Monday, December 30, 2019

Human Embryonic Stem Cells - 1916 Words

The human embryonic stem cells (hESCs) have defined by Bryant and Schwartz (2008) is in the mammalian embryo, there are several cell divisions that take place after the fertilization of the sperm and the egg in the uterus. There is no growth in the total volume of the cell, so the cells that are known as blastomeres get progressively smaller. Then, they are rearranging into a hollow ball known as blastocyst and surround the blastocoel which is a fluid-filled cavity. The blastocyts and then segregate into an outer layer called tropoblast and an inner cell mass (ICM). The tropoblast will form the placenta to the fetus while the inner cell mass that contains human embryonic stem cell will form the tissues of the fetus. According to Sandel and Phil (2004), the hESCs can cure and provide treatment for many kinds of disease such as Parkinson, Alzheimer, diabetes and spinal cord injury. But, ethical issues of hESCs research, therefore, overlap with those of the embryo research. On top of th at, De Wert and Mummery (2003) commented that the research of hESCs has high political and ethical agenda in many countries. Their use in the treatment of disease remains controversial regardless of their potential benefit. This is because their derivation from the early embryo. As Fischbach, Fischbach and others (2004) observe: Human embryonic stem cells offer the promise of a new regenerative medicine in which damaged adult cells can be replaced with new cells. Research is needed to determineShow MoreRelatedThe Human Embryonic Stem Cells910 Words   |  4 Pagesdiscovery of human embryonic stem cells, scientists have had high hopes for their use in treating a wider variety of diseases because they are â€Å"pluripotent,† which means they are capable of differentiating into one of many cell types in the body. However, the acquisition of human embryonic stem cells from an embryo can cause the destruction of the embryo, thus raising ethical concerns. In 2006, researchers introduced an alternative to harvesting embryonic stem cells called induced pluripotent stem (iPS)Read MoreHuman Embryonic Stem Cell Research1625 Words   |  7 PagesProduction and the Scientific and Therapeutic Use of Human Embryonic Stem Cells, the Pontifical Academy for Life presents the field of stem cell research with a statement regarding the official Roman Catholic position on the moral aspects of acquiring and using human embryonic stem cells.  They have declared that it is not morally legitimate to produce or use human embryos as a source of stem cells, nor is it acceptable to use stem cells from cell lines already established. Thus, bringing up the conflictingRead MoreHuman Embryonic Stem Cell Research2490 Words   |  10 PagesFederal Government to fund stem cell research through the National Institute of He alth. There are various types of stem cells, but the policy issue mainly covers human embryonic stem cells. This policy revokes President George W. Bush s executive order 13435 which put heavy limitations on federal funding for stem cell research. Although this policy has already taken effect, there are still bans and immense regulation on particular methods of human embryonic stem cell extraction that involve theRead MoreEssay on Human Embryonic Stem Cells 2138 Words   |  9 Pagesof a federal judge because of several issues that emerged with stem cell research being funded by the government. Although, the science of human embryonic stem cell is in its initial stages - there is much hope for scientific advancement due to the ability for human embryonic stem cells to grow into virtually various kinds of cells   Favorably, advocates for stem cell research and pharmaceutical companies strongly believe that stem cells may pave a way to discover new methods of treatment for devastat ingRead MoreHuman Embryonic Stem Cells ( Hescs )1627 Words   |  7 PagesEstablishment of iPSC The interest in developing human embryonic stem cells (hESCs) as a regenerative medicine has been prospering due to its pluripotency and indefinite self-renewal capacity since first discovered in 19981,2. However, the method to harvest hESCs by destroying embryos raised ethical concerns and thus the progress of this therapeutics has been impeded for years. Alternative approach was not achieved until the discover of induced pluripotent stem cells (iPSCs) by integrating a combination ofRead MoreHuman Embryonic Stem Cell Research992 Words   |  4 PagesThe liver is known in the medical community as a miracle organ because is it the only known organ in the human body that can regenerate itself if half of it is cut out. Tissue regeneration has always been a desirable fantasy, but now it is almost a possibility. Human embryonic stem cells are pluripotent cells that, although unspecialized, can differentiate into various specialized cells, such as nerves, muscle, skin, or even blood. Sadl y, controversy surrounds this relatively new scientific conceptRead MoreHuman Embryonic Stem Cell Research1313 Words   |  6 PagesJessica Rogers Kendra Gallos English III Honors 18 April 2016 Human Embryonic Stem Cell Research Human Embryonic Stem Cell Research, or HES cell research, is a very controversial ethical debate. This issues is a dilemma for scientist, religious activist, and many more. HES cell research is being disputed because the practice is morally wrong. The other side of the issue stands with many scientist, being that they see the potential lives it could save in the long run. Religious activist, andRead MoreHuman Embryonic Stem Cells : The Moral Dilemma898 Words   |  4 PagesHUMAN EMBRYONIC STEM CELLS: THE MORAL DILEMMA Stem cells are unspecialized cells capable of renewing themselves through cell division, even after long periods of inactivity. Stems cells can develop into many different cell types within the body during early life and growth. Stem cells can also serve as an internal repair of sorts inside many tissues. When a stem cell divides, it has the potential to either become another type of cell with a specialized function or remain a stem cell. The abilitiesRead MoreHuman Stem Cell Research : Ethical Dilemmas With The Utility Of Embryonic Stem Cells1879 Words   |  8 PagesTrevor McCarthy Human Embryonic Stem Cell (hESC) research possesses ethical dilemmas with the utility of embryonic stem cells (ESCs) derived from human blastocyst, one of the earliest stages of embryonic development. Embryonic stem cell derivation is controversial because there are different opinions and beliefs on when an embryo is deserving of full moral status, equal to the moral respect, rights and treatment to that of a human being. ESCs extracted from a blastocyst will undergo experimentationRead More Human Embryonic Stem Cell Research Essay4185 Words   |  17 PagesHuman Embryonic Stem Cell Research Many scientists believe that research on human embryonic stem cells, components of human embryos created in laboratories, will eventually yield cures to a number of devastating human conditions including juvenile diabetes, Parkinson’s disease and spinal cord injuries. On August 9, 2001, President George W. Bush announced he would permit federally funded research on existing stem cells lines derived from human embryos. He prohibited the federal funding of research

Sunday, December 22, 2019

Relationship Between Personality And Personality Development

Developmental psychology is described as â€Å"the scientific study of biological, cognitive, social, and personality development throughout the life span† (Taylor, 2005, p.1). According to the readings, personality formation has been argued to be the result of nurture-as in the social environment, and temperament is the result of nature-as in genetic biology (Personality Development: Intimacy and healthy personality, n.d.) This is in actuality a complex interplay between the two forces that shape our personalities as we grow and become healthy adults. Family and social environments both exert influence on the development of individual personality; this has been the topic of studies for years. Lewin’s Field Theory attempted to show†¦show more content†¦I took an online version of the Myers-Briggs Personality test, and the results indicate that I am INFJ. Specifically, I am 28% Introvert, 22% iNtuitive,9% Feeling, and 28% Judging.The website describes INFJs a ha ving complex character, and above average talents. They/we are said to be a rare type, humanitarian in outlook, idealists, and are simultenaeous both doer and dreamer (Humanmetrics Inc, 2017). It says INFJs combine vision with practicallity, are prone to taking larger than necessary responsibility in issues that concern them, and are true intoverts ( often mistaken for extraverts) who care about others and the world. They have small yet substansive social circles. They are said to have clear insight, uncanny empathic abilities, and strong writing skills (Humanmetrics Inc, 2017). Some of the other descriptors include being inherent givers, champions of the downtrodden, hard to fool or outwit, having high levels of stress tolerance and they communicate by being thoughtful, caring and supportive (Humanmetrics Inc, 2017). Among the more amazing, highly applicable things it says I supposedly exhibit, it says INFJs are suited to teaching (I was a corporate trainer); psychology and counseling are obvious career choices; they are often found on the front lines helping those in distress after an emergency (I was a combat medic);they are selective with who they make friendships with; have a talent for deducing the mind, will,Show MoreRelatedCareer Choices Are A Reflection On An Individual’S Personality1325 Words   |  6 Pages Career choices are a reflection on an individual’s personality type. It is believed to be reinforced and rewarded by the individual’s academic environment. The theorist, I will discuss in this paper is John Holland theory. Holland’s theory provides a framework that is congruent to one’s personality type. Many personalities are influenced by their environment, which in terms dictates the type of career they choose. The primary purpose of Holland’s theory is for individuals to look for opportunitiesRead MoreHumanistic and Existential Personality Theories Paper1238 Words   |  5 PagesExistential Personality Theories Matrix Humanistic and Existential Personality Theories Matrix Theorists have invested years of research into learning the dynamics of one’s personality. Humanistic and Existential Personality Theories offered perspectives that have proved to be valuable to those researching and exploring how one’s personality develops and expands throughout life. From Maslow’s hierarchy of needs to Carl Rogers’s development of the formativeRead MoreRelationship between Personality, Behavior, and Performance913 Words   |  4 PagesRelationship between Personality, Behavior, Performance Personality is a major factor in how individuals behave and perform in the work environment. For example, traits that are part of ones self-concept will influence how one processes information and predicts future behavior (Chatman, 1999). By examining a persons personality, human resource managers gain insight into what positions are the best fit for an individual, or which individual is a better fit for the position needing to be filledRead MoreEarly Exposure Of Foreign Literature1425 Words   |  6 Pagesof the foremost tools used for social action and change. From describing social climate and conditions to using satires to bring about desired adjustments, literature has played a very important role in the development of social attitudes. Albrecht’s 1954 essay on the relationship between literature and society sums it up perfectly; literature not only acts as a reflection of society but also has an influence on cultural ideals and social stability. In this study, the ai m is to concentrate onRead MoreNature Vs. Nurture : Nature Versus Nurture1678 Words   |  7 PagesNature Versus Nurture Personality development expands far past the environment. Environment contribute to most of the personality development when it comes to nature versus nurture. Nature versus nurture is a trait that is typically inherited in the human society. Humans see things good or bad within the environment and mimic it. There are questions that still remain about nature versus nurture and the environment. Research is still ongoing and theories are still being made or developed. ScientistsRead MoreFamily Influences Our Personality, Behavior, Beliefs and Values1080 Words   |  5 Pages The effects of family and culture can substantially influence ones personality, behaviours, beliefs and values, which correlates positively to the life experiences in part 1. Research has shown the significance of family interactions on stress levels, personality and behavioural traits on younger individuals. The young ones imitate the elders as they have yet to be independent and this process is considered to be an aspect of evolution, via increasing fitness. Environmental factors such as biologicalRead MoreBirth Order Effect On Child Development1070 Words   |  5 PagesEffects of Birth Order on a Child’s Development For decades, psychologists have argued the accuracy of the Birth Order Theory, the concept that the order in which children are born has lasting effects on their development. The Birth Order Theory was first introduced by a prominent psychologist named Alfred Alder who suggested that birth order has a lasting impression on one’s personality. The notion that birth order plays a role in one’s intellectual development dates back to 1874 when Sir FrancisRead MoreBiological and Humanistic Approaches to Personality Essay747 Words   |  3 PagesApproaches to Personality Valerye Rogers PSY/250- Psychology of Personality Michael Moore, Instructor February 21, 2011 Biological and Humanistic Approaches to Personality In the following, the author will discuss and analyze the biological and humanistic approaches to personality. Maslow’s hierarchy of needs will be discussed and examined. The author will describe biological factors that influence the formation of personality. The author will examine the relationship of biologicalRead MoreWarren Edward Buffett : World s Most Successful Investor Essay1516 Words   |  7 Pagesthe age of 19. In 1951, Buffett enrolled at Columbia University to pursue A Masters of Science in Economics. Buffett has also been recognized as one of the great thinkers in the world. His contributions to philanthropy can be attributed to his personality, not so common in many people of his caliber. In this respect, Buffett has severally written of his belief that his children will never inherit a substantial amount of his wealth and he would give them just sufficient to feel doing anything, butRead MoreWhy Is Psychology Useful?1541 Words   |  7 Pageshealth. It helps a lot of people tackle their mental illness so that they can continue living their lives. Psychological studies have also aided in drug development and the ability to diagnose various diseases (such as Alzheimer’s and Parkinsons). Psychology is extremely useful in the areas of identifying personality, behaviour in groups and relationship theories, all which are to be experienced by every individual. Psychology makes it clear why humans do the things they do and ways in which people can

