Tuesday, December 31, 2019

Theory Critique Cloud and Townsend - 1533 Words

Theory Critique: Cloud and Townsend B. J. Liberty University Theory Critique: Cloud and Townsend Summary Dr. Cloud and Dr. Townsend (1999) have created a comprehensive work titled Boundaries in Marriage. In this book they have outlined what boundaries are and what can be done to create healthy boundaries within a marriage. First, let’s look at the definition of boundaries. Cloud Townsend (1999) define this as â€Å"a property line† (p. 17). In other words in a marriage it is a set of rules that a person sets for themselves so that they can control their emotions; this is also known as ownership. A person must find that ownership within themselves to avoid trying to control or put blame on the other person; this†¦show more content†¦This list is just basically an example of what kinds of conflict a marriage can face; however, there are also strategies that the Bible discuses repeatedly and are ones to be followed to help a person create a healthy bond between a couple. The six strategies are: observation of the conflict; confrontation of the problem being o pen and honest; having ownership, grief, and apology of the conflict; repentance of the sin that has been committed; being active in the process for necessary change; and reexamination of the conflict, marriage, and boundaries (Cloud Townsend, 1999). Evaluation of the Strengths and Weaknesses In reading the work by Cloud Townsend (1999) I found no real weaknesses but only strengths on how to improve a person’s marriage. Boundaries in Marriage are not only for the couples that are experiencing current problems; but for the newlyweds, more seasoned couples, and for the ones who are not yet married. Regardless of the persons situation being able to learn what boundaries are and why they are needed is an important part of a healthy marriage. Cloud Townsend (1999) describes the values that a person must have in order to have a healthier marriage, this is a strength because they require a person to form a relationship that is closer to God first. If we put God first in our lives in not onlyShow MoreRelatedA Critique of Cloud and Townsend1359 Words   |  6 PagesA Critique of Cloud and Townsend A Critique of: Boundaries in Marriage by Dr. Henry Cloud and Dr. John Townsend       In their book, Boundaries in Marriage, the authors, Cloud and Townsend, present a theoretical model for maintaining healthy relationships, specifically marriage relationships. This examination of Cloud and Townsend’s approach to maintaining healthy relationships summarizes both the theoretical and theological orientation of their proposed model, compares their approach to theRead MoreBoundaries in Marriage. - Theory Critique Essay1351 Words   |  6 PagesTheory Critique: Cloud and Townsend â€Æ' Theory Critique: Cloud and Townsend Sam and Diane have been married for a few years now and, everything was so perfect in the beginning. There was nothing but plenty of love and romance. Even still, Sam had become more and more demanding of his wife until at a certain point he began demanding robotic perfection of his spouse. It took a few years, but Diane became more and more fed up. She became more and more hypersensitive and hyper-vigilant to anythingRead MorePersonal Theory Paper3660 Words   |  15 PagesPersonal Theory Paper Evie Kuhn Liberty University Abstract This paper is the development of my personal theory on Christian Counseling. I use many scriptural references to support my beliefs and stress the importance of gaining wisdom and knowledge from the bible. It incorporates all of the presentations, readings, and critiques I did at Liberty University’s Theology and Spirituality in counseling course. I talk about how I integrate Psychology, Theology, and Spirituality into my ChristianRead MoreThe Integration of Christianity and Psychology3666 Words   |  15 PagesPersonal Theory Paper: Future Counseling Theory Paper Bethany F. Miracle Liberty University Abstract In this paper, I discussed my personal theory regarding the integration of Christianity and psychology, as it relates to my beliefs, and how the summation of these two components will be reflected in my future counseling practice. I considered several factors that were critical to my personal counseling theory. First, I considered the human personality, such as, individual differences, motivationsRead MoreProject Mgmt296381 Words   |  1186 PagesUniversity–Federal Way; and Oya Tukel, Cleveland State University. In the fifth edition we continue to commit to improving the text content and improving instruction of project management. We are grateful to those reviewers who provided helpful critiques and insights on the fourth edition, which helped us prepare this revision. The reviewers for the fifth edition include. Gregory Anderson, Weber State University; Dana Bachman, Colorado Christian University; Alan Cannon, University of Texas, Arlington;

Monday, December 23, 2019

Role of Nature and Nurture in Language Development

How do both nature and nurture interact in the promotion of language development in young children? The debate between many researchers is the argument of whether nature or nurture play a more important role in development. In this essay I will be looking into both aspects of nature and nurture focusing specifically on their influence towards language development in children. A main controversial question I will be looking into is the question of whether are we born already equipped with mechanisms which help us to learn language, or is language learned throughout a child’s environment by, for example, imitation and repetition? Studies done by some opposing researchers claim to show that nature and nurture promote language development†¦show more content†¦Although Jim did learn speech it became noticeably odd to others around him as he had developed his own, unique grammatical characteristics and his poor articulation meant he didn’t acquire normal language skills (Sachs et al 1981). Bruner suggests that this was due to lack of social interaction in his learn ing of speech, which again highlights the importance of nurture in promoting a child’s language development. However, it can be argued with (Bruner 1964) that social interaction doesn’t explain all the complexities of language acquisition. Almost every day the language we hear is often incorrect, poorly defined, incomplete and full of hesitations, mispronunciations and other errors, and yet despite this we still learn to talk following the correct grammatical rules. Again this indicates the idea of Chomsky’s (1968) LAD model that children are born ‘hard-wired’ with the innate knowledge of linguistic rules and so these rules help the baby make estimations and presumptions about the language it is hearing. From these estimations and presumption the child can work out grammatical sets of rules and when more language is exposed to them, the more their language develops. Even within Chomsky’s (1968) LAD theory, undoubtedly he believed the role and promotion of the ‘nature’ aspect is the core foundation on which language can develop. But his theory a lso requires the role of nurtureShow MoreRelatedWhat Roles Do Nature And Nurture Play On Children s Language Development?1054 Words   |  5 PagesWhat roles do nature and nurture play in children’s language development? From a baby s first word to their first complete sentence, there s a lot to debate with their language development. The average child has a vocabulary of up to six-thousand words by the time they turn five years old (Brighthubcom, 2016). Language development is one of the most critical roles for an educator in both early childhood and primary settings. It is this ability of language development that is particularly interestingRead MoreThe Role Of Nature And Nurture Development At Childhood Stages1603 Words   |  7 PagesChildhood Development Student’s Name University Name â€Æ' Childhood Development Introduction Twins who have the same genetic makeup raised up in a different environment have portrayed variation in performance and other dynamics of intelligence quotients, physical development, and socioemotional development. Research on adoptions has also revealed interesting results concerning biological and nature in the development of the children. Therefore, this raises the question about the roles of nature and nurtureRead MoreThe Effect Of Environmental And Genetics On The Development Of A Person1000 Words   |  4 Pagesoldest arguments in the history of psychology is the debate of whether or not ones environment or genetic background plays more of a role in the development of a person. Both nature and nurture have been proven to play an important role in one’s development. Nature is what we think of as pre-wiring and is influenced by genetic inheritance and other biological factors. Nurture is generally taken as the influence of external factors after conception e.g. the produ ct of exposure, experience and learning onRead MoreEssay on The Role of Nature vs Nurture632 Words   |  3 PagesThe Role of Nature vs Nurture We used to think our fate was in our stars. Now, we know, in large part, that our fate is in our genes. ---James Watson While social research has been steady and ongoing, our biological knowledge has advanced disproportionately in recent times. As we discover more about the role of genes in pre-determining who we are, the nature versus nurture debate seems headed for a tilt of the biological over the environmental. Nature, or our biological aspect, doesRead MoreNature Vs. Nurture Debate1366 Words   |  6 PagesPSYS 150 Assessment Task 1 Nature-Nurture Debate Scientists and biologist have argued the Nature versus Nurture debate for decades. This debate argues the degree to which our genetics or environment, affects our behaviour and developmental stages. Nature is described as the genetic material that makes up an individual. Nurture can be described as the way in which the environment and experiences of an individual influence their behavior and development. The debate has centered on which is a greaterRead MoreThe Main Components Of Language Development981 Words   |  4 Pages Language is one of the essential skills we all require to live in our society, it enables us to communicate, obtain and transfer information and provide personal expression. All children begin a journey from an early age in learning and developing these skills. This essay will describe the four main components of language development being phonological, syntactic, semantic and pragmatic. Within each component a discussion will be conducted on what roles nature and nurture have on these, this willRead MoreIs Nature Or Nurture?1439 Words   |  6 Pagesissue, nature or nurture, has a bigger impact on an individual’s life. Both of these arguments touch on important points which makes for an interesting but yet difficult topic when choosing what shapes personality. Nature is each human’s individual genetic makeup, which is influenced by genetics and biological factors. Nurture is the influence of outside factors based on each person’s experiences. Until we unders tand more about both nature and nurture and their impact on human development, it willRead MoreLanguage Acquisition : Study Of How Humans Acquire A Set Of Semantic, Syntactic And Phonological Categories Essay1625 Words   |  7 PagesLanguage Acquisition Language acquisition is the study of how humans acquire a set of semantic, syntactic, morphological and phonological categories and rules that underlie their ability to speak and understand the language to which they are exposed. (Parker and Riley, 2005) Language is an understanding that truly makes us human. Yes, other species do communicate with an innate ability to produce a limited number of meaningful words, but there is no other species that can express sentences withRead MoreExploring The Nativist Perspective And Cognitive Development920 Words   |  4 PagesNature and Nurture is a concept that has been widely debated over the impact it plays in children’s language development. Is it better to nurture a child through their environment or allow their inner clock and biology to take over and take its course? Discussing the Nativist perspective and Cognitive development and their varying theories that are arguably similar and have criticisms of their own and how this plays a key role in this topic. At the age of 3 months we see early signs of phonology;Read MoreNature vs. Nurture: Parents or Environment Essay example571 Words   |  3 Pageshave multiple influences, but the genes passed down by parents play a huge role in developing how their offspring will turn out to be. Being unable to properly test whether certain characteristics of a person come from genetics or the influences of the environment makes this theory very difficult to understand, thus making the topic of nature vs. nurture extremely controversial. The debates always show that nature and nurture contrast but then there may be evidence that suggest that the two are linked

