiley.

Holloway, I., Wheeler, S., & Holloway, I. (2010). Qualitative research in nursing and healthcare. Chichester, West Sussex, U.K: Wiley-Blackwell.

Jacelon, C., & O’Dell, K. (2005). Demystifying nursing research. Analyzing qualitative data. Urologic Nursing, 25(3), 217–220.

Melnyk, B. M., & Fineout-Overholt, E. (2011). Evidence-based practice in nursing & healthcare: A guide to best practice. Philadelphia: Wolters Kluwer/Lippincott Williams & Wilkins.

Smith, J., & Firth, J. (2011). Qualitative data analysis: the framework approach. Nurse Researcher, 18(2), 52–62.

We can write this or a similar paper for you! Simply fill the order form!

Developments from the Renaissance to the Enlightenment

Developments from the Renaissance to the Enlightenment
Developments from the Renaissance to the Enlightenment

Developments from the Renaissance to the Enlightenment

Order Instructions:

***PLEASE WRITE FOR 2ND YEAR UNDERGRADUATE LEVEL.***

ESSAY TASK:
Briefly outline the developments from the Renaissance to the Enlightenment, as given in course notes. Summarise the main points that Kant made in his essay “What is Enlightenment?” How did Hamann criticise Kant? Do you think Hamann’s criticism is fair? Briefly justify your answer.

Reading:
*Notes on the Renaissance and the Enlightenment
*“What is Enlightenment?” by I. Kant
*Criticism of Kant

All these readings have been uploaded to the order.

SAMPLE ANSWER

Developments from the Renaissance to the Enlightenment

The beginning of the Renaissance period dates to the 14th century in Florence Italy as an attempt to return to the ancient world when Rome dominated. Among the greatest developments during this period was the architecture that was artistic and full of architectural wonders predominantly in Rome. The emergence of among the greatest artists that the world has known occurred during this period such as Michel Angelo, Raphael, and Leonardo da Vinci (Evans & Marr, 2006). The perception or art during this period changed especially relating to the way the human body was artistically depicted. The human body was pictured as being flattering and in a more positive view and its beauty emphasized compared to the medieval times. Due to the Ancient Greek and Roman sculptures influence, the human body’s nudity was depicted in a positive note in art (Belshek, 2006). This beautiful and noble depiction of the human body led to the development of the humanism movement. Humanists believed that humans were special and at the centre of everything. They believed humans were in charge and responsible for their destiny (West, 2010).

Plato, a celebrated scientist and thinker at the time who was also a humanist believed and emphasized on the power of human reasoning and believed that humans, using their reasoning abilities could unveil critical truths. This is different from the medieval people who emphasized the importance of faith and acquiring knowledge from the Bible (West, 2010). The belief in human reasoning resulted into the scientific revolution during this period. With the emergence of Thomas Aquinas’ book Summa Theologica and the increased confidence of the human abilities people changed their perception about the once infallible ideas of Aristotle. They conducted scientific observations, investigations, and experiments, and experimental methods were developed by Galileo Galilei and Isaac Newton developed the laws of motion and gravity that are used up to date (Fitzpatrick, 2004).

A strong belief in the human abilities and power of reasoning persisted and grew, and it spread from the scholars to the larger society hence the period of enlightenment. During this period, there was a strong belief that human beings using their reasoning powers could understand the universe, nature, and human nature (Fleischacker, 2013). There was increasing application of science and reasoning (the optimistic idea) that resulted to a better understanding of the universe with the most important development being the compilation of the encyclopedia mostly done by Denis Diderot (Zafirovski, 2010).

Main Points that Kant Made in His Essay

According to Kant, a person becomes enlightened when he/she grows out of an immaturity that is usually self-imposed. Immaturity according to him is the inability of an individual to use his/her understanding without being guided by another person. For Kant, immaturity is self-imposed due to the fear of using one’s understanding without being helped by someone else (Goldman, 2011). Laziness and being cowardly maintain immaturity and due to such qualities other people become guardians or authority figures on certain people. These authority figures warn the subjects of the dangers that exist if they do not seek their help and tell the people below them that achieving maturity is dangerous and difficult hence frighten and deter people from pursuing maturity. He laments that often, people find it difficult to free themselves from immaturity and become content with this state. He argues that rules, regulations, and formulas keep people stuck in the state of immaturity, and a person who attempts to go against the rules would be walking towards maturity as he/she is not accustomed to such free movement (Morgan, 2002).

According to Kant, very few people have managed to come out of the state of immaturity and they have done this through the cultivation of their minds. For him, freedom (to use reason publicly) is the only remedy for enlightenment that is the use of reason by a scholar before the literate world. It is only the public use of freedom that can generate enlightenment since private reason is often restricted to the point where it does not hamper the process of enlightenment (Tampio, 2012). Therefore, freedom is required for enlightenment and people should express their thoughts freely. Through the spread of information and ideas people can become their own guardians as they will possess the components required to be a guardian. By allowing the freedom to think, ideas can be spread that will push others to think for themselves (Tampio, 2012).

Criticism of Kant

According to Hamann by arguing that people should develop freedom of thought Kant was at the same interfering with the freedom of people to think by influencing their thought process. Hamann argues that in some instances people may not want to think for themselves and hence accept the rules and regulation set by the guardians and the authority out of choice (Beech, 2010). Hamann feels that by Kant arguing that people should freely and publicly use their ability to he is limiting the people’s choice to do what they want that is follow rules. Therefore, Kant was objecting the use of the Aristocratic bible and other books as rules for living and thinking. However, he was at the same time setting himself up in the position of this books by interfering with the people’s thought process and restrict them to his idea hence maintenance of immaturity (Goldman, 2011).

Hamann’s criticism is not fair because from Kant’s argument; he did not tell people to follow his thought process, but encouraged them to use their freedom of thinking and their reasoning ability. Therefore, for example, if someone chose to follow the rules that exist, let that person follow them after critically thinking about the rules and not just blindly. Kant encourages people to think before making a choice to do something not restricts people (Beech, 2010)

References

Beech, T. J. (2010). Hamann’s Prophetic Mission: A Genetic Study of Three Late Works Against the Enlightenment. London, United Kingdom: MHRA.

Belshek, J. A. (2006). New Castle University. Retrieved June 29, 2014, from New Castle  University Web site: http://research.ncl.ac.uk/ARECLS/vol3_documents/jalalali.pdf

Evans, R. J., & Marr, A. (Eds.). (2006). Curiosity and Wonder from the Renaissance to the Enlightenment. Burlington, VT, United States of America: Ashgate Publishing, Ltd.

Fitzpatrick, M. (Ed.). (2004). Enlightenment World. New York, NY, United States of America: Psychology Press.

Fleischacker, S. (2013). What is Enlightenment? Abingdon, Oxon, United States of America:        Routledge.

Goldman, A. (2011). Kant and the Subject of Critique: On the Regulative Role of the  Psychological Idea. Bloomington, Indiana, United States of America: Indiana  University Press.

Morgan, D. (2002). Kant Trouble: Obscurities of the Enlightened. New York, NY, United States of America: Routledge.

Tampio, N. (2012). Kantian Courage:Advancing the Enlightenment in Contemporary  Political Theory: Advancing the Enlightenment in Contemporary Political Theory.United States of America: Fordham Univ Press.

West, D. (2010). Continental Philosophy: An Introduction (2nd ed.). Malden, MA, United            States of America: Polity.

Zafirovski, M. (2010). The Enlightenment and Its Effects on Modern Society. Denton, Texas, United States of America: Springer Science & Business Media.

We can write this or a similar paper for you! Simply fill the order form!

Responding Effectively to Toxic Gas Emission

Responding Effectively to Toxic Gas Emission
Responding Effectively to Toxic Gas Emission

Responding Effectively to Toxic Gas Emission

Order Instructions:

Private Sector Partnerships: Natural/Man-Made Disasters
Locate the proper Response Partner Guide and the Emergency Support Function Annexes from the NRF Resource Center for this SLP. Also, refer to previous readings and required websites. For our focus in the Module 4 SLP, examples of private sector partners of an emergency response plan for a town or city include:

1.Transportation (e.g., trains, planes, ships)
2.Telecommunication systems
3.Utilities (e.g., water, electricity, waste disposal)
4.Banking
5.Hospitals
6.Retail (e.g., lumber outlet, supermarket)

There are other partners within this category; familiarize yourself with them.

Scenario: For this scenario, we are assuming that you have included the above private sector partners in your Emergency Response Plan. A number of railroad tank cars overturned releasing a toxic gas into the air. Gas clouds are traveling in the vicinity of a large residential area and an elementary school. You are the Incident Commander and tasked with coordinating an effective response. You have already alerted law enforcement and HAZMAT first responders.
Using the six private sector partners above in your response, what other step would you need to take to ensure the safety of the town’s citizens? Be specific and cite your sources.

SAMPLE ANSWER

Responding Effectively to Toxic Gas Emission

Toxic gas emissions into the air in a large residential area, and even worse where an elementary school is located, are a very dangerous disaster. As the incident commander, there is still more to be done even after alerting law enforcement and HAZMAT first responders. The next step to be taken is to contact the transportation partners. Since it will be more harmful to sit and wait for help to come, it is important to start transporting people from the area as soon as possible (Bennett, 2011). In this situation, trains will be used to move the children from the elementary school as fast as possible. This is an important step as it removes individuals from the site which may pose a danger to their lives. This partnership with transportation will also come in handy when transportation vehicles which are headed toward this direction are diverted. It is important to make this area a no go zone to reduce the rates of people who may get affected as a result of the toxic gas. Controlling traffic that is headed towards this direction can be complicated, especially because there are many routines. However, when the transportation partners step in, it will be easier to manage as they will offer their employees as well.