Saturday, December 14, 2019

Marketing of Hardbite Chips Free Essays

string(48) " from originally selling in health food stores\." Hardbite Chips Langara College School of Management MARK 1115 Introduction to Marketing D. Hill 23 November 2009 Executive Summary This report provides an analysis of Hardbite Chips and the Snack Food Industry and offers recommendations for Hardbite Chips to develop an effective marketing plan. Hardbite Chips is an environmentally sustainable business that provides healthy, good-tasting, and quality potato chips. We will write a custom essay sample on Marketing of Hardbite Chips or any similar topic only for you Order Now The target market we have selected for Hardbite Chips is health conscious consumers, particularly those with children. It is our belief that the consumers will be attracted by the healthy features of our product and will be willing to pay slightly more for these benefits. It is our objective to significantly increase awareness of our product among these consumers. As our funds for promotional activities are limited and our target market can be hard to reach our marketing mix focuses heavily on sales promotion. Advertising and public relations will help us promote the features of our product and position it as a high quality brand in the minds of consumers. We hope to use personal selling to increase the number of retailers that carry our product. We believe Hardbite Chips has the ability to obtain satisfactory profits and grow the business. This will allow the company to better compete against the numerous competitors in the industry and increase sales. As the business grows, more funds can be spent on promotional activities enabling the company to expand its target market and appeal to more retailers. Table of Contents Current Marketing Strategy†¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 Company Mission Statement.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 Internal and External Analysis PEST Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 SWOT Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 Competitive Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 Target Market†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 Marke ting Objectives and Issues†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 Marketing Research†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 Product Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 Pricing Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9 Distribution Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 Integrated Marketing Strategy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 12 Appendix I†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 Endnotes†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Current Marketing Situation The Canadian snack food market presents a lu crative opportunity for new and existing companies in the industry. In 2008, Canadians ate an average of 3. 2 kg of potato chips. 1 Food stores capture the majority of snack food purchases in 2001 at approximately 67% and supermarkets accounted for approximately two-thirds of this. Convenience stores took the third largest share of the market at around 13%. Mass merchandisers and wholesale club stores have increased their market share in recent years, passing convenience stores, as more of these types of locations have opened in Canada. However, this change has not yet significantly affected food stores. 2 In 2007, Canadian retail grocery stores sold over $1. 8 billion worth of snack food, with potato chips accounting for approximately $550 million. This continues the recent trend of 6% growth in annual retail sales of potato chips. 3 This growth has encouraged companies to expand into niche markets by offering unique flavours and organic products. The Canadian snack food industry has seen an increase in new entrants in recent years despite the presence of big corporations. These big corporations have economies of scale which give them a significant competitive advantage in terms of cost. Furthermore, these corporations benefit from massive advertising budgets that allow them to hold on to their majority market share. Frito-Lays, a division of PepsiCo. , is the leader in the Canadian snack food industry with multiple SBUs that offer many different products, including different varieties of chips in various flavours. However, the opportunity exists for smaller companies to come in nd target niche markets. In fact, â€Å"in 2006, 106 Canadian snack food manufactures shipped $1. 6 billion of product†. 4 However, big corporations are beginning to see the potential of these markets and are beginning to expand into them. A good example of this is Frito-Lays and the introduction of their Wasabi flavoured chips5. Company Mission Statement Hardbite Chips is dedicated to providing our customers with a healthy, good-tasting, and quality potato chip. In doing so, we are committed to be an environmentally sustainable company with strong ties to the community. Internal and External Analysis PEST Analysis: Hardbite Chips | |Political Environment |Economical Environment | |Mandatory nutrition labeling |Economic recession | |Provincial Government policy bans junk food sales in elementary and |Tough to get capital | |high schools |People are less likely to spend money on unknown premium brands | |Social Cultural Environment |Technological Environment | |Trend away from unhealthy snacks |Equipment needed to expand production is expensive | |Potato chips blamed for contributing to obesity | | |Recent discovery of acrylamide, a possible carcinogen, found in | | |carbohydrates cooked at high temperatures | | |People looking to buy environmentally friendly products | | |Competitive Environment |Demographic Environme nt | |Heavy competition in industry |Many consumers more interested in environmentally friendly products | |Low brand loyalty among consumers in industry |Many people are concerned about health | |Large corporations have majority of market share | | SWOT Analysis: Hardbite Chips | |Strengths |Weaknesses | |Product is hand-cooked |Limited cash-flow makes it difficult to grow | |Potatoes are grown locally |Brand is fairly unknown | |Focus on quality |Small production facility compared to major competitors | |Unique flavours | | |Growing brand awareness | | |Sold in many health stores and on many campuses in BC. Also sold | | |across BC in well known stores such as London Drugs, Shoppers Drug | | |Mart, Overwaitea, and IGA Marketplace locations | | |Opportunities |Threats | |Expanding market |Provincial Government policy bans junk food sales in elementary and | |Many consumers are becoming more interested in environmentally |high schools |friendly products |Larger competition may enter market | |Many consumers are concerned about health |Economic recession | |Opportunity to target niche ethnic markets |Tough to get capital | | |People are less likely to spend money on unknown premium brands | | |Low brand loyalty among consumers in industry | Competitive Analysis We wish to position Hardbite Chips as a top quality potato chip brand in the minds of consumers. It is our desire to utilize the frequent consumer assumption that quality and price are related. [pic] We believe Hardbite Chips has the potential to develop a niche competitive advantage. Our primary focus is on serving health co nscious consumers. Thus, our most important unique selling proposition is to focus on the healthy qualities of our product. By producing an all natural potato chip that is free of trans-fats, we believe we will appeal to health conscious consumers. Also, Hardbite Chips was an early entrant into the expanding healthy potato chip market and the company has expanded its distribution points from originally selling in health food stores. You read "Marketing of Hardbite Chips" in category "Essay examples" It is our belief that this has created brand recognition among the early adopters of healthy snacks. As the number of consumers purchasing healthy snacks increases, we think these early adopters will recommend the product to consumers helping the brand grow. Furthermore, with the discovery of acrylamide, a possible carcinogen, in baked and fried carbohydrates cooked at high temperatures, including many of the existing potato chips on the market, we have an advantage over many of our competitors as our product is not cooked at high enough temperatures to produce acrylamide. Hardbite Chips also uses unique ingredients such as Himalayan salt which provides more nutrients while keeping sodium levels low. This can be particularly appealing to health conscious consumers, especially to those with high blood pressure. Another unique selling proposition Hardbite Chips can use is to appeal to environmentally conscious consumers. Our company is committed to be an environmentally friendly company. Our potatoes and spices are supplied by local growers and our packaging is supplied by a local manufacturer. By highlighting these facts we believe we can convince environmentally conscious consumers that our company operates with similar values. As the â€Å"green† movement grows larger, we think we are situated to capture a large portion of this growing market. Another advertising appeal that we could use as a unique selling proposition is our unique flavours which may appeal to particular ethnic groups. While we attempt to make flavours that we think will appeal to everyone, we realize that certain ethnic groups may find some of our flavours appealing as they are familiar with them. For instance, our creamy coconut and curry flavoured chips may have a special appeal to Thai people as coconut milk is often added to curry in many Thai recipes. Although we currently offer only a few unique flavours, it is our desire to develop more. By looking for inspiration in traditional ethnic foods we believe we can find flavours that appeal to Canada’s diverse ethnic communities as well as more traditional consumers of potato chips. Target Market In examining the potato chip market, we have decided to segment the market based on a psychographic segmentation. Our key considerations are the consumers’ motives, personality, lifestyle, and geodemographics. Since, there is normally just one person who does the grocery shopping for an entire family, most likely a parent, it is our desire to target this person. In particular, we are interested in targeting working parents who are raising children in an urban environment. In terms of personality and lifestyle we would segment these people by looking at the type and amount of activities they do. We are looking to target people who have full, active schedules and are looking for healthy food options but do not have time to compare products on their own. For motives, we are looking for parents that are concerned about providing healthy snacks their children will actually eat. By using geodemographics, we will be able to slightly modify our advertisements for certain ethnic neighbourhoods. We have chosen to target this segment because our product is capable of meeting their needs and should easily appeal to them. Also, as this segment purchases most of the food for their family, our product will be exposed to their children as well. This will help grow brand recognition and will help increase the sales of our product among other segments. The primary challenge we foresee in targeting this segment of the market is our ability to find an appropriate and effective media to communicate to them. These people balance work and family obligations which can take up a substantial amount of their time. For a convenience product such as snack food, these people may not pay attention to ads for different brands. Also, these people often have other things on their mind so they may be distracted when presented with our ads. Marketing Objectives and Issues Our objective is to increase consumer awareness of our product by 30% in the next year. Since our product is still fairly unknown and the company has been focussed on expanding production facilities, we believe now is a good time to increase promotional expenditures and raise awareness of our product. We are most concerned with increasing the awareness of our product benefits and decreasing customer resistance to buying our product. To measure the success of our objective, we will use monthly surveys to determine the approximate number of consumers aware of our product. When increasing awareness of our product, we wish to focus on the benefits that our product offers to consumers. These benefits would include the healthy aspects and quality of our potato chips. We believe consumers will perceive our all-natural, hand-cooked products as highly compatible with their lifestyles. Thus, as consumers become aware of our product, sales should increase. Also, by increasing awareness of our product we hope to decrease consumer resistance to buying our product. In recent years, potato chips have come under attack for contributing to obesity and related health problems. Additionally, carbohydrates cooked at high temperatures have been found to contain acrylamide, a possible carcinogen. Our product addresses these concerns and by informing consumers of this, we believe they will decide to choose our product over our competitors leading to an increase in our sales. In order to measure the effectiveness of our strategy, it is important to receive continuous feedback from consumers. Therefore we will survey consumers throughout the year to measure changes in awareness of our product and the change in the number of people buying our product. We will also ask consumers how they view our product compared to those offered by other snack food manufacturers and how they perceive our product in terms of