Sunday, December 15, 2019

Techniques for Building Strong Customer Relationships Free Essays

Your first strategy to building a strong customer relationship could be to make every customer interaction count. Don’t take a single customer for granted. Each and every interaction with a customer is a gift and should be valued. We will write a custom essay sample on Techniques for Building Strong Customer Relationships or any similar topic only for you Order Now You can achieve that by setting up a focus group made up of loyal customers. A focus group can be a vital tool to getting into the mind of your customers and knowing their needs. Another strategy is to really listen to customers. Even complaints can be a gift if handled properly and quickly. Be available and accessible when customers have questions, concerns, or comments. Humans always look for someone to talk to or share their problems with, and if you can listen more to your customers, you will end up knotting the bond between the customer and your business. I think one of the strongest strategies that are important would be to build a strong brand identity. Make it easy for your customers to identify your business or products in the midst of the crowd. Create a winning slogan, tagged with a catchy logo and a unique theme. Most importantly, make a specific promise and deliver on that promise. One of my favorites is to reward loyal customers as a strategy. This is a point that can never be over emphasized, because most businesses go after new customers while forgetting that the existing customers need to be taken care of. Introducing a loyalty program is a very effective relationship marketing strategy. Creating long lasting relationships helps to ensure long-lasting customers and repeat sales. Nothing strengthens a bond more than appreciation, and thanking customers for sticking to your brand will go a long way to make them know they are important. A simple thank you package might be all your business needs to connect personally with your existing customers. Customers want to know that they are valued and appreciated as an individual. Showing existing customers that value and appreciation encourages them to refer their colleagues, friends, and others to your business. How to cite Techniques for Building Strong Customer Relationships, Papers