Next, the telecommunication systems partners will be contacted. This step will be effective in warning individuals of the dangers associated with coming to this region. At times, when the public is not notified, it will be impossible for people to stop driving to the area. This is because it takes time for the emergency transportation partners to be in place and start functioning. Fortunately, with the availability of telecommunications partners, a wider range of individuals may be notified through the media (Wasileski, 2014). The availability of these partners will also mean that individuals can communicate with the people who are in the affected area and still awaiting their evacuation. This is important as it promotes calm in the population. The people who are away from the area can relax and not come to the affected area when they know that their loved ones are safe. These communication systems will also be effective when the members of the rescue team need to communicate to others about the materials needed or similar things. When the communication lines are not interrupted at times of emergency, the process becomes swift and hence information can be passed and acted upon on time.

After that, the next step will be to contact the utilities partners. In such a situation, utilities are usually needed to support both the rescue team as well as the individuals who are still present in the affected site. For instance, water may be needed to help alleviate symptoms of poisoning from the gas. It may also be required when there is a case of an injury. Therefore, these partners will be contacted to ensure that all the required utilities are available in good number. This is also taken as a precautionary action since the individuals present may not necessarily need them (Harris, 2013). However, it is always better to be safe than to start transporting these items when need arises.

Banking partners will be contacted to offer financial assistance, which is mostly required in such situations. Financing is important when the team will need to purchase first aid kits and other medical equipment. Not all these are available through donations and nonprofit organizations. Some are usually rather expensive and they may need to be purchased from other institutions. They also offer financing for fuels of vehicles being used for this transportation of people and for the provision of first aid supplies to the region. This form of financing is required since there is no partner from such an institution whereby the group can be able to obtain free fueling of vehicles and trucks.

Hospitals who are also partners of this group will be contacted to inform them of the current situation. Since they are partners, they may have to send off aid and medical personnel, as well as be ready for any individuals who may be brought with an urgent need for medical attention (Karagiannis, Piatyszek & Flaus, 2013). When qualified medical personnel are present, the rates of possible deaths as a result of intoxication will be reduced. This is because all individuals who are present at the area will be checked for any signs or symptoms that may insinuate negative effects of the gas. When a person is identified as being affected, first aid will be quickly administered before taking them to the hospital. Their admission will not take time, and the patients will start being attended to immediately because the hospital will have been informed earlier, hence they will have had ample time to prepare and stock up on the required medication.

The last step will be to inform the retail partners. This may be helpful since the group may be given some of the necessary utilities on loan, which may be later catered for by the banking institutions.

References

Bennett, B. (2011). Effective Emergency Management A Closer Look at theIncident Command System. Professional Safety, 56(11), 28-37.

Harris, A. (2013). Never Stop. Engineering & Technology (17509637), 8(7), 48-51.

Karagiannis, G., Piatyszek, E., & Flaus, J. (2013). Model-Driven and Risk-Based Performance Analysis of Industrial Emergency Plans. Journal Of Contingencies & Crisis Management, 21(2), 96-114. https://www.doi:10.1111/1468-5973.12007

Wasileski, R. (2014). Retired & Dangerous. Professional Safety, 59(7), 33-40.

We can write this or a similar paper for you! Simply fill the order form!

Dynamic Symmetry Research Paper Assignment

Dynamic Symmetry
Dynamic Symmetry

Dynamic Symmetry

Order Instructions:

Course Materials: Jeff Todd Titon et al. Worlds of Music: An Introduction to the Music of the World’s Peoples, Shorter Version/3rd Edition. Belmont, Ca.: Schirmer,2009, ISBN: 978-0=495-57010-3 (includes 3 audio CDs).

A minimum of 250 words for each threaded discussion is required for your answer to each discussion question. Students may post anytime during the week to either discussion.

Listen to Shizhane’e’, CD 1:8, textbook pp. 51-52. The A and B sections repeat after the C section, producing what Gary Witherspoon calls “dynamic symmetry” (p. 51).

Obviously the Navajo are concerned with form and shape in their art. How does this symmetrical form support the meaning of the text? Are there examples of this in Western popular music?

• Length of 250 words minimum
• Relevance to assigned discussion topic(s)
• Depth, originality, thoroughness, writing quality

SAMPLE ANSWER

Dynamic Symmetry

Introduction

Dynamic symmetry by Gary Witherson has been used for many years by painters. It is the natural design methodology based on nature’s growth spiral. The importance of Gary’s dynamic principles continues to reign up to this time. Therefore, this paper engages in reviewing issues around this ideology. The paper, while aware of how the Navajos were deeply concerned with the shape in their art, discusses how asymmetrical form supports the meaning of their text.

Discussion

The asymmetrical form supports Navajo’s texts by improvising their quality. This was enhanced by usage of the dynamic symmetry in all their texts (Titon et al. 34). Dynamic symmetry urged every painter or writer to mark his or her surface before beginning his or her drawings, or applying a paint of canvas. The symmetry also gives a provision of different methods of both natural and creative worlds. Navajo, being immersed deeply in his arts, was greatly supported by the symmetrical form (Titon et al. 35) Dynamic symmetry is all about spirals, proportions, and rectangles. This form beautifies texts or paintings (Titon et al. 34).

Nevaja found out that the asymmetrical form made his work pretty. Asymmetrical forms supporting texts in Western popular music, take the style of music terms and concepts. For instance, contour means the shape in the rising and falling of a melody. Another concept related to rhythm is mixed meters, which exhaustively means shifting between meters. Another concept commonly used in Western popular music is polytonality, which implies the simultaneous use of two or more key areas.

Conclusion

In conclusion, Nevaja arts are highly impacted by asymmetrical forms. These enable him complete his texts in a more presentable way. The paper has found that asymmetrical forms have massive effects on Western popular music by capitalizing on musical terms and concepts.

Works Cited

Titon, Jeff T, Timothy J. Cooley, David Locke, Anne K. Rasmussen, John M. Schechter, Jonathan P. J. Stock, David P. McAllester, and David B. Reck. Worlds of Music: An Introduction to the Music of the World’s Peoples. Belmont, Calif.: Schirmer/Cengage Learning, 2009. Print.

We can write this or a similar paper for you! Simply fill the order form!

Understanding Music Essay Term Paper

Understanding Music
Understanding Music

Understanding Music

Order Instructions:

Course Materials: Jeff Todd Titon et al. Worlds of Music: An Introduction to the Music of the World’s Peoples, Shorter Version/3rd Edition. Belmont, Ca.: Schirmer,2009, ISBN: 978-0=495-57010-3 (includes 3 audio CDs).

A minimum of 250 words for each threaded discussion is required for your answer to each discussion question. Students may post anytime during the week to either discussion.

Reference: Text chapter. 3.
What characteristics of African music are similar to Western European traditions? How is the music used in the society?

• Length of 250 words minimum
• Relevance to assigned discussion topic(s)
• Depth, originality, thoroughness, writing quality

SAMPLE ANSWER

Understanding Music

 Introduction

If there is one factor that determines culture of a group, it is music. This is because many people have diverse versions and approaches to music. Although there is a cultural gap between African music and Western European tradition, some similarities still exist between them. Therefore, this paper engages in reviewing the similarities between African music and Western European traditions as well as disusing how music is used in the society.

Discussion

One of the similarities between African music and western European culture is the common sharing of same music traditions. These genres include jazz, blues, gospel, hip-hop, rock and roll, and calypso (Titon et al. 12). The writers noted that most contemporary African music are built from ‘cross pollination’ of western European culture. In addition, African music has borrowed aspects, especially the musical instruments and recording tradition from the Western European culture (Titon et al. 13).

There are varied uses of music in the society, but chief among these is entertainment. Music in most societies is also used in worship and communications. Most cultures appreciate this importance by engaging in all aspects of accessing music. It is used for economic reasons where a singer sells his musical albums. Therefore, singers engage in this employment-oriented profession (Titon et al. 18).

Conclusion

It can be concluded that there exists a correlation between African music and Western European culture. The relationship is mutual in that both societies interact with each other to enhance their music cultures. The paper also noted that uses of music are inexhaustible. They range from entertainment, worship, communication, to employment among many others.

References

Titon, Jeff T, Timothy J. Cooley, David Locke, Anne K. Rasmussen, John M. Schechter, Jonathan P. J. Stock, David P. McAllester, and David B. Reck. Worlds of Music: An Introduction to the Music of the World’s Peoples. Belmont, Calif.: Schirmer/Cengage Learning, 2009. Print.

We can write this or a similar paper for you! Simply fill the order form!

Case scenario Report Assignment Available

Case scenario Report
Case scenario Report

Case scenario report

Order Instructions:

This assignment is of 1500 words. The referencing is Harvard Referencing guide.

Assessment #1 – Case Report (Graded)

Students are required to submit a written report on the analysis of a case scenario. Two case scenarios will be available via the Learn online Course Website and students must choose one (1) from the two. The main aim of case scenario report will be to apply selected theories from the course content to simulated problem solving and decision-making, reinforcing the applicability of theory to practical situations.
Further detailed information including assessment description, marking criteria and academic writing requirements are located on the course learn online webpage.

I have attached all the other requirements for this assignment.

