Wednesday, December 25, 2019

Clean Water Act Protects Water - 1453 Words

A Priceless Natural Resource- Clean Water Water is necessary to sustain life. Water not only sustains life, but it is the very foundation for life. Where does the water we drink come from? Our water comes from many different sources such as groundwater, lakes, rivers, reservoirs, aquifers, springs and streams. In order for this water to sustain our life, it must be clean. Water is needed to meet the demands of people in their everyday life. This includes the need for water in homes, agriculture, industry, medicine and recreation. For health and prosperity people must have access to clean, safe water. Water is regulated at the federal, state and local level. The Clean Water Act protects water at the federal level. The Environmental Protection Agency regulates the standards for contaminants in water. In order for our water to be clean, we must protect our water sources from pollution and contaminants. This is why we need to care for the water that we have. Humans need water in order to survive. Our bodies are about 60 percent water, the brain is about 70 percent water, and the lungs are made of 90 percent water. Water is more important for you to survive than food is. When you become dehydrated, it reduces the amount of blood flow in your body, and causes your heart to work harder, and pump the blood faster. If you go long enough without water you’ll eventually enter into coma and die. You can also drink too much water. When you drink too much water you canShow MoreRelatedWe Must Protect the Clean Water Act Essay1001 Words   |  5 Pages   Ã‚  Ã‚  Ã‚  Ã‚  The Clean Water Act has made advances to our society that have helped our environment to flourish with life. The objective of the Act when it was enacted in 1972 was to restore and maintain the chemical, physical, and biological integrity of the Nations water. This objective was accompanied by other statutory goals to eliminate the discharge of pollutants into waters used by boats by 1985 and to attain waters deemed â€Å"fishable or swimmable† by 1983. So far, the Act has done exactly whatRead MoreEnvironmental Pollution By Lee And Brenda Lerner1315 Words   |  6 PagesLerner, it is stated that problems range from disposal of wastes, water management, and burning of fossil fuels (Lerner and Lerner 200). Although industrialization is very important in the world, restrictions and laws need to be made to protect Earth for generations to come. One type of pollution is water pollution. Writers Lee Lerner and Brenda Lerner wrote in the article Water Pollution and Biological Purification, that water pollution can be caused by runoffs of chemicals or organic waste.Read MoreThe Conservation And Conservation Of Wetlands Essay1384 Words   |  6 Pagesrecognized as complex, diverse ecosystems whose functions provide an incredible range of beneficial functions and services within the landscape† (BenDor et al. 342). Areas where wetlands were once located were considered wastelands and little was done to protect or preserve these areas. These important ecological areas have been lost in the last two centuries due to industrialization and urbanization. In this paper, I want to explore the threats our wetlands are facing and examine if enough is being doneRead MoreTort and Regulatory Risk Plan1681 Words   |  7 Pagesa problem quickly with minimal damage if something was to occur. A company such as Alumina must always make sure that their products meet all minimum standards and they are documented correctly. For example, Alumina met the Toxic Substance Control Act that showed that they were able to properly remove all existing toxins from the incident 5 years prior (Cheeseman 2010). When an issues arises there is always panic in the company due to the uncertainty of the issue and the repercussions thatRead MoreThe Pollution Of Water Pollution1474 Words   |  6 PagesSea Water Pollution I. Title Water pollution has many different meanings, in most cases it is when one or more material builds up in the water causing a problem for people and/ or animals. Water pollution is one of the world’s largest problems that we are facing today. Everyone in this world is affect by the earth’s water. Some are affected differently than others but we are still affected in one way or another. Water pollution doesn’t only threaten humans; it threatens plants and animals as wellRead MoreThe Special Activities For Forestry Works Towards Supporting Activities1593 Words   |  7 Pagesfirefighting services that provide support from an aircraft and can collect, transport, and dump water/fire suppressants and retardants over the location of a fire. Firefighters also transported through aerial means to help put out fires. An aerial forestry support service provides aerial seeding, cone collecting, application of pesticides and herbicides, and inventories uncut timber. The National Environment Policy Act allowed agencies to publish internal agency explanatory guides for agency procedures andRead MoreThe Devastating Power Of Pollution1196 Words   |  5 PagesDevastating Power of Pollution Think about all the bodies of water on our planet. Every river, lake, stream, and is essential to the way our world functions. Unfortunately, our society has done very little to preserve these water sources and as a result, our rivers, lakes, streams, and oceans are suffering from many forms of pollution. Every oil spill, discarded water bottle, and obstructive dam continually add to our already-polluted waters, and very little is being done to reverse this problem. TheRead MoreDelaware River Pollution And Its Effects1058 Words   |  5 PagesImagine an Earth devoid of clean rivers with no inland marine life or readily available freshwater. This situation may arise if humanity does not volunteer to end its polluting tendencies. Initially, each individual should focus on taking steps towards decontaminating his or her nearest water body. For those living in Delaware, this is the Delaware River, which is in need of drastic reform. â€Å"The Delaware River . . . is the fifth most-po lluted river in the country, according to a report releasedRead MoreBenefits Of Non Biodegradable Materials1336 Words   |  6 Pagesthey can cause contamination to ground water and the oceans. So not only are the actual particles of these non-biodegradable materials being consumed by marine life animals but they are polluting the very water that these animals are swimming in and that humans are drinking on a day to day basis. Some may say well if the ground water is contaminated then I’ll just drink bottled water. However, according to the Water Project’s website, â€Å"bottles used to package water take over 1,000 years to bio-degradeRead MoreWild Fish Conservancy Vs. United States Environmental Protection Agency1142 Words   |  5 Pagesnot liable to general sediment-management standards breaches on the Endangered Species Act and the Clean Water Act. Because the Plaintiff argues that both the Clean Water Act and the Endangered Species Act were violated, there are a couple of Act provisions relevant to the case. Under the Clean Water Act, the EPA is required to review state water quality standards. In regards to the violation of the Clean Water Act, The plaintiff points out that the standards imposed by the 1995 amendments to the regulations