Saturday, December 7, 2019

Security and Usability of E-Commerce Websites

Question: Describe about the Security and Usability of E-Commerce Websites? Answer: Abstract Nowadays the availability of internet has revolutionized the global world immensely. In todays modern society people uses modern facilities and e-commerce to buy their everyday household products. Everything from clothes, groceries, foods, cosmetics are available in the online market, and it will be served to the desired customer just in a click of a button. However, the success of an e-commerce business is based on satisfying and catering the needs of its customers. The major success story of this e-commerce websites lies in building a trustable and honest relationship with its most precious and lovable stakeholders that is the customers and consumer base. The e-Commerce websites are making daily experiments provide and satisfy the definite needs of their customers and bringing up various changes and modifications in their e-commerce platform to attract more customers daily. In the recent timeline, the e-commerce policymakers are emphasizing in giving a more strategic outlook to the ir e-commerce platform and websites. This strategy includes the implication of usability and security factors. One of the key accomplishments of an e-commerce website is in improving and improvising the usability of e-commerce platform by considering users preferences. User preferences can be explained as a combinational feeling and attitudes of users for the interface and functional design of the ecommerce platform. This influences users decision and behaviour. Considering the users preferences within an e-commerce platform enhances users satisfaction and increases users loyalty to the platform. The other aspect of installing the faith and trust within the customer is by installing a sense of security and incognito feeling to avoid the fear of online theft and cheat. Besides, the e-Commerce websites are also provided the assurance of safety, security and protections by amending various changes in the IT online market. This factor is also increasing the number of enthusiastic custom ers in the global arena of online e-Commerce arena. The growing number of customers and other related factors like commerce growth and prosperity seeks proper management of this e-commerce websites. They need to handle the matter more sensitively and seriously and need to fill up every loophole within their system. Besides, the business of this e-commerce websites stands and relies heavily on customer satisfaction and feedbacks. The e-commerce websites need to improvise and make their security measurements and usability intense. This will not only help their business development but also install cyber ethics and values within the global market of consumerism. Introduction Creating a safe and secure software program is a multifaceted and time-consuming procedure that seeks to harbour repeated challenging factors, such as functionality, scalability, clarity, productivity, etc. Software engineering analysis has lately focused on modernizing and improving the modelling capabilities considering the non-functional supplies such as steadiness, performance fault lenience, and safety. In this paper, we have focused on various security issues and usability of e-commerce websites. Methods and techniques to integrate security problems in software blueprint have already been constructed (Hartanoet al. 2014). However, there is one vital facet of the design of complex and composite secure systems, which has always been ignored by various well-known e-commerce organizations. Recent studies in the field of Human Computer Interactions in Security representthat security processes that do not work in field practice and application are not effectual. Most of the research in e-commerce security program and usability emphasizes on supplying better and improved user interfaces (UIs), but it is evident that usability troubles with secure systems are more than just UIs and requires relevance of various related factors and design methodology (Kamoun and Halaweh, 2012). However, secure systems do not subsist in emptiness; they survive for giving people and human race with different facilities and utilities. This process cannot function without the participation of people (the customers and consumers). In security, the focal point tends to focus on those unwanted people who want to mistreat the system (hackers and attackers). This is to the harm the ordinary and regular users, who play as a significant fraction in shielding it. Any secure system is a socio-technical system, and the necessities, scrutiny, and design process must consider this. Most countermeasures need the participation of public at some stage (Schumacher et al. 2013). Users can have significantly varying levels of understanding, experience, comprehension and expertise. Designing a system that suitably assists these contradictory levels of ability and aptitude, it requiresbasic training procedure if the countermeasures are to so reliable. Therefore, the design and the improvement of a secure software system need the addition of yet another vital requirement: usability. This supplementary requirement launches an additional layer of complexity in the development process. The main aim and objective of this project work are to discuss the potential security concern and usability in an e-commerce website (Konradtet al. 2012). In addition, at the same time, this paper focuses on various factors that could enhance and install improvement to these important factors. Literature review The popularity of an e-Commerce website is based on its usability and security factors. Maintaining a top-notch security provides customer loyalty and trust. Most of the famous e-commerce sites use latest technologies to deliver clients with top-notch safety and assurance. These techniques include the incorporation of SSL (Secure socket layer) to provide a secure HTTP (HTTPS) by encrypting the data transferred (Bansal, Sethi and Kataria, 2015). Moreover, the user needs to be fully aware of the fact that their data is protected before conducting an online purchase from any ecommerce website (Hartono et al. 2013). Various other methodologies like Digital signatures, Digital certificates, Cryptography, Anti-virus implementation, IDS integrated firewall implementation, use of Cisco router, proper log reporting, default ports changing, proper monitoring and analysis, updating software patches, host monitoring and implementing authentication protocols are conducted to provide security to t he customers (Fulton et al. 2013). Nowadays every e-commerce websites are concentrating more on providing proper usability to its clients. The interfaces within the web pages are made very simple and user-friendly so that everyone can use it without any difficulty (Distanteet al. 2014). The main purpose of this usability factor is to provide better experiences to customers to satisfy and cater their needs. Various e-Commerce websites are conducting studies on criteria, element, traits, matrices, attribute and characteristics of a user (Grigeraet al. 2013). Based on these factors the e-Commerce is building their web page platforms in the recent timeline. Various e-commerce companies and websites are accelerating fast and coming up with new security strategies for its customers. Recently, eBay introduced a security key device for its clients and users. This key fob randomly generates a six-digit unique security code that frequently changes within a time span of 30 seconds (Taveau, Nahari and Ebay Inc. 2014). This is a mode of the authentication procedure, which cannot be breached by any hackers. Another leading name in the global e-commerce market amazon.co.uk is also focused on enhancing its security in the global e-commerce sector (Balduzziet al. 2012). They are currently following a Safe Harbor Framework to protect the privacy and the security of its customers. This SH Framework supports strong encryption methodology to provide standard security features to its customers (Connolly, 2013). Moreover, amazon.co.uk has adopted the Secure Socket Layer (SSL) technology that is provided by VeriSign to provide its customers with eternal se curity back up. The SSL service providers encrypt the data and deliver the message (information) to the host when a customer enters his/her credit card details (Soghoian and Stamm, 2012). This encryption procedure is followed by various other online securities amazon.co.uk have secured its online transaction system (Ismail, 2015). Moreover, the other online security services followed by amazon.co.uk are digital certificates in web server, SSL encryption, public key cryptography and access control list (ACL). Apart from eBay and amazon.co.uk other e-Companies like Argos, Next.co.uk, and Tesco are emphasizing more on increasing the customer security of its websites. Currently, Argos is providing its customers with Secured code for Visa and Master Card for providing online payment security to the customers (Siwach, 2014). Argos Company has undergone a partnership program with the various Master card and Visa card providers and coordinately produced various credit cards with unique and concrete code numbers. This code numbers acts like an online PIN number for use on Argos.co.uk website. This process provides the customers with great security and privacy (Dwivediet al. 2013). Adding to this, the SSL protocol and encryption of customer data is also performed in the online e-Commerce website of Argos. Even other online UK based e-Commerce companies like Next.co.uk and Tesco follow a robust protocol for providing safety and security to its customers. This safety and security measurement include s SSL servers, digital signature, encryption, cryptography, anti-virus implementation, firewall application and proper monitoring system (Zhang et al. 2012). All these above mentioned companies like eBay, amazon.co.uk, Argos, Next.co.uk, and Tesco follows a standard guideline in maintaining a usability design for its e-Commerce websites respectively. Firstly, they all keep their navigation simple, understandable and functional for the users. The menu sections of this websites are simplified to seven to eight headers (Oyomnoet al. 2013). They incorporate trendy and fun words to indicate a particular part considering the ease of use. Secondly, they all stick to known symbols in their navigation option to make the shopping experience of the customer more intuitive and user-friendly (Hasan, Morris and Probets, 2013). Thirdly, they keenly follow a small check out procedure. They made their log out process simple by only installing a go back or forward option. However, a simple checkout error is mandatory to indicate a proper and hassle-free checking out procedure. They followed this principle and made their checkout error messages simple, to t he point and understanding for the common users (Sivaji et al. 2011). Adding to this, they always focus on limiting down the loading process of the website, as it sometimes frustrates a customer and user. Most of the customers are not from a patient breed of class and to provide every customer depending on their mood and demand the website should be adored with fewer animations to increase the loading time. The last but the most important factor that all these online e-Commerce sites follow is that they made a automated search feature on their websites (Alrobaiet al. 2013). This would help the customers to search the exact product that they are looking for the website and would present it in front of their screen. Some of the e-Commerce websites due to their poor management and security policy have become victims of the security breach. Among these companies, Target.com has dealt with 70 million violations in the recent timeline. Some of the other online e-Commerce websites that has conferred immense loss and sacrificed the customer security are AOL.com, Play.com, CDuniverse.com, and SalesGate.com. In a recent project, a credit card thief with the false name Maxus stole more than 370,000 credit card numbers from the online music store by the name of CDuniverse.com. On the other hand, Play.com which is a leading online retailer in the United Kingdom has revealed that some unknown hackers have breached their data and more than 1,0000 customers those ethical hackers have leaked email addresses and other data (Tihanyiet al. 2015). Moreover, the clients who are anday to day user of this e-Commerce website has confirmed about receiving some spam and phishing emails from various unknown sources. Simi lar incidents had happened to the user of the AOL.com Mail user, and they claimed about some spam and phishing messages. Later, in the year 2014, the director of AOL Company has confirmed about the security breach of their company and asked their customers to change their password as a preventive measure. Some 520,000 users who have a mail account in AOL.com have complained about a possible hack of their email (Davis, 2015). The reason for this security breach inside this website is believed to have happened due to various legit reasons. Firstly, these e-commerce sites are very poorly maintained and are loaded with malware and Trojan. The second reason that contributes to the hacking idea is an insecure system configuration for using an un-patched technology. However, SalesGate.com, AOL showed a probable breaching due to poor network security. This lack of network security can happen due to various reasons (Turban et al. 2015). These websites namely Target.com, AOL.com, CDuniverse.com, Play.com, and SalesGate.com lack the SSL layer potential, and the network points like POS terminal, and third party vendor links loT-based devices, etc. were not adequately shielded and protected. These e-Commerce companies have lacked in utilizing the proper tools to monitor the data packages and DNS transactions. All this mismanagement and callousness among the website developers and website technicians of these companie s has resulted in breaching data and information (Zafar, Ko and Osei, 2012). However, the primary target of a corporation should be providing satisfaction to the customers. It is found that only satisfied customers have the tendency to return and shop from the same company. Therefore, e-Commerce service providers should also concentrate on satisfying their customers. It is easy to reach ordinary people through online services and promote marketing; however, it is found that there are very few e-commerce service providers who are thriving in the market without facing loss. The main reason behind the popularity of few e-commerce service providers (such as e-bay, amazon.com, etc.) is the customer satisfaction. Most of the successful e-commerce service providers introduced cart system to help the client to choose their own budget and shop accordingly (Fang et al. 2014). It is observed that most of the customers prefer credit card transaction to pay for their shopping; therefore the e-commerce service providers are concentrating on introducinga security proof onli ne credit card transaction system as well as alternative payment systems (like virtual money transaction etc.) to boost the customer satisfaction. The e-commerce service providers are also providing added policies such as providing an extra discount for using only credit cards to attract more people (Zhang, Zeng and He, 2012). Also, they are also giving quick search methods so that the customers can enter their requirements and find results within seconds with a large variety, which will be helpful to attract more customers. The customers love surfing for products, however sometimes could not buy them due to several reasons. For this reasons, e-commerce service providers are adding an extra wish list interface feature, which will be helpful to save the chosen product in the cart so that the customers can buy those products whenever they want. On the other hand, an addition of special features can also make an e-commerce business attractive but the customers need something more than simple features. This extra' thing is security. Customers who are paying through online always need to make sure that their transaction is completely secure, and their account details are out of the reach of hackers (Luo, Ba and Zhang, 2012). Therefore, the e-commerce service providers are building up their website with SSL data encryption framework to ensure the website security. It is observed that when the websites of e-commerce service providers show SSL certificate seals on the homepage, it automatically provides the cust omers and installs an instant trust factor (Lee and Kozar, 2012). Moreover, this up stage is giving customers the confidence to rely on those websites as they are ensuring the customers with the confidence of their personal data and information are safety before purchasing any item in that e-commerce website. Furthermore, the e-commerce service providers need to strengthen their security to a larger extent to influence more customers to purchase through them with more safety protocol. It is observed that anyone with technology, capability and opportunity can have the potentiality to cause a security breach (Huang and Benyoucef, 2013). Therefore, the e-commerce service providers need to consider the prevention steps against unauthorized modifications of data from that particular site and take care of the authentication of the data source. Besides, they also need to take care of the confidentiality and privacy of the customers. It is found there are many viruses, which can easily break the security systems provided by the e-commerce service providers, such as Trojans, Worms, Viruses, malicious ActiveX, etc (Ajakaiye and Krause, 2011). However, discussing the pros and cons of various e-commerce websites by critically evaluating the security and usability factor we have missed out the viewpoints of a customer satisfaction. The usability and security of an e-commerce site install faith and trust in the mind of its consumers and clients. The user interface of the websites acts as a channel through which customers get in touch with the e-service provider. There are various factors to install satisfaction among the customers and users following the B2C protocol (Hartanoet al. 2014). Several factors that establish faith trust and customer satisfaction are achieved by providing the customer with proper design interface. This convenient interface includes information design, navigation design, and visual design. Adding to this, quality of service and product also increases the satisfaction level of the customers and consumers. This includes the idea of providing the customers with proper information about a product describ ing every characteristic feature of it like colour, weight, height, etc. All these factors contribute to a better understanding between the two stakeholders (e-Company and the consumer).Adding to this, the security factor also installs faith and trust on the mind of the customers which is critical in increasing the customer base of the e-Commerce company online (Fischer, Halibozek and Walters, 2012). However, certain factors hamper the integrity of an e-commerce website that implicates several security issues like identity theft, credit card fraud, virus and DoS attacks, etc. Research Methodologies The present chapter of the research paper describes the different kinds of research process and research approach with the analyst accepted and rejected in the operations of the research paper. The present research paper based on different kinds of website usability and different kinds of security issues which majority of the buyers faces in the