SAMPLE ANSWER

Case Scenario 1 Report

Section 1

From the review of the case scenario and the friend’s account, it is evident that the relationship breakdown between Jeremy and his family is the main issue at hand. This has consequently resulted into depression, loneliness, and a feeling of abandonment that are the underlying causes of his persistent stress hence the intense and prolonged headaches. To counter the pain, Jeremy takes long-acting painkillers and for the feeling of loneliness and abandonment Jeremy abuses alcohol. This interferes with his judgment and, therefore, he misuses the pain drugs and forgets to take his insulin drugs which further worsen his physical condition. In addition, alcohol is contraindicated in diabetes treatment due to the drug interaction that renders the drugs ineffective. From his emotional state at arrival in the hospital, Jeremy seems to have been attempting to commit suicide using an overdose of painkillers taken with alcohol a combination that is clearly contraindicated in medicine. Therefore, apart from the medicine Jeremy is currently using he requires psychiatric therapy to deal with his underlying emotional problems.

Section 2

In reference to the case scenario, the questions of interest here include:

  1. What are the effects of family breakdown on adolescents?
  2. How do adolescents adapt to family breakdowns?
  • How effective are pharmaceutical interventions in treating the symptoms associated with family breakdowns?
  1. What effect does alcohol have on pain and drugs used in Type 1 diabetes?
  2. What is the effectiveness of psychotherapy in the treatment of Jeremy’s condition?

In the case scenario, Jeremy seems to be suffering from a condition that is psychological and affecting his emotional well-being and judgment. These questions will be critical in determining whether the family breakdown is the underlying cause of his stress that in turn requires him to be on constant pain killing medication. In addition, the questions will help determine whether his constant partying, alcohol abuse and the suicide attempt are possible adaptive mechanisms to deal with the emotional distress. Furthermore, they will highlight the effectiveness of pharmaceutical and psychological interventions in handling Jeremy’s case and how alcohol use affects the efficacy of drugs.

Section 3

In the last 30 years, there have been social and demographic changes leading to increased diversity and complexity in the family structure. Today, more couples are cohabiting and becoming parents, and the risk of separation among this group is higher compared to that of divorced parents (Mooney, Oliver, & Smith 2009). However, even among married parents the rates of divorce are significantly increasing. Therefore, children are experiencing parental separations or situations where they have a single parent. This parental separation and family breakdown often has a negative impact on educational achievement, behavior, mental health, self-concept, social competence, and the overall long-term health on the adolescent (Mooney, Oliver, & Smith 2009). Therefore, the question that arises is what the psychological effects of family breakdown on children are.

Per Rodgers and Pyror (1998; 2001) who conducted a review of evidence-based literature on the impact of family breakdown on a child’s outcomes found at those children had an increased risk of developing behavioral problems, poorly performing in school, and required more medical treatment. In addition, they were leaving school and home early, and developing depressive symptoms including higher degrees of smoking, drinking, and other drug use and becoming addicts in adolescence and or adulthood (Mooney, Oliver, & Smith 2009).

Erikson’s Psychosocial Development Theory

According to Erik Erikson, child development occurred under certain predetermined stages and order. Erikson focused on the social development of the child and how this affects their sense of self. He, therefore, developed the Psychosocial Theory of Development that comprises of eight developmental stages (Sigelman & Rider 2014). Each of these stages has two possible developmental outcomes and per the theory, the successful completion of each of the stages results into the development of a healthy personality and proper socialization with others. However, failure to complete a particular stage is associated with a decreased inability to successfully complete the subsequent stages hence development of an unhealthy personality and a poor sense of self. In case a stage is not completed and resolved successfully, this can occur at a later time in the individual’s life. These stages are, “Trust vs. Mistrust, Autonomy vs. Shame and Doubt, Initiative vs. Guilt, Industry vs. Inferiority, Identity vs. Role Conflict, Intimacy vs. Isolation, Generativity vs. Stagnation, and Ego Integrity versus Despair” (Sigelman & Rider 2014).

Application to the Scenario

Due to the family breakdown, Jeremiah was separated from his family at a crucial time when he needed the support of the parents to complete the particular developmental stage that is the identity versus role conflict stage fully, and this resulted into role confusion. In addition, Jeremy was moved to a new country, and since the previous stage was not completed, it became even difficult to complete the next stage (intimacy versus isolation) as these were new people hence he developed feelings of isolation, loneliness and depression hence the headaches.

 

Health Detrimental Beliefs and Attitudes

From the Scenario, Jeremy seems to have health destroying beliefs and attitudes regarding his condition. Due to the family breakdown and separation, Jeremy has clearly developed a psychological condition (depression) and feelings of loneliness and isolation. However, to deal with the stress associated with these feelings he constantly takes painkillers for the stress related pain and to deal with the negative feelings and depressive mood he constantly parties and abuses alcohol as remedies for his state. This negatively impacts his judgment and even he forgets about his diabetes pills. As a final resort, he believes suicide is best for dealing with his problems.

Pathophysiological Processes of Depression

The clinical and etiological heterogeneity related to depression has made it difficult to elucidate the pathophysiology of depression. The current theories in neurobiology having the most-valid foundations empirically and reviewed of the basis of their strengths and weaknesses and selected theories are based on the investigation of psychosocial stress and the stress hormone (Hasler 2010). Stress is attributed to be a cause of depression and the sensitivity to stress is partially gender-specific. While men and women exhibit almost equal sensitivity to stressful events that can lead to depression, the responses differ depending on the type of stressor. Men experience episodes of divorce following separation, divorce, and difficulties in working while women are sensitive events that happen close to their social network (Hasler 2010).

The Corticotropin-releasing hormone from the hypothalamus is released when psychological stress is detected in the brain regions and this critical in the pathogenesis of depression. This hormone brings about several physiological and behavioral alterations that resemble depression. The sickness behavior is as a result of the released hormone with the significant risk factor being suicide (Hasler 2010).

Step 4

In reference to the case scenario, the main problem that to be addressed is the depression. Depression is a mood disorder that results to the development of persistent feelings of sadness and lack of interest. The condition interferes with the thought process and behavior and results into several physical and emotional problems (feelings of worthlessness) (Moragne 2011). Depression is life-threatening and occurs at any age causing severe distress and disruption of life. Due to the negative beliefs regarding depression, ignorance, and a lack of knowledge some of the coping techniques used include alcohol use, drug use, painkillers, comfort eating, self-mutility shopping, suicidal thoughts and even suicide (Brigitta 2002).

To support the client (Jeremy) as a nurse, assessment of the client’s clinical symptoms of depression would be the most important and first in the patient-centered approach. For Jeremy, I would assess of his feelings, behaviors, and verbal response. Once this is done, in a collaborative manner, I would help him conceptualize his treatment goals through the identification of his strengths and weaknesses. Finally,  I would provide depression nursing intervention techniques such as close interaction, encouragement, attentive to the client’s needs, appraising the client’s strengths, and help the client understand the meaning of life and to develop a sense of purpose in order to feel worthy of living. Moreover, I would notify the client of his other medical conditions and the need to adhere to treatment to avoid other negative health consequences that would further worsen his depression.

Therefore, per the Nursing and Midwifery Board of Australia (2006), planning nursing care in consultation with the individual, practicing within the professional and ethical framework, and practicing using a framework that is based on evidence are the ANMC RN Competency Standards required (NMBA 2006).

Conclusion

Depression is life threatening and requires special care from a personal and professional level. I think that the beliefs, attitudes, behaviors, and lifestyle choices that a person having depression has and makes are at the centre on how this disease will progress. For Jeremy, I think if consuming alcohol will worsen his condition. Given the fact that he has another health conditions it is critical that he adheres to the drugs provided and keeps away from the alcohol. A lifestyle change for him would be beneficial as this will help cope with the negative emotions on a long-term basis. From my nursing practice experience, I have realized that many people with depression often engage in health-damaging adaptive mechanisms just like Jeremy, and this often worsens their condition and at times results in death

References

Brigitta, B, 2002, Pathophysiology of Depression and Mechanisms of Treatment, Dialogues Clin Neurosci., 4 (1), 7–20.

Hasler, G, 2010, Pathophysiology of Depression: Do we have any solid evidence of interest to clinicians? World Psychiatry, 9 (3), 155-161.

Mooney, A, Oliver, C & Smith, M, 2009, Impact of Family Breakdown on Children’s Well-Being: Evidence Review, University of London, Institute of Education, London: University of London.

Moragne, W, 2011, Depression, Minneapolis, MN, United States of America, Twenty-First Century Books.

Sigelman, C & Rider, E, 2014, Life-Span Human Development. Stamford, CT, United States of America, Cengage Learning.

The Nursing and Midwifery Board of Australia, 2006, National Competency Standards for the Registered Nurse, 1-11.

We can write this or a similar paper for you! Simply fill the order form!

Major risks to the organization when implementing and using IT

Major risks to the organization when implementing and using IT
Major risks to the organization when implementing and using IT

Major risks to the organization when implementing and using IT

Order Instructions:

It is important to pay close attention to grammatical errors and sentence structure as you compose this paper. you must also try to use research to support your examples. Use the resources below to help you in completing this paper. Also take note that they are a series of questions asked hear and you must clearly respond to each one of them in essay form and remember that a paragraph cannot be anything less than 5 sentences

IT Risk Mitigation

You have examined the role of IT within the organization, including its impact on the structure of the company and the ability to increase competitive advantage. But with the new opportunities that IT can create, there are risks and threats that must be addressed.

– What are the major risks to the organization when implementing and using IT?
– To what degree are IT security risks and business risks interrelated?
– What disadvantages might a business encounter from a “locked-down” IT environment, and how can these be balanced against the disadvantages of a security breach?
– Also include in your discussion the topic of ethics as it relates to handling consumer or patient data and intellectual property.

Be sure to include examples from your own experience or research you have done in your discussion.