health. Challenges in meeting our marketing objectives will include selecting an effective channel through which to educate consumers about our product. Also, as more companies are entering into the market we will be competing with them to make customers aware of our products. Another challenge that may present itself is the large companies in the industry may also become aware of our product and choose to emulate some characteristics of our product reducing our competitive advantage and making it harder to convince consumers are products are differentiated enough to be material. To overcome these challenges we will attempt to communicate with consumers as close as possible to the point of purchase. Our integrated marketing communication strategy will be the key to providing us the opportunity to meet our marketing objectives. Marketing Research Our research thus far has only included secondary sources of information. However, this information has given us a basic understanding of the market, changes occurring in the market, and our competitors in the industry. Statistics Canada has provided us with detailed information on the total sales of snack food in Canada as well as how large a portion potato chips make up of these sales. Agriculture and Agri-Food Canada and the USDA’s Foreign Agriculture Services have helped us to determine where the majority of snack foods are purchased by consumers in Canada. Industry Canada and Agriculture and Agri-Food Canada have also supplied us with detailed information about the size of the industry as well as general performance information for the industry. Despite the high cost of primary data, it is our belief that it would benefit the company to conduct such research. This would allow us to better define the exact size and distribution of our target market, the growth of this segment, and the rate at which this segment’s beliefs and attitudes are changing. Primary data will also allow us to develop new flavours that are customers would enjoy. To gather this information we would recommend the company use internet surveys with screened internet samples and to design the questionnaire to provide data on all of these areas so as to keep costs as minimal as possible. We have chosen screened internet samples because they can provide real-time reports and can be personalized for individual respondents. Also, since the segment we have chosen to target is quite active and busy, internet sampling will allow us to reach these consumers and hopefully receive a high rate of responses. Additionally, primary data is needed to assess the company’s ability to meet the marketing objectives. For this we would recommend the company conduct internet surveys with recruited internet samples each month. This will allow us to determine the effectiveness of our promotions. We have included a sample survey that the company may use for this purpose (see Appendix I). We have chosen the internet sample method because of its relatively low cost. However, as the company grows, we would recommend the use of focus groups to help develop and test new flavours of chips and to help determine the most effective way of promoting the product to our target market. Although they are more expensive, focus groups allow us to get more detailed information from consumers which we can then use to better serve our customers. Product Strategy Potato chips are at the maturity stage in the product life cycle. Many of our competitors have been in the business longer than us and have established a hold over some share of the market. Many new entrants to the industry, including Hardbite Chips, target niche markets that have been underserved by larger, more established companies. Our product is aimed at satisfying the needs of health conscious consumers. To meet these needs, our product provides consumers with many healthy features not included with other potato chips. By making our potato chips trans-fat and cholesterol free we provide a product that consumers can snack on without having to worry about high cholesterol and its detrimental effects on health. We also use Himalayan salt instead of table salt on our potato chips. Himalayan salt provides â€Å"84 minerals in the same ratio as healthy blood plasma† and is a lower sodium alternative to table salt. 6 We believe this will be particularly appealing to health conscious consumers, especially those with high blood pressure. Another health benefit our potato chips have over those of most others potato chips, is our unique cooking process. During this process, temperatures do not get high enough to create acrylamide in our potato chips. Since acrylamide is has been found to be a possible carcinogen, we believe customers will see this as a significant benefit. Our product is augmented by offering our potato chips in different and unique flavours. Also, information about the healthy qualities of our product can be found on the packaging. We would like to further augment the product by increasing the number of flavours available and providing a guarantee of consumer satisfaction with our product. Our long term goal is to position the Hardbite Chips as a top quality brand in the minds of consumers. Pricing Strategy Our pricing objective is satisfactory profits. This will enable us to compete with our competitors and continue to grow our production levels. Our competitors in the industry are numerous and many have developed economies of scale giving them the advantage of lower costs. Therefore, to achieve our objective we want to position our product at a slightly higher price than our competitors. We want to utilize the assumption of uncertain consumers that price and quality are related. However, we must be careful not to price our product to high as the market for potato chips is elastic. It is important that the company has enough sales to cover our fixed costs and provide satisfactory profits. As we our selling a product in the maturity stage of the product lifestyle, the distribution channels we use is important to the company. Thus, it is important that we price our product at a level that appeals to wholesalers and retailers. Our pricing strategy is to focus on the market for healthy and high quality potato chips. We believe this will allow us to price our product at a price slightly above our competitors. In order to encourage customers to try our product we will offer coupons. This will allow us stimulate demand by offering a lower price temporarily. We can then discontinue the rebate once people are aware of our product. Distribution Strategy Hardbite Chips currently distributes the potato chips it produces through numerous distributors. This strategy has helped the brand grow from being sold in mainly in health stores to being sold on many campuses across BC in addition to well known stores such as London Drugs, Shoppers Drug Mart, Overwaitea, and IGA Marketplace locations. This has allowed the company to increase demand for its products without having its own sales force. Given the proportion of snack food sales in retail grocery stores, we believe it is important that we communicate directly to these retailers to encourage them to carry our brand. We also think selling our product in convenience tores will help increase brand awareness. Retailers that we feel would immensely help increase our sales include Safeway, The Real Canadian Superstore, and 7-11. Getting our product sold in vending machines would also help increase brand awareness. Despite a provincial ban on the sales of junk food in elementary and high school s, vending machines are found in many high traffic areas. As our packaging has information on the health benefits of our product, health conscious consumers may be more inclined to buy our product given the alternatives. IMC Strategy Our primary communication objective is to convince consumers our product is a healthy choice for their snacking needs. We would also like to communicate our commitment to the environment and our community. We feel that these messages can complement each other and work to position the company as caring and responsible in the minds of consumers. Given the size of our company and the limited amount of funds we have for promotion, we cannot afford to spend the amount we would like to on advertising. Thus, to reach our target market, we think we should advertise in magazines devoted to healthy lifestyles. The reason we have chosen magazines is they are a relativity low cost advertising option, they have a long advertising life and they have a high pass-along rate. We believe public relations may be the most cost effective way to increase customer awareness of our product. Sponsoring community activities, like a community garden, and co-sponsoring events like eco-challenge, which receives national television coverage, will help establish us as a health conscious and environmentally friendly company. Sponsoring activities like this will also likely result in positive media coverage for the company. This media coverage will inform consumers of our product that we were unable to reach through our advertising. Sales promotion provides many appealing options and offers the easiest way to reach our target market. For these reason it will be the largest portion of our target segment. Since potato chips are a convenience product, consumers spend a little time deciding which product to buy and they are not likely to remember advertising for a particular potato chip brand. Therefore, a point of purchase display may significantly help sway a consumer in favour of our product. This allows us to be the last promotional item they see before they make their purchase. Providing samples is another sale promotion technique that we think would work well for our product. By being able to sample our product before purchasing it, consumers will be less put off by our slightly higher price. As we discussed in our pricing strategy, we would also like to use coupons to entice customers to buy our product. By temporarily reducing our price we believe many more consumers will be willing to try our product. As we discussed in our distribution strategy, we would like to use personal selling to encourage more retailers to carry our product. By doing this together with our other promotional elements we hope to create an effective mix of push and pull strategies that will convince more retailers to carry our product. As the company grows and more funds can be spent on promotional activities we would like to increase the amount of advertising done. We would like to use different forms of media to reach our target market. Also, as consumer awareness of our brand grows and we increase our product offerings, we would like to expand our target market and create slightly different marketing campaigns to target certain ethnic groups. Conclusion Despite heavy competition in the snack food industry we think Hardbite Chips can produce satisfactory profits and continue to grow. Given that potato chips are in the maturity stage of the product life cycle, increasing the number of retailers that sell our product is an important part of our strategy. By increasing the number of retailers who sell our product, we will make it easier for our target market to purchase our product. We believe by increasing awareness of our product we can capture a large portion of health conscious consumers. By using our promotion mix to inform consumers of the benefits and features of our product, we can convince members of our target market segment that our brand is of high quality. Although our price is slightly higher than most of our competitors, we believe consumers will perceive our product as worth the extra cost. Appendix I Sample Survey |1. List all brands of potato chips that you are aware of. | |______________________________________________________________________________ | |______________________________________________________________________________ | |______________________________________________________________________________ | |2. Are you aware of the brand Hardbite Chips? (if your answer is no, skip to question 4) | |Yes ___ No___ | |3. What product features of Hardbite Chips are you aware of? | |______________________________________________________________________________ | |______________________________________________________________________________ | |4. On average, how often do you buy potato chips? |More than once a week ___ | |Once a week___ | |Once a month___ | |Once every 2-3 months___ | Endnotes 1. Statistics Canada, Canada Food Stats: Analysis, http://www. statcan. gc. ca/ads-annonces/23f0001x/hl-fs-eng. htm 2. L. B. C. Consulting, Canada: Market Development Reports: Snack Food Market in Canada, Global Agriculture Information Network Report, United States Department of Agriculture (Ottawa, Canada: Foreign Agriculture Services, 2003), 6. http://www. fas. usda. gov/gainfiles/200301/145785163. pdf 3. Agriculture and Agri-Food Canada, Retail Sales in Canadian Grocery Stores, 2007, http://www. ats -sea. agr. gc. ca/can/4714-eng. htm Agriculture and Agri-Food Canada, Retail Sales in Canadian Grocery Stores, 2006, http://www. ats-sea. agr. gc. ca/can/4715-eng. htm 4. Agriculture and Agri-Food Canada, Canada’s Snack Food Industry, http://ats-sea. agr. gc. ca/supply/3320_e. htm 5. The Province, â€Å"From pasta to potato chips,† May 21, 2006, Canadian Newstand, ProQuest 6. Sarah Merson, â€Å"SALT — THE PROS AND THE CONS,† Foods Matter (UK), March 2009, 9, EBSCOhost Bibliography Agriculture and Agri-Food Canada. Canada’s Snack Food Industry. http://ats-sea. agr. gc. ca/supply/3320_e. htm. Agriculture and Agri-Food Canada. Retail Sales in Canadian Grocery Stores, 2006. http://www. ats-sea. agr. gc. ca/can/4715-eng. htm. How to cite Marketing of Hardbite Chips, Essay examples