process of purchase and sales. The present research paper is based on the analyzing an E commerce website, about its features, application and different mode of transactions which this particular company adopts in the operations of the business (Abrishami and Peivandi, 2012). The selected website is Amazon.com. Amazon is one of the most popular and common American E commerce website, which mainly operates its business in different kinds of online transactions. In the present research paper, the investigator has used different kinds of research methodologies in order to complete the investigation procedure with appropriate information (Ushakov and Arkhipov, 2014). The most challenging jobs for the investigator is to complete the investigation procedure on time and to select the appropriate research methodology in order to complete the investigation procedure (Brambilla, Tokuda and Tolksdorf, 2012). Research approach, research designs and research philosophies are the three main research parameters, which the investigator adopts in the proceedings of the investigation procedure. The three kinds of research philosophies are positivism, realism and interpretism. Based on the requirements of the investigation procedure the analyst decides whether to choose the research philosophies. The three kinds of research philosophies have different kinds of utilities. In the present research paper, the investigator has used the concept of the positivism research philosophies (Anner, 2012). Positivism research philosophy allows the investigator to support the investigation procedure with real facts and materials with scientific approaches, which already exists in the universe. Inductive research approach and deductive research approach are the two kinds of research approach (Safko, 2012). The most important jobs of the investigator is choose whether to use inductive method of research approach and inductive method of research approach. In the present research approach, the analyst has used the concept of deductive research approach in order to organization the investigatio n procedure based on different issues E Commerce websites (Bredeson, 2012). With the help of the deductive method of research approach, the investigator will be able to develop the investigation procedure with relevant hypothesis. The investigator in the present research paper will be able to develop a proper research hypothesis with the application of deductive research approach (Shang, Zhang and Chen, 2012). There are three kinds of research designs, which the investigator adopts in the proceeding of the investigation procedure (Vincent and Agbola, 2012). Explanatory research design, exploratory research design and descriptive research design are the three research designs, which the analyst adopts in the research operations. In the present research paper on issues of different commercial websites, the analyst has used exploratory research work (Vincent and Agbola, 2012). Moreover, with the application of the explanatory research design the investigator in the present research pap er on E commerce website stability and securities will be able to focus on real facts and findings (Collins, 2012). Explanatory research design contributes in attempting to build a connection between two different variables that the research topic consists so that the research problem can be solved. This part of the study will cover the data finding procedure of the research paper. Primary data finding procedure and the secondary method of data finding procedure are the two accepted data finding procedure, which all the analyst uses in the research work. In the present research paper on issues of e commerce website the researcher used two source of data collecting procedure. The investigator has decided to use a mixed source of data analysis procedure. The two source of data analysis procedure in the investigation process are the primary source of analysis procedure and the secondary source of data analysis procedure (Eiselt and Sandblom, 2012). The primary source of data collection will provide useful data in collecting first hand data and on the other hand, the secondary data will be very much useful in collecting data from second hand source (Popping, 2012). The investigator divides the primary source of data collection into two parts. One is the quantitative part and on the other hand, is the qualitative part. However based on the requirements of the research work on issues of commercial websites the investigator mainly focused on the application of the quantitative data collection procedure. The researcher interrogated 12 people in the qualitative part of the data analysis procedure (Brambilla, Tokuda and Tolksdorf, 2012). The questionnaire, which was prepared by the investigator, consists of 10 questions based on the requirements on the investigation procedure on E commerce website with its stability and securities. Image of Snap Deal Image of Spyder Image of Ebay Image of Tesco Image of Amazon Data sampling method is also an important part of the analyzing procedure. The investigator used both probability method and non-probability method of sampling. Nearly, 12 people were interrogated in the quantitative part of the data analysis procedure (Greene, 2011). Researcher has undertaken different research methodologies for qualitative data collection (Vincent and Agbola, 2012). By maintaining the ethical constipation of the investigator procedure mainly the Data Protection Act and maintaining the confidentiality of the investigation, the investigator has organized the present research study. There are several research methodologies, but at the end, the investigator has decided to use positivism research philosophy in order to support the operations of the research work with real facts and findings (Hannes and Lockwood, 2012). The investigator has rejected other two research philosophies by accepting positivism research philosophy. On the other hand, the investigator has decided to use the deductive method of research approach by eliminating the inductive method of research approach (Vincent and Agbola, 2012). Finally, the investigator has decided to use the explanatory research work in the operations of the research work, eliminating explanatory design and descriptive research designs (Liu, 2012). Chapter 3: Findings and Critical Discussions This part of the study, mainly focus on the data analyzing procedure. The investigator has decided to focus mainly on quantitative data analysis procedure. The investigator keeping in mind the requirements of the investigation procedure prepared 10 questions. All the questions were prepared by analyzing different gaps in the literature review. The objective of the investigator is to analyze different kinds of gaps, which are found in the literature review. Quantitative Questionnaire Q1) Gender division of population. Options Total number of respondents Population Response in Percentage Male 6 10 60% Female 4 10 40% Table 1: Gender of the population Figure 1: Gender of the population Findings and Analysis From the above tabular information, the investigator has concluded about the gender of the population. The majority of the people present in the population were male and on the other hand, the reaming respondents were female. All of the respondents in the entire population were very much cooperative in the entire survey. The researcher in this part of the data analysis procedure was benefited in different ways, as all the respondents were very much cooperative with the researcher in the entire investigation procedure. Q2) Classification of age group Options Total number of respondents Population Response in Percentage Within15-25years 4 10 40% Within 25-40years 2 10 20% Within 40-50 years 2 10 20% Within 50-70 years 2 10 20% Table 2: Different age group of the population Figure 2: Different age group of the population Findings and Analysis From the above tabular information, the investigator has concluded about the age group of different people present in the present research survey. The investigator has classified the entire age group into four divisions. The first division of age group is between 15-25 years, the second division of age group belongs to 25-40 years, the third age group is divided between 40-50 years and the final division of the age group belongs to 50-70 years. It is clear from the above tabular information that majority of the people belongs to the 15-24 years. All the people in the entire research operation cooperated with the investigator in different ways. Q3) Do you agree with the fact that in E Commerce websites faces different kinds of security issues Options Total number of respondents Population Response in Percentage Strongly Agree 4 10 40% Agree 2 10 20% Neutral 2 10 20% Disagree 2 10 20% Strongly Disagree 0 10 0% Table 3: Opinion of the fact that E Commerce websites faces different kinds of security issues Table 3: Opinion of the fact that E Commerce websites faces different kinds of security issues Findings and Analysis From the above research question, the investigator has a mixed review. The majority of the people in the entire research operations have strongly agreed with the fact that majority of the E commerce site faces security issues. Nearly 20% of the people agreed with the fact E commerce websites need to focus on different kinds of security issues and on the other hand, the reaming 20% of the people were neutral and disagree with the point that E commence sites faces different issues in the business transactions. Globally there are certain issues, which are faced by different E commerce companies in the operations of the online transactions. Majority of the of the E commerce sites faces different kinds of issues on online payment transactions. Q4) Do you think websites like EBay, Snap deal, Amazon developed a strong security system on different kinds of online transaction. Options Number of respondents Total respondents Percentage Strongly Agree 5 10 50% Agree 2 10 20% Neutral 2 10 20% Disagree 1 10 10% Strongly Disagree 0 10 0% Table 4: Reviews of Amazon towards development a strong security system on different kinds of online transaction Figure 4: Reviews of Amazon towards development a strong security system on different kinds of online transaction Findings and Analysis From the above tabular information, the investigator has concluded about the development of security on the online business transactions of Amazon. The investigator has concluded that 50% of the entire population agreed with the fact that Amazon has taken different kinds of steps in the development process of online securities in the operations of the online transactions. Majority of the people globally do not want to use the online system as a mode of payment due to lack of security. Most of the people prefers the concept of cash on delivery instead the concept of online money transaction. In order to solve this particular problem, Amazon has developed the entire structure of the online security system. Amazon introduced the concept of HTTP(S) instead of HTTP in order to secure different modes of online transactions. Nearly, 20% of the people in the population agreed with the fact that Amazon has done well in order to solve some specific security issues in the operations of online business. The reaming 10% of the people were neutral and disagree with this particular research questions. According to this group of people, Amazon needs to increase and develop more security on the online business transactions in order to make the majority of the people more secure from different kinds of online and internet frauds. Q5) How frequent do you use E commerce websites for purchasing and online shopping? Options Number of respondents Total respondents Percentage Frequently 5 10 50% Often 2 10 20% Very often 1 10 10% Rarely 1 10 10% Never 1 10 10% Table 5: Frequency of using E commerce websites for marketing and online shopping Figure 5: Frequency of using E commerce websites for marketing and online shopping Findings and Analysis This is one of the most common and important questions developed by the investigator in the data analysis procedure. In modern generations, the application of internet provided one of the major breakthroughs and changed the entire concept of marketing. The objective of the present research paper is to identify the disadvantages of online marketing faced by the users globally. Security is one of the major concern which majority of the E commerce websites faces in the operations of the business. With the effect of online marketing, nearly 50% of the entire population prefers the concept of online marketing. This group of people wants to be benefited with the additional advantages that the E commerce websites offers to the people. Wide varieties of product and discounted price are the primary reason behind the online shopping. The reaming people in the population were often and rarely use the concept of online shopping. With the help of the technological advance most of the people globally prefers the concept and application of online shopping. Q6) what challenges do you face while buying products on online with the help of E commerce Sites? Options Number of respondents Total respondents Percentage Increased Website Traffic 2 10 20% Last Minute Promotions 2 10 20% Payment System 3 10 30% Security Issues 3 10 30% Holiday Shipping Demands 0 10 0% Table 6: Challenges faced by the customers while buying products on online with the help of E commerce Sites Figure 6: Challenges faced by the customers while buying products on online with the help of E commerce Sites Findings and Analysis It is one of the most common and important questions which the investigator has developed in the operations of the analysis. These are the some major issues, which the buyers face in the process of online marketing. Most of the people in the population agreed with the fact the payment system and different kinds security issues are the primary problem in the concept of online shopping. With the technological advancement, most of the E Commerce companies have developed a strong online business. However, there are some problems in the operations. The primary disadvantage is lack of security. On the other hand, 30% of the people in the population concluded that security issues is also an important problem in the in the overall process. Nearly 20% of the people suggested that the concept of last minute promotion is one of the most common issues, which the majority of the buyers face in the process of online shopping. Holiday shipping demand is another important challenge, which the buyers faces while purchasing. However, this problem is negligible as compared with other issues. Q7) How often do you face problems in e-commerce websites? Options Number of respondents Total respondents Percentage Frequently 5 10 50% Often 2 10 20% Very often 1 10 10% Rarely 1 10 10% Never 1 10 10% Table 7: Frequency of application of different kinds of E commerce sites Figure 7: Frequency of facing problems of different kinds of E commerce sites Findings and Analysis From the above tabular information, the investigator has concluded about the frequency of the E commerce website visit. The application of internet in marketing has changed the entire concept of shopping. There are certain advantages in the concept of online shopping. Majority of the users prefers the concept of online shopping in order to be benefited with different additional benefits. It is to be noted that there are some issues, which act as a barriers in the concept of online shopping. Security and the sustainability is the primary issues which the majority of the users faces in the operations of the online transactions. Half of the entire population uses the allocation of E commerce in a very frequent basis. The objective of this group of people is to get benefited with different kinds of additional options and additional benefits in the process of online shopping. On the other hand, 20% of the population uses the concept of online shopping very often. The reaming people of the popular do not use the concept of online shopping, usually prefers the concept of traditional shopping. Hence, it is very much clear, from the above findings and the research that the entire concept and trend of shopping has been changed entirely due to the application of various kinds of modern technology in marketing the entire trend of shopping has been changed. However, there are various kinds of disadvantages and security issues, which are highlighted in the present research paper. Q8) Do you believe your e-commerce website is secured enough. Options Number of respondents Total respondents Percentage Strongly Believe 5 10 50% Believe 2 10 20% Neutral 2 10 20% Doubtful 1 10 10% Strongly Doubtful 0 10 0% Table 8: Security of the E commerce Websites Figure 8: Security of the E commerce Websites Findings and Analysis From the above research question, the investigator concluded about various kinds of security issues which majority of the business firm faces in the operations of the investigation procedure. Half of the population strongly believes in the point that E commerce websites are secure enough in order to carry on different kinds of business transaction. Some group of people strong believes in the point that the E commerce site needs to develop more security in the process of E commerce. Nearly 20% of the people believe in the fact that the security needs to be increase in order to develop a proper E commerce system. The reaming 20% of the people doubt in the security system of E commerce. From the above question, it can be concluded that most of the people globally, believes in the concept of online marketing. The major challenge and barriers faced by the majority of the E commerce site is based on the security issues. Q9) what elements do you consider while visiting any e-commerce website? Options Number of respondents Total respondents Percentage Security 6 10 60% Feasibility 2 10 20% Sustainability 2 10 20% All of the above 0 10 0% Table 9: Different kinds of factors, which affect the operations of E Commerce Websites Figure 9: Different kinds of factors, which affect the operations of E Commerce Websites Findings and Analysis From the present research question, the investigator concluded about the factors, which hampers the purchasing decisions of the customers. From the above tabular information majority of the people concluded that security is the only issues in online marketing. On the other hand, reaming 20% of the people concluded about that feasibility and sustainability are the other two problems, which hamper the purchasing decision of the customers. Mode of payment is the payment is the primary issue, which majority of the customers fears in the concept of online shopping. Feasibility is another important factor, which affects the operation of online marketing. The last important factor, which is considered in the overall E commerce website, is the concept of the sustainability. Hence, it can be concluded that, the security issues is one of the major factor in the application of the online shopping. There are different steps which majority of the organization develops in the process of online marketing. Q10) Rate the security system of the modern e-commerce websites? Options Number of respondents Total respondents Percentage Very Poor 2 10 20% Poor 1 10 10% Average 5 10 50% Good 1 10 10% Excellent 0 10 0% Table 10: Security system in the application of different kinds of E Commerce sites Figure10: Security system in the application of different kinds of E Commerce sites Findings and Analysis From the above tabular information, the investigator