Tuesday, December 17, 2019

Violence And Sex On Television - 898 Words

Violence and Sex on Television: Effects on the Younger Audience In today’s society, the media is used greatly for communication, advertisement, information, and for numerous other reasons. The world has evolved by technological advances as well as by the type of content that is put out on the internet, radio, and especially on television. In particular, violence and sex are two of the most controversial content types that have been recently used loosely in the present as compared to the past years. It has become sort of a norm in our society and in popular culture. It is very debatable topic because of arguments of how it can take a toll or influence on behavior. Not only has this content been used more frequently, it has also become easier for the younger audience to view because of how freely and loosely it is used in regular everyday television. I strongly believe that long term viewing of violence and sex will ultimately effect and even alter behavior of younger audiences . Violence and sex are also very easy for the younger audience to access because of how freely it is used in regular everyday television. According to a fact on Teen Health and Media, on average teenagers spend â€Å"more time in front of the television than any other activity besides sleeping.† The fact is that television is a major part in everyday lives. Since the younger adult watches a great amount of television, it is likely that the way of life shown on shows will translate for them to realShow MoreRelated Sex and Violence on Television Essay2135 Words   |  9 PagesSex and Violence on Television   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Since its inception, television has been the center of controversy. Often it has been viewed as being extremely detrimental to society, and because of this, it is often referred to as the Boob-tube or the Idiot-box. So what makes television so detrimental? - The content (or in the opinion of many) the lack thereof. It is said that television has caused the rotting of our minds, that it depreciates the imagination and contributes to laziness. ButRead MoreDoes Sex and Violence on Television Have a Negative Effect on Children?2395 Words   |  10 PagesDoes sex and violence on television have negative effects on children? The issue that I am addressing is the effect of sex and violence in the media on children. As long as there has been television, there has been an association made between media and violence – children who repeated what they saw on cartoons leading to their death, teenagers injured while emulating a popular movie, and mass killings blamed on video games. Primarily this relationship has been assumed to be causal with televisionRead MoreViolence on Television Can Have Negative Effects on Children1210 Words   |  5 PagesWatching repeated violence on television desensitizes children to violence, and similarly incorrect portrayals of sex on television may contribute to adolescent sex. Violence, and sex on television negatively impacts todays youth, and adolescents. In fact, a main contributor to these negative effects on children are caused by parents. Some parents pay little to no attention to the ratings of television shows, or movies, or the amount of sex, and/or violence their child sees on television. Studies indicateRead MoreViolence in the Media in Richard Rhodes Hollow Claims about Fantasy Violence1289 Words   |  5 Pagesabout Fantasy Violence† expresses that the media’s portrayal of violence has no influence on those that view it. One of the first tactics that Rhodes used was by attacking the flaws of Organizations who blamed entertainment for the issues of violent behaviors. He claims that due to increased social control over the years has caused a decline in violence. Rhodes’ used thought-provoking tactics attempting to disprove that violence is influenced from the media instead he believes that violence is stemmedRead More Sex Violence in the Media Essay1329 Words   |  6 PagesSex Violence in the Media On February 1, 2004, millions of Americans sat down around their television sets with their family and friends to watch the biggest sports event of the year: Super Bowl XXXVIII. Inside the Reliant Stadium of Houston, Texas, the New England Patriots beat the Carolina Panthers 32-29 in one of the closest games in recent history; but this year it wasn’t the football game or even the commercials that had people talking. It was an incident that occurred during the halftimeRead MoreEssay on Ways in Which Television Corrupts American Society1087 Words   |  5 PagesWhen the first television was first successfully shown, people thought that this invention brought people to a new age, and that the television was a huge benefit to humanity. Unfortunately, since then the Golden Era of televisions moral and standards have fallen drastically. We are far away from the days when Lassie and the town of Mayberry ruled the airways and were the talk of America. What was once intended as a bene fit for society has become its detrimental fall, now instead of upholding AmericanRead MoreEssay about Violence on Television1246 Words   |  5 PagesViolence on Television Today’s society is heavily influenced by television. The violence disrupts a child’s learning process and can alter the moral beliefs that an older person has. Children view more violence on Saturday mornings than any other time. The cartoons aimed at little children influence youngsters to mimic violent acts because their parents do not fully explain the effects of the stunts. It is pathetic that in such a technology based society, such a simple thing as television canRead MoreMedia Essay1335 Words   |  6 Pagesï » ¿Samuel OGarro Media and Society Professor Stephanie Morrow Media portrayal of sex and violence between today and my past. Media is a mode of communication which acts to be a link between the people in today’s society. There were many different issues presented between today and earlier days in the case of media portrayal of sex and violence. Today the media represents the stories of sex and violence in every single newspaper, video, radio and channels as opposed to the past, the mediaRead MoreViolence on Television Essay1341 Words   |  6 PagesViolence on Television Most people in our society generally have the opinion that violence on television increases aggression in children and adolescents. Does it ? Who is to say whether television has a positively direct effect or a positive correlation ? However, the majority of the people who have researched this topic have discovered that violence on television is indeed one of the prime factors contributing to the increase in violent and aggressive behavior among the youth in societyRead MoreThe Negative Effects of Television on Children in Society Essay1308 Words   |  6 PagesAn estimated one billion television sets have been sold in North America, and on average, children watch 28 hours per week. The effect of television creates negative development in children. Television is one of the biggest contributions to the growing amount of obese children in North America. The amount of glorified violence in today’s society can be attributed to children watching high rated television shows. Many young children are involved in promiscuous behaviour. This might be a result of