Friday, December 6, 2019

Time Frame for Handling Customer Complaints †MyAssignmenthelp.com

Question: Discuss about the Time Frame for Handling Customer Complaints. Answer: Introduction Latino engineering is a manufacturing company that manufactures engineering equipments for various industries. It is one of the famous and well established companies. After the completion of the 30 years of the company, the company has handed over to the investment group. After the12 months of the takeover of the company by the investment group, the company is getting the complaints from the clients related to the issues that includes defective engineering equipment, poor design and development follow up with clients, too long turnaround time for issue resolution, non responsive customer service team, in some cases; wrong engineering equipment was packaged and delivered to clients. The company is required to find the root cause as well as develop the continuous development for the purpose to manage the working and reduce the chances of the occurrence of the issues. In this essay we will develop the continuous improvement plan through analyzing the root cause of the issues. A root cause analysis is performed for the purpose to recognize the base of the problem. The process of root cause analysis is important as it allows to identify the problem and helps in improving the problem in a systematic manner. The root cause analysis process includes the description of the problem, collecting the data related to the problem, identify the potential cause, identifying for the cause to be removed, identification of the solution, implementation of the change and observing the change to make sure the effectiveness in elimination of problem. There are many of the techniques that are used for the purpose of the analysis of the root cause that includes Five Whys Analysis, Failure Mode and Effects Analysis (FMEA), Pareto Analysis, Fault Tree Analysis, Current Reality Tree (CRT), Fishbone or Ishikawa or Cause-and-Effect Diagrams, Kepner-Tregoe Technique and RPR Problem Diagnosis(brighthubpm, 2017). In the case study, the company faced the problem after 12 months of the t akeover by the investment group. The company started getting the complaints from the clients and those five complaints were: defective engineering equipment, poor design and development follow up with clients, too long turnaround time for issue resolution, non responsive customer service team, in some cases; wrong engineering equipment was packaged and delivered to clients. In order to analyze the root cause of the each of the problem, there is a need to identify the problem that has occurred. The identification of the problem is essential for the purpose to take out the solution for the problem or to prevent the problem top occurs again or reduces the chances of the occurrence of the problem(Mindtools, 2017). The information about the problem should be extracted from the senior management of the company. The problem should be discussed in order to understand the background of the problem for the identifying of the problem. This will allow to understand the problem. The each of the problem can be identified and can be solved but the analysis of the root is essential to resolve the root of the problem to occur. We will use Pareto Analysis for the purpose to identify the root cause of the problems. Pareto Analysis is one of the famous as well as simple techniques that is helpful in prioritizing the possible changes through the identification of the problems and these problems can be resolved through making the changes. This techniques will allow to prioritize the each of the changes which will help in improving the situation(ASQ, 2017). This techniques use principles of Pareto and this is a six steps techniques. In the first step the identification and the listing of the problem will take place through the discussion with the team members or the clients. In the second step, the identification of the root cause of the each of the problem will take place through the appropriate technique. In the third step the scoring of the each of the problem will take place according to the each of the problem. The fourth step will be group problems together through the root cause. In the fifth step, the scores of the each of the problem will be added up. The group with the highest score will be the priority. The last and the sixth step will be taking the action(Mindtools, 2017). The method will help in the identification of the root cause of the problem as well as solving the problem through making the changes according to each of the problem faced by the company. Plan to Eliminate or Reduce the Root Cause The elimination of the root cause is essential in order to reduce the complaints of the clients and the problems as well. This requires the plan for the elimination of the root cause of the problems. The plan for each of the problem is as follows: Defective engineering equipment: It has been found that there are defects in the equipments manufactured by the company and the cause of the problem is that the testing procedures that are conducted by the company are not effective as well as the maintenance is also improper. Apart from this, it can be concluded the root cause of this problem is ineffective working of the engineers and improper maintenance by them which resulted in inefficient quality of the engineering equipments. It is essential to put the efforts to improve the quality of the equipments manufactured by the company and for this purpose, the staff of the company is required to be provided with the guidance so that the problem can be eliminated. The training should be provided to the employees of the company in the related area. There is a need to introduce the rules and regulations in the company so that there will be no chances of the lack in the process of the testing of the equipment that are manufactured. Poor design and development follow up with clients: It is essential for a company to provide the clients with the good quality and good design equipment in order to fulfill the needs as well as attract the more clients towards the company. It has been found the clients have complaint regarding the design of the equipment. This cause of this problem is the improper designing of the equipments by the engineers. This problem occurred due to the lack of the attention of the engineers on the design of the equipments. The designs of the equipment are required to be enhanced in order to meet the needs of the customers. The fulfillment of the demand of the clients regarding the design of the equipment can be implemented when the engineers re-design the equipment in more efficient manner and train the employees to manufacture the new designed equipments. It is also essential for the company to engage in the activity of follow up with the clients. The cause of the inefficient follow up with th e clients is the lack of the employees in the department to follow up with the clients(Customer Expression, 2017). There is a need to hire the employees in the company who will take the follow up with the clients and should be provided with the training regarding the same. The training should be provided to the employees related to it(Linkedin, 2017). These actions will allow developing a feeling of trust among the clients of the company as well as help in keeping the company updated about the clients. Too long turnaround time for issue resolution: The problem of the slow process of the issue resolution occur because the customer service department of the company is not effective and there is no trained staff for this purpose in the company which slows down the process of issue resolution of the clients. The lack of the trained staff for providing the customers service as well as resolving the issues of the clients arises the problem(Markidan, 2017). There is a need to hire the employees and train them for this purpose as well as to make use of the software for the purpose to register the issue of the client so that it can be resolved in the shortest time possible. Non responsive customer service team: In any of the company, there is a need to develop an effective team for providing the service to the customers as there is a need to communicate with the customers and solve the problems of the customers in an effective manner so that the needs of the customers can be fulfilled as well as the issues of the customers can be resolved. The issue that has arisen is that the customer service team of the company is non-responsive. This issue have came up because the cause of the non responsiveness is the lack of the employees in the customers service team of the company or the lack in the employees' morale or the change in the environment of the company as the ownership of the company has been transferred to the investment group. The other root cause of this issue is that the employees of the company are not boosted by the manager. In order to resolve this issue, it is essential for the company to increase the number of the employees in the customer se rvice team through hiring the new employees in the company and providing them with the training. Along with this, there is a need to boost the morale of the employees of the customer service team so that they will be able to provide the service to the customer in more effective manner which will ultimately increase the responsiveness of the customers service team of the company and the company will be able to get rid of this issue in the future. Wrong engineering equipment was packaged and delivered to clients: The delivery of the wrong engineering equipment to the clients results in disappointing the clients. This issue arises because of the inappropriate information about the required engineering equipment to the employees or the lack of the responsibility of the employees. In order to eliminate the issue, there is need to provide the employees with the proper information about the required engineering equipment by the clients so that they will pack and deliver the right engineering equipment to the right client. It is also essential for the company to provide the training to the employees so that they will be able to perform their responsibilities in an effective manner. This will help in delivering the right engineering equipment to the right client(Wheeler, 2014). Continuous Improvement Plan The analysis of the root cause of the issue was performed for the purpose to resolve the issues through the improvement in the methods and the procedures of the company so that these issues will not occur in the future (Moore, 1999). For this purpose, there is a need to develop a continuous improvement plan to reduce the chances of the occurrence of the issues. The changes in the methods and the procedures or the solution for the problem will help in this area. The continuous improvement plan is developed mainly to introduce the development in the company (Miers, 2003). This allows the company to run in more uniform manner as well as helps in making it more convenient to achieve the success and growth. The continuous improvement plan for the company will assist in the following: 1. Improvement in the areas where there is a need for the improvement through the analysis 2. Chalking out the action that are required to be implemented in the company for the each area of improvement 3. Delegating the responsibilities to the managers 4. Prioritizing the activities according the requirement of the improvement 5. Deciding the time limit for the accomplishment of the each of the tasks or the areas of the improvement 6. Evaluating, monitoring as well as measuring the effectiveness of the improvement in the company This continuous improvement plan will allow the company to function in more effective manner as well as help in satisfying the clients of the company (Harmon, 2003). The company will be able to resolve the issues of the clients in more efficient manner as well as build the feeling of trust in the clients towards the company and the offered engineering equipments. There is a need to implement the plan by focusing on the goals of the company and the activities are required to be aligned in a manner so that it will not overlap with the other activities as this may affect the efficiency of the employees of the company(Nilsson?Witell et al., 2005). The company is required to focus on the designing of the engineering equipments as the culture of the company emphasize on the measureable as well as visible issues of the company (Krishna, 2004). It is essential for the company follow the some of the steps because company is following the continuous improvement. Goal: It is required to enter SMART components which will increase the development value. Strategy: with the help of the continuous improvement plan, there is a need to provide the employees of the company with effective leadership for the purpose of guiding the employees for the projects. Action Steps: It is required that the stakeholders will make sure, the environment of the company is supportive as well as equitable for the employees (Sinur Bell., 2003) (Verma, 2009). Implementation Plan It is essential for the company to implement the lean management in the business process of the company. For the purpose of the improvement in the company, it is needed to implement the business process management in the company (Yoon, 2003). This will help the company in the improving the effectiveness of the products and the services provided by the company to the clients as well as help in the improvement of the performance of the company(Berke et al., 2006). With the help of the value stream mapping, the company is able to define the rules through this methodology as well as define the business process, but it is required for the company to adapt a new tool for the management of the business process so that the company will be able to enhance the product as well as enhance the customer service team (Snabe et al., 2008). This will allow the company to increase the value and satisfy the clients of the company. The procedure of the company is emphasized on the development of the design of the engineering equipments as well as enhances the customer service team of the company so that it will provide the good quality as well as good design product to the clients as well as response to them. The main value of the process is to enhance the design of the equipment as well as the customer service team so that the gals of the company can be achieved through this. The value stream is used as main tool as this will allow defining the enhancement in the design of the equipments as well as providing with the techniques of improving the customer service team of the company. This will be possible through ensuring the design of the equipments as well as providing the training to the employees related to the both of the areas respectively (Smith Fingar., 2002). Development of the value with the help of the business processing The management of the process will allow manufacturing equipments with good design as well as improving the team of customer service through providing the training to the employees by following the systematic procedure for the training of the employees and delegating the responsibilities of the areas. Activity Date of Receiving Date of Starting Key Indicator of Performance Scheduled day end day Progress state Complete In charge person Department Preparing the new design equipments and hiring of the employees for customer service team 5/10/2017 5/10/2017 4 months - - Not yet - Project Inc. charge Project management Obtaining the new design and selected employees 5/10/2017 5/10/2017 5 months - - Not yet - Project Inc. charge Project management Providing the employees with the training 5/10/2017 5/10/2017 4 months - - Not yet - Project Inc. charge Project management Controlling the activities 5/10/2017 5/10/2017 5 months - - Not yet - Project Inc. charge Project management Confirming the procedure of the work plan - - Not yet - Project Inc. charge Project management Measuring the improvement - - Not yet - Project Inc. charge Project management These activities will allow the company to maintain the situation of the company as this includes the activities that are helpful in the attaining the goals (Chang, 2005). Conclusion In this essay, the continuous improvement plan has been developed for the purpose to meet the needs of the clients as well as the company. The need of the company is to develop good design equipments of engineering and improving the customer service team of the company. With the help of the continuous improvement plan, we have managed the business process of the company as well as achieved the goals of the company. References ASQ, 2017. The 7 Basic Quality Tools For Process Improvement. [Online] Available at: https://asq.org/learn-about-quality/seven-basic-quality-tools/overview/overview.html. Berke, P., Crawford, J. Dixon, J., 2006. What Makes Plan Implementation Successful? An Evaluation of Local Plans and Implementation Practices in New Zealand. Environment and Planning B: Urban Analytics and City Science, 33(4), pp.581-600. Brighthubpm, 2017. Overview of Root Cause Analysis Techniques. [Online] Available at: https://www.brighthubpm.com/project-planning/57124-overview-of-root-cause-analysis-techniques/ [Accessed 2017]. Chang, J.I., 2005. "Business Process Management systems.". Taylor Francis,. Customer Expression, 2017. Time Frame for Handling Customer Complaints Can Determine Customer Satisfaction. [Online] Available at: https://www.customerexpressions.com/blog/complaints-tracking/time-frame-for-handling-customer-complaints/. Harmon, P., 2003. Business Process Change: A Manager's Guide to Improving, Redesigning, and Automating Processes. Morgan Kaufmann. Krishna, S.J., 2004. Business Process Management: Concepts and Cases. ICFAI University Press. Linkedin, 2017. 5 Reasons Why The Follow-Up Call Is So Important. [Online] Available at: https://www.linkedin.com/pulse/5-reasons-why-follow-up-call-so-important-ryan-morwood. Markidan, L., 2017. How to Handle the 7 Toughest Customer Support Challenges. Zapier. Miers, D., 2003. "Best Practice BPM." Workflow systems. Mindtools, 2017. Pareto Analysis. [Online] Available at: https://www.mindtools.com/pages/article/newTED_01.htm [Accessed 2017]. Mindtools, 2017. Root Cause Analysis. [Online] Available at: https://www.mindtools.com/pages/article/newTMC_80.htm [Accessed 2017]. Moore, S., 1999. "Lean operations are future of processing for Asian companies." Mod. Plast. Nilsson?Witell, L., Antoni, M. Dahlgaard, J.J., 2005. Continuous improvement in product development: Improvement programs and quality principles. International Journal of Quality Reliability Management, 22(8), pp.753-68. Sinur, J. Bell., T., 2003. "A BPM Ta xonomy: Creating Clarity in a ConfusingMarket." Gartner. Smith, H. Fingar., P., 2002. "Business Process Management: The third wave.". Meghan Kiffer, Tampa, USA. Snabe, J.H., Rosenberg, A., Mller, C. Scavillo, M., 2008. Business process management: the SAP roadmap. Galileo Press. Verma, N., 2009. Business Process Management: Profiting from Process. Global India Publications. Wheeler, C., 2014. Picking Error Problems - Suggestions and Solutions. [Online] Available at: https://www.newcastlesys.com/bid/349401/picking-error-problems-suggestions-and-solutions. Yoon, Y.S., 2003. Service 6 Sigma 101.. Nemo Books.

