Tuesday, December 31, 2019

Proposal to improve Employee Safety in the Work place

MEMORANDUM TO: Winston P. Dunnah – President Dunnah Construction FROM: Michael Carter - Vice President of Dunnah Construction DATE: 12/03/2013 SUBJECT: Proposal to improve Employee Safety in the Work place Mr. Dunnah the purpose of this memo is to inform you that the Research into improving Workplace Safety is now finish and ready for your review. I have look at the statistics on work place violence over the past three years, 2011 through 2013. As I stated in my earlier memo I feel, that this is a very important need for the employees, management, and the business. Millions of workers face violence in the workplace every year and it is the second leading cause of occupational injury. Workplace violence can range†¦show more content†¦Workplace Violence Workplace safety is more than looking at all the hazers within the work place such as wet floors, hazard materials; and so on, it is also protecting employees from work place violence. Workplace violence and domestic violence in the workplace can cause devastating effects on management and employees (Dealing with Violence in the Workplace, 2012). Statistics Workplace violence perpetrators classification: Criminal intent, Customer or client, Worker-on-worker, and Personal relationship. The criminal perpetrator has no legitimate relationship to the business or its employees. 85 percent of workplace homicides fall into this category, customer or client are those that the company prove services to and approximately 3 percent of all workplace homicides fall into this category, worker-on-worker is an employee or past employee who attacks or threatens another employee. Fatalities account for approximately 7 percent of all workplace homicides, and personal relationship has not relationship with the business but has a personal relationship with the intended victim accounts for 5 percent of all workplace homicides (Dealing with Violence in the Workplace, 2012). Incidence rates for nonfatal assaults and violent acts by industry, 2000 Incidence rate per 10,000 full-time workers Private Sector Overall Health Services Overall Social Services Nursing Personal Care FacilitiesShow MoreRelatedBenefits Of Maintaining A Safe Work Environment Essay845 Words   |  4 PagesNow that we have explored the negatives that can take place in the workplace , we can better evaluate the benefits of Maintaining a safe work environment. The good news is that it is very practical for employers to produce and foster a safe work environment. In fact, The Occupational Safety and Health Administration estimates that an â€Å" effectively safety and health program can save $4 to $6 for every $1 invested. For example, after employees at the Black Angus Restaurants participated in an ergonomics-trainingRead Morenvq level 5 leadership and management in health and social care unit 11041 Words   |  5 Pagesneeds.    * Develop positive  relationships with work colleagues and other professionals.    * Share information with people using the services, by providing and receiving information.    * Report on the work I do with people.    On e to one communication:       1.3 Analyse the barriers and challenges to communication within own job role Effective Communication is significant and a fundamental relationship-building skill in the workplace for any employee especially for managers to perform the basic functionsRead MorePerformance Management ( Pm ) Essay1493 Words   |  6 PagesPerformance Management (PM). After doing a deep analysis of processes of The Knot’s human resources management, we present a breakdown of the areas of opportunity that we found to improve the employees’ performance appraisals. The aim of this initial assessment is to figure out the current problems that have cause the employees’ unconformity. Areas of opportunity PM Causes: 1. Lack of clear job analysis which describes objectives or goals, duties, tasks, standards of performance (expected results)Read MoreAPM: Engineering Technology, 13th edition – Answers to Quizzes and Case Studies1176 Words   |  5 PagesAPM: Engineering Technology, 13th edition – Answers to Quizzes and Case Studies 1 SAFETY THROUGH DESIGN †¢ Safety is to be designed into all processes, the ANSWERS—QUIZ 1 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. b a b a b a c a b b b d Safety through design is defined as the integration of hazard analysis and risk assessment methods early in the design and engineering stages and the taking of the actions necessaryRead MoreBenefits Of Employee Wellness Programs1048 Words   |  5 Pages Employee wellness program is set up to improve the health of employees’, promote their morals and at the same time improve workers productivity. Examples of employees’ wellness programs includes on site clinics, on site gym or employee discount at a gym, smoking cessation, stress reduction programs, weight control and healthy diet. (Churchill, Gilliespie, Herbold, 2014). ). The Center for Disease Control and Prevention in 2008 estimated that the medical cost of chronic disease was 75% of all theRead MoreThe Effect of Training and Development on Employees Performance1269 Words   |  6 PagesPROPOSAL THE EFFECT OF TRAINING AND DEVELOPMENT ON EMPLOYEE PERFORMANCE IN ZTBL SUBMITTED TO: DR. WSEEF JAMAL SUBMITTED BY: Mehboob ali mpa(Hrm) IM|SCIENCES, HAYATABAD, PESHAWAR INTRODUCTION. Zarai Taraqiati Bank Limited (ZTBL) formerly Agricultural Development Bank of Pakistan (ADBP) is the premier financial institution geared towards the development of agriculture sector through provision of financial services and technical knowRead MoreOutsourcing And Management Strategy : Pike River Mine Tragedy1515 Words   |  7 Pages Introduction: Pike River Mine tragedy took place on the 19th November, 2010 and resulted in deaths of 29 workers. Many factors led to this tragedy especially poor decisions made by PRCM and Department Of Labour. In this Report, many aspects of the tragedy will be discussed. Section one: outsourcing and management strategy In terms of business, outsourcing can be defined as the process of assigning company’s business processes to external agencies in order to develop the firm’s performance andRead MorePreceptorship Program Proposal At A Medical Center1703 Words   |  7 PagesPatient safety is indeed one of the highest priority and important aspect in the healthcare industry. Therefore, the onus lies on healthcare organizations to implement necessary measures for newly licensed registered nurses during the first 6 months of their employment so as to decrease high turnover rates, turn over costs, medication errors and increase patient safety. There is a high turnover rate of newly registered nurses in the healthcare industry as they transition from students to professionalRead MoreThe Act Of Texas And The Sunset Advisory Commission ( Sac )1586 Words   |  7 PagesIn 2013, a proposal was written by a branch of the Texas state government called the Sunset Advisory Commission (SAC). This proposal would, if made into law, deregulate 14,568 respiratory therapists (RTs) currently employed in Texas (Gaebler 6). This would mean that RTs along with 18 other programs would not have to hold a state license to practice their craft (Sunset 52). Deregulation may sound like a good idea on paper, however in practice, it is anything but. The potential negative outcomes inRead MoreSouthfield Packaging Case Study Essay1373 Words   |  6 Pagesï » ¿ Southfield Packaging Case Study 1a) What is your evaluation of the appraisal process (SPR) at Southland Packaging? My initial evaluation of the this process is positive, if both the supervisor and the employee adhered to the guidelines that were to be utilized during the process. The SPR was to last two full hours (not certain it should require this much time) and provide an undisturbed opportunity for the manager and to communicate directly with the subordinate about their level of performance