Sunday, December 8, 2019

Managing Consumer Markets for Sustainable - myassignmenthelp

Question: Explain the importance of marketing in a sustainable environment. Answer: At around 5:45 pm, the Populus caf was crowded with lots of people. Having gone to take a cup of coffee the place was really hard to access even a waiter who would just take a single simple order. A hot coffee latte was all I wanted. Regardless of my dire want for a cup of coffee, it took me a whole 30 minutes to be served. Every person who came into the caf must have been here before. The casual and cozy setting of the caf proved it. Almost every customer knew each other an observation I made from their casual greetings. Been a first timer and without company, I had to keenly observe the caf unfolding as I found it a nice place to bring a friend the next time I would be here at the Populus cafe. When it comes to marketing there are the basic marketing principles which are four and work effectively in a Marketing strategy. Marketing is a vital social procedure which comes out from a community to aid the efficient and effective society's resolution demand for a switch of values of consumption. The way to attract many consumers and how to get a product at them is an art which ought to be understood. Every company that is considered great has a strategy of marketing and has to be exceptional (Wood, 2000). There exist lots of marketers and each and every marketer has a specific and unique way to market their products but most professionals when it comes to marketing agree on a couple on marketing principles fundamentals. Marketing has what is called the 7 Ps. Product The product Populus cafe is offering is either tangible that means that the item is physical (coffee) or intangible (service), which attracts a whole variety of customers. Mostly these happen to be on the services. The degree at which a product satisfies the consumers needs and also provides a value lays an examination ground of how the product is to be evaluated (Kotler, 1969). There are expectations from a customer that the product should satisfy. The product should have features and also accessories that should help in the impression of the product. When one is creating a product one needs to consider some factors such as the branding, the name of the product and also the warranty of the period. Price The second principle which is the price is the value or how much in terms of monetary terms the consumers purchase the product at. In this case, how much Populus cafe is selling its coffee and services? The price tag of a product determines how much profit the product owners are going to experience. The demand for a product rises when the prices fall which means that the per unit profit decreases. Pricing has models such as Cost plus pricing which is to your cost of production a specific percentage is added. Also the value based pricing; this is used mainly used on expensive and luxury products. According to the customer's perception of a commodity, the price is set. Efficient pricing escalates the profits in total for an organization by harmonizing the in demand per unit profit. Relatively the price of coffee at populous caf is considerable. Place This is where the distribution channels are considered in the place principle. How the product goes into the existing market and where to sell one's product. If the products cannot reach the consumers then it means they have nothing to buy (Steenkamp, 2000). The channels of distribution are very vital part in production structure, shipping, warehouses and points of sale which make it possible for consumers to find products at retail outlets. Populus caf is located at the heart of offices. Many people who come here are from the offices judging on their official wear. That doesnt mean the doors are closed for any other person. Students come here for class discussions which make Populus caf popular. To make a good accessible and desirable then the channels of distribution have to be efficient, easy and reliable. The distribution chain of command is also important. From the producer to the wholesalers then to retailers and finally to consumers determines how the goods will be effectively distributed. Promotion The communication between the consumers and the product or services providers is a principle of promotion. The way potential customers get the word about the product is important. The best and most relied on the form of promotion is known as advertising. Advertising is utilized well when the media creeps in. Promotion is diverse and it includes anything from media and print advertising to selling directly or customer spreading information to a potential customer (Shostack, 1977). For one to communicate perfectly one has to choose the perfect form of promotion in order to pass the intended information and to the right consumers. With a combination of all the principles then the marketing strategy is said to be effective. People The service is determined by the people. The chefs and the waiters define Populus cafe. Even with the delayed service. The waiters are polite and besides that, they are smartly dressed. Most companies in this era are doing staff training in order to satisfy the customers' needs. In the caf, it looks no different. Process Populus caf being a coffee shop it provides quick services. The reason as they thrive in providing the kind of service is their confidence in delivering the type of services they do offer. The Caf demands the type of service and no service quality is compromised. To reach to the end customer and establish rapport and the service is fast requires proficiency and Populus caf got it all. Physical evidence The ambiance of the Caf is so unique. The combination of the lights and the wall paper is so unique that it gives a whole different experience from any other coffee shop. The setting of caf is casual but so attractive that one longs to be in the caf forever. The comfort ability makes a customer feel at home. The music at the music is amazing. The contemporary music gives the customer the sense of belonging. Identify the differences between service and product marketing There exist a lot of differences and similarities when it comes to services and product marketing. Both the services and products gain from name and trust recognition additions into the materials of marketing. Purchasers get impulse from the products unlike in services delivery which needs time. There exist differences between marketing products and services which mostly are based on the building of relationship (Vargo, 2004). Trust In service based business one trusts themselves to deliver services as described. The ability to trust in one self is outstanding. In marketing, a service one needs to feed in confidence and trust since no one receives anything tangible after exchanging money. The result is service oriented after making promises to customers. Time When one sells a service it means that time is being sold too. On selling a product it means an investment of time has occurred for product acquisition. The process repeatedly occurs without further time investment. On the other hand, services are time investive by nature. There is no time that one can provide a service and not use time. In marketing, time is very important since one has to work on a time frame and one has to deliver the within the agreed time period without failure expectancy from the customers mostly (Mathieu, 2001). Certainty is a must in trust enhancement. Clear and vivid time estimation is required in the production of services with the surety of good services in professionalism. Deliverability It is possible to estimate the time that one would deliver a product ordered through the mail or even a telephone call. The customers can purchase the product immediately in case one is selling from a store. When it comes to services the delivery is made after the ordering process and the delivery times and order times vary. The biggest challenge that comes with marketing the services is convincing the customers that quality results will be presented within a specific period of time. When it comes to the marketing of services the clients often refer to one another and it makes it even harder for service providers to convince the consumers who have had a negative testimonial from another client having undertaken the same service the customer is craving for (Gebauer, 2008). The ability to change the mindset comes in when the service provider assures the consumer of a different strategy which makes the marketing strategy different altogether. Wants and needs A lot of products can be promoted in various methods that can lead to bulk buying. In case one sees attractive products one can instantly buy them without a second thought. Justification might come in that the purchasing of the shoe is to attend an event or something of the sort but in reality, they gave in to the wants. When it comes to service bulk purchasing rarely happens. So what happens is the expert service marketers get out in the field and explain to the consumers how the service is amazing to experience. By way of conviction the experts make the consumers advance into buying the services and in the final end the consumers end up justifying their wants and needs. In short, the procedure in the service industry is long and tedious and in some way expensive since there are experts involvements. Relationships In a service based business customer relationships are vital unlike in the marketing product business (Furrer, 2000). Although in product business activities like branding and name recognition require relationships. In the service industry, for one to continue earning money even in the future one has to build relationships which help to strengthen the service provider-client bond. Explain business and consumer marketing There exist a big difference between the business to a consumer which is the transactions carried out between business and consumers directly and business to business which is generally the transaction of commerce between two businesses (Solomon, 2014). Further differences are that: When it comes to customers most of them want products which are discretionary. The consumers do not necessarily need the product but just want it. On the other hand, businesses are out to buy a solution for a need not just a want. The products purchased are to be used for operations in order to solve problems that occur daily. The number of the target when in regards to consumer market they target a huge number of consumers who are going to buy the products in bulk with in considerable prices in contrast with the business marketing where the market size is small and highly specialized (Ranganathan, 2002). The small size buys the products at very considerable prices. Business marketers target and put all their energy into the targeted business to create a high profile business relationship with a goal of making it work for long while on the customers marketing, a relationship is not highly considerable. They focus on that particular event of a sale and after that; they expect to get n ew customers (Sheth, 2007). When it comes to after sales services in business marketing it happens often since the relationship established is of top notch degree. So it means that constant contact is made to ensure that the products sold are still in order but the main reason is to establish undying links to enhance business in future. Where else in customer marketing after sales services are not considered. The transaction is remote and it is not considered to be that important since there is no reliance that the next time the customer will be back. In cases where consumers buy in bulk after sales services are done to ensure the customer comes back as that specific consumer is beneficial to the business in a huge way (Ford, 2002). Reference Wood, L. (2000): Brands and brand equity: definition and management.Management decision,38(9), 662-669. Kotler, P., Levy, S. J. (1969): Broadening the concept of marketing.The Journal of Marketing, 10-15. Steenkamp, J. B. E., Baumgartner, H. (2000): On the use of structural equation models for marketing modeling.International Journal of Research in Marketing,17(2), 195-202. Shostack, G. L. (1977): Breaking free from product marketing.The Journal of Marketing, 73-80. Vargo, S. L., Lusch, R. F. (2004): The four service marketing myths: remnants of a goods-based, manufacturing model.Journal of service research,6(4), 324-335. Mathieu, V. (2001): Product services: from a service supporting the product to a service supporting the client.Journal of Business Industrial Marketing,16(1), 39-61. Gebauer, H. (2008): Identifying service strategies in product manufacturing companies by exploring environmentstrategy configurations.Industrial marketing management,37(3), 278-291. Furrer, O., Liu, B. S. C., Sudharshan, D. (2000): The relationships between culture and service quality perceptions: Basis for cross-cultural market segmentation and resource allocation.Journal of service research,2(4), 355-371. Ranganathan, C., Ganapathy, S. (2002): Key dimensions of business-to-consumer web sites.Information Management,39(6), 457-465. Solomon, M. R. (2014): Consumer Behavior: Buying, having, and being(Vol. 10). Upper Saddle River, NJ: Prentice Hall. Sheth, J. N., Uslay, C. (2007): Implications of the revised definition of marketing: from exchange to value creation.Journal of Public Policy Marketing,26(2), 302-307. Ford, D. (Ed.). (2002): Understanding business marketing and purchasing: an interaction approach. Cengage Learning EMEA.