has a mixed review on the security system of E commerce. In recent time, it is one of the most common and important issues which both the buyers and the sellers faces in the business operations. Majority of the people in the survey agreed with the fact, the security system of E commerce is average. Nearly 50% of the total people in the survey agreed with the fact that the security system of the entire E commerce site is average. On the other hand, some people in the population concluded that the security system of the E commerce site is poor followed by 20% of the people concluded that the security system of E commerce is very poor. In recent time, with the technological advancement, all the companies based on the nature of the trade tries to develop a proper security system. For example, the application of technology HTTP(S) made a huge contribution towards the development process of a proper communication system in the online bus iness transaction. However, the concept and application of online shopping has changed the entire trend of shopping. Majority of the people based on the requirements prefers the concept of online shopping as compared with the traditional mode of shopping in order to be benefited in different ways. However, there are certain challenges and certain issues and certain challenges faced by majority of the E commerce sites. Chapter Summary This chapter mainly highlights different kinds of findings, which the investigator has concluded about the operations of the research work. In this chapter, the investigator summarizes 10 questions, which was prepared by keeping in mind the requirements of the research paper. The investigator in the present research paper mainly reflects on different kinds of issues, which are in the E commerce site in the operations of purchase and sales. The present research paper mainly focuses on different issues, which the majority of the E commerce sites face in the business operations. At present, website usability and security is one of the major concerns for every E commerce website. The investigator in the present research paper mainly focuses on different kinds of issues on E commerce sites. In order to conduct an effective research the investigator has gone through different kinds of commercial websites which operates its business in E commerce. However, the investigator has focused on di fferent kinds of issues faced by some popular and unpopular E commerce sites. Conclusion The concluding part of the research paper summaries about different kinds usability and security issues faced by different commercial websites in the operations of the business. The concept of online marketing has certain advantages as well as disadvantages. The objective of the present study is to highlight some of the major disadvantages in the operations of the E commerce site. The present study is divided into several parts. The first part of the study is the introduction part; the second part of the study is the literature review part, the third part of the study mainly describes about the methodologies. The forth chapter is the most crucial part in the entire research paper. The fifth chapter summarizes the concluding part as well as the recommending part of the research paper. Keeping in mind the requirements of the research paper, the investigator has organized the entire investigation procedure. The investigator in the present study mainly focused on various kinds of disadvantages and issues, which are faced by the uses on the time of online business transaction. The application and the concept of E commerce have brought one of the major breakthroughs in the operations of the business. This part of the study will highlight the advantages and disadvantages which on E commerce. The primary advantage it allows the customers to save time and it allows the customers to save time and on the other hand, it provides all the customers to select the products from wide varieties. On the other hand, there are certain disadvantages in the concept of E commerce. The researcher in the present study highlights some of the major issues and challenges which majority of the E Commerce sites faced in the business operations. Security and website instability are the major two global problems, which some group of users faced while shopping online. The researcher in the study mainly spotlight on the different kinds of securities issues and challenges faced by the users while shopping online. In order to support the research work with effective data and information the investigator has searched different E commerce websites. For example, Amazon.com, Ebay.com and Snapdeal.com are the other three commercial websites, which the researcher searched in the operations of the research work. In order to solve this particular problem different initiative have been taken by different companies in order to make the technological advancement in a much better manner. In order to develop a proper security system in the website the application of HTTP(S), introduced by the majority of the companies in order to make it more secure from different kinds of frauds. Reflection I have learnt many things in my program at GSM London throughout the years. Our university is one of the most common and important university across the country. Different students join the organization from different cultural backgrounds. The way of communication and the way of approach differs from each other. While organizing the present study, I have gone through different kinds of activities. Professors and official staffs helped me a lot while organizing every research paper. I have learned many extracurricular activities from my seniors. What was most important about the investigation procedure is the application of the fieldwork. In order to organize a proper data collection process, the application of the fieldwork was very much important. I have learned some unique activities from my professors, which will not only ensure me in completing the research work but will allow me to apply these skills in my studies. It is more important for me to utilize this particular opportuni ty. It was one of the excellent opportunities for me to gather more knowledge and apply proper skills in the operations of the research work. This research work helped me a lot to develop proper communication skills with my seniors and professors. This communication helped me a lot to find a proper solution for my research gaps. GSM program has also helped me to evaluate my strengths and weakness in an effective manner. On the other hand, I have learned many different things from my peer groups. Our University is one of the most popular and famous university across the country. Different students join the university from different cultural backgrounds. The ways of communication and the way of working differs from each other. I have learned different additional things from my peer groups, such as way of studies and application of knowledge and skills in a different way and approaches. The most important and unique thing which I have learned is the application of proper knowledge and skills in a practical workplace. Learning and evolution of different kinds of modern theories is an important part of studies and on the other hand, application of these theories is equally important. By consulting and developing proper communication skills with my peers, I have learned different modes of applications of knowledge and skills in the practical workplace. I have also learned that several modes of communicati on is also important that helped me in the learning process. It was one of the most difficult and challenging job to complete the investigation process on time. With the help of my seniors as well as with the help of my teachers I was able to complete the investigation process on time with effective data and findings. The contribution of my professors, seniors and peers were remarkable in the process of organizing this particular investigation procedure and helped me to develop my knowledge and skills apart from my studies. It was very much important for me to develop a proper practical knowledge and skill while organizing this research work as well as the overall work. References Baggini, J. (2012).Ethics. London: Quercus. Abrishami, M. and Peivandi, A. (2012). The Impact Of Globalization on The Transformation From Traditional to Modern Business Practices and Operations in India.IJSR, 3(4), pp.79-83. Adamkiewicz-Drwillo, H.G., (2012). Estimating the impact of globalization on international competitiveness: A multidimensional approach.China-USA Business Review,11(12), pp.1543-1556. Ajakaiye, T.D. and Krause, K.S.K., 2011. Online Based Authentication and Secure Payment Methods for M-Commerce Applications. Alrobai, A.A., Alroobaea, R.S., Al-Badi, A.H. and Mayhew, P.J., 2013. Investigating the Usability of E-Catalogues Systems: Modified Heuristics vs. User Testing.User Testing (July 4, 2013). Anner, M. (2012). Globalization and Labor Rights: Assessing the Impact.International Studies Review, 14(2), pp.343-345. Balderston, K. (2011). Investing with Impact: Unlocking Value for Business and Society.Innovations: Technology, Governance, Globalization, 6(3), pp.35-39. Balderston, K. (2011). Investing with Impact: Unlocking Value for Business and Society.Innovations: Technology, Governance, Globalization, 6(3), pp.35-39. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E. and Loureiro, S., 2012, March. A security analysis of amazon's elastic compute cloud service. InProceedings of the 27th Annual ACM Symposium on Applied Computing(pp. 1427-1434). ACM. Bansal, D., Sethi, P. and Kataria, S., 2015. Secure Socket Layer and its Security Analysis.Networking and Communication Engineering,7(6), pp.255-259. Barnaghi, P., Wang, W., Henson, C. and Taylor, K., 2012. Semantics for the Internet of Things: early progress and back to the future.International Journal on Semantic Web and Information Systems (IJSWIS),8(1), pp.1-21 Brambilla, M., Tokuda, T. and Tolksdorf, R. (2012).Web engineering. Berlin: Springer. Bredeson, D. (2012).Applied business ethics. Mason, Ohio: South-Western/Cengage Learning. Collins, D. (2012).Business ethics. Hoboken, N.J.: John Wiley Sons. Connolly, C., 2013. EU/US Safe HarborEffectiveness of the framework in relation to national security surveillance.Papier fr das Hearing im LIBE-Ausschuss. Corti, L. (2012). Recent developments in archiving social research.International Journal of Social Research Methodology, 15(4), pp.281-290. David, E. (2012).Agent-mediated electronic commerce. Berlin: Springer. Davis, D., 2015. Legal Drivers in Cyber Security.Engineering Technology Reference,1(1). Distante, D., Garrido, A., Camelier-Carvajal, J., Giandini, R. and Rossi, G., 2014. Business processes refactoring to improve usability in E-commerce applications.Electronic Commerce Research,14(4), pp.497-529. Dwivedi, A., Dwivedi, A., Kumar, S., Pandey, S.K. and Dabra, P., 2013.A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System.InAdvances in Computing and Information Technology(pp. 367-379). Springer Berlin Heidelberg. Eiselt, H. and Sandblom, C. (2012).Operations research. Heidelberg: Springer. Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E. and Lim, K.H., 2014. Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms.Mis Quarterly,38(2), pp.407-427. Fischer, R.J., Halibozek, E.P. and Walters, D., 2012.Introduction to security.Butterworth-Heinemann. Fulton, N., Butler, J.M., Curtis, M.A., Parrott, D., Whitehead, M.J. and Wu, H., Reuters Limited, 2013.Method for certifying and verifying digital web content using public cryptography.U.S. Patent 8,352,379. Greene, S. (2011). Catalyzing Investment for Domestic Impact: The Impact Investing Initiative of the U.S. Small Business Administration.Innovations: Technology, Governance, Globalization, 6(3), pp.27-34. Grigera, J., Garrido, A., Panach, J.I., Distante, D. and Rossi, G., 2015. Assessing refactorings for usability in e-commerce applications.Empirical Software Engineering, pp.1-48. Hannes, K. and Lockwood, C. (2012).Synthesizing qualitative research. Chichester: John Wiley Sons. Hartono, E., Holsapple, C.W., Kim, K.Y., Na, K.S. and Simpson, J.T., 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation.Decision Support Systems,62, pp.11-21. Hartono, E., Holsapple, C.W., Kim, K.Y., Na, K.S. and Simpson, J.T., 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation.Decision Support Systems,62, pp.11-21. Hartono, E., Kim, K.Y., Na, K.S., Simpson, J.T. and Berkowitz, D., 2013. Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage.InAdvances in Information Systems and Technologies(pp. 1075-1085).Springer Berlin Heidelberg. Hasan, L., Morris, A. and Probets, S., 2013. E-commerce websites for developing countries-A usability evaluation framework.Online Information Review,37(2), pp.231-251. Homann, K., Koslowski, P. and LuÃÅ'ˆtge, C. (2007).Globalisation and business ethics. Aldershot, England: Ashgate. Huang, Z. and Benyoucef, M., 2013. From e-commerce to social commerce: A close look at design features.Electronic Commerce Research and Applications,12(4), pp.246-259. Huemer, C. and Lops, P. (2012).E-Commerce and web technologies. Berlin: Springer. International Journal of Social Research Methodology: Theory Practice. (2012).International Journal of Social Research Methodology, 15(6), p.ebi-ebi. Ismail, M.B.S., 2015. Encryption: Provide Security for Big Data Application in Cloud Computing Environment.Advances in Computational Research,7(1), p.253. Kamoun, F. and Halaweh, M., 2012. User interface design and e-commerce security perception: an empirical study.International Journal of E-Business Research (IJEBR),8(2), pp.15-32. Khachidze, V. (2012).Contemporary research on E-business technology and strategy. Berlin: Springer. Konradt, U., Held, G., Christophersen, T. and Nerdinger, F.W., 2012.The role of usability in E-Commerce services.International Journal of E-Business Research (IJEBR),8(4), pp.57-76. Kotler, P. and Armstrong, G. (2012).Principles of marketing. Boston: Pearson Prentice Hall. Kurtz, D. and Boone, L. (2012).Principles of contemporary marketing. Australia: Southwestern Cengage Learning. Kwon, O. (2012). A new ensemble method for gold mining problems: Predicting technology transfer.Electronic Commerce Research and Applications, 11(2), pp.117-128. Lee, Y. and Kozar, K.A., 2012. Understanding of website usability: Specifying and measuring constructs and their relationships.Decision Support Systems,52(2), pp.450-463. Liu, Z. (2012). The Research on Collaborative Commerce of Enterprise Application Integration.Physics Procedia, 24, pp.1221-1225. Luo, J., Ba, S. and Zhang, H., 2012. The Effectiveness of Online Shopping Characteristics and Well-Designed Websites on Satisfaction.Mis Quarterly,36(4), pp.1131-1144. Marburger, D. (2012).Innovative pricing strategies to increase profits. [New York, N.Y.] (222 East 46th Street, New York, NY 10017): Business Expert Press. Maxwell, J. (2012).A realist approach for qualitative research. Thousand Oaks: SAGE Publications. Oyomno, W., Jppinen, P., Kerttula, E. and Heikkinen, K., 2013.Usability study of ME2. 0.Personal and ubiquitous computing,17(2), pp.305-319. Popping, R. (2012). Qualitative Decisions in Quantitative Text Analysis Research.Sociological Methodology, 42(1), pp.88-90. Safko, L. (2012).The social media bible. Hoboken, N.J.: Wiley. SarathiBhattacharjee, P. and Ara Begum, S. (2012). The Application of E-commerce in Business Application: Their Problems and Prospects.International Journal of Computer Applications, 49(10), pp.36-40. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F. and Sommerlad, P., 2013.Security Patterns: Integrating security and systems engineering. John Wiley Sons. Shang, X., Zhang, R. and Chen, Y. (2012). Internet of Things (IoT) Service Architecture and its Application in E-Commerce.Journal of Electronic Commerce in Organizations, 10(3), pp.44-55. Singh, N. (2012).Localization strategies for global e-business. Cambridge: Cambridge University Press. Sivaji, A., Downe, A.G., Mazlan, M.F., Soo, S.T. and Abdullah, A., 2011, June.Importance of incorporating fundamental usability with social trust elements for e-commerce website. InBusiness, Engineering and Industrial Applications (ICBEIA), 2011 International Conference on(pp. 221-226). IEEE. Siwach, S., 2014. E-COMMERCE: A CONCEPTUAL STUDY.International Journal of Information Technology Computer Sciences Perspectives,3(1), p.867. Soghoian, C. and Stamm, S., 2012. Certified lies: Detecting and defeating government interception attacks against ssl (short paper). InFinancial Cryptography and Data Security(pp. 250-259). Springer Berlin Heidelberg. Taveau, S.L.J. and Nahari, H., Ebay Inc., 2014.System and method for transaction security enhancement.U.S. Patent 8,914,876. Thorson, E. and Duffy, M. (2012).Advertising age. Mason, OH: South-Western Cengage Learning. Tihanyi, N., Kovcs, A., Vargha, G. and Lnrt, ., 2015. Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. InTechnology and Practice of Passwords(pp. 89-101). Springer International Publishing. Trask, C., Mathiassen, S., Wahlstrm, J., Heiden, M. and Rezagholi, M. (2012). Data collection costs in industrial environments for three occupational posture exposure assessment methods.BMC Med Res Methodol, 12(1), p.89. Turban, E., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2015.E-Commerce Security and Fraud Issues and Protections.InElectronic Commerce(pp. 459-520).Springer International Publishing. Ushakov, D. and Arkhipov, A. (2014). Urban Business Systems' Globalization: Factors, Forms and Economic Impact.Research Journal of Business Management, 8(3), pp.189-202. Vincent, O. and Agbola, O. (2012). A Conceptual Trust Model for Managing E-Commerce Environment.J. Comp. Sci Applic., 19(1). Zafar, H., Ko, M. and Osei-Bryson, K.M., 2012. Financial impact of information security breaches on breached firms and their non-breached competitors.Information Resources Management Journal (IRMJ),25(1), pp.21-37. Zhang, D., Zeng, X. and He, W., 2012. Research on Customer Satisfaction of E-Commerce Website with Uncertain Linguistic Variables.Journal of Convergence Information Technology,7(1). Zhang, Y., Deng, X., Wei, D. and Deng, Y., 2012.Assessment of E-Commerce security using AHP and evidential reasoning.Expert Systems with Applications,39(3), pp.3611-3623. Appendix: Questionnaire Question 1 Gender division of population. Male Female Question 2: Classification of age group Within 25-40years Within 40-50 years Within 50-70 years Question 3: Do you agree with the fact that in E Commerce websites faces different kinds of security issues Strongly Agree Agree Neutral Disagree Strongly Disagree Question 4 Do you think websites like EBay, Snap deal, Amazon developed a strong security system on different kinds of online transaction. Strongly Agree Agree Neutral Disagree Strongly Disagree Question 5: How frequent do you use E commerce websites for purchasing and online shopping? Frequently Often Veryoften Rarely Never Question 6: What challenges do you face while buying products on online with the help of E commerce Sites? Increased Website Traffic Last Minute Promotions Payment System Security Issues Holiday Shipping Demands Question 7: How often do you face problems in e-commerce websites? Frequently Often Veryoften Rarely Never Question 8: Do you believe your e-commerce website is secured enough? Strongly Believe Believe Neutral Doubtful Strongly Doubtful Question 9: What elements do you consider while visiting any e-commerce website? Security Feasibility Sustainability All of the above Question 10: Rate the security system of the modern e-commerce websites? Very Poor Poor Average Good Excellent