Monday, December 23, 2019

Organizational Behavior in a Global Context - 1681 Words

Organizational Behavior in a Global Context Part 1: Overall Chapter Summary: This chapter is talking about organizational behavior in a global context. What is organizational behavior in a global context? Base on the information from this chapter, every organization should do their businesses all over the world. After that people will have more possibilities to having a job. Also, that kind of culture is all about sharing values and ideas to help each other understand how and why countries do things. In several ways, the representation to globalization for employees and managers can happen. They can be introduce to globalization by moving to another company or by getting a promotion. Organizations should be always prepared with the†¦show more content†¦Women, Work, and Stereotypes---Page 64 Stereotyping is particularly difficult to stop. Like page 63, this exhibit show common stereotype about women â€Å"Dependent, passive, uncompetitive, unconfident, unambitious, warm, and expressive.† We are easy to make judgments about an individual, rather than obtaining factual information. Especially for women, even today women have achieved a great deal in workplace acceptance, respect, and advancement. Moreover, some companies reported substantial in the number of women managers in their companies. But, in business still have some problem to businesswomen. I think there have very difference way between businessmen and businesswomen. In fact, people think businesswomen as comfortable with power as any woman could be. Also, people think businesswomen have stuck her look rather than running the company. Moreover, a lot of businessmen believe that women do not have the stomach for selling on Wall Street. So, even women are advancing into management position, they still need to conflict people’s stereotyping that is very difficult to dispel. Part 3: Managerial Advice: Today, we are living in a diversity environment world. To face relationships is a part of our lives today. Everybody have their connection issue. Some wonderful professors are create program to teach people how to promoting a positive diversity environment. TheseShow MoreRelatedA Study On Refining Organizational Training Essay951 Words   |  4 PagesINTRODUCTION In today’s global economy the role of training employees goes beyond providing traditional instruction to meet organization training needs. Developing new hires and managing their full capabilities is at the core front of any organization. This capstone literature review plan focuses on refining organizational training research, demonstrating an understanding of current organizational environment and limitations, and how the capstone project can fit in the global context of training. IIRead MoreThe Relevance Of Organizational Behavior1202 Words   |  5 Pages In basic terms, organizational behavior concerns itself with the behavior of individuals in the organizational setting. This text concerns itself with the study of organizational behavior. In so doing, this paper will amongst other things address not only the various concepts associated with organizational behavior but also the relevance of studying the same as an academic discipline. Organizational Behavior: A Concise Definition In seeking to define organizational behavior, we must first defineRead MoreGlobal Leadership And Organizational Behavior Effectiveness1671 Words   |  7 PagesThe Project GLOBE (Global Leadership and Organizational Behavior Effectiveness). The GLOBE research followed in Hofstede s footsteps yet also searched for additional dimensions (Cater, Lang Szabo, 2013, p. 446) as depicted and defined on Table II. In light of the GLOBE findings, earlier conceptualisations of culture have been reconsidered with respect to the impact of culture on leadership (Dickson et al., 2012 as cited in Cater et al., 2013, p. 447). GLOBE researchers introduced twnety one first-orderrRead MoreWhat Does Culture Affect Hr Philosophy, Policies And Programs?1098 Words   |  5 Pagesprovides a guide as to how people interact and what they expect from one another. How does culture affect HR philosophy, policies and programs? Culture consists of symbolic system of values, attitudes, beliefs, and perceptions about appropriate behaviors that are shared in our society as a way of life. In other words, culture is a set of meanings (senses) and values that inform a particular way of life. It is lifestyle that shape and form a particular human group. For this reason it is importantRead MoreAn Informal Institution Based View1593 Words   |  7 Pages High-Low Context The success and failure can be explained using a core perspective named institution-based view, which was introduced as part of the concept of global business. Culture, an informal institution plays a major role in the success and failures of multinational enterprises around the world. The formal institution includes laws, regulations, and rules, also termed as political systems, legal systems, and economic systems. Informal institution includes cultures, ethics, and norms. BothRead MoreThe Role Of A Manager For Any Capacity At A Business904 Words   |  4 Pagesneed to fully understand and implement all organizational policies, and they need to manage and drive employee performance. Managers are in a state of perpetual assessment. Performing these tasks in one country and one culture is challenging enough, but from an ethical point of view, there is a pretty solid line when it comes to areas such as discrimination, customer relations, and employee interactions here in the United St ates. There are organizational policies in place which are relatively standardRead MoreCross Cultural Relationships1105 Words   |  5 Pagespatterns of thinking, and consequently adapt their behaviors according to specific cultural contexts. Managing people across cultures  offers solid theoretical frameworks and practical insights to handle the cultural challenges in managing people in a globalized workplace. Cross cultural management addresses topics including cross-cultural communication and understanding at both interpersonal and inter-organizational levels, leading multicultural and global virtual teams, cross-cultural leadership, managingRead MoreInclusive Leadership : Forming A Global Team1114 Words   |  5 PagesLeadership: Forming a Global Team Cornelius Cash Grand Canyon University LDR804-Leading across Cultures September 21, 2016 t: Ethical Leadership Models Research has shown inclusive leadership is based on leadership that is ethical and all-encompassing driven by the leaders desire to honestly connect to subordinates. Ethical leaders understand all subordinates regardless of race, creed, color or national origin play an equally important role in the strategic organizational plan (Cottrill, LopezRead MoreThe Role Of Organizational Behavior By Embracing Performance Management Research Essay759 Words   |  4 Pagesvalues’, Academy of Management Journal, 42(5), pp.507-525. Aguinis, H., C. Pierce, (2008) ‘Enhancing the Relevance of Organizational Behavior by Embracing Performance Management Research’, Journal of Organizational Behavior, 29 (1) pp.139-145 Atrill, P., E. McLaney, (2011) Accounting and Finance for Non-Specialists, 7th Edition, Harlow: FT/Prentice Hall Barney, J. (1986) ‘Organizational Culture: Can it be a source of sustained competitive advantage’? Academy of Management 11(3), pp. 656-665. BarneyRead MoreThe Leadership Model : Inclusive Leadership And Organizational Culture Among A Diverse Global Group Of Employees1065 Words   |  5 Pagessubordinates regardless of race, creed, color or national origin play an equally important role in the strategic organizational plan. Such traits allow leaders to effectively engage with subordinates of a wide variety of cultural, demographic, and social constrictions. This assignment will address the role of inclusive leadership in strengthening the organizational culture among a diverse global group of employees. The organization is planting business operations in Greece, Singapore, Germany, and Iran