Friday, November 29, 2019

Meat Is Useless Essays - Meat, Diets, Vegetarianism, Dog Meat

Meat Is Useless Meat is Useless Eating meat is part of the daily life of billions of people all over the world. Every day thousands of animals are killed for the production of meat food for people. However, studies have shown that meat is not essential for our existence and gives us nothing more than the other foods on the market. Meat consumption may not harm you or the surrounding environment immediately but there are consequences and sooner or later they will appear. A meatless diet is healthier than a diet containing meat. According to surveys and examinations of the contents of the food products, meat contains more fat than non-meat foods. Since it is very difficult for our bodies to process high quantities of fat and it is being accumulated in our bodies, fat consuming causes many health problems. According to the American Heart Association, the fat in the food we eat should be no more than 30 percent of the total calories we consume daily. However, this is very difficult to achieve when meat is part of our daily meal plan. The only way to stay healthy and continue eating meat is to put a limit on the amount of meat we consume. Unfortunately, nowadays most people are often tempted by the taste and appearance of the meat products on the market and it is very difficult for them to resist. That is why the solution of a balanced diet can not be practically used. Moreover, it has been recently proven that many diseases are commonly prevented, consi stently improved, and often cured by a low-fat vegetarian diet. Among them are diseases such as kidney stones, prostate cancer, breast cancer, stomach cancer, pancreatic cancer, ovarian cancer, colon cancer, arthritis, osteoporosis, strokes, diabetes, peptic ulcers, obesity, hemmorhoids, salmonellosis, and many others (American Heart Association). Cholesterol can be found in every meat product. This is another particular reason proving that meat is bad. Cholesterol blocks the arteries and makes it very difficult for the blood stream to circulate. Such a process may result in a heart attack. A diet rich in vegetables, fruits, and cereal lowers the level of cholesterol, thus lowering the risk of getting a heart attack as well. Of course, meat is not the only factor that may cause a heart attack but why don't we try to decrease the chances of getting a heart disease by just getting rid of meat? Eating meat is also responsible for the mass destruction of the environment. For growing animals people waste overwhelming amounts of natural resources which may be used for other necessities. They may be utilized for growing corn or wheat for feeding people, rather than for feeding farm animals. The amount of grain a cow eats in a day could feed 15 starving people (Spence 1). If this food was used for humans and not for livestock, the world's massive hunger problems would be at least partly solved. The opposing side of this idea states that even if these fields can be used for growing food for people, most of them are under private ownership and the owners would not give their production to feed the people who are starving. However, meat is much more expensive than grains and corns are. And if more of them are produced they will become even cheaper than they are now. Other damages, result of growing animals, exist. When big quantities of water and food are used for growing livestock, the natural habitat of other animals, plants, and insects is changed and some of them become extinct. Furthermore, the cutting of woods for the extension of the mentioned fields causes the decreasing of oxygen and the increasing of carbon dioxide. Such processes accelerate the global warming and are dangerous for our future survival. Eating meat is directly connected to the process of killing animals. Ending the life of other living creatures on purpose and only to please our taste preferences is egotistic and has nothing to do with the humanity people are supposed to defend. Most of these animals are grown only for the purpose of gaining as much weigh as possible. Thus, they become fat and put more efforts to move than the animals that are not