Resources

Course Text
• Management Information Systems for the Information Age
Chapter 8, “Protecting People and Information: Threats and Safeguards,” pages 356–365

This chapter discusses privacy, intellectual property, copyright, fair use, and pirated software.
Articles
• Tran, E., & Atkinson, M. (2002). Security of personal data across national borders. Information Management & Computer Security, 10 (5). Retrieved from ABI/INFORM Global database.

This article discusses how national laws regarding personal data can impact transnational companies.
• Halliday, S., Badenhorst, K., & Solms, R. (1996). A business approach to effective information technology risk analysis and management. Information Management & Computer Security, 4(1). Retrieved from ABI/INFORM Global database.

This article connects business risk analysis with information technology risk analysis.
Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective on risk of security threats to information systems. Information Technology and Management, 6(2–3). Retrieved from ABI/INFORM Global database.

This article takes a management, rather than IT, point of view on security threats to information systems

SAMPLE ANSWER

What are the major risks to the organization when implementing and using IT?

Cyber criminality is increasingly becoming sophisticated every day.  The ever growing cleverness in the hacking industry has literally become a critical challenge that organisations are faced with. A survey on cyber security demonstrates that more than 55% of survey correspondents indicated that cyber molestation and the general criminal activities have grown immensely. More than 30% of organisations witnessed negative monetary damage resulting from attacks like hacking and phishing in a period of one year.  Organisations should now compete with a range of hi-tech attacks orchestrated by well structure monetarily driven criminals (Halliday, Badenhorst & Solms, 1996).

Data violations can culminate to embarrassing disclosures, the threat of clientele identity theft, and fines or legal dilemmas. In addition cryptographic keys can fall in wrong hands, granting unauthorized individuals or applications entry to sensitive or important information.  Based on a particular nature of the information, the loss of cryptographic keys can culminate into critical mishaps that are likely to disorient business operations, the loss of clients and legal implications. Application-centered key control procedures present only limited security, leaving sensitive codes and information they safeguard, susceptible to assault. Propagation of fragmented key control systems can enhance the intricacies and security cost control, leading to business procedures that are complex to administer and scale. The complexity of reporting obligations can be enhanced with poorly documented key control.

To what degree are IT security risks and business risks interrelated?

As firms globally take advantage of ICT to curtail cost and enhance performance, digital data can be shared or accessed through interlinked information structures, the threat of information violation in increasingly concerned (Farahmand et al. 2005).  Various major threats that concern ICT experts and business investors include system malfunctioning, disaster recovery, data reliability, which are equally concerns of the potential business threats. Security issues subsist from all assaults that include; connectivity such as; IP spoofing, spamming, and malicious programs. Such intrusions end up tampering with data, data modification, data disclosure and service interruption on power grids and even physical harms like was the case of Staxnet, which dealt a heavy blow on the Iranian nukes. In fact, malware technology has become so lethal that it can now create a physical destruction. With the enormity of such security threats in an IT setting, the business fraternity remain vulnerable especially in the absence of security analysis. Firms will still be vulnerable if they fail to implement a comprehensive security plan. As Tran and Atkinson (2002) state, business environments are fitted with some proficient security measures like data encryption, security socket layer (SSL) protocol to encode the transmission, and biometric validation that manages the physical entry.

What disadvantages might a business encounter from a “locked-down” IT environment, and how can these be balanced against the disadvantages of a security breach?

Firms that are run on heavy computerized networks would be disadvantaged with a locked down IT setting. Nonetheless, the limitation of such backdrops is the rigidity of application updates. IT experts should come in to decide a balance between practicality, fee, comfort, as well as safety measures as the “locked down” IT environment expects managerial leadership. Information and Technology experts require utmost support from the managerial that should comprehend the potential threats.  By and large, implementing a locked down IT framework will be instrumental for the business. Most companies should take advantages of Microsoft Windows 2008 to ensure security is guaranteed. Apart from the Cisco firewall, online activities should be validated with SSL apart from static web server (Tran and Atkinson, 2002). Moreover, the issue of security can be enhanced by redirecting emails through virus interceptors and spam filters prior to hitting the front end substitution of all incoming emails. While personal emails should not be allowed within the corporate systems, the organization should implement programs that filter spamming and safeguard web traffic.

Ethics as it relates to handling consumer or patient data and intellectual property

The truth is that humans tend to abuse the technology per se by simply abusing the best practices.  Human virus can alter how applications work, like tampering with payroll information to enhance the wage bill. This can be done by administrators on the back-end, to alter figures without any documentation. This is to say personnel represent the highest risks particularly when they abuse their rights and professional ethics (Farahmand et al. 2005).  At that point, it becomes paramount to implement safety assessment in almost all structures and networks through an independent party to preclude the issue of unethical behaviors as well as practices.

References

Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective  on risk of security threats to information systems. Information Technology and  Management, 6 (2–3).

Halliday, S., Badenhorst, K., & Solms, R. (1996). A business approach to effective information    technology risk analysis and management. Information Management & Computer Security, 4(1). Retrieved from ABI/INFORM Global database.

Management Information Systems for the Information Age Chapter 8, “Protecting People and  Information: Threats and Safeguards,” pages 356–365

Tran, E., & Atkinson, M. (2002). Security of personal data across national borders. Information    Management & Computer Security, 10 (5)

We can write this or a similar paper for you! Simply fill the order form!

Natural-Accidental Disasters Assignment

Natural-Accidental Disasters
Natural-Accidental Disasters

Natural-Accidental Disasters

Order Instructions:

Local, State, and Federal Partnerships: Natural/Accidental Disasters

1)National Response Framework. Review areas specifically pertinent to local, state, and federal government leaders and emergency management practitioners (pp. 11-19).

http://www.fema.gov/media-library-data/20130726-1914-25045-1246/final_national_response_framework_20130501.pdf

2)You will also need to become familiar with the “memorandum of understanding” approach to cooperative engagements.

a)Provide two examples of a memorandum of understanding. Explain why you chose these examples.
b)Explain why it is advantageous to have a reciprocal emergency response agreement with the town or city that adjoins your town or city. Give examples.

SAMPLE ANSWER

Local, State, and Federal Partnerships: Natural-Accidental Disasters

  1. Provide two examples of a memorandum of understanding. Explain why you chose these examples

The two examples of memorandum of understanding that have been observed in this document are found in the section that discusses the emergency responses in tribal areas as well as the responses that are offered by federal departments.

Under Tribes: “The NRF’s Tribal Coordination Support Annex outlines processes and mechanisms that tribal governments may use to request direct Federal assistance during an incident regardless of whether or not the incident involves a Stafford Act declaration. ”

The reason why this is considered to be a memorandum is the fact that it details a mutual agreement between the various native Indian tribes and the Federal government. The memorandum is expressly detailed under the heading of the “NRF tribal Coordination Support Annex.” The reason for this memorandum is to ensure that the different tribal regions get the assistance they need in the event of an emergency. The reason for this is that many of the tribal regions are remote and lack resources necessary to enable them adequately respond to different natural disasters and man-made emergencies. The federal government on the other hand does have these resources as well as the capacity to adequately handle the emergencies. As such it became necessary for this memorandum that obligates the federal government to provide emergency assistance.

Under Federal Departments: “All Federal departments and agencies must cooperate with one another, and with local, state, tribal, territorial, and insular area governments, community members, and the private sector to the maximum extent possible. Although Federal disaster assistance is often considered synonymous with Presidential declarations under the Stafford Act, Federal assistance can actually be provided to state and local jurisdictions, as well as to other Federal departments and agencies, through a number of different mechanisms and authorities.”

The above extract also qualifies to be a memorandum of understanding. In this scenario unlike the above one where one of the parties bears the obligation, all the parties have a shared responsibility to provide the other department with the necessary assistance that is required. The reason for this memorandum is the fact that different departments are specialized in different areas and different emergency situations call for different tangible and intangible resources.

  1. Explain why it is advantageous to have a reciprocal emergency response agreement with the town or city that adjoins your town or city. Give examples

A reciprocal emergency response arrangement with a city or town adjoining the one I live in is advantageous in that it guarantees immediate and quicker assistance in the event that the emergency situation in the jurisdiction of local authorities in my region. This could be a road accident that has occurred near a border region, it is ideally the responsibility of our local authorities to respond but it will be more effective if the situation is handled by the response team that is closest even if it is from the neighboring town. At times a coordinated effort is crucial for the effective handling of large scale operations such as preparedness for a natural calamity such as a flood or forest fire which has no respect for regional boundaries. The agreement will facilitate more effective responses with operations like evacuation and rescue missions being carried out with more resources available for use (National Response Framework, n.d.).

Reference

National Response Framework. Review areas specifically pertinent to local, state, and federal government leaders and emergency management practitioners. Retrieved from http://www.fema.gov/media-library-data/20130726-1914-25045-1246/final_national_response_framework_20130501.pdf  on August 11, 2014

We can write this or a similar paper for you! Simply fill the order form!

Trusted Supply Chains Case Study

Trusted Supply Chains
Trusted Supply Chains

Trusted Supply Chains- Client Report: Sanken Power Systems (UK) Product

Order Instructions:

A3 Report Structure

Client Requirements
To undertake a study to create a Strategic Evaluation of the market structure for Sanken BR200 device in the European Telecommunication Market.

This study shall strengthen the projects potential to:

• Establish a target market in the European telecommunication industry.
• Approach nearest potential customers.
• Identify if the BR200 fits in the telecommunication industry.
• Identify the companies tier position in relation to the telecommunication market.

Deliverables

• Examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers, by looking at:
• Market Research
• Market Segmentation
• Evaluating the company’s BR200 device and their current position in the market, by looking at:
• Porters Five Forces
• PESTEL analysis
• SWOT analysis
• Determine the supply Chain tiering through mapping the process, by looking at:
• Value Chain Mapping
• Supply Chain Segmentation
• Supporting Theory
• Objective Based:
• Market Research Hague, Paul (2004) –Market Research is used in business models and frameworks to gather information that can be either qualitative or quantitative, to draw a clear picture of the current market structure. Such as surveys provide vital information to assess the market size and competition.