Saturday, December 14, 2019

Concocting a Divisive Theory Free Essays

Concocting a Divisive Theory The phenomenal recovery of an mtDNA section from the arm of the Feldhofer Cave Neandertal was greeted with the enthusiasm and yes, even with the ballyhoo it deserved. 1 It was a truly important discovery, and from a research lab that every bit late as a twelvemonth before had predicted it could n’t be done. The protagonists of the theory that Neandertal mans are a different species were beyond exuberance ( few others were quoted on the issue ) . We will write a custom essay sample on Concocting a Divisive Theory or any similar topic only for you Order Now And so, in a crescendo of excitement, Stringer and McKie2 delivered their putsch de gra?ce in a New York Times op-ed discoursing the significance of the Neandertal mtDNA findings: The deductions for the thought of race are profound. If modern humanity is made up of people who are all recent posterities of a few African innovators, it is every bitclear that Homosexual sapiens must be a startlingly homogeneous species. We merely hold non had clip to diverge genetically in any meaningful mode. However, some scientists and those with narrow political dockets have put frontward statements to prolong the thought that races exist with cardinal biological differences. Alternatively of concocting dissentious theories, we would be better served to acknowledge the importance of recent informations that will assist us happen the properties that separated Homo sapiens from other early worlds like the Neanderthals. Is this more opera or is it all over? Have the antediluvian DNA surveies brought us a existent discovery and ended the Neandertal contention so exhaustively that the lone holdouts should halt concocting their dissentious theories because they can merely differ if they have a political docket about race? Tattersall3 believes it is all over. He interprets the mtDNA consequences as demoing that the Neandertals were a distinguishable species for 600,000 old ages. For this reading, one must presume that the history of the Neandertal mtDNA line of descent section is a population history, that invariably roll uping mutants are the exclusive cause of mtDNA development, and that the mutant rate of mtDNA is known with sufficient truth to day of the month the putative split. Belief in the Eve theory of modern human beginnings is the most of import requirement for these premises because it ties mtDNA history to population history through the account that low mtDNA diverseness inworlds comes from a recent population- size constriction ( in this instance, a new species ) . It is no surprise that Eve theoreticians reacted to the intelligence with joy. It is non that I want to rain on anybody ‘s parade, but there are some shrewish inside informations. Let ‘s expression at what was really done. Krings and coworkers1 reported that the 379 base-pair section of mtDNA found in the Feldhofer specimen has 27 differences from the mention human sequence and, significantly, that 25 of these differences were at places that varied in at least one of their comparative human samples of 2,051 persons. When the Neandertal sequence was compared with 994 modern-day human line of descents of known geographic beginning, the figure of differences was more than three times greater than the average figure of differences between the worlds. But possibly the most surprising determination was that several of the worlds were found to differ from each other more than the Neanderthal differs from some worlds. Lineages in the human sample have between 1 and 24 pairwise differences reflecting mutants, while the Neandertal differed from these worlds by between 22 and 36 mutants. Taking the difference in ages into history, every bit good as the fact that any peculiar mtDNA line from that clip had merely a little opportunity of prevailing until today, this form of fluctuation is to be expected, given that an ancient Neanderthal man is being compared with modern-day worlds. In such a comparing, the pairwise differences must ever be greater than they would be for the ascendants of the modern-day worlds in the analysis who were populating at the same clip as the Neandertal. This is because the modern-day homo mtDNA lines have had a longer clip to mutate. Whether the magnitude of fluctuation is to be expected is a different inquiry. The reply could depend on the mtDNA mutant rate. Here, excessively, there have been surprising finds. Until late, the rate of alteration for human mtDNA was determined phylogenetically. Dates for mtDNA coalescency were estimated by comparing the maximal pairwise difference among worlds to the figure of differences dividing human and chimpanzee sequences. Dates for human and chimpanzee divergency were so used to gauge the rate of alteration. The Neanderthal divergency day of the month estimated by Krings coworkers assumes a mutant rate at about the center of the But possibly the most surprising determination was that several of the worlds were found to differ from each othermore than the Neanderthal differs from some worlds. scope for phyletic findings: 0.01 to 0.2 permutation sites each million old ages. But, in fact, even the fastest of these rates may be wrong. When Czar Nicholas II and his household were exhumedin 1991, their designations were based on fiting their mtDNA with that of other descendants of the Czar ‘s female parent. These analyses out of the blue revealed immensely more mutational alterations than the phyletic rates predicted.4 Subsequent computations of mutant rates between coevalss proved to be dramatically higher than had been assumed from the longer-range phyletic considerations. In two different surveies, 100s of base brace from the mtDNA control part ( more than in the Neandertal analysis ) were sequenced and intergenerational mutant rates of 1.2–4.0 permutations per myr were derived.5,6 The Eve theory postulates that a recent population-size constriction took topographic point at the clip of mtDNA coalescency in worlds. But if mtDNA mutant rates are so every bit high as the intergenerational analyses indicate, the ‘‘Eve † of these surveies could good hold been a Biblical figure because she would hold lived merely about 6,500 old ages ago. Of class, a population-size constriction this recent is extremely improbable because ‘‘it remains puzzling how the known distribution of human populations and cistrons could hold arisen in the past few thousand old ages. †6 A much more likely account for today ‘s mitochondrial diverseness is that there was no recent population constriction, but that the mtDNA has limited fl uctuation because of choice. It is known that the development of human mtDNA departs from neutrality. Choice can explicate this and the limited fluctuation in human mtDNA by, for illustration, long-run background choice against somewhat hurtful mutants, 7 or by episodes of directional choice, or, possibly a selective sweep.8 Selection is an of import component in mtDNA development because mtDNA does non recombine. Therefore, choice against any part reduces variableness in the full genome. 9 Even on the same chromosome, nonrecombining parts have much lower fluctuation than do recombining parts. One dissentious theory is that choice has reduced mtDNA fluctuation in worlds since the Neandertal lived. A concluding item is related to the claim of Krings and coworkers1 that the Neandertal is every bit related to all life people. This contributes to the perceptual experience that he was genetically isolated from them. But these writers merely presented their comparings for wide continental groups ( Africans, Europeans, and so on ) . A more appropriateanalysis is populational. A comparing of the Feldhofer Neandertal with gene-bank informations for 14 world-wide populations resulted in an mean pairwise difference of 27.3, the same average difference as in the survey by Krings and coworkers.1 But in this instance, pairwise differences for specific populations could be straight examined. These ranged from 21.3 to 33.2: the smallest average difference was between the Neandertal and a sample from Finland. One can conceive of the dissentious theory that might be concocted from these findings. There are others, largely geneticists, who besides have been busy concocting dissentious theories about modern human lineage agree on one point: The Eve theory is wrong.9,11 The job they all reference is that a population constriction terrible plenty to reset mtDNA fluctuation to zero would reset atomic fluctuation as good. Mitochondrial cistrons should retrieve their fluctuation and return to equilibrium much more rapidly because of their higher mutant rate and smaller effectual population size. But it is merely the antonym. MtDNA is out of equilibrium and has small fluctuation, whereas all impersonal atomic cistron systems studied so far are in equilibrium and have more variation.7,8,12 This entirely regulations out a terrible population-size constriction. One late supported theory is that modern worlds are non a new species but descend from a little hereditary group that lived in Africa for at least a million years.13 Others are based on analyses of the beta-globin genes14 and the Y chromosome,15 each of which reveals grounds for important genetic exchanges both out of Africa and into Africa much earlier than the period of mtDNA coalescency, even when the phyletic mutant rate estimations are used. A population-size constriction would hold erased this older fluctuation. But if the Eve theory is incorrect, there is no ground to restrict accounts of the Neandertal mtDNA to past species divergency ; nil to confute the contention that the Neandertal reflects a greater magnitude of mtDNA fluctuation in the yesteryear than in the present ; and nil to take away from the impression that mtDNA can differ dramatically between sections of the same species. Human fluctuation with and without Neandertals is similar to the difference between Pan troglodytes races. In that comparing, Pan troglodytes verus has much more mtDNA fluctuation than does Pan troglodytes schweinfurthii.12So what does the antediluvian DNA mean with regard to the topographic point of Neandertal mans in human development? The deductions are inconclusive. It seems that dodo anatomy still provides cardinal informations about human development. Many Neanderthal characteristics persist in much later post-Neandertal Europeans.16 Furthermore, it is normal to happen mixtures of assorted Neandertal characteristics in Europeanstoday. One recent analysis of Neandertal and early Upper Paleolithic European nonmetric traits indicates that their fluctuation requires Neanderthal alloy of at least 25 % .17 Further survey of these informations estimated an about 6 % Neandertal familial input in modern European cistron pools, a determination that is in line with the pairwise difference analysis ( but does non necessitate ancient mtDNA ) . And what does this mean for the Multiregional theory of development? Here, the reply is clearly nil because multiregionalism means development in more than one part, but non needfully in every region.18 It could be a valid account for human development even if every individual So what does it intend? The antediluvian DNA findings are compatible with both phyletic readings of Neandertal mans: separate species or human race. Neanderthal became nonextant without issue. Human populations do non prevail infinitely or continuously through clip. All of them either go nonextant without issue or merge with other populations. So what does it intend? The antediluvian DNA findings are compatible with both phyletic readings of Neandertal mans: separate species or human race. But there are other, independent grounds for rejecting the impression that Neandertal mans are a different species. Tattersall and I have discussed some of these in old arguments in Evolutionary Anthropology. The fact remains that ‘‘the familial fluctuation between the modern and Neanderthal sequences is within the scope of other species of Primatess. †19 If Neandertal mans are non a separate species and the Feldhofer Neandertal informations prove valid, they give us two of import pieces of information. First, they indicate that if a selective expanse in human mtDNA led to its presently low degree of fluctuation, it was more recent than at least some of the European Neandertals. This could supply independent support for generational clock rates, but extra antediluvian Deoxyribonucleic acid analysis is necessary to analyze this possibility. Second, they remind us that computation of mean effectual population size in the yesteryear from coalescency theory has no relation to the existent figure of engendering females populating then.9,13 Although the sample made up of the Neandertal plus life worlds has a much larger effectual mitochondrial population size than life worlds do, it is unreasonable to reason that there were more people alive during Neandertal times than there are today. Ironically, even as the new informations raise the Neandertalargument to a higher and more interesting rational degree and represent how familial and palaeontological informations can be wed, the political degree of argument sinks to a new low. Mentions 1 Krings M, Stone A, Schmitz RW, Krainitzid H, Stoneking M, Pa?a?bo S ( 1997 ) Neandertal DNA sequences and the beginning of modern worlds. Cell 90:1–20. 2 Stringer CB, McKie R ( 1997 ) Neandertal mans on the tally. The New York Times 146 ( s4 ) : E15. 3 Tattersall I ( 1998 ) Neandertal cistrons: What do they intend? Evol Anthropol 6:157–158. 4 Edward gibbons A ( 1998 ) Calibrating the mitochondrial clock. Science 279:28–29. 5 Parsons TJ, Muniec DS, Sullivan K ( 1997 ) A high ascertained permutation rate in the human mitochondrial control part. Nature Genet 15: 363–368. 6 Loewe L, Scherer S ( 1997 ) Mitochondrial Eve: The secret plan thickens. Tendencies Ecol Evol 12:422–423, p. 422. 7 Hey J ( 1997 ) Mitochondrial and atomic cistrons present conflicting portrayals of human beginnings. Mol Biol Evol 14:177–172. 8 Wise CA, Sraml M, Easteal S ( 1998 ) Departure from neutrality at the mitochondrial NADH dehydrogenase fractional monetary unit 2 cistron in worlds, but non in Pan troglodytess. Geneticss 148:409–421. 9 Templeton AR ( 1997 ) Testing the out of africa replacing hypothesis with mitochondrial DNA information. In Clark GA, Willermet CM ( explosive detection systems ) , Conceptual Issues in Modern Human Origins Research, pp 329–360 and combined bibliography, pp 437–492. New York: Aldine de Gruyter. 10 Hunley K, Merriwether DA ( 1998 ) The consequence of fossil age on the appraisal of the clip to common ascendant. Paper presented at the 1998 meeting of the Human Biology Association. 11 Ayala FJ ( 1995 ) The myth of Eve: Molecular biological science and human beginnings. Science 270:1930– 1936. 12 Wise CA, Sraml M, Rubinsztein DC, Easteal S ( 1997 ) Comparative atomic and mitochondrial genome diverseness in worlds and Pan troglodytess. Mol Biol Evol 14:707–716. 13 Harpending H, Batzer MA, Gurven M, Jorde LB, Rogers AR, Sherry ST ( 1998 ) Genetic hints of ancient human ecology. Proc Nat Acad Sci USA 95:1961–1967. 14 Harding RM, Fullerton SM, Griffiths RC, Bond J, Cox MJ, Schneider JA, Moulin DS, Clegg JB ( 1997 ) Archaic African and Asiatic line of descents in the familial lineage of modern worlds. Am J Hum Genet 60:722–789. 15 HammerMF, Karafet T, Rasanayagam A, Wood ET, Altheide TK, Jenkins T, Griffiths RC, Templeton AR, Zegura SL ( 1998 ) Out of Africa and back once more: Nested cladistic analysis of human Y chromosome fluctuation. Mol Biol Evol 15:427–441. 16 Frayer DW ( 1993 ) Development at the European border: Neanderthal and Upper Paleolithic relationships. Pre?hist Eur 2:9–69. 17 Hawks J ( 1997 ) Have Neandertals left us their cistrons? In Cavalli-Sforza L ( erectile dysfunction ) , Human Development: Abstractions of Documents Presented at the 1997 Cold Spring Harbor Symposium on Human Evolution Arranged by L.L. Cavalli-Sforza and J.D. Watson, p 81. Cold Spring Seaport: Cold Spring Harbor Laboratory. 18 Relethford JH ( 1995 ) Genetics and modern human beginnings. Evol Anthropol 4:53–63. 19 Ruvolo M, cited in Kahn P, Gibbons A ( 1997 ) Deoxyribonucleic acid from an nonextant homo. Science 277:176–178. Milford Wolpoff Department of Anthropology University of Michigan Ann Arbor, MI 48109-1382 U R 1998 Wiley-Liss, Inc. ISSUES Evolutionary Anthropology 3 How to cite Concocting a Divisive Theory, Essay examples