Monday, November 25, 2019

Gender roles in Shakespeares Twelfth Night Essays

Gender roles in Shakespeares Twelfth Night Essays Gender roles in Shakespeares Twelfth Night Paper Gender roles in Shakespeares Twelfth Night Paper Essay Topic: Twelfth Night Throughout the passage taken from Shakespearean Twelfth Night several themes both in correspondence and disparate from the often comedic tone of the play are prevalent. An interesting dynamic is immediately displayed in the passage through the relationship and dialogue between major and minor character. Viola, a predominant and strong character in the play, is engaging in dialogue with Antonio who although when analyses has complexity, is seemingly a minor character. This brings about the theme of power relationships and specifically gender within the comedic realm represented intricately in this passage. Viola carries and element of intrinsic power throughout the passage, evident in the stage direction offers Antonio money It may be seen that at the time Of publishing, possession Of means and value were majority reserved for males in the female subservient Elizabethan period. This is correspondent with a form of comedic absurdity, the ability to act as the opposite gender and toy with the idea of masculinity and femininity. This reflects back upon Violas androgyny and none gender binary throughout the rest of the text and is successfully represented in the chosen extract . The act of her offering money to Antonio whilst in a female state may be encompassing and reflecting her time as Cheerios, whereby she had power in a time of patriarchy. This gender fluidity frees Viola from the restraints of gendered labels and is further reinforced when Viola articulates l hate ingratitude more in a man this negation may be viewed as commonly attributed to men in a time of female demure attitude. : This also provides however, a contradictory dynamic as she refers to Antonio as sir as a marker of respect, showing in this particular time and space she is removing herself room any indication of being a man and is acting from a very much female perspective, indicating she moves freely between genders to suit her situation. This statement on her part of all the things she detests from males may also be viewed as comedic by the audience as they hold an awareness of Viola as Cheerios. Antonio antagonistically clings onto the idea of inherent masculinity, adopting a sense of fear when this is compromised Lest that it make me unsound a man. However from the very beginning of the text he is taking on a role subservient and lesser to Viola in his request to entreat of o some offbeat money In this instance a male is requesting means from a female, inverting the typical roles and challenging gender stereotypes. This gender dynamic rings true in a theatrical sense when the play is physically performed. Historically gender neutrality within casting was and continues to be commonplace within the theatrical dynamic, mirroring the dismissal of Gender r Twelfth gay Eleanor the act 01 he commonplace specific gender roles within the afore mentioned passage performance on stage. Viola is able to play about with the female interchangeability, at times in the passage acting n euphemism claiming my having is much and at others cacti emotion and a sense of prowess Ill make division of my implying that she is in the powerful decision making stand a feminine smokescreen to mask her true personality thro claiming lean and low ability This may be seen as maniple masking herself as truly meek and feminine. This particular an intricate relationship between actor and audience, Vic knowledge of Violas true capabilities and witty persona. Both in the physical and theatrical sense is also laced thro appearing in its immediacy in the first line of the text. It is scene opens with the Second Officer saying Come, sir, lea end of the passage Come sir I pray you go When perform would mean Antonio leaves the stage and Viola is left as TTL character if only for a short time. This once again reinforce power battle displayed within the extract. The use of abs enforces the dramatic and tragic element of the extract. C kindness and misery all evoke a sense of tragedy intertwine comedic realm. Tragedy is also particularly prevalent in Ar possible my deserts to you Can lack persuasion? Do not et This represents how within the realm of theatrics, a char aromatic lines can evoke diversity in response from the at this parameterized talk of misery would create an emote sympathy, whilst for others, hilarity would ensue. The extra represents how Shakespearean genius for comedy also Nell tragedy, evoking a cornucopia of reactions from the audio is performed in a physical sense. The line Oh heavens the Antonio particularly represents this. This outcry of a dram viewed as comedic in a theatrical dynamic evoking laughter pragmatically representing the tragedy felt by Antonio ant frustration at the hectic communication with Viola in this Antonio, at the end of the passage is once again asked to a further subservient position to Viola, reinforcing the stats character, with Viola much more prevalent than that of Ar length of utterances in the extract of each character are sis providing a substantial scope for interaction and thus intra how communication between Viola and Antonio develops conversation to transcending into a more dramatic and in the final instance of her speech in the extract.

Thursday, November 21, 2019

Organisational Learning and Design Essay Example | Topics and Well Written Essays - 1250 words

Organisational Learning and Design - Essay Example Previously, it was believed that the companies have to identify the extraordinary potential candidates and prepare them for future senior level positions (Belet, 2007). Recently, the organisations have stressed the importance of changing the business structures so that the culture imperative for learning enterprises can be supported (Mishra & Bhaskar, 2011). Moreover, there needs to be a balance between the leadership and management development aspects so that reforms are easily commenced. In order to evaluate the significance and challenges of the learning organisations, two articles have been reviewed. According to Mahoney (2000), the concept of learning companies was initiated in 1990s and there is no perfect solution for creating such organisations. It is mandatory for the corporations to foster leadership within each level of the organisations from the directors and senior managers to lower management level. Also, equally important is the conception of a culture which will assist the enterprises in the development and augmentation of learning organisations. On the other hand, Belet (2007) studied the concept of building high potential executives in French companies for crafting learning-oriented organisations. According to the author, there is still presence of the hierarchical and centralised leadership styles in these enterprises and the leadership development programmes are ineffective in bringing the desired changes within the firms. Hence, there is requirement of embedding the learning organisation characteristics within the businesses so that they can comply with the changing market structures. In today’s contemporary business world, the organisations have to adjust their structures and frameworks to make sure that they have the compatible systems and tools for responding to the markets. It has been mentioned by Mahoney (2000) that it is the responsibility of the directors and senior managers to

Wednesday, November 20, 2019

Book Review Essay on HR from the Heart Example | Topics and Well Written Essays - 1000 words

Book Review on HR from the Heart - Essay Example She expresses the same gravity when she tells about the importance of the profession. She writes, â€Å"When you go into HR, you must realize that, first and foremost, you are responsible for people’s livelihood. Every day you make plans that affect individuals on the most intimate levels. Every time you choose between one candidate and another, the decision you make sets a chain of events that determines the rest of both their lives –even the candidate you never see again because they’re not right fit for your company. You decide on whether an employee stays or goes. You decide who gets promoted and who doesn’t. You decide who gets a raise and who doesn’t. By establishing the compensation guidelines or advertising management, you influence who gets a generous raise and who doesn’t. And you make all these decisions in a larger context of understanding the internal structures and secret plans of the company as a whole.† (Sartain 6) In this book the author is describing how an HR professional should make career choices and mold careers of others as well. She feels frustrated to see HR professionals as vulnerable as others in making career choices when they are capable of helping others mold careers. Sartain also shows how they can make a difference by relating passion with their career as she says, â€Å"If we, as HR professionals, can’t link career and passion for ourselves, how can we expect to be able to do it for the employees of our organization? One of the parts of HR that I get the most joy out of is helping people find the right environment in which to do the things that they enjoy doing.† (Sartain 20). In today’s business environment, HR plays a crucial role in hiring the right kind of talent and retaining them. HR professionals are supposed to power brokers who stamp ‘No’ to every new proposal and are ready to make yet another policy. However, HR is a dynamic and ever-changing profession which can make a difference

Monday, November 18, 2019

The life of Zora Neale Hurston Research Paper Example | Topics and Well Written Essays - 250 words

The life of Zora Neale Hurston - Research Paper Example In 1917, she enrolled in Morgan academy found in Maryland with the help of her former employer. After her graduation, she joined Howard University where she studied for one and a half years and secured a scholarship that saw her transfer to Barnard College for a degree course. Between 1928 and 1932, she studied human culture at Columbia University. In 1936, she got a Guggenheim Fellowship award for travelling and collecting folklore in the British West Indies and Haiti (Boyd 35). Throughout her life, Zora engaged in a number of jobs alongside her writing. She served as a secretary while working with Fannie Hurst (1889–1968); she later became a writer in paramount and Warner brother’s studios. She also worked as a librarian with the library of congress and finally as a drama tutor at North Carolina Collage for Negroes. Zora most celebrated work include her novel â€Å"Their Eyes Were Watching God† written in 1937, her collection of American folklore that included Tell My Horse (1939) and Mules and Men (1935). Zora worked on three other novels: Moses, Man of the Mountain (1939), a retell of the Mosaic biblical allegory in an African perspective, Seraph on the Suwanee (1948), a story of woman experience in love; and Jonahs Gourd Vine (1934), an autobiography of her father. Hurston met a number of people who significantly shaped her carrier life, this include notable African American writers such as Langston Hughes, Arna Bontemps and Jessie Fauset, all of whom belonged to the renown New Negro movement that was later change to Harlem Renaissance. Like many other writers, Hurston has her own critics. One of them is Darwin Turner who suggested that she was a "quick-tempered woman, arrogant toward her peers, obsequious toward her supposed superiors, desperate for recognition and reassurance to assuage her feelings of inferiority" (1979). Clearly, Zora was a