• Market Segmentation Malcolm McDonald (2012) Market Segmentation is dividing the target market into segments in which each customer in the segment share common interests. Therefore, a more narrow focused strategy can be designed and dedicated towards achieving customer’s needs. This method is used to identify the potential customers in the market.

• PESTEL Analysis Jim Downey (2007)–Is assessing the Political, Economic, Social, Technological,Environmental and legal variations in the business environment. This method can be used to provide important information for Sanken to look for new potential opportunities in Europe and take into consideration any possible limitations.

• Porters Five Forces Tony Grundy (2006) – This model can be used by Sanken to set up strategies to explore opportunities that lie within the Telecommunication market, such as mapping the competition and market attractiveness. This model includes threats of new entrants, the threats of substitute products or service, the bargaining power of suppliers, and the intensity of competitive rivalry.

• Value Chain Mapping Mike Morris (2001)–To examine all the value addedactivities that take a product from the beginning process until it finally reaches the customer. It is also used to look deeply into refining the process to make it more efficient.

• Supply Chain Segmentation Douglas Thomas (1996)–Segmentation analysis enables Sanken to focus on specific key sectors to create a tier, as well as build supply chain resources, knowledge and competencies in any division to successfully meet customers’ demands in the market.

• SWOT Analysis Andrews et al (1969) – This tool is used to summarize and analyse the overall strengths, weaknesses, opportunities and threats of the project. To draw a clear picture for the decision makers to consider different aspects of the project as well as organize their thought process.

Table of Content
1.0 Client Aim and Objectives
2.0 Supporting Theory
2.1 Objective 1
2.1.1 Market Research
2.1.2 Market Segmentation
2.2 Objective 2
2.2.1 Porters Five Forces
2.2.2 PESTEL Analysis
2.2.3 SWOT Analysis
2.3 Objective 3
2.3.1 Value Chain Mapping
2.3.2 Supply Chain Segmentation
3.0 Gantt Chart
3.1 Gant Chart Methodology
4.0 Contribution
4.1 Market Analysis
4.2 Shakeholder analysis
4.3 (Add+ )
4.4 ( Add+)
5.0 Reflection
6.0 References

What is the aim of the Client Project?
Client: Sanken Power Systems (UK) Products, Bridgend South Wales
• The purpose of the report is to show the client Why you would use the methods identified.
• What is the (strategic) reason/rationale/motivation for this project? i.e. what is the range of problem(s) or issues involved?

• Consultants(ME) need to submit a report that clearly shows and explains How? they would do the study.
• A Client wants to do something new and needs a study to identify whether it is possible and or desirable e.g. Launch Sanken’s BR200 into a new market.
• For example when talking about the analysis tools i.e. PESTEL analysis discuss only why this tool is relevant to the study and why it needs to be used. Do not explain each and every Stage!
• Create a Gantt Chart and dicuss its methodlogy
Deliverable:
Consultants need to produce a 6,000 word report outlining the main objectives of the study and the methods that would be employed – following the A3 report structure provided.

SAMPLE ANSWER

Trusted Supply Chains

Trusted Supply Chains— Client Report: Sanken Power Systems (UK) Product

The rise in amount of information transmitted and received has promoted the rapid proliferation of ICT services and gadgets such as cloud services and smartphones (Walkenhorst et al., 2009, n.p). In response to these emerging trends, the devices used in control power supply for the DSPs, MCUs, and FPGAs that constitute the core elements of these emerging ICT gadgets must equally be able to support much higher output currents and lower voltages (Hilmersson and Jansson, 2012, n.p). Therefore, the DC/DC converters commonly used in control power supply should have high current and low voltage specifications as well as a fast response to the rapidly changing loads. The non-isolated step down converter module which is the new BR200 series produced by Sanken features a line-up of seven products all with an output current of either 20 A or 10 A perfectly fits this specification.

  • Client Aim and Objectives

Aim:

To undertake a study to create a Strategic Evaluation of the market structure for Sanken BR200 device in the European Telecommunication Market.

Objectives:

  1. To Examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers
  2. To evaluating the company’s BR200 device and their current position in the market
  3. To determine the supply Chain tiering through mapping the process

2.0 Supporting Theory

Sanken is a top global supplier of semiconductor products with their core business being that of semiconductor power devices. Although most of their power devises are widely used in the Automobile industry, the company eyes an opportunity in the Telecommunication industry especially for its BR200 device. The reason for this kind of inclination is motivated by the fact that optical communication is becoming increasingly popular and as such, Sanken needs to engage deeper into the optical systems (Dolnicar and Lazarevski, 2009, p. 360). Moreover, Sanken’s BR200 device is a key component in the telecommunication industry and thus the need for the company to establish the type of component required within the network loop (Hilmersson and Jansson, 2012, n.p). Sanken must establish if their BR200 equipment is appropriate in the telecommunications sector and consequently identify a target market for it within the European market.

Apparently, Sanken postulates that the telecommunications market opportunities largely lie in the major European market players such as Ericsson and Fujitsu. However, the company still beliefs that there is potential for expansion through identification and entry into new markets. The success of venturing into new markets will greatly depend on the capacity of the company to access and acting upon reliable market information (Fabling and Sanderson, 2013, p. 428). Information is particularly needed to narrow down on potential customers, understand their position within the telecommunications market for the purpose of positioning themselves in the supply, and as a basis for approaching their nearest customer to engage with within the supply chain in telecommunication.

Sanken Power Systems (UK) Ltd seeks for the services of a reputable and reliable supply chain company. The PackIT Logistics limited is a leading supply chain based in Cardiff, South Wales and providing efficient services in warehousing, order fulfilment, storage, sock management and distribution, E-Commerce Fulfilment customer service, back office systems, account management, data management services, contract packing, and response management in a range of businesses and industries across UK and internationally.

In the case of Sanken, it is necessary that appropriate information is provided to enable the company master the complexities of the telecommunications market. Market information will focus on investment, customer base, competitiveness, and market entry strategies (Baldwin and Yan, 2012, n.p). Telecommunication market in Europe is characterised by high dynamism in terms of technological innovation cycles, product differentiation, quality improvement, and high capital intensity (Haveman,  2013, p. 602).

The BR200 series consists of a line-up of non-isolated step-down converters that can offer a fast response to any changing loads making it easy to mount. These types of converters offers a stable supply of power output to the MCU, DSP, and FPGA components, whose loads have rapid fluctuates. It also allows high-intensity mounting and in turn facilitating the development of more compact equipment (Wright and Larsen, 2014, p. 171). As such it presents as a competitive alternative to most of the current devises that lacks these essential aspects.

2.1 Objective 1

To examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers2.1.1

Market Research

Market research is a key consideration when evaluating a new market or product. Research is essential in providing Sanken with the data and information that will enable the company make viable decisions about venturing into the new market. Indeed, the company requires a combination of both primary and secondary research in order to obtain the required data (Rudež et al., 2013, p. 131). The principle aim of the market research is to identify a competitive landscape for the BR200 device in terms of the understanding competitors marketing approaches, pricing structure, as well as strengths and weaknesses.

As Quinn, (2009, p. 272) notes, one of the areas that require market research before venturing into the new market is on market trends. According to Jae Young et al., (2013, p. 290) an analysis of the industry trends is very necessary as a basis for forecasting postulated levels of sales in the potential market. Market trends offer a comprehensive guide to potential market size growth prospects. This offers a strategic market analysis of factors influencing the market, demand, and companies including distribution and supply chain factors, pricing, new product development and introduction, and economic issues.

Regarding trade regulations Sanken must be aware of all the legislative requirements that they need to comply with for smooth running of the business (Dibb and Simkin, 2009, p. 376). Additionally, other considerations when venturing into the new market are technical standards desired in the new market and product safety as well as any rules or regulation in exercise in these markets or countries. Again, it is very crucial that tariffs and duties for the particular electronic devices be considered. A wide range of laws and guidelines within the country or market of destination must be first met before the BR200 device can enter the new market. To ensure market success, the design and usability of the device must satisfy the end user’s desires and expectations. Telecommunications industry is largely driven and characterized by innovation (Min et al., 2008, p. 16). Consumer needs, expectations, and behaviour are constantly evolving. Market research is therefore, very necessary to determine exactly what is required in the market and how best to deliver it. This entails reviewing of designs and market information about the product being introduced. This must include product viability and usability in the potential market as well as the safety of the electrical device to ensure that they are ready for the market.

2.1.2 Market Segmentation

In order to compete successfully in today’s’ competitive and volatile business markets, companies must attack niche markets exhibiting unique wants and needs. Battisti (2013, p. 41) defines market segmentation as a process of grouping customers into homogeneous groups or categories in order to optimize on the use of resources and to increase efficiency in terms of distribution, pricing, product adoption, branding, and communication. The principle purpose of market segmentation For Sanken is to reflect on some aspects that are being faced by the telecom industry. This is necessary since venturing into new telecom markets requires proper consideration of huge amounts of data from various sources such as banks, online shops, and insurance about potential customers.

`Market segmentation is the foundation upon which the other activities in analysing of the potential market are based (Schlager and Maas, 2013, p. 45). It requires major commitment on the part of the management to facilitate customer-oriented research, planning, and implementation and control. By and large, the use of the market segmentation information is bound to improve the company’s competitive advantage putting it in a better position to serve the needs of their customers.