Friday, December 6, 2019

Elegy to and Unfortunate Lady Essay Example For Students

Elegy to and Unfortunate Lady Essay In Alexander Pope’s poem â€Å"Elegy to the Memory of an Unfortunate Lady,† Pope uses a great amount of war-like imagery to enhance his vision of the suicide described. He creates allies and enemies, weapons and invasions, as well as the gruesome death that only seems to come from war. These pieces add to the overall meaning of the work and the vision of the event that has occurred, giving the reader an image of a battle occurring. The first images of the war or battle are that of the victim of battle. Starting at line four and extending to line ten, I find that Pope is using a great amount of imagery to depict the woman’s wound and the fate upon which she has fallen. In line four he describes her wound in only three words â€Å"bleeding bosom gor’d,† but he then extends the depiction of her wound into how it was obtained. He describes the knife or the dagger that she must have used to kill herself with as a â€Å"sword†, which is something that would typically be found in battle rather than in the case of a suicide. He also brings in the theory of the ancient Roman justice system for not just war but any crime. It is much greater and braver to die by your own sword than by any other. She kills herself for the simple fact that in her eyes she must be punished for loving some one too much; however, her death is the start of the real war, between Pope and the society and family that ab andoned her. Pope sides with the ghost in the poem and criticizes her family and society for her death. In line thirty he states clearly his great dislike for the uncle who he labels as â€Å"Thou, mean deserter of thy brother’s blood!† This is an apparent line drawn between what Pope believed should have occurred and what did occur, creating the image of enemy and ally. It is even an echo of a challenge to the uncle on how to raise or treat his family. Pope blasts society in lines forty-eight and forty-nine when he states that â€Å"rites unpaid? / No friend’s complaint, no kind domestic tear† He seems to be stating that society abandoned her as much as her family did and that no one seems to even care that this young woman is gone. He once again has drawn a line saying, â€Å"you are the enemy and I am the ally.† Now that the sides have been chosen the battle can be looked at much more closely. The image of a battle takes up much more of this poem than any other section. Not only is the suicide a battle within the woman as to whether or not to commit it, but the language lends itself to shape yet another battle of morality. Pope brings in the language of battle a great deal on page 115 of the poem. He speaks of â€Å"justice†, â€Å"vengeance†, and the â€Å"besiege†ing of â€Å"your gates † (in which case he is speaking to the family and society). These are images that are common with battle rather than suicide. He also brings up the fact that â€Å"foreign hands† are what took care of the young woman’s body once she died. This also seems to illuminate the image of death on a battlefield. Pope captures this picture beautifully in lines fifty-two to fifty-four, when he writes:By foreign hands thy dying eyes were clos’d,By foreign hands thy decent limbs compos’d,By foreign hands thy humble grave adorn’d,By strang ers honour’d, and by strangers mourn’d!This passage is the essence of how men died in battle in those days and during the civil war. They were not buried by their family and friends, but rather buried in mass graves or where they lie, if buried at all. They were mourned and honored by strangers rather than their loved ones. Pope also brings up the fact that she has no tombstone marking her grave; â€Å"Nor polish’d marble emulate they face.† That is another common factor with the victims of war. There is often no marking of their graves but rather just the grass to cover where they

Monday, November 25, 2019

MLA Gets With the Times

MLA Gets With the Times MLA Gets With the Times MLA Gets With the Times By Maeve Maddox Probably the biggest change in the seventh edition of the MLA Handbook for Writers of Research Papers has to do with the section. No more underlining I abandoned underlining for italicizing as soon as I got my hands on my first computer. That was in the 1980s. MLA has finally come round and recommends italicizing titles of books, periodicals, films, etc. No more continuous pagination All you have to do now is enter the volume and issue number for a scholarly publication. New Abbreviations Didnt you just hate it when your web source didnt include a publisher or date of publication? Well, there are abbreviations for those now: N.p. no publisher n.d. no date n. pag. no pagination (ex. online journals) NOTE to web publishers: if your site contains useful, accurate information, give researchers a break and provide a date and publisher. URL not compulsory A works cited entry for a website will include author, article title, and name of the website, but the URL is not mandatory. (Its probably still a good idea to include the URL for an obscure site.) Multi-media Markers A medium of publication marker goes at the end of every entry. For example: PRINT, WEB, DVD, TV. If the source is from the web, the marker is followed by the date of access. You can see some examples of entries typed according to the new guidelines a the Purdue OWL site. Annotated sample research paper that follows the new guidelines. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Book Reviews category, check our popular posts, or choose a related post below:Cost-Effective vs. Cost-EfficientWriting the CenturyDozen: Singular or Plural?

Thursday, November 21, 2019

How useful is the concept of ideology for media analysis Discuss in Essay

How useful is the concept of ideology for media analysis Discuss in relation to soap operas - Essay Example As the strength of the British army grew weak in confronting an imposing German hostility, the military administration had to resort to Conscription as a means of restoring its strength. But a glimpse at the history of media in the backdrop of public administration and consumerism will show that the positive application of ideological propaganda is an exception than the rule. Almost every known media type is susceptible to ideological undercurrents, whether as a result of design or accident. The Television as a medium of communication and entertainment allows sophisticated application of ideological persuasion. It has to be remembered that television is a product of the twentieth century. The centuries prior to its invention were not devoid of prevalent ideologies or their imposition on the masses. However, the imposition of the desired set of beliefs and habits were achieved through brute force. These centuries saw colonialism at its peak; and where imperialism exists violence follows. But the twentieth century is different in that empires were giving way to independent republics, especially after the Second World War. Soap Operas, which form the bulk of cultural programming, are truly representative of the rest of the electronic media. A careful study of soap operas helps us understand media in general and media’s role as vehicles of ideological propaganda in particular (History Today, 10). The soap operas serve as vehicles of ideology in two different ways. The more obvious way is through advertisements and sponsorship. Advertisements are essentially messages to the target audience as to what is good for them, what is it they should aspire for, what it that will gain them respect, etc., is. Of course, the process is not based on force but manipulation and exploitation. In a study conducted by Cynthia Frisby for the Journal of Advertising Research, the relationship

Wednesday, November 20, 2019

E-commerce in Singapur Essay Example | Topics and Well Written Essays - 2750 words