Sunday, December 1, 2019

The Regina Knight Case Essay Example

The Regina Knight Case Paper The legal citation of the case. Regina v [2001] NSWSC 1011 (8 november 2001) The elements of the offence. In order for a trial to be brought, the police and prosecutors might be able to prove that the elements of the particular offence are present. In this criminal case both Actus reus, Mens rea as well causation was clearly shown through the behavior of Katherine Knight. Actus reus is the term referring to ‘guilty act’ meaning any voluntary actions of omissions that constitutes to a crime, it is the physical element of an offence Her Actus reus is shown through her act of stabbing him 37 times and killing him. She also chopped off his head and cooked it with vegetables and skinned majority of his body. It is certain to say her act was intentional, malicious and evil. Mens rea refers to ‘guilty mind’ and is defined as the state of mind requiring constituting a particular crime which is the mental element of an offence. It is clear that the murder was pre-meditated. Her mens rea is shown more clearly by the comments made by the prisoner to other persons indicating intention, comments made by Mr. rice to others which indicated his fears for his life, comments of a similar kind made by the prisoner to Mr Price in the presence of others and the conduct of the prisoner in the days leading up to the murder. She threatened Mr. Price and said â€Å"You’ll never get me out of this house. I am going to kill pricey and I am going to get away with it, I’ll get away with it cause I’ll make out, I’m mad. The causation of the incidence was clear. She wanted to kil l him and she performed actus reus and his life ended on her hands. We will write a custom essay sample on The Regina Knight Case specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Regina Knight Case specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Regina Knight Case specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Factors that might have led to the criminal behavior. There are a few factors that may account to the behavior of Knight. It includes psychological factors, social factors, and self interest. Knight is said to have been diagnosed with the borderline personality disorder and to have suffered from a post traumatic stress disorder. Her borderline personality disorder may have contributed to the crime but is said by doctor Delaforce and lambeth that the murder was pre-meditated and her behavior highlights the malign nature of the prisoner. Dr. Delaforce also took into account that the prisoner enjoyed watching gruesome and disturbing videos entitled such as â€Å"Resurrection†. His Honour reflects â€Å"That video gave to the actions by the prisoner in relation to Mr. Price’s body a sense of â€Å"copy cat. Knight had almost performed the exact same task and scene of murder to Mr Price compared to the murder in â€Å"Resurrection†. Although nothing is 100% proven, she has said that she had been physically abused by two of her brothers when she was young and that on one occasion her father engaged in activity suggestive of some sexual connection with her. She has been in two de facto relationships and she claims that she has been sexually abused by David Kellet who was also unfaithful to her, which she results to have had a nervous breakdown. Knight says Mr. Saunders has also treated her very badly and was violent to her. Both of them explain that what she said about the sexually or physically abusing is not true and indeed that â€Å"they were the ones being assaulted by her†. Her self interest of revenge is the most major role affecting her to commit criminal behavior, her strong idea of revenge which leads to satisfaction. It is her nature to maliciously revenge anyone who crosses her and she believes that, that is what they deserve. The problem is not that she did not know it was wrong to do such thing, but that she did not care about doing them†¦Ã¢â‚¬  The interview by Dr. Lambeth came to a similar conclusion of the prisoner’s interest and enjoyment in violence. Reporting and investigation of the crime. Citizens must play a major role in the criminal justice system by reporting crime. In the morning of Mr. prices death, around the 1st of March 2001, Police were called by next door neighbor Mr who was suspicious of Mr. Price as Mr. Price mentioned earlier to him Knight may kill him anytime soon. By reporting the police, action was able to be taken much faster by professional police and there was less time to get rid of evidence of killing for Knight. Police had found Mr. Price’s body to have been stabbed at least 37 times in various parts of his body back and front. His blood was found splattered and smeared throughout various parts of the house and in a pool. The police found the blood not fully congealed and had only dried at edges, of the 1st of March in 2000. An examination of the blood stains, their differing characteristics and pattern of occurrence in various parts of the house, establish that Mr. Price was first attacked by the prisoner in the principal bedroom of the premises at a time when he was in a recumbent posture. His body was found perfectly skinned his body and his head chopped off and boiled with vegetables. The way he was skinned was done professional and neatly and is required by a very skilled person with knife to be able to do so. Mary who has been working as a meat slicer in abattoirs for years is obviously a huge suspect. However Knight claims that she has no idea or recollection of Mr. Price’s death. She claims that she cannot recall anything and do not know about anything. The prisoner claims not to remember anything of the aftermath of killing. However so much evidence reveals that the murderer is Knight. The fact that the slicing of his body required a professional experienced person with the knife and the tremendous threats about the fact she was going to kill Mr. Price to Mr. Price and many others. The Plea Knight was arraigned on 2 February, 2001 on a charge of having murdered John Charles Thomas. She pleaded not guilty. The trial was initially fixed for 23 July, 2001 but was adjourned due to the illness of her counsel. She maintained her plea of not guilty and the trial was re-fixed for 15 October, 2001. After a medical assessment the prisoner was officially charged with the murder on 18 October 2001 and pleaded guilty to the charge. The court accepted her plea of guilty her conviction of murder was recorded. Factors affecting the sentence decision. The three factors that affect sentencing decision in this criminal case include aggravating, mitigating and subjective factors. Katherine Mary Knight has committed a murder which falls into the most serious category of murder and it is proven beyond reasonable doubt that the murder was premeditated. She used a sharp butcher knife to murder and stabbed him at least 37 times as well as perfectly skinning his whole body. Sometime before she murdered him she made numerous threats to him about his death. After she had murdered him, she stated that she had no recollection of the murder what so ever to the police. She tried to escape her position of crime by trying to blame everything on her mental personality disorder. She not only planned the murder but actually enjoyed the horrific acts which led to death and defilement. After the death of Mr. Price, she indicated cognition, volition, calm and skill and showed no remorse or guilt at all. There were four matters going on the mitigation of the penalty was the fact that the prisoner pleaded guilty to the charge of murder, the borderline personality disorder diagnosed in the prisoner, the absence of any prior relevant criminal record on the part of the prisoner and that the quality of mercy would not be strained were a finite sentence to be imposed on the prisoner. Although the prisoner claims to have no recollection of many events to the death of Mr Price, the horrific murder was premeditated. Even though she claims to have no recollection, her attempts to prove mitigation is regarded as nothing more than trying to block out the gruesome events caused by her. It is said by Dr. Delaforce that â€Å"she knew the nature and quality of the acts†¦was aware at that time that those acts were wrong. † Her actions were a sense of ‘pay back’ and she tried to make herself look mad. However Dr. Delaforce explained that the way she committed the murder showed the immorality of her actions which does not necessarily mean madness. The extent to which the law balances the right of victim and offender. The extent to the law which balances the rights of Knight and Mr Price seems to reasonably just. Knight committed a crime that is Knight’s life imprisonment seems pretty reasonable as she will be a significant threat to the community if she is set free and for her gruesome act of murder towards Mr Price. Knight had the right to put in an appeal, have strong qualified lawyers and to have a say. Although Knight is punished to life imprisonment, the tragedy of Mr Price and his family is not just. Mr. Price attended a chamber Magistrate at Scone Court House on 29, February 2000 and seeked an apprehended violence order and informed the chamber magistrate that he wanted to end his relationship with her to prevent her entering his life. The only problem is that he did not report it earlier and shortly after this visit, he died. Knight had the right to apply for an appeal, and although her appeal was through it was not seem reasonable and was rejected. The law succeeded in balancing the rights as it took under consideration the impact the situation had on the victim’s family. In order to be just it referred to previous cases such as (Regina v Previtera (1997) A Crime R 76; Bollen v Regina (1998) 99 A Crim R 510) and judging by precedent the penalty Judge O’Keefe J sentenced Knight was suitable. Despite the prisoner’s attempt of appeal later on, the dismissal of her appeal was also appropriate. The penalty given. The final penalty given to Katherine Mary knight is life imprisonment. Her murder fits in the most serious category of crime. The culpability of her truly requires a life sentence. A court is to impose a sentence of imprisonment for life on a person who is convicted of murder, if the court is satisfied that the level of culpability in the commission of the offence is so extreme that the community interest in retribution, punishment, community protection and deterrence can only be met through the imposition of that sentence. She also will be harmful if let out in the community, considering there is no possible alternative, no other penalty than imprisonment is appropriate. Katherine Mary Knight is sentenced for life imprisonment. Bibliography http://www. trutv. com/library/crime/notorious_murders/women/katherine_knight/4. html By Paul B. Kidd Copyright 2003, Paul B. Kidd Publications. All Rights Reserved http://www. philosophyblog. com. au/about-skinning-your-husband-and-cooking-his-head-katherine-knight-and-john-price/ November 19th 2006 03:52 ttp://www. australian-news. com. au/female_killers/Katherine_Knight. htm Copyright (c) 1998-2007 Australian News Commentary all rights reserved Anna Marshall 3 July 2006 Case: Regina v ? Knight ? [2001] NSWCS 1011 (8 November 2001) Last updated: 29 January Judgment date: 08/11/2001 Judgment of: OKeefe J Decision: Imprisonment for life. Case: ? Knight? V R [2006] NSWCCA 292 (11 September 2006) Last updated: 13/09/2006 Judgment date: 11/09/2006 Judgment of: McClell an CJ at CL Adams J Latham J Decision: Appeal Dismissed