Market segmentation analysis entails segment identification, market selection, and strategic positioning (Juan, 2014, p. 88). Segment identification involves establishing based on selected segmentation criteria and variables a given number of similar market segments say in terms of justifiable size, accountable, profitability, and customer-focused segments. To specify on market opportunities, it is crucial to make strategic choices concerning corporate objectives, financial and technical resources available, competitive opportunities, and customer needs. Positioning is a key factor in ensuring that the company carves out on a market niche. This involves searching out unique advantages, seeking new market segment not being cultivated by competitors, and then develop new approaches to these old problems. Positioning should be based on both real sources such as quality and superiority and intangible factors like reputation to gain competitive advantage for the company (Kuen-Hung et al., 2013, p. 722).

Market segmentation analysis has the capacity to enhance responsiveness of products so as to meet the needs and conditions of the marketplace (James and Raee, 2013 p. 32). The process facilitates the developing cost-efficient and effective promotional tactics and campaigns. Through market segmentation analysis, it will be possible to gauge the company’s market position in the potential markets and customers in relation to the competition. In this context, the company is able to plan for its business strategies in the entry of the new market. When launching the new venture it is very critical for Sanken to identify and understand the type of companies they are targeting and how well to reach them. Therefore, conducting a market segment analysis is necessary for focusing the new product to the most promising segment.

2.2 Objective 2

To evaluate the company’s BR200 device and their current position in the market
2.2.1 Porters Five Forces

The Porter’s five forces model is a framework used for the analysis of the business strategy development. It describes five forces that highlight the competitive intensity and attractiveness of the market as; bargaining power of customers, threats of new entrants, threats of substitute products, bargaining power of the suppliers, and competitive rivalry within the industry. These factors are referred to as the micro-environment and have direct impacts its ability to make profits and serve its customers (Lamore et al., 2013, p. 701). Any changes in these factors require that the company reassesses its marketplace. The model will be used to analyse the attractiveness of the European telecommunications industry.

The five forces analysis will facilitate the understanding of a factors impacting profitability in the telecommunication industry in terms of developing competitive strategies and to increase capacity in the market. It is specifically ideal for the EU market since there are more than three competitors (Al-Araki, 2013, p. p. 230). As Lorca-Susino (2014, p. 33) argues, it is effective in several other ways including establishing the impact of the government on the industry and considering the lifecycle stage of the industry as well as considering the dynamic characteristics of the specific industry. It is an effective tool for identifying and analysing the competitive position and strength of the company within the particular market.

The theory is based on the perspective that there are five basic drivers that determine the competitive attractiveness and intensity of a market (Kaufmann and Roesch, 2012, p. 9). The model helps to identify areas where power lies within a given business situation in this case the case being that of the position of the Sanken Power Systems within the European market for their BR200 device. This is a significant step since it will help in understanding the strength of the company’s current competitive position as well as the strength of a new business opportunity that it may look to move into. The model in this case will help to understand if the introduction of a new product in a new market is potentially viable and profitable. The theory is also effective in identifying and understanding where power lies and areas of strength as a basis for the strategic move in a new market.

2.2.2 PESTEL Analysis

The PEST analysis of Sanken will be used as a strategic tool to analyse the external environment in which it operates (Global Semiconductor Industry, 2013, n.p). It is an acronym for political, economic, social, and technological factors. These factors play a very crucial role in the value creation opportunities of the company’s strategy. However, these factors are usually outside the company’s control and must be considered as either opportunities or threats.

PESTEL analysis helps to show the big picture of a company’s external environment especially ones related foreign markets (Ghazinoory et al., 2011, p. 24). It helps gain a better understanding of the potential opportunities and threats likely to be faced when venturing into new markets. It aids in building a better vision of the development or expansion of business and ways in which the company can compete profitably. It analyzes for market growth or decline and as such the potential, position, and direction for the business. These factors are particularly important when the company is planning into entering into a new market as is the case with Sanken. This is achieved through creating insight into market status of key flatness of the market, both in terms of the future and present trends.

The first step in making the most out of the PESTEL analysis is to consider the relevance of each of the six factors in the analysis to the business context (Briciu et al., 2012, p. 147). The second step involves identifying and categorizing the information applicable in these factors. Finally, the data should be analyzed in order to draw conclusions (Nunan and Di Domenico, 2013, p. 7).
2.2.3 SWOT Analysis

When launching a new product it is very critical that the company evaluates the four pillars related to marketing; place of sale, promotion, product, and price of sale (Millson, 2013, p. 1). For successful analysis of these factors it is necessary to analyze the external and internal factors of the company which will in turn help in maximize the opportunities and strengths while minimizing on the threats and weaknesses. New products ought to be developed around two concepts of satisfying the demand or need of a specific target market and with a selling benefit (Simoneaux and Stroud, 2011, p. 75). A weakness related to launching a new product may not necessarily mean that something is wrong with the product, it might instead be signalling the advantage that the competition has over the company. Developing a new product implies an opportunity for the company in the market (Quinn and Dibb, 2010, p. 1244). As such early influencers and adopters are companies who like to try the hottest new product and to tell others their experience with it. This will allow the company to set prices appropriately. Once the new product has been introduced in the market, the competitors will likely react. In this case Sanken is likely to face a great threat after launching their BR200 by competitors changing the playing field. In this regard, it is critical that Sanken has a backup plan for the promotion, distribution channels, and pricing of the product in readiness to respond to competitor changes.

Harwood and Ward, (2013, p. 252) postulate that the SWOT analysis examines the business’ strengths and weakness, as well as threats and opportunities in the potential market. By focusing on these key factors that are likely to affect the business in the new market, the analysis provides a clear basis for establishing the business performance and prospects. The reviewing of the potential business performance will motivate action (Dobbs, 2014, p. 32). The analysis is an effective step towards identifying how successful the new market or product can do through the analysis of the favourable and unfavourable conditions in the potential market. SWOT analysis is a strong basis for planning when undertaking a major business venture (Min et al., 2008, p. 22). The system combines environmental analysis information and separates it into two components. This level of analysis facilitates the company to determine the factors likely to aid in the achievement of some specific objectives or on the obstacles to be overcome before the company can achieve the desired outcome.

2.3 Objective 3:

To determine the supply Chain tiering through mapping the process

2.3.1. Value Chain Mapping

It requires a great deal of resources in terms of finances and time to launch a new product effectively, quickly, and ahead of the competition. An efficient launching of the BR device requires coordination and integration along the chain for the purpose of product design, planning, and manufacturing, procurement, sales and marketing. A value chain strategy in this case is the crucial collaboration of the various functions of the business, primary and support activities with the aim of meeting a certain business objective (Ereaut, 2002, n.p). Value chains are a leading-edge business strategy that guides every participant to contribute to creating value for consumers (Kahn and Kahn, 2010, n.p).

Value chain mapping describes activities that take place within a business and relates them to an analysis of its competitive strength (Competitive Market Analysis, 2009, n.p). The primary activities are those that concern directly with creating and delivering a product while support activities are those that are not involved in the production directly although they may increase efficiency and effectiveness.

By conducting a value chain analysis the Sanken will be able to introduce the BR200 device through involving the management in creating value, deciding the way communication is to be handled, ensuring volatile supply and demand, and chain efficiencies and risks (Market Selection, 2013, n.p). Value chain mapping is an effective means of developing a differentiated product, whole chain marketing, and ensuring consistency of supply.

2.3.2 Supply Chain Segmentation

Proctor (2010, p. 86) postulates that supply chain segmentation is the designing and operating distinctly the different end-to-end value chains form suppliers to customers and optimized through a combination of unique product attribute, business value considerations, customer value, and manufacturing and supply capabilities. It is the dynamic alignment and integration of customer channel supply and demand response capabilities that are optimized for net profitability for each segment (John 2014, n.p). The prevailing fierce completion in the telecommunication industry coupled with the economic downturn across Europe has necessitated the need for businesses to tackle some of the most conflicting challenges of reducing costs and driving growth through innovation (Presutti and Mawhinney, 2013, n.p). Traditionally, the aspect of sales has always been assigned to the marketing function while that of cost reduction is directed towards supply chain. Business alignment is geared towards developing congruence between the supply chain, marketing, and product strategy.

Supply chain segmentation is an effective approach towards mapping the end-to-end supply chain in order to provide visibility within the different segments of the business. Segmentation helps to identify the scope of integration for active management by the supply chain organization (De Backer and Miroudot, 2014, n.p). It is an easy way of identifying the primary customer for the supply chain organization. Segmentation in this case will serve a strategic purpose by reflecting what is important to the growth and profitability of the new product. This approach also gains the much needed internal support to drive the new venture. Sectoring the supply chain is strategic in that it facilitates support for company plans as well as maximizing growth and returns for the new business. In this way, resources are aligned where they are most needed.

According to (Yeates et al., (2010, n.p) value-based approach segments customers on the basis of economic value. The segmenting highlights characteristics in each of the segments. For instance, the company can look at areas where customers in each of the segments differ from others in terms supply chain service. This information can then be used as a basis for strategizing on the entry approach. A needs-based segmentation matches well with the management of supply chain (Lymbersky, 2008, n.p). In this case segmentation is done on the basis of driver that clients have for a specific supply chain service. Clients are categorized in terms of the common set of needs they share. The purpose is to match each sector needs with the current supply chain service. This would guide in enabling the company deliver services in each sector better than the competitors does and as such earn a competitive advantage. Segmentation is, therefore, a very effective approach to understanding Sanken’s supply chain for the purpose of venturing in to the new market. It will enable the company to focus attention and attention in segments where they can create value and provide strategic support.