E-commerce in Singapur - Essay Example In the essay "E-commerce in Singapour", the writer claims that the evolution of the Internet and powerful online technology has given way to a new area of commerce known as electronic commerce or e-commerce. E-commerce simply means doing business electronically. In other words, commercial activities are performed online such as buying and selling goods online, electronic funds transfer, and direct consumer marketing. With a large percentage of the population having access to the Internet at home and on the go, consumers are opting to shop online rather than going the conventional way to ‘brick and mortar’ shops. Today, e-commerce is proving to be a fast growing industry in Singapore with many aspiring entrepreneurs launching their business on the Internet. In order to compete with others and to increase market shares, the business organizations implement multiple technologies for shaping their core competencies and for achieving cost effectiveness. In this respect, e-com merce and e-business are two technological advancements which play very significant role in shaping modern trade. It has helped the managers in managing and controlling the challenging tasks of business activities. â€Å"According to Andersen Consulting, 80% of European top managers recognize the importance of e-commerce for their competitive edge – not only for marketing and sales but also for purchasing and procurement†. This paper will focus on the use of e-commerce and e-business in the retail industry of Singapore. ... include the importance and use of e-commerce and e-business in trade business by figuring out its multiple applications for retailing business activities. The third section will describe various issues and prospects of e-commerce and e-business for small and medium retail industry of Singapore. Finally, based on the analyses and findings from literature review, set of relevant recommendation will be offered for the retail industry of Singapore. The overall discussions and evaluation and will concentrate the on the thesis statement of this paper which is, ‘the use of e-commence and e-business will the small and medium retail industry of Singapore’. e-Commerce and e-Business in Trade and Business In the global business, the scope of e-commerce and e-business has been expanded tremendously. This has been possible due to increasing popularity and awareness regarding information technology and internet. â€Å"With developments in the Internet and Web-based technologies, dist inctions between traditional markets and the global electronics marketplace-such as business capital size, among others are gradually being narrowed down† (Kumar, 2009, p.38). These web-based information technologies are very important management tools in strategic positioning which help the business organisations to identify and grab the underlying opportunities. This is also very important for optimal utilization of human skills and other resources (Andam, 2003). In the business activities, e-commerce and e-business are very important for strategic positioning. e-Commerce and e-business are interrelated with other but there are some differences between these two from the business perspectives. Therefore, in order to better understanding, it is necessary to clarify these two terms. In the words

Monday, November 18, 2019

Neural Network Essay Example | Topics and Well Written Essays - 2750 words

Neural Network - Essay Example Last line means to say that if the letters are placed in some tilted position, then also algorithm must tackle this problem. Pattern Recognition or Optical Character Recognition (OCR) is a pipelined process consisting of several stages in proper sequence. They are shown in figure 2. Each character is represented as a combination of pixels. All pixels together make a huge feature vector. Total number of pixels is equal to wh where w is the number of pixel in width side and h is the pixels present in height. Figure 3 depicts the way pixel forms one particular character. xi is the fraction of ink in pixel i. Classifier must be adaptive (generalize) in nature so that it can be able to recognize patterns encountering first time. A typical character image is 6464 pixels large and for each such pixel 256 grey values are required making feature space large. For training a recognizer hence, requires huge amount of data to fill this vast space. In order to reduce the dimension space Principal Component Analysis is mostly used which transforms into lower dimension space (Yeung & Ruzzu, 2001). OCR also should make a distinguishing between ‘O’ and ‘6’. Figure 4 shows one case example. If t/b comes smaller that means letter is ‘O’ otherwise ‘6’. A good algorithm must define the tolerance level (T) adequately. Other examples of such cases are letter ‘q’ and digit ‘9’. First identify the maximum rotation number whether it is 1, 2, 3, 4 or 6. Then check any mirror is present or not (m). Is there any indecomposable glide reflection (g)? And finally whether there is any rotation axis on the mirror present or not. Other than this Genetic Algorithm also works as PR. Selection of patterns play an important role in PR process as it determines the accuracy of algorithm, its learning time, and the necessary number of samples. Best selection of feature plays important

Saturday, November 16, 2019

Data flow diagram

Data flow diagram Data Flow Diagram DFD is a system modeling tool, the most popular and important representations in data flow modeling. DFD allows us to picture a system as a network of functional processes, connected to one another by pipelines and holding tanks of data. It is a structured, diagrammatic technique representing external entities, logical storage, data sinks and data flows in the system. You can also call DFD as: bubble chart, bubble diagram, process model, and work flow diagram. Data Flow Diagram Types Physical Data Flow Diagram: Physical data flow diagrams are implementation-dependent and show the actual devices, department, people, etc., involved in the current system. Logical or Conceptual Data Flow Diagram: Logical data flow diagram represents business functions or processes. It describes the system independently of how it is actually implemented, and focuses rather on how an activity is accomplished. The components of the data flow diagram (DFD) Processes: The basic processing items of a data flow diagram. They are used to transform incoming data flows into outgoing data flows. Processes that are not further decomposed have to be described by means of a textual specification. This text defines how the input data of the process are transformed into output data. Terminators: Data producers (data sources) or data consumers (data sinks) outside of the system Data flows: Logical channels (pipelines) in which data are transported; they are represented by arrows connecting the processes; Data store: Storage space from which data can be read with a time delay after writing them; without processing component. Data flow diagrams are useful if: you have lots of calculations to carry out You are familiar with data flow techniques in a method you have used repeatedly before. The approach to data flow diagramming should be as follows: create a data flow diagram for each of the major outputs of the system work back from the outputs to the inputs to construct the diagram add new objects where necessary to the object model as you discover the need for them in the data flow modeling add new operations and attributes to the object model as you discover the need for them in the data flow modelling Data Flow Description The data flow symbol is a line with an arrow showing the direction of flow. It should be named using words that are understood within the department or organization describing the data. The data that leaves one process is exactly that which arrives at the next process. An arrow usually at the end of the flow line indicates direction of flow. External Entity Definition The external entity is a source or recipient of data that is outside the boundary of investigation. The fundamental purpose of this symbol is to indicate that whatever happens at the end of the data flow, Entity Relationship Diagram A logical data model is documented as an entity relationship model supported by the data items for each entity (conventionally in the form of a Third Normal Form relation).Though the relationship among data store is not emphasized in data flow diagram, it is well reflected in ERD. ERD is one of the most useful model forming tools to organize this discussion. ERD is network model that describes stored data of a system at a high level of abstraction. For system analyst, ERD has a major benefit: it highlights the relationship between data stores on DFD which would otherwise only be seen in the specification process. The main components of an ERD include: Entity- a subject, a duty, or an event that has a significant meaning to the future system Attribute the characteristics of the entity displayed by fields or columns of a table. Relationship- There is 3 major types of relationship used in ERDs: One one relationship One many relationship Many many relationship Entity- is any type of object that we wish to store data about. Which entity types you decide to include on your diagram depends on your application. In an accounting application for a business you would store data about customers, suppliers, products, invoices and payments and if the business manufactured the products, you would need to store data about materials and production steps. Each of these would be classified as an entity type because you would want to store data about each one. In an entity-relationship diagram an entity type is shown as a box. There may be many entity types in an entity-relationship diagram. The name of an entity type is singular since it represents a type. Attributes-The data that we want to keep about each entity within an entity type is contained in attributes. An attribute is some quality about the entities that we are interested in and want to hold on the database. In fact we store the value of the attributes on the database. Each entity within the entity type will have the same set of attributes, but in general different attribute values. For example the value of the attribute ADDRESS for a customer J. Smith in a CUSTOMER entity type might be 10 Downing St., London whereas the value of the attribute address for another customer J. Major might be 22 Railway Cuttings, Cheam. Cardinality and Optionality The maximum degree is called cardinality and the minimum degree is called Optionality. In another context the terms degree and cardinality have different meanings. In [Date 4th ed. p240] degree is the term used to denote the number of attributes in a relation while `cardinality is the number of tipples in a relation. Here, we are not talking about relations (database tables) but relationship types, the associations between database tables and the real world entity types they model. Entity Descriptions CustomerInfo This entity is to store the personal Name, Address etc in to check in the Hostel. Stock This entity is to store the detail of stock items in order to check new item. Check In This entity is to store the Customer information that was get to the Room. Booking This entity is to store the Room that have been booking according to customers order. Room This entity is to store the Room information of the Hostel status. Sale Service This entity is to store the sale record of each customer and the item. Entity Life History The ELH technique is based on concepts developed by Michael Jackson for structured program design. The essential idea is that all data processing can be described in terms of sequence (order), selection (choice) and iteration (repetition) of processing components, which are derived from the data structures. In an ELH these ideas are used by analogy to model sequences, selections and iterations of events affecting an entity. In between the birth and death events there may be a number of life events. Jackson rules are observed in that the diagram shows that it is possible for there to be no changes between creation and end of life for a particular instance, as an iteration may occur zero, one or many times. Parallel lives are used when there are two (or more) independent sets of events that can affect an entity. As events from the two sets are not dependent on each other, but only on events from their own set, they cannot be ordered together in a predictable way. Quits and resumes are a means of jumping from one part of the diagram to another in order to cope with exceptional or unusual events. If used indiscriminately they can undermine the apparent structure of the diagram and make it more difficult to understand. Analysts should therefore use a quit and resume only when they are sure that there is no sensible way in which they can use normal Jackson structures to show what they want. Normalisation Any collection of attributes can be said to be either unnormalised or in a particular normal form depending on its compliance with the rules given below. Many normal forms have been defined. Codd originally defined first, second and third normal forms. There are some cases, particularly where keys are complex and contain many attributes, where further normalization may be required. For such cases, Boyce- Codd normal form, fourth normal form and fifth normal form also exist. In this book, normalization will only be covered up to the third normal form, since this is sufficient for most practical purposes. For further information about the other normal forms the reader is referred to Data (2000). Report for National Hostelling Association There are a lot of advantages when compared to the manual system and computer based system. Although our system is still window based.We will be able to room service, Ecommerce application in the future. We have made the information giving in our system easily understandable for new uses of the system. The display area of the store is not very large. It will only display a small section of the Room Other Sale Item that the Check in the Hostel room. My system will allow customers to choice rooms . This will allow customers to request room and service that are not on display. The customer can search the room by keyword or by category such as room,Booking No, CheckIn/Out etc or by charges. The charges will take the discount value for each invoice ie, the For manager, he will help with this activities during busy periods and will be responsible for the general management duties such as accounting, correspondence, staffing etc. The manager will also Booking and necessary from a number of customers and he will also decide which of the services will be discount prices to the customer. In order to do this, he will need the information from the system. The system also produce the monthly report in order to estimate the rooms status and the customer like and dislike of the services ie the c ustomer trend according to the season. These above information are explained about the functions of the National Hostelling Association. To have a successful system design for the National Hostelling Association, I have to study the manual system first. Then I draw the context diagram. The context diagram shows the entire system as a single process surrounded by the external entities. The National Hostelling Association, Context diagram represents data input and output flows. This make to concentrate or focus on the boundary to be investigated. This can give great help in discussing with the user on the scope of the system. Aims and objectives are given to the system so the system user cannot depart from the system needs. As the context diagram is drawn, the level 1 DFD are also easily drawn to make the system easy to look and to be understandable. This can enhance the clarity of the system to the user. Then I create a data model to support the system information. It points the ways how the data items are grouped together into entities and identifies the relationships between the entities. To get the attributes for the entities, I studied the manual records and the receipts of the National Hostelling Association. Additional characteristics such as the optionality and degrees of relationship are needed to identify for the entities. Then I studied how the entities change with time.ELH is described to know the creation of an entity occurrences, record the sequence of changes in the system during its life time and how it ends in the system. Then I do the normalization which provides the sound foundation for physical design which can be implemented as the database design. For database design, all entities are included in the data dictionary which is the sources of information of the system. Then, I create the prototype by using Visual Studio 2005. It includes searching for an item of National Hostelling Association. I also take the screenshots of the prototype and identify where the system needs the validation rule. All the tasks shown above demonstrate an understanding of the modeling and installation of the data driven system. They demonstrate the analysis and design of a system including the prototype use interface, training plans for the users. Preparation for the installation of the system In order to install the system, we first need to install the hardware first. Then we need to do the data entry for the items. We also need to install the software required to run the system. The requirements are as follows: Hardware Requirements Pentium IV or above Processors is C.P.U. 1.8 GHz or above. Memory (RAM) is 512MB or above. Hard Disk space is 1GB for my system and 10 GB for Operation System. Software Requirements Window XP Visual Studio 2005 Microsoft Office Word 2003 for reading Manual Guide