Tuesday, November 26, 2019

Carbohydrate-electrolyte sports drinks- do they enhance athletic performance The WritePass Journal

Carbohydrate-electrolyte sports drinks- do they enhance athletic performance Introduction Carbohydrate-electrolyte sports drinks- do they enhance athletic performance Introduction  Aim of Sports Drinks  Types of Sports DrinksStudies on Carbohydrate-Electrolyte Sports DrinkConclusionReferences:Related Introduction All athletes, whether it be trained or untrained, should ingest fluids before, during and after training or competition in order to achieve optimal euhydration. Fluids are required to prevent dehydration (loss of 2% body weight) and excessive electrolyte loss which leads to impaired exercise performance, fatigue and physiologic function, with 3% dehydration increasing the risk of developing an exertional heat illness (e.g. heat cramps, exhaustion or heat stroke (Casa, 2000). Fluids also provide a carbohydrate source to prevent the depletion of the body’s stores (Maughan 1994) – thus the composition of fluids is crucial. The amount and rate of fluid replacement will depend on a variety of factors – individual athlete’s sweat rate; exercise duration; exercise intensity; environmental factors; acclimatization state and the sport dynamics for example opportunities to drink and access to fluids (Casa, 2000). The absorption of fluid into the body depends on the speed at which it is emptied from the stomach and the rate at which it is absorbed through the walls of the small intestine. The higher the level of fluid in the stomach, the more gastric emptying is encouraged.   Aim of Sports Drinks Sports drinks aim to provide a number of different functions including provision of substrate, prevention of dehydration, electrolyte replacement, pre-exercise hydration and post-exercise rehydration (Maughan, 1998). The functional characteristics of a sports drink can be manipulated by altering the different variables which include carbohydrate content: concentration and type; osmolality; electrolyte composition and concentration; flavouring components; and other active ingredients (Maughan, 1998). Composition of Sports Drinks The major components of sports drinks are carbohydrates and electrolytes. Evidence suggests that the only electrolyte that should be added to sports drinks is sodium (Maughan, 1994). Sodium does not have a direct impact on physical performance but has a number of essential functions including maintaining plasma osmolality (Below et al, 1995), encouraging voluntary fluid intake (Passe, 2001) and reducing urine output (Vrijens Rehrer, 1999). Present in small amounts, sodium helps to quicken the rate of gastric emptying and increases the rate of fluid absorption into the intestine. Sodium concentration in sweat and plasma are 10.0-70.0mEq/l and 135.0-148.0mEq/l respectively (Latzka Montain, 1999, Costill, 1984). Athletes have a sweat rate of around 1litre/hour during exercise which increases in higher temperatures (Brouns F Kovacs E). It is important to remember that sweat rates and sweat electrolyte content vary between each individual athlete (Sawka, 2007). Carbohydrates are the ma in energy source during exercise and are stored as glucose in the liver and muscles. Consuming sports drinks containing a carbohydrate source helps to maintain the body’s glycogen stores and prevent glucose levels from falling too low. However, high concentrations of carbohydrate in the drink slow the rate of gastric emptying (Merson el al, 2002).   Types of Sports Drinks There are three types of sports drinks, all of which contain various levels of fluid, carbohydrates and electrolytes (usually 10-25mmol/l of Sodium) – (i) Isotonic drinks contain fluid, electrolytes and 6 to 8% of a carbohydrate source. These empty from the stomach at a rate similar to water and quickly replace fluids lost by sweating and supply a boost of carbohydrate. Isotonic drinks are the drink of choice for most athletes for example in middle and long distance running and team sports. In the Position Stand by the American College of Sports Medicine Position 2007, isotonic drinks are recommended for events lasting longer than one hour .(ii) Hypotonic drinks contain fluid, electrolytes and a low level of carbohydrate and quickly replace fluids lost by sweating. This is suitable for athletes who need fluid without the boost of carbohydrate e.g. jockeys and gymnasts. A study by Bonneti and Hopkins 2010, found that the ingestion of a hypotonic drink enhanced performance simil ar to that of an isotonic drink, suggesting that hypotonic drinks may be the preferred option for endurance performance of longer than an hour. More evidence is needed to prove this, but it seems that water is absorbed into the intestine more rapidly when using a hypotonic drink over an isotonic drink ( Bonneti Hopkins 2010) (iii) Hypertonic drinks contain fluid and high levels of carbohydrate. They are used to supplement daily carbohydrate intake to meet energy demands, particularly in ultra distance events were high levels of energy are required. They need to be used in conjunction with isotonic drinks to replace fluids. Studies on Carbohydrate-Electrolyte Sports Drink In an area of on-going research, many studies have been conducted with carbohydrate-electrolyte sports drinks and their effects on performance. Table 1 summarises the effect of these drinks when compared with placebos. Studies lasting longer than one hour, with the addition of carbohydrate to the drink, have shown to increase performance (Coyle, 2004). Events lasting less than one hour have shown to have no need for carbohydrate electrolyte sports drinks (Bonen et al 1981, Powers et al 1990).   