Saturday, November 16, 2019

Packet Sniffing Software Is A Controversial Subject Information Technology Essay

Packet Sniffing Software Is A Controversial Subject Information Technology Essay Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to sniff out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave Busters, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. Definitions A packet sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when an attacker monitors network packets, modifies them, and inserts them back to the network (Whitman, et al., 2008). For example, a MITM attack could occur when two employees are communicating by email. An attacker could intercept and alter the email correspondence between each employee, without either knowing that the emails had been changed. MITM attacks have the potential to be a considerable threat to any individual or organization since such an attack compromises the integrity of data while in transmission. Packet sniffing programs work by capturing binary data that is passing through the network, and then the program decodes the data into a human-readable form.   A following step called protocol analysis makes it even easier for the data to be read.   The degree of these analyses varies by individual packet sniffing program. Simple programs may only break down the information in the packet, while more complicated ones can provide more detailed information and analysis, for example, by highlighting certain types of data such as passwords that pass through the network (Packet Sniffing, Surasoft.com, 2011). As for todays networks, switch technology is commonly used in network design. This technology makes it increasingly easy to set up sniffing programs on servers and routers, through which much traffic flows. In addition, there are already built-in sniffing modules being used in todays networks. For example, most hubs support a standard called Remote Network Monitoring (RMON). This kind of standard allows hackers to sniff remotely with the SNMP (Simple Network Management Protocol), used in most network devices, and only requires weak authentication. Network associates Distributed Sniffer Servers are used by many corporations. These servers are set up with passwords that are quite easy to guess or crack. In addition, computers with Windows NT system usually come with Network monitoring agent, which also allows remote sniffing (Packet Sniffing, ISS.net, 2011). Essentially, these sniffing programs are set up for the use of network administrators. However, the threat exists that hackers ca n gain access to the network and view the program logs. Packet sniffers capture all of the packets that travel through the point where the sniffer is located.   For example, if the program was installed next to the server of an organization, the user could have access to all the data being transferred across the company through that server.   Typical types of packets intercepted by attackers include the following: SMTP (email): The attacker can intercept unencrypted emails (Packet Sniffing, ISS.net, 2011). HTTP (web): Web traffic information and history can be easily captured (Packet Sniffing, ISS.net, 2011). Telnet Authentication: Login information to a Telnet account can be intercepted (Packet Sniffing, ISS.net, 2011). FTP traffic: Access to an FTP account can be sniffed in cleartext (Packet Sniffing, ISS.net, 2011). SQL database: Information from web databases is also vulnerable (Packet Sniffing, ISS.net, 2011). Functionality and Possible Uses of Packet Sniffers Good and Bad Uses Like any tool, a packet sniffer is a double-edged sword because it can be used for good or bad purposes (Orebaugh, Ramirez, and Beale, 2007). It can be used by security professionals to investigate and diagnose network problems and monitor network activity (Orebaugh, et al., 2007). Conversely, it can be used to eavesdrop on network traffic by hackers, criminals, and the like, who can use the data gathered for harmful purposes (Orebaugh, et al., 2007). Professionals such as system administrators, network engineers, security engineers, system operators, and programmers use packet sniffers for a variety of uses, including troubleshooting network problems, figuring out system configuration issues, analyzing network performance (including usage and bottlenecks), debugging during the development stages of network programming, analyzing operations and diagnosing problems with applications, and ensuring compliance with company computer usage policies (Orebaugh, et al., 2007). Good: Troubleshoot Network Problems When an error occurs on a network or within an application, it can be very difficult for administrators to determine what exactly went wrong and how to correct the error. Many consider the packet sniffer to be the best tool for figuring out what is wrong with programs on a network (Neville-Neil, 2010). Examining packets as a starting point for solving problems is useful because a packet is the most basic piece of data and holds information, including the protocol being used and source and destination address (Banerjee, Vashishtha, and Saxena, 2010). Basically, at the packet level of analysis, nothing is hidden when all layers are visible (Neville-Neil, 2010). Understanding the timing of what happened is another important factor in debugging network problems (Neville-Neil, 2010). This information can be easily attained by using a packet sniffing program. Essentially, packet sniffers allow you to find out the who, what, and when of a situation, all of which are vital to understanding how to fix a problem (Neville-Neil, 2010). Once these things are known, the administrator can determine what is causing the problem and how to go about fixing it. As soon as a problem occurs, the first recommended step is for the network administrator to use a packet sniffing program to record all network traffic and wait for the bug to occur again (Neville-Neil, 2010). If the administrator already had a packet sniffing program with logging in place, then he or she could go back and examine the log records. Assuming the administrator did not have a log previously set up, the next step would be to only record as much information as necessary to repair the problem (Neville-Neil, 2010). It would not be a good idea to record every single packet of data because if too much data is collected, finding the error will be like finding a needle in a haystack although the administrator has likely never seen a haystack that big (Neville-Neil, 2010). For example, recording only one hour of Ethernet traffic on a LAN will capture a few hundred million packets, which will be too large to sort through (Neville-Neil, 2010). It goes without saying that the admini strator should not record the data on a network file system because the packet sniffer will capture itself (Neville-Neil, 2010). Once the data is recorded, the administrator can examine the packets to analyze and understand what occurred to solve the problem. Good: Network Optimization In addition to solving network communication problems, packet sniffers can help administrators plan network capacity and perform network optimization (Shimonski, 2002). A packet sniffer allows users to view data that travels over a network packet by packet (Shimonski, 2002). However, rather than having to examine each packet, the appropriate sniffer program will perform the analysis for the administrator. The tools are especially useful because depending on the packet sniffing program used, the packet data will appear in an easy-to-understand format. Packet sniffers can often generate and display statistics and analyze patterns of network activity (Shimonski, 2002). Data can appear in graphs and charts that make analysis and comprehension easy. Additionally, the network administrator can filter by selected criteria to capture only the relevant traffic rather than having to sort through irrelevant data (Shimonski, 2002). Knowing what programs and which users use the most bandwidth can help administrators manage resources efficiently and avoid bandwidth bottlenecks. Good: Detect Network Misuse Packet sniffers can be used to monitor application traffic and user behavior (Dubie, 2008). This can be used to detect misuse by company employees or by intruders. To use a packet sniffer to monitor employees legally, a network administrator must do three things. First, he must be on a network owned by the organization, second, he must be directly authorized by the networks owners, and finally, he must receive permission of those who created the content (Whitman, et al., 2008). Permission by content creators is needed because packet sniffing is a method of employee monitoring (Whitman, et al., 2008). Typically, an employee will sign a release form when first employed that allows the employer to monitor the employees computer usage. By using a packet sniffer, employers can find out exactly how each employee has been spending his or her time. Packet sniffers can be used to see all activity and administrators can monitor for behaviors such as viewing inappropriate websites, spending time on the job on personal matters, or abusing company resources. For example, a packet sniffer program could show that a particular employee was downloading music at work, both violating organizational policies and using a large amount of network bandwidth (Dubie, 2008). Packet sniffers are also used to detect network intrusion, log traffic for forensics and evidence, discover the source of attacks such as viruses or denial of service attacks, detect spyware, and detect compromised computers (Orebaugh, et al., 2007). A packet sniffer and logger that can detect malicious entries in a network is a form of an intrusion detection system (IDS) (Banerjee, et al., 2010). The packet sniffer IDS consists of a database of known attack signatures. It will then compare the signatures in the database to the logged information to see if a close match between the signature and recent behavior has occurred. If it has, then the IDS can send out an alert to the network administrator (Banerjee, et al., 2010). Despite this use of packet sniffers to detect intrusion, hackers have methods of making themselves very hard to detect and can use packet sniffers for their own advantages. Bad: Gain Information for Intrusion Intruders maliciously and illegally use sniffers on networks for an innumerable number of things. Some of the most common are to capture cleartext usernames and passwords, discover usage patterns of users, compromise confidential or proprietary information, capture voice over IP (VoIP) telephone conversations, map out a networks layout, and fingerprint an operating system (Orebaugh, et al., 2007). The previously listed uses are illegal unless the user is a penetration tester hired to detect such types of weaknesses (Orebaugh, et al., 2007). An intruder must first gain entry to the communication cable in order to begin sniffing (Orebaugh, et al., 2006). This means that he must be on the same shared network segment or tap into a cable along the path of communication (Orebaugh, et al., 2007). This can be done in many ways. Firstly, the intruder can be physically on-site at the target system or communications access point (Orebaugh, et al., 2007). If this is not the case, the intruder can access the system in a variety of ways. These include breaking into a certain computer and installing sniffing software that will be controlled remotely, breaking into an access point such as an Internet Service Provider (ISP) and installing sniffing software there, using sniffing software that is already installed on a system at the ISP, using social engineering to gain physical access to install the software, working with an inside accomplice to gain access, and redirecting or copying communications to take a path that the intruders comp uter is on (Orebaugh, et al., 2007). Intruders can use sniffing programs designed to detect certain things such as passwords and then use other programs to have this data automatically sent to themselves (Orebaugh, et al., 2007). Protocols that are especially vulnerable to such intrusion include Telnet, File Transfer Protocol (FTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer Program (SMTP), Hypertext Transfer Protocol (HTTP), Remote Login (rlogin), and Simple Network Management Protocol (SNMP) (Orebaugh, et al., 2007). Once the intruder has access to the network, he can collect data and use it as he likes. Common examples of stolen data include credit card numbers and proprietary organizational secrets, but include anything the hacker desires. Although organizations may use a primarily switched network, they are not protected from sniffer attacks because many programs exist that allow packet sniffing in a switched network (Whitman, et al., 2008). Because intruders who use packet sniffers do not directly interface or connect to other systems on the network, they are considered to be a passive-type of attack (Orebaugh, et al., 2007). It is this passive nature that makes sniffers so difficult to detect (Orebaugh, et al., 2007). In addition to this, hackers use normally use rootkits to cover their tracks so that their intrusion will not be detected (Orebaugh, et al., 2007). A rootkit is a collection of Trojan programs hackers use to replace the legitimate programs on a system so that their intrusion will not be detected (Orebaugh, et al., 2007). Rootkits replace commands and utilities that the hacker inputs and clears log entries so that there will be no record of his entry (Orebaugh, et al., 2007). Though it is difficult, there are some ways to detect rootkits. Methods of detection include using an alternate, trusted operating system, analyzing normal behaviors, scanning signatures, and analyzing memory dumps (Rootkit, Wikipedia , 2011). Removing rootkits can be very complicated and difficult and if the rootkit is in the central operating system, reinstalling the operating system may be the only option (Rootkit, Wikipedia, 2011). The threat of eavesdropping by intruders is large and challenging. However, there are some defenses that can be taken to prevent hackers from using packet sniffers against an organization. Protecting Against Packet-Sniffers and Man-in-the-Middle Attacks Packet sniffing and man-in-the-middle attacks compromise the integrity and confidentiality of data while in transmission.   