  • Gantt Chart

3.1 Gant Chart Methodology

Gantt charts provide clear illustrations of the status of a project. To complete the venture successfully, Sanken will need to control a large number of activities in order to ensure that they are completed within schedule. This is to avoid knock-on effects on other activities in case some of the tasks in instances where deadlines are missed or tasks are finished out of sequence causing late delivery of products and more costs for the company (Market Entry Strategies, 2013, n.p). Gantt charts will convey this information visually and effectively by outlining all the tasks involved in the venture, and their order which are shown against a timescale. This clearly highlights overview of the venture as well as its associated tasks and when these tasks need to be accomplished.

Glowik (2009, n.p) notes that a Gantt chart helps to work out practical aspects of the venture in terms of the minimum time required for covering a given task and which activity needs to be completed before others can start. This information will then be used to determine the critical path; the sequence of activities that must first be individually completed on time if the whole venture is to deliver on time. Additionally, the Gantt chart will be used to inform the relevant teams informed of the progress.
4.0 Contribution
4.1 Market Analysis

Market analysis is the evaluation of the dynamics and attractiveness of a given market within a particular industry (Cayla and Paloza, 2012, p. 44). In the case of Sanken, a market analysis will form the basis for planning pertaining to the introduction of their new product in the telecommunications industry. Market analysis can be done in various dimensions such as market size, trends, growth rate, profitability, or industry cost structure, distribution channels, and key success factors. The goal of conducting the market analysis is to gain an understanding of the potential opportunities and threats and then relating them to the company’s strengths and weaknesses. Sanken will use the findings of the analysis guide their investment decision and in turn advance their success. The findings can also motivate the changing of certain aspects of its investment strategy.

In terms of the market size, the market volume presents the totality of the realized volume of sales within a given market (Wilkie et al., 2012, p. 957). This is dependent on the quantity of consumers as well as their consequent ordinary demand. Notably, the market potential is also a crucial factor for consideration which will provide the information concerning the potential for growth of the telecommunication industry. Examples of information that are key in determining market size are trade association data, company surveys, government data, and financial data from major players. Market trends entail evaluation of the upward and downward movement in a given market which offers information about new opportunities and threats. One of the ways of forecasting market growth for Sanken is through extrapolating the historical data into the future or through the study of market trends in complementary products. Analysis done through the Porter’s five forces will be important at this point in evaluating the attractiveness or profitability of the telecommunications market.

The most important factor for any company that plans on introducing a product in a new market is the pilot study. This clearly outlines the market situation in the new market or country, a picture of what to expect while venturing in.  However, most ventures still fail for some reasons. In most cases, companies will fail due to failure to do objective research, or to follow the guidelines outlined in the same. Failure may also emanate from the use of wrong communication, advertising, and advertising channels.  To achieve a successful launching in a new market, therefore, a proper set of processes that are based on research is a key factor to consider.

4.2 Stakeholder Analysis

Stakeholder analysis is the technique of identifying the key people that require to be won over. It involves working out stakeholder’s power, interest, and influence, in order to identify what to focus on (Alternative Market Entry Strategies, 2012, n.p). It is critical that Sanken develops a good understanding of the most important of the stakeholders. This will enable the company to establish how they are likely to respond and plan on how to win their support. By identifying the key people to work in the venture, Sanken will be able to make use of the powerful opinions that most of the stakeholders are likely to bring over to shape the venture at an early stage.

Apart from the possible support that stakeholders are likely to bring on board, their input is equally crucial since it can enhance the quality of the venture. Winning the support of stakeholders is an important consideration in the venture since it helps in anticipating people’s reaction towards the venture which is crucial to building into the company’s plan of action to win people’s support. Effective communication with stakeholders is essential in ensuring that they fully understand the significance of the venture and as such they will be willing to support when necessary.

4.3 Pricing in a New Market

The major objective of entering in to a new market is to increase profits. Pricing has huge impacts on the profitability of a product (Jolly, 2008, n.p). For this reason, the pricing strategy needs to be evaluated methodically before a final price can be reached. The four pricing strategies available for Sanken are the value-based pricing, market based pricing, cash-plus pricing, and the negotiation pricing (Murray et al., 2012, p. 56). In developing a pricing strategy it is very important to have a basic understanding of competitors as well as the level of competition. This enables the company to create value for themselves and for the customers. Choosing the right pricing strategy will, therefore, largely depend on how well Sanken understands the potential market they are venturing into.

Pricing in a new market is highly dependent on the market dynamics and prospects that exist in the host country (Halliburton et al., 2011, p. 95). As such, it is crucial that Sanken makes a deep market analysis through proper consideration of the pricing framework. Sales offices emerge as the most profitable for a Sanken to venture in to a new market. The company will have the opportunity to use the local knowledge and experience of sales teams and in turn reduce on contribution costs of the new product.

Pricing strategies will play a crucial role in determining the number of customers that are going to buy BR200 device. The pricing strategy adopted should be in a position to cover costs, grow market share, and earn reasonable profits for Sanken (Piercy, 2009, n.p). To grow the market share for instance will require that the company offers product selections at a price that will take the market away from the competitors. Cost based pricing entails adding up the total costs incurred to manufacture the product and then adding up the mark-up (Phan and Markman, 2011, n.p). Competitive pricing on the other hand entails matching prices of competitors for similar products. The other option is for the company to set high prices for the new product on the rationale that the attributes of the BR200 device are unmatched in the market.

4.4 Market Entry Strategy

Market entry strategy is an important factor when entering a new market. It is the planned method of delivering the company’s products to a target or potential market and distributing them there. It is very critical for Sanken to understand the preferences of the new customers as well as the management and business culture as a basis for identifying the best talent in driving new business in the new market. Morley (2014, n.p) contends that the different market entry models that are available for the company are upsala model, eclectic paradigm, industrial networks, business strategy, the agency approach, the bargaining power approach, or the transactional cost analysis theory.

Entering into new markets offers great opportunities to companies to increase their sales and enhance their brand awareness. The process of entering a new market requires proper analysis of the existing competitors and potential customers (Donadelli and Persha, 2014).

According to Allen et al., (2012, p. 212) entry plans involves a set of procedures that needs to be considered. First, is the process of selecting the market. In this stage, comparison is done of the different alternatives available in terms of market size, competitors, prices, technology available, as well as the consumer profiling (Collis, 2014 n.p). Secondly, consider the Go-to market strategy.  At this stage once the market has been identified a strategy to get into the actual market has to be developed. Models that can be use include the direct model, in-direct model, or the acquisition model (Using Business Analyses, 2014, n.p).

Markets that are much developed calls for the use of the direct model and requires more investment in terms of money and resources. The indirect approach entails partnering with a player who will support the growth and establishment of the business in that market. In this model, it is important to start with one or two partners as you familiarize with challenges and other factors in that market (Greenblatt, 2013, n.p). Acquisition approach is applicable for medium sized firms with stable firms, assets and management teams to enable them develop long-term decisions (Thomas et al., M 2012, n.p). This stage is crucial in facilitating the budget process for the whole process of market entry.

The fourth stage involves identifying the key customers for the BR200 device, prospecting as well as lead generation (Plötner, 2012, n.p). This is achieved by preparing a list of targeted decision makers and a marketing plan. A crucial consideration to make when planning at this point is the available revenue. Market entry mode is a fundamental decision for Sanken as it plans on entering into a new market. Sanken can choose between the exporting, agent, dealer, or sales office mode of entry. Entry timing is also very important for the company which is dependent on the type of the product, competition levels in the particular market, and the prevailing market factors. The market entry strategy for Sanken will map out the approach to follow in selling, delivering, and distributing the BR200 device in the new market.

5.0 Reflection

It is important to note that a company’s entry into new markets provides an opportunity to increase their sales and gain a wide view of the market dynamics as presented by the diversity. Several factors need to be factored in the process to start a business in a new market. First, the organization has to conduct a survey on the market and employ key models such as the PESTEL analysis tool and SWOT. Information gathered through these models gives an insight into the overview of what to expect in terms of competitors, customers, costs, and technology. For instance, in this case the introduction of BR200 device would be informed by vast market, stakeholder, and industry information gathered through market research, market analysis, and stakeholder analysis of the telecommunication industry within Europe.

Once information has been gathered on the opportunities, threats, and potential of the new market it is time to come up with an entry strategy.  The plan is to maximize on the potential and opportunities while minimizing the threats. Sanken will then be able to come up with a budget and guidelines into which approach of entry to employ. The company should avoid at all costs misconceptions concerning any factors when implementing the plan. Lack of proper survey and implementation plans could result to failing of the business. In this study, it was evident that the success of the plan to venture in to a new market with the new product for Sanken is dependent on the viability of the analysis of the telecommunication market.

References

Al-Araki, M 2013, ‘SWOT analysis revisited through PEAK-framework’, Journal Of Intelligent & Fuzzy Systems, 25, 3, pp. 615-625.

Allen, M, Walker, K, & Brady, R 2012, ‘Sustainability Discourse Within a Supply Chain Relationship: Mapping Convergence and Divergence’, Journal Of Business Communication, 49, 3, pp. 210-236.

Baldwin, J, & Yan, B 2012, ‘Market Expansion and Productivity Growth: Do New Domestic Markets Matter as Much as New International Markets?’, Journal Of Economics & Management Strategy, 21, 2, pp. 469-491.

Battisti, M 2013, ‘REASSESSING SEGMENTATION IN THE LABOUR MARKET: AN APPLICATION FOR ITALY 1995-2004’, Bulletin Of Economic Research, 65, pp. s38-s55.

Briciu, S, Căpuşneanu, S, & Topor, D 2012, ‘DEVELOPMENTS ON SWOT ANALYSIS FOR COSTING METHODS’, International Journal Of Academic Research, 4, 4, pp. 145-153.