However, a study by Murray et al 1989, found that drinks containing 8-10% carbohydrate delayed fluid absorption and gastric emptying whilst drinks containing 6% carbohydrate solution enhanced exercise performance after 1 hour.   When comparing a 15% carbohydrate-electrolyte solution to a 2% carbohydrate-electrolyte solution in a hot climate, it is in fact the 2% solution that increased performance and prevented fatigue (Galloway Maughan). There has been numerous studies conducted with hig h carbohydrate content solutions (above 10 %,) but this amount of carbohydrate content should ideally be used in carbohydrate loading only and not when looking to increase performance. Conclusion There is clear evidence that drinks, containing an energy source in the form of a carbohydrate and an electrolyte, have beneficial effects for athletes and improve performance (Convertino et al, 1996; Casa 2000) provided exercise duration is long enough to allow empting of the drink from the stomach followed by absorption into the intestine (Shirreffs, 2003).   It is important to remember, that every individual is different, and what suits one person in a given situation may not suit another, therefore customized fluid replacement programmes are advised (Maughan 1993). References: Below PR, Mora-Rodriguez R, Gonzalez-Alonso J Coyle EF (1995) Fluid and carbohydrate ingestion independently improve performance during 1 h of intense exercise. Medicine and Science in Sports and Exercise 27, 200–210. Bonen A, Malcolm SA, Kilgour RD, MacIntyre KP Belcastro AN (1981) Glucose ingestion before and during intense exercise. Journal of Applied Physiology 50, 766-71. Bonetti DL Hopkins WG (2010) Effect of Hypotonic and Isotonic Sports Drinks on Endurance Performance and Physiology. Sportscience 14, 63-70. Brouns F Kovacs E (1997) Functional drinks for athletes. Trends in Food Science Technology 8, 414-420. Cade R, Spooner G, Schlein CA, Pickering M Dean R (1988) Effect of fluid, electrolyte, and glucose replacement during exercise on performance, body temperature, rate of sweat loss, and compositional changes of extracellular fluid. Journal of Sports Medicine 12, 150-6. Casa DJ (2000) National athletic trainer’s association position statement: fluid replacement for athletes. Journal of Athletic Training 35, 212-224. Converertino V, Armstrong L, Coyle E, Mack G, Sawka M, Senay L Sherman W (1996) American college of sports medicine position stand: exercise and fluid replacement. Medicine and Science in Sports and Exercise 28, I-vii. Costill DL (1984) Sweating: its composition ad effects on body fluids. Annals of the New York Academy of Science 301, 160-174. Coyle EF (2004) Fluid and Fuel Intake during exercise. Journal of Sports Science 22, 39-55. Davis JM, Lamb DR, Pate RR, Slentz CA, Burgess WA Bartoli WP (1988) Carbohydrate-electrolyte drinks: effects on endurance cycling in the heat. American Journal of Clinical Nutrition 48, 1023-30. Galloway SDR Maughan The effects of substrate and fluid provision on ermoregulatory and metabolic responses to prolonged exercise in a hot environment. Journal of Sports Science 18, 339-351. Latzka WA Montain SJ (1999) Water and electrolyte requirements for exercise. Clinics in sports medicine 18, 513-524. Maughan RJ (1993) Fluid replacement in sport and exercise – a consensus statement. British Journal of Sports Medicine 27, 34. Maughan RJ (1994) Fluid and electrolyte loss and replacement in exercise. In Oxford Textbook of Sports Medicine, pp82-93 [M Harries, C Williams, WD stanish LL Micheli editors]. Oxford: Oxford university press. Maughan RJ (1998) The sports drink as a functional food: formulations for successful performance. Proceedings of the Nutrition Society 57, 15-23 Merson SJ, Shirreffs SM, Leiper JB, Maughan RJ (2002) Changes in blood, plasma and red cell volume after ingestion of hypotonic and hypertonic solutions. Proceedings of the Nutrition Society. Millard-Stafford M, Rosskopf   LB, Snow TK Hinson BT (1997)Water versus carbohydrate-electrolyte   ingestion before and during a 15-km run in the heat. International Journal of Sports Nutrition 7, 26-38. Murray R, Seifert JG, Eddy DE, Paul GL Halaby GA (1989) Carbohydrate feeding and exercise: effect of beverage carbohydrate content. European Journal of Applied Physiology 59, 152. Passe DH (2001) Physiological and psychological determinants of fluid intake. In Sports Drinks: Basic Science and Practical Aspects, pp45–87 [RJ Maughan, R Murray editors]. Boca Raton, Florida: CRC Press. Powers SK, Lawler J, Dodd S, Tulley R, Landry G Wheeler K (1990) Fluid replacement drinks during high intensity exercise: effects on minimising exercise-induced disturbances. European Journal of Applied Physiology 60, 54-60 Sawka MN (2007) Position Stand: Exercise and Fluid replacement. American College of Sports Medicine, 377- 390. Shirreffs SM (2003) The Optimal Sports Drink. Schweizerische Zeitschrift fur Sportmedizin und Sporttraumatologie 51, 25-29. Tsintzas K, Liu R, Williams C (1993) The effect of carbohydrate ingestion on performance during a 30-km race. International Journal of Sports Medicine 3 127-39. Vrijens DM, Rehrer NJ (1999) Sodium-free fluid ingestion decreases plasma sodium during exercise in the heat. Journal Applied Physiology 86,   1847–1851.