Wednesday, November 13, 2019

Prevention and Treatment for TB at Arequipa Sanatorium :: Tuberculosis Health Medical Essays

Prevention and Treatment for TB at Arequipa Sanatorium Arequipa Sanatorium and its â€Å"pottery† for tuberculosis treatment was founded in 1911 in the town of Fairfax, Marin County in the Northern Bay Area of California. [1] It was from the outset a private enterprise initiated by Dr. Philip King Brown. On October 22, 1913, a twenty-one year old housewife weighing 111 pounds, was admitted to Arequipa for â€Å"coughing on exertion.† When she was discharged home on February 28, 1914, she had worked at Arequipa Pottery over 105 hours, and had earned four dollars and five cents for it. She never gained more than three pounds and was probably discharged more for her lack of ability to work, than for being â€Å"cured.† A month earlier, the nurse Superintendent at Arequipa had written a letter to the Associated Charities of San Francisco, saying that â€Å"unless (the woman) is able to earn her way in the pottery, I doubt that we will be able to maintain her at the Sanitarium any longer.† [2] This young woman’s experience with sanatorium treatment at Arequipa, underscores a contradiction in the treatment of tuberculosis in the Progressive Era. Arequipa means â€Å"Place of Rest,† and while enforced rest was fundamental to Brown’s regimen, he also considered work to be therapeutic. Requiring work from patients helped â€Å"solve† the problem of how women of â€Å"modest means† could avoid destitution from their illness. It also helped Brown financially support his enterprise. The contradiction of using both rest and work as treatment at Arequipa provides a window into the complexity of health and social reform in the Progressive Era. In The Tuberculosis Movement, Michael Teller notes that in the mid 1800s the notion of the hereditary origin of TB â€Å"darkened every hope of prevention or cure.†[3] In her 1996 cultural history Fevered Lives, Katherine Ott, argues that the acceptance of TB after Koch’s discovery of the tubercule bacillus in 1882, transformed â€Å"consumption† into the specific and more clearly defined diagnosis of â€Å"tuberculosis.† In fact, sufferers and the public experienced these two conditions as two separate but related diseases.[4] Prevention and treatment of tuberculosis in the Progressive Era, included both older ideas of the disease as hereditary and the new understanding that the disease was infectious. Without effective medical treatment and without a modern understanding of the dormant and active phases of the disease, eugenic ideas about pre-disposition to TB coexisted with limited and mechanical ideas about infection control.