Fortunately, there are several techniques that can be used by organizations and individuals to protect against these threats and reduce risk.   Specifically, technology, policy, and education are typically used to cover all aspects of security.    Technology Encryption is the best form of protection against any kind of packet interception (Orebaugh, et al., 2007).   The reason behind this is that even if the data is captured by the packet sniffer, the information is completely unreadable by the attacker (Orebaugh, et al., 2007). By using this technique, messages are encrypted once the data leaves the senders computer.   Both sender and receiver hold a key that decrypts the message being transferred.   Most popular websites apply a level encryption by using the HTTP Secure (HTTPS) protocol.   With this technology, the connection between the web server and the users computer is encrypted; making the information intercepted by a third party useless.   Currently, most popular websites such as Google, Facebook, Yahoo, and Twitter use the https technology.   However, some sites (such as Amazon.com) use https only at the login page and fail to provide a secure connection afterwards.   In order to assure complete security, it is im portant to apply the https protocol throughout the users browsing experience.   The main disadvantage of this feature is that it slightly slows down the users connection.    Email can also be protected from packet sniffers by using encryption.   Email extensions such as Pretty Good Protection (PGP) can be easily implemented using standard email platforms like Microsoft Outlook (Orebaugh, et al., 2007).   Once sender and receiver start using the encryption techniques, intercepted email messages cannot be interpreted by an attacker (Orebaugh, et al., 2007). Another way to protect against sniffers is by using One Time Passwords (OTP). With this method, a different password is sent every time the authentication is requested to the user (Orebaugh, et al., 2007).   Similarly to the case of encryption, if a third party intercepts someones password, this information will be useless since these can only be used once (Orebaugh, et al., 2007).   This technology can be extremely useful to ensure security; however, remembering new passwords for each login can be very challenging and frustrating for most users. A new security technique called quantum encryption is also provides good protection against sniffing attacks.   This technique consists of making each bit of data as small as a photon (McDougall, 2006).   The data is then transferred across fiber-optic lines.   Ã‚  If the information is picked up and intercepted by any kind of packet sniffer, the entire photon message is disrupted, ending up the entire transmission (McDougall, 2006).   A technology like this would make it impossible to intercept information since the communication will be cut in the case of interception.   However, it requires fiber-optic Internet connections, which many service providers do not own and its installation can be expensive. Policy Information security professionals can help secure employees connections by requiring the use of any of the technologies explained before.   For example, if certain employees need to access websites that are outside of the organizations network, they should be allowed to use only websites that use the https protocol such as Google and Yahoo.   Policies requiring Access Control Lists (ACL) can also help prevent sniffer attacks.   All secured networks and assets should be supported by an ACL to prevent unauthorized access.   Additionally, physical security policies should be implemented to efficiently protect the computer and server rooms in the organization.   Unauthorized access to these locations could cause the installation of sniffer programs and equipment. Education Every security initiative should have a training program supporting it.   Basic but regular training sessions given to employees about the dangers of packet sniffing can prove to be very valuable when protecting a network.   Security facts such as not allowing strangers to computer rooms should be explained to all employees. Example and Demonstration of a Packer-Sniffer Program: Wireshark Originally named Ethereal, Wireshark is a free and open-source packet analyzer (sniffer) typically used by network and security professionals for troubleshooting and analysis (Orebaugh, et al., 2007).   However, many potential attackers also use it to perform man-in-the middle attacks and gain information for password cracking.   Wireshark is available for most operating systems (including OS X, Windows, and Linux) and allows users to see all the traffic that goes through a specific network (Orebaugh, et al., 2007). Wireshark differs from other packet-sniffer programs mainly because of its easy-to-understand format and simple Graphical User Interface (GUI) (Orebaugh, et al., 2007).   Wireshark can be easily set up to capture packets from a specific channel.   Once the program is running, all the network packets are shown in the screen.   The top panel (summary panel) shows a summary of the entire packet, including source, destination, and protocol information (Orebaugh, et al., 2007).   Since one quick web browse can provide a large amount of packets, Wireshark solves packet browsing issues by categorizing each packet according to its type and showing each category with a specific color in the GUI.   Additionally, the user has the option of applying filters to see only one type of packets.   For example, only packets dealing with http functions may be shown.   The middle panel in the GUI is called the protocol-tree window. It provides decoded information of the packet (Orebaugh, et al., 2007). Finally, the bottom panel (data view window) shows the raw data of the packet selected in the Summary panel (Orebaugh, et al., 2007).   Figure 1 shows a screenshot of Wireshark while running and graphically shows the three main panels of the GUI. Figure 1 Screenshot of Wireshark while running and the three main panels. To troubleshoot network problems, Information Systems professionals use Wireshark by installing the sniffer program in various locations in the network and seeing which protocols are being run in each location (Orebaugh, et al., 2007).   Additionally, if the sniffer is placed in a location where it can capture all data flowing to the main server, Wireshark can detect network misuse by providing the source and destination of all packets.   For example, if an employee in a company uses his computer to access inappropriate websites, Wireshark will show the employees and the websites IP addresses in the source and destination columns with detailed information about the website in the info column and the protocol tree panel. It is easy to see how useful Wireshark is for network troubleshooting and identifying misuse; however, the program can also be used with malicious intent.   For example, the program can be used to find out passwords on unencrypted websites.   To demonstrate this case, the username john_doe_user and password 123mypasswrd were used to log in to the unencrypted and unsecured www.bit.ly website.   At the same time, Wireshark was set up to capture all packets in the computer.   After the packets were captured by the sniffer, the data can easily be filtered by the http category.   In the info column, a packet labeled POST means that someone has entered text to a website.   After clicking on this specific packet, all the username and password information can be seen in the center section of Wireshark (as shown in figure 2).   Unencrypted and unsecured websites are very vulnerable to these types of attacks.   On the other hand, websites using the https security feature prove to be safer for users.   For example, the same situation as before was applied to the encrypted website www.facebook.com by trying to log in, but Wireshark was unable to capture any packets with login information. Figure 2 Wireshark screenshot showing username and password. Other types of malicious attacks can also be performed with Wireshark.   For example, some toolkit add-ins to Wireshark such as Dsniff and Ettercap can be used to perform man-in-the-middle attacks and password cracking (Orebaugh, et al., 2007).   Even if the incoming data is encrypted, these tools can crack some passwords by using dictionary brute force attacks (Orebaugh, et al., 2007). Case Study: A costly attack at Dave Busters In 2007, the popular restaurant chain Dave Busters experienced the power of malicious packet-sniffing software attacks.   A multinational group of hackers was able to penetrate the companys corporate network and install basic packet-sniffing software at 11 of the chains restaurant locations (Thibodeau, 2008).   During a four-month period, the attackers were able to intercept customer credit card data going from Dave Busters restaurant locations to the corporate headquarters network in Dallas (McMillan. 2008).   Extremely sensitive information such as credit card numbers and security codes were sold to criminals, who used this data to perform fraudulent transactions to online merchants (McMillan, 2008).   The attack proved to be very profitable for the hackers.   For example, from information coming from only one restaurant location, the criminals were able to gain over $600,000 in profits (McMillan, 2008).   It was estimated that approximately 130,000 credit or debit ca rds were compromised by this attack (Westermeier, 2010). To access Dave Busters network, the attackers simply drove around a restaurant location with a laptop computer and took advantage of vulnerable wireless signals to access the computer networks (Westermeier, 2010).   Malicious sniffing software was then installed in the network to intercept credit and debit card information (Westermeier, 2010).   The packet-sniffing software was written by one of the groups hackers and consisted of SQL injection attacks (Thibodeau, 2008).   However, many organizations have stated that the code was not very impressive.   For example, the CERT Coordination Center described the programs source code as a college-level piece of technology (Thibodeau, 2008).   Additionally, the malicious code had one weakness: it would shut down every time the computer that was monitoring rebooted (McMillan, 2008).   Therefore, the criminals had to go back to the restaurant location, gain access, and re-start the packet-sniffer every time this happened. The fac t that this costly program was developed by someone with just basic programming skills and how they consistently gained access to the network highlights the lack of protection of Dave Busters security systems.    According to the Federal Trade Commission (FTC), Dave Busters information security systems and policies did not provide the necessary security features to protect customers information (Westermeier, 2010).   The attackers were able to access the network not just once, but repeatedly over a time frame of four months (Westermeier, 2010).   The fact that the company was oblivious to these multiple intrusions during a long time period proves that they were vulnerable to attacks and that Dave Busters did not apply any Intrusion Detection Systems (IDS) to their networks, nor did they monitor outbound traffic (Westermeier, 2010).   Additionally, sensitive customer information was not given special protection.   Credit card data was transferred across simple unprotected and unencrypted networks (Westermeier, 2010).    What could Dave Busters have done? First of all, private networks should have been protected in a better way.   It was just too easy for hackers to gain access and install malware.   By allowing only a specific group of IP addresses, or granting only temporary access, the firm could have been safe from unauthorized access by strangers.   But even in the case of hacker access, tools such as IDS can help monitor the network during an attack.   If the company had implemented an IDS in their network, the unauthorized intruders would have been detected in time to prevent losses. Additionally, by treating sensitive data differently than regular communications, the company could have considerably reduced the threat.   Dave Busters could have simply used readily available firewall systems to the networks that held customer data (Westermeier, 2010). Encryption devices could have also proven to be useful.   If link encryptors had been used, the intercepted data would have been completely useless for the hackers.   Data isolation could have also been useful.   The firm could have separated the payment card systems from the rest of the corporate network (Westermeier, 2010). Sensitive information did not necessarily require connection to the Internet; so the company should have separated these transmissions from the network. Finally, a general company-wide policy requiring access restriction, IDS installation, firewall usage, and sensitive data isolation throughout all restaurant locations could have been extremely useful.   A uniform and thorough information security policy along with a comprehensive training program given to specific employees would help enforce the security features.   Considering that Dave Busters had not implemented any of the security features explained in this section, it is obvious that their story would have been different if these techniques had been used. Conclusion Packet sniffing is a sophisticated subject that wears two hats. It can be used for either good or evil depending on the intentions of the person using the program. It can help with analyzing network problems and detect misuses in the network for good purposes. Meanwhile, it can also help hackers and other cyber-criminals steal data from insecure networks and commit crimes, as in the case of Dave Busters. The best way to protect data from being sniffed is to encrypt it. Necessary policies and training also help with the protection. As technology evolves, there will be more and more ways to commit cyber crime. Extremely sensitive data like credit card information and health care data should be well protected, from the perspectives of both the business and personal. In order to protect this information, organizations and individuals must be aware of the threat of packet sniffers.