Friday, November 22, 2019

5 Cases for Requiring a Comma Before a Sentence Tag

5 Cases for Requiring a Comma Before a Sentence Tag 5 Cases for Requiring a Comma Before a Sentence Tag 5 Cases for Requiring a Comma Before a Sentence Tag By Mark Nichol A sentence tag is a word or phrase added to the beginning or end of a statement for emphasis or to provide more information. For the following sentences, I discuss the necessity of preceding end-of-sentence tags with a comma. 1. â€Å"I shouldn’t have been surprised really.† Without a comma separating really from the rest of the sentence, the implication is that really is an adverb modifying how the writer should not have been surprised (really, as in factually, and the opposite of allegedly). However, its function is merely to emphasize the point: â€Å"I shouldn’t have been surprised, really.† 2. â€Å"I was in the other room at the time actually.† This sentence indicates that the writer was in the other room in an actual manner, rather than figuratively, but that’s not the literal meaning. The writer has been challenged about his or her location when an incident occurred, and the intent, again, is to emphasize. A comma is required before actually to signal this distinction: â€Å"I was in the other room at the time, actually.† The idea could also be conveyed with actually inserted elsewhere in the sentence (in descending order of elegance): â€Å"Actually, I was in the other room at the time† or â€Å"I was, actually, in the other room at the time† or â€Å"I was in the other room, actually, at the time.† (Note that not all adverbial tags are so flexible about location; try these variations in the first example, and you’ll see that really seems to feel right only as a concluding tag.) 3. â€Å"We did it all right.† This sentence implies that the writer is evaluating a merely competent performance. With a comma inserted before â€Å"all right,† the implication is of emphasis on the fact of the accomplishment: â€Å"We did it, all right.† 4. â€Å"They offered a free pass to boot.† Without a comma preceding â€Å"to boot† (which means â€Å"as a bonus†), the phrase appears to describe an action that is, thanks to the pass, complimentary. The comma signals that â€Å"to boot† is an appendage that idiomatically offers additional information: â€Å"They offered a free pass, to boot.† 5. â€Å"Geology has an impact on biology and vice versa.† As written, this sentence seems to equate biology and vice versa as two things geology has an impact on. But â€Å"vice versa,† meaning â€Å"the opposite,† applies to the entire sentence preceding it, so it must be set off from the sentence: â€Å"Geology has an impact on biology, and vice versa.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:30 Synonyms for â€Å"Meeting†Ã¢â‚¬Å"As Well As† Does Not Mean â€Å"And†Supervise vs. Monitor

5 Cases for Requiring a Comma Before a Sentence Tag

5 Cases for Requiring a Comma Before a Sentence Tag 5 Cases for Requiring a Comma Before a Sentence Tag 5 Cases for Requiring a Comma Before a Sentence Tag By Mark Nichol A sentence tag is a word or phrase added to the beginning or end of a statement for emphasis or to provide more information. For the following sentences, I discuss the necessity of preceding end-of-sentence tags with a comma. 1. â€Å"I shouldn’t have been surprised really.† Without a comma separating really from the rest of the sentence, the implication is that really is an adverb modifying how the writer should not have been surprised (really, as in factually, and the opposite of allegedly). However, its function is merely to emphasize the point: â€Å"I shouldn’t have been surprised, really.† 2. â€Å"I was in the other room at the time actually.† This sentence indicates that the writer was in the other room in an actual manner, rather than figuratively, but that’s not the literal meaning. The writer has been challenged about his or her location when an incident occurred, and the intent, again, is to emphasize. A comma is required before actually to signal this distinction: â€Å"I was in the other room at the time, actually.† The idea could also be conveyed with actually inserted elsewhere in the sentence (in descending order of elegance): â€Å"Actually, I was in the other room at the time† or â€Å"I was, actually, in the other room at the time† or â€Å"I was in the other room, actually, at the time.† (Note that not all adverbial tags are so flexible about location; try these variations in the first example, and you’ll see that really seems to feel right only as a concluding tag.) 3. â€Å"We did it all right.† This sentence implies that the writer is evaluating a merely competent performance. With a comma inserted before â€Å"all right,† the implication is of emphasis on the fact of the accomplishment: â€Å"We did it, all right.† 4. â€Å"They offered a free pass to boot.† Without a comma preceding â€Å"to boot† (which means â€Å"as a bonus†), the phrase appears to describe an action that is, thanks to the pass, complimentary. The comma signals that â€Å"to boot† is an appendage that idiomatically offers additional information: â€Å"They offered a free pass, to boot.† 5. â€Å"Geology has an impact on biology and vice versa.† As written, this sentence seems to equate biology and vice versa as two things geology has an impact on. But â€Å"vice versa,† meaning â€Å"the opposite,† applies to the entire sentence preceding it, so it must be set off from the sentence: â€Å"Geology has an impact on biology, and vice versa.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:30 Synonyms for â€Å"Meeting†Ã¢â‚¬Å"As Well As† Does Not Mean â€Å"And†Supervise vs. Monitor

Thursday, November 21, 2019

Michael Jackson concert review Essay Example | Topics and Well Written Essays - 1000 words

Michael Jackson concert review - Essay Example Even before the actual performance began, and just the name of Michael Jackson passed across the projector screen, the crowd was already cheering on and celebrating. It is important to note and mention that their ecstasy and joy was excusable because in 1987, no other person in the world had reached the legendary status and position of Michael Jackson in entertainment (OConnor et al 843). The stage arrangement and background details or props were accurate to convey the mood of that particular point in time. The lighting was proper, because the flash lights coincided with the drops of the breakdance put forth by Michael Jackson and his band of performers. In all aspects and fairness, it is safe to assert that the venue was too small for the legendary stature of Michael Jackson. Preferably a soccer stadium could have served well since the status of Michael Jackson was too legendary to be confined to the auditorium. In a way, the band sounded too loud for the venue because the venue was small and stuffed by fans and revelers. Therefore a bigger venue such as a stadium would have allowed the band as a whole to sing and perform by feeding off their musical energy to the revelers and fans. In terms of the set list or the play list, it is proper to mention that it was accurately on point. The songs were arranged in order of their popularity and likeness. The show starter however was a popular song so as to get the audience and the revelers to the performances’’ mood and tune. The performance and show was began by â€Å"Wanna be Starting Something†- which is a blazer and a crowd puller. The first song got the mood of the night and the performance by exciting the audience and the revelers. The preceding songs grew to more energetic and involving songs that the audience could sing along to with ease. My favorite song for the performance stands out to be