Monday, November 11, 2019

Driving Forces for M-Commerce Success

Driving Forces for M-commerce Success Jason J. Zhang, Yufei Yuan, and Norm Archer Michael G. DeGroote School of Business McMaster University Hamilton, Ontario, Canada Abstract Is m-commerce just an extension or a subset of e-commerce? Will it turn out to be just more hype? In this paper we discuss the realities of m-commerce and the major differences between mobile commerce and Internet-based e-commerce. Based on this understanding, we identify key factors that must be taken into consideration in order to design valuable m-commerce applications.We emphasize that the success of m-commerce relies on the synergy of three driving forces: technology innovation, evolution of a new value chain, and active customer demand. Key words m-commerce, e-commerce, wireless communication networks Jason J. Zhang is currently a Ph. D. student in Information Systems at Michael G. DeGroote School of Business, McMaster University, Canada. He received his M. E. degree in Information System Engineering at t he School of Management, Dalian University of Technology, and B. E. degree in Computer Science & Engineering at North China Institute of Technology, P.R. C. He once worked as an IT consultant for Office Automation (OA) for the Chinese government. His research interests include e-commerce, e-government, supply chain management, m-commerce, and agent-facilitated decision support systems. Yufei Yuan is currently a Professor of Information Systems at Michael G. DeGroote School of Business, McMaster University, Canada. He received his Ph. D. in Computer Information Systems from The University of Michigan in U. S. in 1985. His research interests are in the areas of web-based negotiation support system, business models in electronic ommerce, approximate reasoning with fuzzy logic, matching problems, and decision support in health care. He has published more than 30 papers in professional journals such as International Journal of Electronic Markets, Internet research, Fuzzy Sets and Systems , European Journal of Operational Research, Management Sciences, Academic Medicine, Medical Decision Making, International Journal of Human-Computer Systems, and others. Norm Archer holds the Wayne C. Fox Chair in Business Innovation, and is a Professor of Management Science and Information Systems in the Michael G.DeGroote School of Business at McMaster University. His research interests are in topics that relate to eBusiness, including business-to-business implementations, intelligent agents, and the human-computer interface. He has published in a number of journals, including Internet Research, International Journal of Management Theory and Practice, IEEE Transactions on Systems, Man, and Cybernetics, International Journal of Human-Computer Studies, International Journal of Technology Management, and others. 1. Introduction What is mobile commerce?Is it just hype? Almost every company in telecommunications is trying to figure out what m-commerce really is, and how to exploit it. From the marketers’ vision, in the new world presented by m-commerce, consumers can use their cell phones and other wireless devices to purchase goods and services just as they would over the Internet using their personal computers (PCs). Specifically, m-commerce is about content delivery (notification and reporting) and transactions (purchasing and data entry) on mobile devices (Leung and Antypas, 2001).Unfortunately, in reality, m-commerce is often a highly frustrating experience. Industry observers attribute this drawback to the immaturity of mobile technology, but they believe 3G (third generation wireless digital cellular telephone technology) networks could change the situation (Cohn, 2001). While m-commerce is still in its infancy, enhanced devices and networks are irrelevant unless m-commerce applications are compelling and user friendly. Most often m-commerce is understood as mobile e-commerce (Donegan, 2000; Schwartz, 2000; Liebmann, 2000).M-commerce is supposed to enable us to buy everything from anywhere over the Internet without the use of a PC. Internet access and Web browsing is assumed to be the key to extending m-commerce to customers (Harter, 2000). In many ways, m-commerce is the continuation of e-commerce with the palm handheld, wireless laptops and a new generation of Web-enabled digital phones already on the market (Keen, 2001). Thus it was once believed that if you brought together mobile communications and the Internet, two of the biggest things in telecommunications, there would be an almighty explosion of growth.However, it has not happened yet. In many ways, m-commerce and the wireless Internet have been the victims of over-excited speculation (Darling, 2001). Among 1,700 people surveyed in Spring 2000 by Jupiter Communications, the majority said that they would not use nor pay for the wireless Web (Lindsay, 2000). WAP (Wireless Application Protocol) services were disappointing, particularly in Northern Europe countries, where mobile communications are most advanced and consumers know well the limitations of the wireless Web (Monica, 2000).Consequently, the enthusiasm that originally greeted the concept of the mobile Internet has waned. Contrary to conventional perspectives on m-commerce, forward-thinking marketers should not view m-commerce as e-commerce with limitations, but rather as wireless in its own unique medium, with its own unique benefits (Cotlier, 2000). Even though wireless technology is sometimes regarded as an enhancement tool rather than a brand new medium (Ramakrishnan, 2001), successful players in the m-commerce market space must take a much broader view of the technology, the market, and potential consumers.M-commerce is not simply a new distribution channel, a mobile Internet or a substitute for PCs. Rather, it is a new aspect of consumerism and a much more powerful way to communicate with customers. Obviously, people will not shop with their phones in the same way they shop with PCs. Unleashing the value of m-commerce requires understanding the role that mobility plays in people’s lives today. That calls for a radical shift in thinking (Nohria and Leestma 2001). In this paper, we will identify driving forces for the success of m-commerce.To clarify the nature of m-commerce, we discuss several fundamental differences between m-commerce and Internet-based e-commerce. Based on this new perspective of m-commerce, we identify a set of key factors that should be considered by marketers as well as consumers in making decisions concerning m-commerce applications. Finally, we propose that the synergy of three driving forces will lead to a greater likelihood of success for m-commerce. 2. Key differences between m-commerce and e-commerceAs we argued, m-commerce is not simply an extension or a subset of e-commerce. In fact, there exist fundamental differences between m-commerce and e-commerce in terms of their origins, technologies and the nature of the services the y can offer. 2. 1 Origin The emergence and development of e-commerce was due to the rapid growth of the Internet. The Internet originated from several U. S. government-sponsored programs (ARPANET, CSNET and NSFNET, etc) aimed at providing a networked computing environment for researchers (Kalakota and Whinston, 1996).Starting from the early 1990s, the Internet was extended to business community applications. With such great business potential and rapid growth to millions of users, the term â€Å"electronic commerce† was coined, and e-commerce applications expanded rapidly (Turban et al. , 1999). Because of widely-expanding networks and nearly free access to the Internet, e-commerce bridges distances and enables companies to display and sell goods and services cheaply to consumers and businesses around the world.In the Internet world, much is given away free or at a discount in the hope that a way will eventually be found (presumably through advertising income) to turn traffic into profits. Contrarily, m-commerce is rooted in paid-for service in the private mobile phone industry where business competition is stiff. In the telecom world, users pay for airtime, by the size of the data packet transmitted, and by the service used for what they get (Fox, 2000). Global wireless networks are segmented and owned by different mobile operators such as AT&T, Pacific Bell Wireless, Vodafone, Orange, Deutsche, NTT DoCoMo, etc.Compared to almost free Internet access, high cost has been seen as a major characteristic of m-commerce (Shim and Rice, 2001). Mobile communication through cell phones is costly, and any additional services will attract extra charges. The reason is that establishing a mobile communication network requires heavy business investment with no government support (Ramakrishnan, 2001). M-commerce carriers therefore must look for a great deal of business activity to generate revenues that justify the huge infrastructure investments (Lamont, 2001).Due t o their different origins, the customer bases of m-commerce and e-commerce are quite different. Researchers and university educators were the early users of the Internet. The Internet user population was originally dominated by highly educated people. As Internet household penetration increases, the demographics of users continue to shift closer to those of the population at large (Pastore, 1999). This growth pattern is clear in U. S. and tends to be repeating in the rest of the world (http://cyberatlas. internet. com/ big_picture/demographics).In contrast, other than business users, most cell phone users are young people or relatively less well-educated consumers. Over the next decade, billions of people will gain access to mobile devices, but many of them will be functionally illiterate and technologically unsophisticated users (Feldman, 2000; Barnett et al. 2000). Because of their differences in background, consumers tend to have quite different expectations for m-commerce, compa red to e-commerce. For example, one reason for the low uptake of the wireless Internet in the U.S. is that most Americans already are familiar with the wired Internet and expect to pay for wireless Internet access as they do for wired access: unlimited access for a flat monthly fee (Fox, 2000). 2. 2 Technology The Internet, the fundamental infrastructure of e-commerce, adopted a well-established protocol, TCP/IP (Transmission Control Protocol/Internet Protocol), which solves the global internetworking problem and ensures that computers communicate with one another in a reliable fashion. Over the past everal years, the World Wide Web (WWW) has come to dominate Internet traffic, and the vast majority of e-commerce applications are Web-based. It is also easy to connect the Internet with existing business information systems. Uniform Internet standards significantly reduced e-commerce entry costs and helped fuel the rapid growth of e-commerce. In contrast, m-commerce services are constr ained by a variety of wireless media communication standards ranging from global (Satellite), regional (3G, IEEE 802. 11a/b, DoCoMo I-mode), to short distance (Bluetooth) (Shim and Rice, 2001).Cellular carriers use different systems and standards such as GSM (Global Service for Mobile), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) to compete with each other (Leung and Antypas, 2001). M-commerce applications tend to be device and carrier dependent. The wireless applications today primarily use two technologies: WAP and SMS. WAP (Wireless Application Protocol) is the display language designed for cellular handhelds. It was created by Motorola, Ericsson, Nokia and Phone. com in 1997 when they founded the WAP Forum.WAP is a derivative of the XML/HTML language family, but it is designed to operate without a keyboard or mouse. SMS (Short Message Systems/Services) is a derivative of the old numeric paging network, with additional functionality for two-way communication and support for text and attachments. There are more users of SMS today than of WAP, thanks to cheaper service and the widespread availability of low-cost, two-way paging devices from companies such as Motorola (Leung and Antypas, 2001). Until now, there has been no generic world-wide framework and standard for application development using universal mobile connection and access.In fact, wireless technology is still in its infancy and hindered by limited coverage and a smorgasbord of competing standards, which can explain the slower-than-expected adoption of m-commerce in the United States (Shim and Rice, 2001). Choosing from conflicting standards, products and features, gives even hardened technophiles a headache. The pyramid of m-commerce applications thereby presents a much more complicated process, in which many pieces must fall into place before the mobile phone can be seen as a real revenue generator.In addition to underlying networking infrastructure and standar ds, it is the client devices that actually determine what specific services can be delivered. The boom in e-commerce applications is actually due to the widespread use of PCs, which have a complete text input keyboard, large screen, substantial memory, and high processing power. Contrarily, various m-commerce applications rely on the use of handheld devices. These devices range from pagers, cell phones, and palmtops, to pocket PCs.Mobile devices such as cell phones and PDAs (Personal Digital Assistants) have tiny screens, some of which display only three lines of text at once (Lucas, 2001). The displays are black and white with low resolution; there are no QWERTY keyboards, and no support for animation (Leung and Antypas, 2001). Although WAP devices support a limited graphics format called Wbitmap, because mobile devices have limited bandwidth and small screens, any application that is heavily graphic or animation driven would not be suitable at this time.In addition, software appli cations are relatively crude. There are no cookies or session controls, meaning that if the connection is lost, the application will restart rather than continue from previous screens (Leung and Antypas, 2001). Web browsers and drop-down menus are unavailable, so companies must plan on character-based terminal applications with cursors and key entry forms. Long selection lists or deep menu layers will wear out the fingers of even the most patient users (Moustafa, 2000; Jainschigg and Grigonis 2001).However, in contrast to PCs, cell phones do have their own unique features: mobile, portable (small size), smooth voice communication, and connected to persons (primarily because of portability) rather than to home or office. 