Collis, DJ 2014, International Strategy : Context, Concepts And Implications, West Sussex: John Wiley and Sons, Inc.

‘Competitive Market Analysis’ 2009, Credo Reference Collections.

De Backer, K, & Miroudot, S 2014, Mapping Global Value Chains, n.p.: Frankfurt am Main.

Dibb, S, & Simkin, L 2009, ‘Implementation rules to bridge the theory/practice divide in market segmentation’, Journal Of Marketing Management, 25, 3/4, pp. 375-396.

Dobbs, ME 2014, ‘Guidelines for applying Porter’s five forces framework: a set of industry analysis templates’, Competitiveness Review, 1, p. 32

Dolnicar, S, & Lazarevski, K 2009, ‘Methodological reasons for the theory/practice divide in market segmentation’, Journal Of Marketing Management, 25, 3/4, pp. 357-373.

Dolnicar, S, & Leisch, F 2014, ‘Using graphical statistics to better understand market segmentation solutions’, International Journal Of Market Research, 56, 2, pp. 207-230.

Ereaut, G 2002, Analysis And Interpretation In Qualitative Market Research, London: Sage.

Fabling, R, & Sanderson, L 2013, ‘Exporting and firm performance: Market entry, investment and expansion’, Journal Of International Economics, 89, pp. 422-431.

Ghazinoory, S, Abdi, M, & Azadegan-Mehr, M 2011, ‘SWOT METHODOLOGY: A STATE-OF-THE-ART REVIEW FOR THE PAST, A FRAMEWORK FOR THE FUTURE’, Journal Of Business Economics & Management, 12, 1, pp. 24-48.

‘Global Semiconductor Industry – Porter’s Five Forces Strategy Analysis – 2016’, 2013, Electronics Business Journal, 2013.

Harwood, T, & Ward, J 2013, ‘Market research within 3D virtual worlds: An examination of pertinent issues’, International Journal Of Market Research, 55, 2, pp. 247-266

Haveman, HA 2013, ‘Follow the Leader: Mimetic Isomorphism and Entry into New Markets’,Administrative Science Quarterly, 38, 4, pp. 593-627.

Hilmersson, M, & Jansson, H 2012, ‘Reducing Uncertainty in the Emerging Market Entry Process: On the Relationship Among International Experiential Knowledge, Institutional Distance, and Uncertainty’, Journal Of International Marketing, 20, 4, pp. 96-110.

Jae Young, C, Jungwoo, S, & Jongsu, L 2013, ‘Strategic management of new products: Ex-ante simulation and market segmentation’, International Journal Of Market Research, 55, 2, pp. 289-314.

James, R., & Raee, M. (2013). An analysis of the telecommunication industry in the Sultanate of Oman using Michael Porter’s competitive strategy model. Competitiveness Review, (3), 234.

John M., M 2014, Chapter 3: Supply Chain Strategies And Planning, n.p.: McGraw-Hill Professional, AccessEngineering.

Jolly, A 2008, Growing Business Handbook : Inspiration And Advice From Successful Entrepreneurs And Fast Growing UK Companies, [N.p.]: [N.p.],

Juan, Y 2014, ‘Market Segmentation, Information Asymmetry and Investor Responses in the Chinese A- and B-Markets’,Australasian Accounting Business & Finance Journal, 8, 1, pp. 79-100.

Kahn, M, & Kahn, M 2010, Sentiment Market Analysis / Michael N. Kahn, n.p.: Upper Saddle River, N.J. : FTPress Delivers, c2010.

Kaufmann, L, & Roesch, J 2012, ‘Constraints to Building and Deploying Marketing Capabilities by Emerging Market Firms in Advanced Markets’, Journal Of International Marketing, 20, 4, pp. 1-24.

Kuen-Hung, T, Chi-Tsun, H, & Mu-Lin, T 2013, ‘Reviews of market drivers of new product performance’, International Journal Of Market Research, 55, 5, pp. 719-738.

Lamore, P, Berkowitz, D, & Farrington, P 2013, ‘Proactive/Responsive Market Orientation and Marketing-Research and Development Integration’, Journal Of Product Innovation Management, 30, 4, pp. 695-711.

Lorca-Susino, M 2014, ‘The Eurozone And The Economic Crisis: An Innovative Swot Analysis’, Economics, Management & Financial Markets, 9, 2, pp. 27-40.

Market Selection And Retail Location Analysis: Writing And Speaking Exercise 2014, n.p.: South-Western.

Millson, Mr 2013, ‘Refining The Npd/Innovation Path To Product Market Success With Partial Least Squares Path Analysis’, International Journal Of Innovation Management, 17, 2, p. -1.

Min, S, Kalwani, M, & Robinson, W 2008, ‘Market Pioneer and Early Follower Survival Risks: A Contingency Analysis of Really New Versus Incrementally New Product-Markets’, Journal Of Marketing, 70, 1, pp. 15-33.

Morley, M 2014, Understanding Markets And Strategy : How To Exploit Markets For Sustainable Business Growth, Philadelphia, PA: Kogan Page.

Nunan, D, & Di Domenico, M 2013, ‘Market research and the ethics of big data’, International Journal Of Market Research, 55, 4, pp. 2-13

Phan, P, & Markman, G 2011, Competitive Dynamics Of Entrepreneurial Market Entry, Cheltenham, UK: Edward Elgar.

Piercy, N 2009, Market-Led Strategic Change : Transforming The Process Of Going To Market, Amsterdam: Elsevier/Butterworth-Heinemann.

Plötner, O 2012, Counter Strategies In Global Markets, Basingstoke: Palgrave Macmillan.

Presutti, W, & Mawhinney, J 2013, Understanding the Dynamics Of The Value Chain, [New York, N.Y.] [222 East 46th Street, New York, NY 10017]: Business Expert Press.

Proctor, T 2010, ‘chapter five: MARKET ANALYSIS’, Strategic Marketing, pp. 82-101.

Quinn, L 2009, ‘Market segmentation in managerial practice: a qualitative examination’, Journal Of Marketing Management, 25, 3/4, pp. 253-272.

Quinn, L, & Dibb, S 2010, ‘Evaluating market-segmentation research priorities: Targeting re-emancipation’, Journal Of Marketing Management, 26, 13/14, pp. 1239-1255.

Rudež, H, Sedmak, G, & Bojnec, Š 2013, ‘Benefit Segmentation of Seaside Destination in the Phase of Market Repositioning: the Case of Portorož’, International Journal Of Tourism Research, 15, 2, pp. 138-151.

Schlager, T, & Maas, P 2013, ‘Fitting International Segmentation for Emerging Markets: Conceptual Development and Empirical Illustration’, Journal Of International Marketing, 21, 2, pp. 39-61.

Simoneaux, S, & Stroud, C 2011, ‘SWOT Analysis: The Annual Check-Up for a Business’, Journal Of Pension Benefits: Issues In Administration, 18, 3, pp. 75-78.

Thomas, A, & Chartered Institute of, M 2012, Analysis And Decision, London: BPP Learning Media Ltd.

Using Business Analyses 2014, n.p.: Gale Virtual Reference Library

Walkenhorst, P, Shaw, W, & Newfarmer, R 2009, Breaking Into New Markets : Emerging Lessons For Export Diversification, Washington, D.C.: World Bank.

Wright, N, & Larsen, V 2014, ‘Capital Investment and Market Segmentation: Making Movies for Ormon Audiences‘, Marketing Education Review, 24, 2, pp. 167-172.

Yeates, D, Paul, D, & Cadle, J 2010, Business Analysis, Swindon: British Informatics Society.

We can write this or a similar paper for you! Simply fill the order form!

International firms Research Assignment

International firms
International firms

International firms

Order Instructions:

INDIVIDUAL ASSIGNMENT

The individual assignment is worth 30% of your final grade.

Each student will be expected to submit an individual assignment of 2,000 words in their Week 8 tutorials and via Turnitin. The required format for the assignment is an ESSAY. The topic is as follows:

Choose and collect two newspaper or periodical articles that have relevance for international firms from developed markets doing business in emerging/developing markets.

Your chosen articles must be published between 23rd June and 11th August 2014 in one of the following newspapers or periodicals:
The Sydney Morning Herald, The Australian, The Australian Financial Review, The Wall Street Journal (US edition), Business Review Weekly, The Economist

Based on your articles you should address the following points within your essay:
What are the implications for international firms doing business within an emerging/developing market? Do you consider the legal, political, cultural and economic differences between home and host countries to be important considerations for international firms?

In your opinion, what is the most relevant macro-environment factor for an international business when choosing to internationalise into an emerging/developing market? Discuss any international business concepts or theories that could be used to help justify your answer.

Include copies of both articles (either the original ‘cut-outs’ or a print out of the article from the newspaper’s website) as appendices to your assignment.

Your essay should incorporate at least 12 different references. These can be sourced from the following:
Academic articles
Relevant textbooks
Periodicals
Newspapers
Relevant online sources

The 12 references should be evenly balanced between these five resource options. Examples of all of these reference options are detailed on pages 4-5 of this guide.

Students are expected to maintain an appropriate standard in presenting their essay Remember to acknowledge your sources throughout the paper using the Harvard referencing system. The report is to be typed and 1.5 spaced (a standard 12 point font should be used). It should be checked for spelling, consistency and clarity of expression.

No extensions will be granted. Late tasks will be accepted up to 72 hours after the submission deadline. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission – 20% penalty). This penalty does not apply for cases in which an application for unavoidable disruption is made and approved.

Your essay must be submitted to Turnitin.

We can write this or a similar paper for you! Simply fill the order form!