Friday, November 29, 2019

Ielts Exam free essay sample

The illustration below shows the process of tying a bow tie. Write a report explaining to a university lecturer how to tie his bow tie. Write at least 150 words. Model Answer The diagram illustrates how to knot a bow tie in eight stages. To begin with, the tie should be placed around the neck, with one end slightly longer than the other. Then place the longer end over the other and pass it upwards and behind the point where the two ends cross. Next, take the other end of the tie and bend it twice to form an ‘S’ shape. Bring the longer end down and in front, so that it holds the ‘S’ curve in place. Now comes the trickiest part of the process. Take the long end of the tie and form a similar ‘S’ shape before passing it through the narrow gap behind the other end. This creates a knot and the bow should now be held securely in place. We will write a custom essay sample on Ielts Exam or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Finally, adjust both sides of the bow to make it symmetrical and prepare to be the envy of your friends. (152 words, IELTS 9. 0) Task 1 Question The diagram below illustrates the carbon cycle in nature. Write a 150-word description of this diagram for a university lecturer. The National Center for Atmospheric Research Model Answer The diagram shows how carbon moves through various stages to form a complete cycle. This report will give a brief description of the main stages in this cycle. First, we can see that energy from the sun is transformed into organic carbon through a process in plants known as photosynthesis. This organic carbon is then transferred underground when plants, and the animals that feed on them, die and decay. Some of this carbon is trapped underground in the form of fossils and fossil fuels. Carbon is also released back into the atmosphere, however, through various means. One is when animals and plants respire, and another is when humans burn fossil fuels in cars and factories. All this carbon enters the atmosphere as CO2. It is then reabsorbed by plants, and the cycle begins again. Overall, we can see that carbon moves in a natural cycle, although human factors may now be affecting the balance. (154 words, IELTS 8. 0) Task 1 Question The diagram shows the skeletal systems of two ancestors of modern human beings. Write a 150-word report for a university lecturer describing the diagram and making comparisons where relevant. Model Answer Variations in the skeletal systems of two early types of human are illustrated in this diagram. Overall, we can see that australopithecus afarensis had a heavier body and much longer arms, while homo erectus was slimmer and had more developed joints. To begin with the upper half of the body, australopithecus afarensis had a much broader chest and waist than homo erectus, giving it a rounder appearance. The former had much longer arms and larger hands, which would have been useful for climbing trees. As for the lower half of the body, we can see that homo erectus had proportionately longer legs and larger hip, knee and ankle joints. The feet of homo erectus were also smaller and more arched, with shorter toes. These differences meant that homo erectus was better suited to long-distance running. In conclusion, we can see significant changes in the development of early humans from the diagram. Homo erectus is more similar to contemporary human beings with its long legs and arched feet. The physical differences are clearly related to differences in the lifestyles of tree climbers and endurance runners. (183 words, IELTS 8. 0) Where do IELTS Academic visitors come  from? The world map above gives a breakdown by country of visits to ielts-academic. com in June 2012. By far the largest group of users comes from South Asia, with 3,124 from India and 1,885 from Pakistan over this one-month period. Next is the  South-East Asian region, with a surprisingly high number of users in Vietnam (1,155) followed by the Philippines (667), Malaysia (317) and Thailand (235). The third-largest region consists of English-speaking destination countries where a lot of IELTS test-takers are already studying. There were 782 visitors from the United Kingdom in June 2012, followed by 622 from Australia and just 429 from the USA, where TOEFL is still the most popular test of English. Perhaps the real surprise is the relatively tiny number of users in China (13), suggesting that authorities there do not want students to benefit from free IELTS advice! Hopefully, this situation is set to change in future. (150 words, IELTS 7. 5)