Tuesday, November 19, 2019

Increase Safety in Retail Parking Lots Essay Example | Topics and Well Written Essays - 1000 words

Increase Safety in Retail Parking Lots - Essay Example Retail parking lots are a common place to be attacked by criminal because most customers are holding a lot of cash for shopping. The muggers see these shoppers as easy targets (Sennewald & Christman 2008). As a matter of fact, statistics show that police have reported to a high number of theft incidences from large retail companies. The company is obligated to return the favor of ensuring safety. Moreover, securing the parking lots next to our retail businesses would also increase our customer base since people love to shop in a place where they feel that they are secure and do not run the risk of being mugged. The main aim that the store is concerned about the customer being save in the [parking lot is to have a clear conscience. This is because if anything happens to the customers when they are within out parking lots, they we are guilty if we failed to do something that could have kept them save. Moreover, since we also work at the store, we also run the risk of being mugged or kidnapped. In order to have a clear conscience and also feel comfortable working at the store, it is our job to put all measures in place to ensure that our parking lot is safe (Vellani 2007). Although it is not possible for the company to prevent any misfortunes from befalling its customers, it is possible to take the necessary precautions for minimizing the chances of this happening by making sure that they are safe inside and outside the store. Keeping the client safe within and outside the stores is the right thing that any company can do. Most of our stores are found in unsecure neighborhood. This does not h owever mean that the customers need to feel insecure. Parking lots are the most areas prone to being attacked by mugger because they are usually deserted and the presence of many cars provides a perfect hide out for criminals. This implies that if the security within the retail stores were beefed up, then the insecurity in the

Sunday, November 17, 2019

Ecommerce in Bangladesh Essay Example for Free

Ecommerce in Bangladesh Essay 1. Introduction When Electronic commerce, commonly known as ecommerce, is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the at least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of ebusiness [1]. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions The main areas of e-commerce are following: i. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B) 2. Objectives Our objectives are following: i. To define e-commerce and describe how it differs from ebusiness. ii. To identify and describe the unique features of ecommerce technology and discuss their business significance. iii. To describe the major types of e-commerce. iv. To discuss the origins and growth of e-commerce. v. To explain the evolution of e-commerce from its early years to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contributing to e-commerce and understand design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. Volume 2 Issue 2, February 2013 www.ijsr.net 150 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited application and use of B2C e-commerce .This field is not yet much developed in Bangladesh. There are many reasons behind it one simple reason this country is not so developed and most of its citizens are poor and uneducated. It is quit natural that there are few customers who is willing and can shop in internet. It will take years to be developed this sector in bd. The telecommunication infrastructure any country affect the Internet services directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, different sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as: low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically t he Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they can compare prices across regions, find out whether prices vary by order fragmentation, get awareness about substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth. With the rising forces of globalization, it is becoming increasingly important that the private sector, particularly the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for Bangladeshi export sectors –one, whether businesses are automating their internal processes with these of ICTs to become increasingly efficient and competitive in a global context, and two, whether businesses have effective presence and participation in the cyber world. International organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) [2] have, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also develo ped rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online cards, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. Figure 1 depicts the three dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent within Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists [3]. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the country’s exports. A significant volume of B2G is also possible, as the government remains the biggest spender. Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. Figure 2. E-commerce growth in Bangladesh 4. Methodologies The methodologies of our survey are given below: 4.1 Identification of scope of study 151 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shopping cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, t he product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth based on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and code review of e-commerce site We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, server technology (hardware and software). We also reviewed credit card transaction and shopping cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, acco unt, shopping cart, and product list and checkout option. Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity–relationship diagram using Chens notation is shown in Figure 4. 5. Technical Design of E-Commerce Site The technical design of e-commerce site include database structure, database schema, table structure, php session, shopping cart, e-r diagram, and credit card transaction. Figure 4. A sample entity–relationship diagram using Chens notation In software engineering, an entity–relationship model (ER model for short) is an abstract [4] and conceptual representation of data. Entity–relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often 152 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entity– relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization. Developing an enterprise-wide conceptual ER model is useful to support documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more logical data models. The purpose of the conceptual ER model is then to establish structural metadata commonality for the master data entities between the set of logical ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data m odel integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a single disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined [5]. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is however developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structur al metadata into a database management system as relational database objects such as database tables, database indexes such as unique key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model; this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks: Entities, Relationships, and Attributes The building blocks: entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key. Figure 5. The building blocks: entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entiti es can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: owns relationship between a company and a computer, supervises relationship between an employee and a department [6], performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized in Volume 2 Issue 2, February 2013 www.ijsr.net 153 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entity–relationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entity–relationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her l unch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise; naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it b ecame fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can readily be represented in a relational database. They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an approach supported by the original author; an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file databases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations; although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154 correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation: ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre-existing information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie [7] and Liu could not find a single instance of entity–relationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this lack of use on the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entity–relationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All constraints are expressible in the same language. A database can be considered a structure in realization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled i n the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of theory in predicate calculus. A model of this â€Å"theory† closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database [8], the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships). Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example: The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schema’s example is shown in figure 8. Table 1: Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDG Volume 2 Issue 2, February 2013 www.ijsr.net 155 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include: tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages. Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries. Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application [9]. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem: the web server does not know who you are and what you do because the HTTP address doesnt maintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session managem ent in terms of performance and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156 Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform some of the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP [10] software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is either hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v. The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the auth orizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performs what is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12. Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction: i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card. Figure 12. Credit card transaction 6. Conclusion Electronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic payment issues. The problems identified in this Project are: Security problem, Confusing checkout process, Customers can’t find products, Customers can’t touch and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed: Merchant needs to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all tran slation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and Technology (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University of Information Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals. References [1] http://en.wikipedia.org/wiki/Electronic_commerce [2] Tkacz, Ewaryst; Kapczynski, Adrian (2009), Springer, P. 255 [3] Online Today, The Electronic Mall. CIS/compuserve nostalgia. Http://www.gsbrown.org/compuserve/electronic-mall1984-04/. [4] http://www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. [5] http://techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion [6] Miller, Holmes E. And Engemann, Kurt J. (1996); A methodology for managing information-based risk; Information Resources Management Journal; 9:2; 17-24 [7] http://www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 [8] http://www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html [9] http://www.startupsmart.com.au/mentor/michaelfox/2011-02-03 Authors Profile Md. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh. Volume 2 Issue 2, February 2013 www.ijsr.net