Monday, November 25, 2019

buy custom Malaria essay

buy custom Malaria essay Malaria is a disease which has existed for more than fifty years. Malaria is believed to have affected people during the ancient world. For example, in 2700 BC, some cases of malaria were reported in China. The Roman Empire was also plagued by malaria. In Rome, it was referred to as the Roman fever. Thus, the term malaria originated from the Medieval Italian word: mala aria meaning bad air(Randall 24). Initially, malaria was pervasive in Europe and some parts of America especially in the north, however, few cases of this disease have been reported at present. Since 1896, scientific research has been conducted to establish the nature of malaria. Although malaria is closely linked with poverty, it also leads to poverty. This is because it hinders economic progress in many countries especially in Africa where it is endemic. At present, tropical regions register the highest percentages of malaria infections, but some temperate regions also experience malaria infections. Poverty serves as both a cause and impact of malaria. This is because poor individuals lack resources to curb and cure malaria. The economy is also affected since many resources are channeled toward dealing with malaria. Demographic transition has also stagnated in places like Africa where malaria has not been properly handled. Besides this, child mortality is relatively high in malaria infested regions. Causes of Malaria Plasmodium parasites are responsible for malaria infections among humans, birds, and animals. In humans, malaria is caused by P. falciparum, P. malariae, P. ovale, P. vivax and P. knowlesi(Zimmerman 45). Nonetheless, malaria infections are primarily caused by P. Vivax. On the other hand, P. falciparum is extremely lethal, and it causes majority of malaria deaths. Humans and some vertebrates act as intermediate hosts of parasites. Anopheles mosquitoes serve as the major hosts, and they also act as key transmission vectors. Female mosquitoes usually transmit the parasites because they feed on blood. Male mosquitoes do not participate in transmission of vectors because they eat plant nectars, and they do not rely on blood meals. Apart from mosquitoes, blood transfusion may also lead to transmission of malaria, but this occurs rarely. Malaria often recurs among patients who have received medication because of the following factors. In some cases, some parasites may not be completely destroyed through treatment. Hence, they can multiply and trigger another infection. This mode of infection is known as recrudescence. Secondly, malaria re-infection often occurs when an individual is exposed to the parasites after treatment. Relapse is the third mode of infection. It is speific to P. vivax and P. ovale and involves re-emergence of blood-stage parasites from latent parasites in the liver(Zimmerman 56). Development of malaria takes place in two phases. The first one is known as exoerythrocytic phase, which is characterized by liver infection. The second level is known as erythrocytic phase, and the parasites infect and damage the red blood cells. After a mosquito bite, the pathogens are transmitted to the liver through the blood stream. Once in the liver, the organisms differentiate to yield thousands of merozoites, which escape into the blood stream and infect the red blood cells, thus beginning the erthrocytic stage of the life cycle(Sutherland 551). After this, an infected individual starts experiencing the symptoms which include the following. Signs and symptoms Symptoms of malaria include fever, shivering, vomiting, anemia, retinal damage and convulsions(Webb 134). An infected individual may experience sweating followed by sudden coldness especially in a case where one is infected by P.vivax. In some cases, an individual may experience abdominal pain. Besides this, victims of malaria infection may also sustain cognitive impairments, and this majorly occurs among children. Retinal whitening is a distinct symptom among individuals having cerebral malaria infections. At an advanced stage, a malaria patient experience a coma, and a patient can easily die due to serious body malfunctioning caused by acute damage of blood cells. Plasmodium falciparum is more dangerous than other malaria parasites because it causes severe malaria that is not easily treated. Diagnosis Blood examination conducted through laboratory procedures is the main way of diagnosing malaria. A part from blood analysis, urine and saliva can also be used as alternative samples for diagnosis of malaria, but they are less invasive specimens. Antigen tests are among the new mechanisms for conducting clinical examination for malaria. In areas where laboratory tests are absent, analysis of the common symptoms such as subjective fever can be used to identify the presence of malaria in a patient. Treatment A malaria patient is able to recover completely if he or she receives proper medication. The manner malaria treatment is administered depends on the severity of the infection. For instance, oral drugs can be applied in treating normal malaria infections. Anti-malarial drugs are mainly used in cases of severe infection. Support measures are also important for seriously infected individuals. Chlroquine and quinine have been commonly used, but moree effective drugs with few side effects have been introduced. Use of prophylactic drugs is seldom practical for full-time residents of malaria-endemic regions(Webb 245). Control Apart from treatment, various mechanisms can be used to reduce the spread of malaria parasites, and they include the following. Malaria can best be dealt with through elimination of mosquitoes. For example, vector control initiatives were successful in the eradication of malaria especially in Europe and America. Draining of wetlands is also important in this process because it reduces the rate of mosquito breeding. Better sanitation and pesticide DDT have also contributed to a significant reduction of mosquito breeding. Before DDT, malaria was successfully eradicated or controlled in several tropical areas by removing or poisoning the breeding grounds of the mosquitoes or the aquatic habitats of the larva stages(Webb 89). Another viable method of curbing malaria that was recently discovered is called sterile insect technique. This involves creating transgenic mosquitoes that are resistant to malaria. This procedure will gradually make mosquitoes less harmful since most of them will no longer participate in vector transmission. Researchers from Arizona University have also made a noble contribution toward malaria elimination by engineering mosquitoes that cannot be affected by malaria. Indoor residual spraying involves the use of insecticides to eliminate mosquitoes which inhabit homes. In this case, interior parts of residential houses can be sprayed with insecticides, and it has been recommended for people living in highly infested areas. Besides this, mosquito nets are also useful in enhancing protection of people from potential malaria infections. People should also be sensitized on how to deal with malaria related challenges. Conclusion The above discussion reveals that malaria has been a challenge to humans for a long time. In this case, many measures have been taken to deal with it. Malaria has been eliminated successfully in some regions, but it has remained endemic especially in the third world. This is because poor countries are still not prepared to eliminate it. Apart from causing many annual death cases, malaria has posed a great challenge on the entire world economy. This is because many resources have been diverted towards dealing with it. Scientist should, therefore, strive to formulate sustainable solutions for malaria. For instance, they can develop better drugs and vaccines to enhance the elimination of malaria. Last but more importantly, everyone should remain committed in the fight against malaria. Buy custom Malaria essay

Friday, November 22, 2019

Ottoman and Safavid Empires Essay Example | Topics and Well Written Essays - 750 words

Ottoman and Safavid Empires - Essay Example Powerbase The solid powerbase is an important factor that legitimized the rule of the Ottoman and Safavid empires. They owed much of their power to the empire created by the Mongols previously as well as the political institutions that allowed for the achievement of the "military patronage state" wherein government functioned like a great military family that serve as protector of the country and its culture. The Ottoman Empire is the greater beneficiary of these Mongol legacies. Nonetheless, what can be seen here is that the prevailing political environment was already stable, systematic and influential. All it took was strong leadership to take advantage of all the policy network available as well as the existence of an effective bureaucracy that has been established long before. This last factor is particularly helpful in the case of weak Sultan who is incapable of protecting his subjects by himself. The bureaucracy assumed great powers and centralized authority that a weak leader could rule just effectively, taking authority and power from the many branches of his government (Karpat 2002, 400) Holy Mandate Another important legitimizing force for the powerbase of the Ottoman and the Safavid empires was religion - the Islamic values and laws. ... The Safavids also benefited from religion in this manner. In fact, Islam is their primary claim to authority. The primary authority of the Safavid rulers was based on the claim that the they were descendants of the seventh imam, and therefore were quasi-divine persons (Lapidus 2002, 445). Unlike the Ottomans, who benefitted in combining religious and secular approach in governance, the Safavids went as far as establishing a religious establishment that eventually used to eliminate opposition to the government and the ruler. For this purpose, Shah Ismail founded Shi'ism built up the ranks of the Shi'i ulama, which ruthlessly suppressed rivals of the state and the religious order. Shah Ismail successfully made his subjects think that he and his heirs, being descendants, of the Seventh Imam, Muza al-Kazim, were his reincarnations on earth (The Empire of the Heartlands reference 64). This cemented the authority of the Shah, becoming the head both of the state and of religion, being the T welfth Imam, in the flesh. In addition, the Safavid rulers also carefully cultivated historic images of previous glorious Persian past such as manuscript illuminations, architecture, and court literature of Iranian kings of kings (Khoury and Kostiner 1990, 36). This recall of past glory and Persian forms of monarchy strengthened the religious authority of the Safavid leaders so that they were able to consolidate power and maintain it without significant opposition from the people. In the 13th century, for example, the leadership encouraged the theory that the Safavid founder Husain married the daughter of Yazdigird III, the last Sassanian king, effectively linking the house of Ali to the Iranian monarchical tradition (Empires of the Heartland reference, 47). The Ottomans also organized

Wednesday, November 20, 2019

Annotation Assignment Example | Topics and Well Written Essays - 500 words

Annotation - Assignment Example An interesting verbatim quote from the article is â€Å"these seemingly innate feelings may help explain how quickly and easy rituals serve that purpose† (Lau 1). The article is very short. Lau merely reflects on the article’s findings and hypothetical framework while failing to explore the ways the researchers came to these conclusions after the research. The article should have discussed the change in theory before the experiment and after making the new findings. Instead, Lau presented an extension of the study’s abstract section, which is very succinct. Despite the shortness, the article covered all crucial aspects of the study. Lau compares the findings of the first study with a previous one concerning the same matter (Lau 1). This comparison brings the article up-to-date and clear. I found the study more interesting than the article itself. The sample used, research design, purpose, and reasoning of the study was compelling. Lau further cites resemblances between customs across traditions like hitting wood and spitting that the study’s researcher noted before the actual study. The article may be used for a piece of writing as a basis for an abstract idea concerning superstition amongst human beings and its role or purpose evolutionarily, socially, or psychologically. This type of support arises from the author’s inclusion of the follow-ups made by the researchers. The author says the relationship between the beliefs surrounding suspicious and random activities such as knocking on wood and tossing tennis balls have â€Å"a common underlying mechanism† (Lau 1). This quote expresses the author’s interest in the topic but insufficient understanding of the study being outlined. the author could have added two more comparisons with recent systematic findings to be thorough about the thesis and hypothetical framework. Instead,

Monday, November 18, 2019

Administration management Essay Example | Topics and Well Written Essays - 500 words

Administration management - Essay Example Furthermore, with the radical shift in consumer needs and changing scenario of the external business environment, organizations are compelled to bring change into their system of operation. The change not only helps a company to remain consistent with the external business environment but also helps in complying with the internal state of affairs. However, a change in an organization does not always bring positive outcome, it often results into negative consequence. One of the most obvious negative consequences appears in the form of resistance from the employees to change. This is because employees often feel that a change in the organization will disrupt their current position and they became obsolete and becomes a burden for the company. This study will throw light on a real incident which took place in the organization where I have worked previously. The organization was basically a retail store with its headquarters in the city of New York, US. In this company, I have worked as a floor manager for two years. During my tenure as a floor manager, I have witnessed one of the major technological changes in the organization, which is the implementation of auto- search technology.

Saturday, November 16, 2019

A Study On Agricultural Biotechnology Education Essay

A Study On Agricultural Biotechnology Education Essay For the past 10,000 years humans associated with domesticate plants, selecting seeds of favoured forms, pick out unwanted types to produce each following generation. Plants constitute the main food resource for humans and animals. So it is necessary to improve crop quality and yield to feed the hunger world. Today this came to a big problem due to environmental damages and population explosion [1]. There has been a drastic increase in population ever since and it is around 6.5 billion in the starting of 2010. Each year millions of people are dying due to starvation and nutritional deficiencies. So many Asian and African countries are not getting the benefits of the green revolution and gene revolution. The polluted agricultural lands and the consequences of global warming affected the agricultural production. The yield lost in each year due to pests, insects and diseases is around 30% of the total production [2, 3]. So biotechnology promises to reduce the world hunger by creating new array of transgenic plants which are resistant to pests and diseases and provide more nutrition [3]. The food and agricultural organization (FAO) recognized that the genetic engineering has the ability to increase the agricultural production. Biotechnology offers a wide range of environmental benefits such as reduce pollution, development of perfect crops which has higher nutrition, reduced or nil pesticides, resistance to insects, more yield etc.[4]. The transformation of agriculture started during the end of first half of twentieth century and it referred as Green revolution. The green revolution started in 1945 during this time Mexico imported wheat. After this Mexican government started working on the agricultural techniques. In 1964 they exported half million tons of wheat, the modern biotechnological techniques made Mexicans foot stable and this is also happened in so many other countries [5]. The green revolution decreased the world poverty in some extent. Now undeveloped countries need more applications of biotechnology, countries like India and China are still researching on new technologies but in the developed European countries are avoiding these techniques and considering as unnatural [3]. During the twentieth century conversional method produced and producing so many hybrids, which can provide more yield, stability of harvesting and farm income. But these conversional techniques dont preserve the gene pool. In the last 20 years biotechnology developed more and discovered new techniques for the stability and production. In animal biotechnology bovine somatatropin (BST) used to increase the milk production. In plant biotechnology so many new techniques arrived [5]. Conversional agricultural techniques are associated with modern genetic engineering. The plant tissue culture is the one of the major contribution of biotechnology in plant breeding. Via tissue culture we will able to produce many copies from a single plant part within a short time. The meristem culture will able to produce virus free plants. The plant tissue culture method helped for the conservation of so many medicinal plants. Another application of tissue culture is the selection of somoclonal variants with improved virus resistance [6]. The new molecular DNA technologies modify plants in different ways. Molecular level studies helped to produce agriculturally important virus resistant and virus free plants [7]. The cloning methods also gave a new phase to biotechnology. The new technologies in cloning help to prevent plant disease by deactivating the gene action. The findings suggest that the genetically modified micro organisms have the capacity to prevent the disease caused by the pathogens [7]. The genetic engineering methods are also employed in various animal species. Now it is possible to create animals with useful dairy product, meet, or fibre production. Most of the animal based experiments are primarily introduced in mouse and drosophila. Now these have been extended to the domestic farm animals. Genetic engineering is mainly used for the manipulation of fertilised egg and utters and manipulation of sperm and embryonic tissue. This facilitates the introduction of novel genes to the animals and provides more yield. Transgenic poultries, pig, sheep and cow are the examples for transgenic animals [8, 9]. The ability to alter the genome of animals by gene transfer is the major achievement of biotechnology. The animals having altered are known as transgenic animals. The transgenic animals are created by the introduction of small piece of known DNA in to the embryos. This will help the rapid introduction of new genes in to the livestock without any cross breeding [8] Transgenic methodology has so many potential advantages. The practical applications in livestocks are improved milk production and composition, increased growth rate. It is important that the production capability of transgenic animals realised only when their true genital potential is attained. The molecular study of Agrobacterium tumefaciens helped to produce transgenic plants. Using this technique many important genes were transferred to plants and it helped to get the high yield [10]. The different tools of genetic engineering made the gene transfer uncomplicated and plant manipulation easier. Gene banks and DNA libraries helped for the conservation and selection of variety of genes which facilitate special characters. Different microbes were used as vectors for the gene transfer [11]. In advanced industrial countries conventional agriculture system is following for the production. This allows the wide knowledge about the production techniques to grow crops, livestock and poultry. This method also helps to reduce the production cost and provide more yield to farmers [12]. There are some environmental problems associated with conventional agriculture method, but now they are trying to solve by using genetic engineering by the development of new methods for the diffusion of disease, insect resistant plants, drought resistant plants etc. And also biotechnology is working on to produce bio pesticides [12]. The environmental problems created by the chemical substance such as pesticides, herbicides, hormones and insecticides which used in the modern farming leads to the new thoughts in the production of bio pesticides and genetically modified plants. But their productions are restricted and under control. According to US food, agriculture and trade act in 1990 it should; (a) satisfy food and fibre needs of humans, (b) enhance the quality of the environment and natural resources depends on the agriculture economy, (c) efficient use of non renewable resource and on farm resource, (d) sustain the economic viability of farm operations and (e) enhance the quality of life for the farmers and the society as a whole [13]. The modern agricultural biotechnology focusing on genetically modified crops. So many researches are currently undergoing based on this. The genetically modified foods are the products of transgenic plants. These plants contains one or more genes from the another organism which is transferred by genetic engineering technologies [14]. According to Huttner et al biotechnology is being used in almost food production system, and it offers more opportunities in agriculture than medicine [4]. Apart from the food production biotechnology has been used to for the plant breeding and disease resistant. Most advanced commercially available plasticised are biotech products. The problem of pesticides is the introduction of super weeds and it will be difficult to control [2]. Genetically modified organisms are also used to control the pest and insects. Introduction of Bt-genes is the one of them and 17% of the total globally planted crops are Bt crops and its amount is very high in US. It is found that about 80% of the biotechnology researches are focused on non food based agricultural products such as cotton, tobacco, ornamental plants and medicinal plants [4]. It is found that use of biotech plants can reduce the plowing for control the weeds and this will lead to reduced use of diesel and decrease the pollution. This is also better for conservation of soil and water; reduce soil erosion and soil composition. The survey shows that the use of biotech crops saved around 441 million gallon of fuel which may result in the elimination of 10 billion pound carbon dioxide and this elimination is equal to removal of four million cars from the road. Thus the biotech crops has significant role in reducing the environmental pollution associated with agriculture production [2]. The genetically modified crops such as corn, soybean, and cotton are used for feeding livestock. The GM crops were introduced 15 years ago. GM crops indicate the genetic modification of plants to make it resistant to biotic stresses provide more yield. The main biotic stresses are pest and pathogens. Each year these factors reduce around 30% of the yield and in developing countries this may be higher due to climatic conditions. Weeds in the field compete with the crops for their nutrition and it will affect the yield. For this reason new GM crops were introduced to resist them. To avoid the insect attack and reduce the chemical insecticides GM technology introduced insect resistant plant. It is also help to reduce the environmental pollution [15]. In 2007- 90% of the agriculture area planted GM crops in six countries of north and south America and it is around 80% is in US, Brazil and Argentina. But in India and china they planted less than 3% only. But in the 27 countries of European Union they planted only 0.21% GM crops [16]. Present agricultural biotechnology status in Asia is amazing. Several Asian countries are currently following the uses of biotechnology in agriculture. The Chinese government gives high priority to biotechnology for improving food production and its quality in environmentally sustainable method. They are adopting the new genetic engineering methods for the crop production. Chinese introduced and planted new verities of wheat, rice, tomato, pepper, potato, papaya and tobacco and these crops are resistant to pest, herbicides and diseases. They approved around 50 verities of GM plants in last years. India government is supporting the development of infrastructures in biotechnology. In 1980 they formed Department of biotechnology to promote the advantages of biotechnology in agriculture and medicine. The RD of India developing a new generation of citrus, coffee, mangrove, and vanilla. The organisations in India such as M S Swaminathan research foundation have developed bio-village for th e growth of new incoming technologies in agriculture [17] The Indonesian government has developed three National biotechnology centers to coordinate R D in agriculture and medicine. In 1985 Pakistan started crop improvement using modern biotechnology. Now they are mainly concentrated on the improvement of rice and cotton. Philippines started the use of modern biotechnology by the creation of national institute of molecular biology and biotechnology. There also an increased use of modern biotechnology started in Thailand, Bangladesh, Singapore, Sri lanka and Vietnam. There are so many international agricultural research centres for the development of the new crops. International agricultural research canter (IARCs), international rice research institute (IRRI) are some of them [17]. Every technology can bring benefits and risks. This is also happened in the case of biotechnology. The risk of agricultural biotechnology got more publicity even biotechnology is also been used as a part of medicine and industry. The introduction of GMO has created a lot of controversy even it is not used for the production wide range of products. Then also the GMO technology is using widely. The argument is mainly focused on the herbicide and insecticide resistant plants which are more beneficial for farmers, seed producers and chemical companies. The insecticide resistant plants guaranteed 100% success, but in case the partial dosage in some insects may results in the formation of new mutants which will able to resist particular dosage. The pollination between the GM crops and wild crops may lead to the arrival of new genera, and wild verities may disappear from the environment. The introduction of antibiotic marker gene may result in the gene transfer. It is also noted that in the meat industry the routine feeding of animals lead to the high levels of antibiotics on them. It is observed that currently the biotechnology applications does not cause any harm to environment. But on the other hand it is worried about the GMO. The increased use of GMO may lead to higher amount of pesticide residues, genetic pollution, damage to beneficial insects, creation of super weeds and super pests, mutant viruses and bacteria [17, 12, 18, 4]. The 21st century being known as the century of biology and biology based industries promises to be powerful tools for the economy. It will become more powerful in industrialised countries and might be challenged by developing countries. Advanced biotechnology will revolutionise the agriculture and food industry. It is expecting that the consequences of genomics in the bio industry will be under control and biotechnology can reduce the world hunger in future. REFERENCES [1] Dominique Job, plant biotechnology in agriculture, Laboratoire mixte CNRS/INRA/Bayer CropScience (UMR 1932), Bayer CropScience, 14-20, rue Pierre-Baizet, 69269, Lyon cedex 9, France [2] www.bio.org, agricultural biotechnology- delivering benefits to farmers consumers and the environment. [3] www.cei.org, agricultural biotechnology [4] Jeremy Hall, Sarah Crowther, Biotechnology: the ultimate cleaner production technology, Science Policy Research Unit, University of Sussex, Falmer, Brighton, BN1 9RF, UK [5] Norman E. Borlaug, the green revolution revisited and the road ahead Nobel peace prize lecture [6] Low cost opening for tissue culture technology in developing countries. Proceedings of a Technical Meeting organized by the Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture [7] Graham S. Warren, Pious Thomas, Maria-Teresa Herrera, S.J. Lindsey Hilland Robert F. Terry .The use of plant cell cultures for studying virus resistance, and enhancing the production of virus-resistant and virus-free plants, 26-30 ,August 1991 [8] http://www.bio.org/foodag/animals/biotechanimalagoverview_ip.pdf [9] http://www.nap.edu/openbook.php?record_id=10418page=34 [10] K.P pauls, plant biotechnology for crop improvement Department of Crop Science, University of Guelph, Guelph, Ontario, Canada, N1G 2JV1 [11] http://www.scitopics.com/Advances_in_plant_genetic_engineering.html [12] Thomas A. Lyson, Advanced agriculture technologies and sustainable agriculture, TRENDS in biotechnology, vol.20, May 2002 [13] Biotechnology Information Center, National Agricultural Library,Beltsville, Maryland USA, http://www.inform.umd.edu/EdRes/Topic/AgrEnv/Biotech/Bibliographies/ sustain.ag [14] http://www.greenpeace.org.uk [15] Environmental impact of genetically modified crops Ferry. N, Gatehouse A.M.R, Newcastle University, UK [16] http://www.foei.org/en/resources/publications/food-sovereignty/2009/gmcrops2009full.pdf [17] Agricultural biotechnology, poverty reduction and food security , Published and printed by the Asian Development Bank ,P.O. Box 789, 0980 Manila, Philippines [18] Christine McCollum, PhD, Charles Benbrook, PhD, Lori Knowles, llb, bcl, ma, llm, Susan Roberts, jd, ms, rd, ld Application of Modern Biotechnology to Food and Agriculture: Food Systems Perspective