2. 3 The Nature of Services The wide accessibility of the Internet makes any e-commerce service globally available. The Web enables search and delivery of rich information, and sophisticated electronic transaction processes can be integrated easily with backend enter prise information systems.In contrast, the delivery of m-commerce applications relies on private wireless communication carriers. These services are usually delivered to a specific region, and are rather simple, more personalized, location-specific and time-sensitive. Since a mobile device usually accompanies a person wherever he or she goes, mobile services can be delivered to a person anywhere and anytime rather than to a fixed office or home. M-commerce therefore creates more of a perception of enhanced intimacy with consumers than other office-based distribution channels.Time sensitive, simple transactions such as movie ticket purchases, banking, and travel reservations are believed to be the key applications that will stimulate m-commerce (Lucas, 2001; Swartz, 2001-2). Other key drivers to m-commerce growth are location-based applications such as traveler navigation, emergency response, etc. (Secker, 2001; Rockhold, 2001; Swartz, 2001-1). Finally, in general we categorize Inter net based e-commerce into B2C (business to consumer) and B2B (business to business). The rapid growth of e-commerce started from the booming of dot. com companies aimed at online shopping and customer services.Gradually, the emphasis shifted to B2B, and more recently e-business, to take advantage of the real business value of the Internet. In contrast, mobile commerce started from person to person communication, and gradually more services were introduced through interactions between people and systems: checking the weather, finding a local restaurant, etc. M-commerce applications can be used to serve both consumers and business people. Rather than apply B2C and B2B classifications to m-commerce, P2P (Person to Person) and P2S (Person to System) would be more appropriate to address the nature and trend of m-commerce applications.The details of m-commerce applications will be discussed in the next section. The major differences between m-commerce and e-commerce are summarized in Tabl e 1. Table 1. Major Differences Between M-commerce and E-commerce | | | | | |E-commerce |M-commerce | | | | |ORIGIN | | | |Sponsorship |Government-sponsored Internet |Private mobile phone industry | |Business entry cost |Low |High | |Customer access cost |Free or low cost Internet access |High mobile service charge | |Customer base |Highly educated computer users |Less educated cell phone customers | | | | | |TECHNOLOGY | | | |Message transmission |Packet-switched data transmission |Circuit switched for streamlined voice | | | |communication | |Protocol |TCP/IP, HTTPML |GSM, TDMA, CDMA, 3G | |Standardization |Highly standardized |Multiple incompatible standards | |Connectivity |Global |Mainly regional | |Bandwidth |High |Low | |Identity |URL with IP and domain name |Phone number | |Application development |General computer applications |Device-specific applications | |Interface device |Personal computers |Cell phones and PDAs | |Mobility |Fixed location |Mobile | |Display |Big scr een |Small screen | |Main input mode |Keyboard for full text input |Voice with small key pad | |Main output mode |Text and graphics |Voice with small text display | |Local rocessing power |Powerful CPU with large memory and disk space |Limited processing power with small memory chip | |Software and Programming |Support a variety of programming languages |Java or specific script languages | |Trend |Towards sophistication |Towards minimization | | | | | |SERVICES | | | |Service range |Global |Regional | |Delivery destination |PC in office connected to the Internet |Person accompanied by a mobile device | |Transaction complexity |Complete and complex transactions |Simple transactions | |Information provided |Rich information |Simple and short messages | |Timing |Less time-critical |Time critical | |Location-based service |No |Yes | |Target mobility |Service to a fixed point |Service to a moving target | |Backend business connection |Strong connection to backend business information | Weak connection to backend business information | | |systems |systems | |Service classification |B2C (business to consumer) and B2B (business to |P2P (person to person) and P2S (person to system)| | |business) | | 3. Key Factors in Designing M-Commerce ApplicationsOnce we have identified the major differences between wireless mobile communication based m-commerce and Internet based e-commerce, we can identify the key factors that must be taken into consideration in designing useful m-commerce applications. 3. 1 Mobility M-commerce opportunities can be very significant, if investors understand consumer groups intimately and develop ubiquitous solutions that recognize the role that mobility plays in consumers’ lives (Nohria and Leestma, 2001). In business services, not being forced to be hardwired enables a company’s employees to remain connected while moving from office to office, or state to state; they can tap into the corporate network from airport lounges and hotel lobbies.For individual consumers, mobile devices basically allow them to keep in touch with their friends and families anywhere and anytime. For instance, videophone users can take pictures wherever they go and send them attached with short notes to friends while shopping, traveling, or simply hanging out (Kunii, 2001). Beyond person to person mobile communication, additional value can be generated by linking mobile consumers and existing services. Mobile consumers can access various services anytime and anywhere, presenting new marketing channels for businesses. While traveling, a user may use a mobile phone to control a home burglar or fire alarm system and to turn lights on or off as if at home (Fox, 2000). 3. 2 Personal identity and built in payment mechanismsSince mobile devices, particularly cell phones, are registered by their subscribers and normally accompany the person, it becomes possible to identify and deliver personalized services to the user. A cell phone with additi onal security information such as a PIN number or biometric identification technology can be used to identify a person. A payment mechanism may also be built into the cell phone system. It is then possible to allow consumers to use their wireless phones as devices to make or trigger a payment (bus ticket, vendor machine etc. ), similar to the use of a smart card or an ATM machine. And there are even a few vending machines that let users pay for soft drinks using their cell phones (Fox, 2000). Credit card numbers could also be replaced by cellular phone numbers for wireless transactions.Relying on a third party payment mechanism is always a big hurdle for Internet-based e-commerce because an IP address cannot identify a person. However, this difficulty could be easily overcome in m-commerce with the use of an identifiable mobile device. Hence, cell phones naturally support e-Wallet applications in m-commerce, which is crucial to the success of other applications. Certainly, systemati c security solutions involving PKI (Public Key Infrastructure) and biometric services should be adopted as well (Young, 2001). As an example Obongo has modified its e-wallet software for use on wireless devices. A so-called m-wallet contains the cardholder’s account data, name, and mailing address, and is accessed with the push of a button.Once opened, the data within the wallet are transferred to the merchant to complete the payment (Lucas, 2001). M-wallets make micro-payments easier and help carriers charge for advanced services such as digital media and game applications that consumers cannot get any other way (Swartz, 2001-2). Besides financial services, personalization in m-commerce can migrate into entertainment (music and games, etc), content services and even personalized marketing. Since mobile operators maintain personal information on subscribers, a CD vendor, for example, could simply ask customers to verify payment information and a shipping address through their cell phone displays rather than have them fill out forms each time from scratch (Barnett, et al. 2000).Good potential applications of the content revolution are personalized software that deliver highly targeted offers for large- or small-ticket items that consumers can act upon, even while waiting in line (Lucas, 2001). 3. 3 Location-Based Services To date location-based services have been regarded as key enablers of m-commerce’s future success, according to the current hype (Swartz, 2001-1). Portable geographic positioning systems (GPS) are becoming smaller and more affordable, at costs in the neighborhood of only about U. S. $200. These systems can be used not only to identify locations, but also for business to deliver location-sensitive services to users. The ability to target rich and relevant information to end-users provides great potential value in location-based applications.For instance, it would be quite useful to provide driving directions and local commercial s ervices where users happen to be, such as near specific restaurants, movie shows, bus schedules, weather reports and guided tours in museums (Shaffer, 2000; Taaffe, 2001). Hence, one of the selling points of m-commerce applications is proximity. Go2Systems, in Irvine, Calif. , one of a swarm of vendors eyeing the uses of ALI (automatic location identification) data, linked with Coca-Cola to steer wireless customers to stores selling Coke products (Jones, 2000). Coca-Cola, the world’s best-known brand, has ventured into the wireless world by providing its fountain clients (McDonalds, Burger King and more than 800,000 U. S. estaurants) with the opportunity to attract additional business by placing their names on Go2 Systems’ wireless services. Their 5-year, U. S. $30-million deal will allow customers to find the nearest Coke fountain location through their cellular phones with Go2 location-based direction services, which include addresses, turn-by-turn directions and one -click calling (Swartz, 2001-1). CT Motion, a location-based services developer, provides an m-coupon application, by which the mobile user can receive an electronic coupon from a retailer in his or her specific location (Secker, 2001). Imagine that a young teenager is riding his skateboard through the park on a Saturday afternoon, when his cell phone beeps.It is a message from the Soda X portal that the local professional soccer team is playing tonight, and the store that he is approaching is offering him half-price tickets for the game if he buys a pair of jeans today. Privacy concerns are critically important while implementing location-based advertising. Pull mode may resolve the issue of privacy, when a mobile user requests information and is willing to receive an advertisement (Secker, 2001). However, many location-based applications are still to be developed; few carriers have a strategy, let alone a business model (Swartz, 2001-1). Location-based services would have to be ta rgeted extremely well, in order to avoid damaging trusted relationships that merchants already have with customers.Location can be traced not only for people but also for other objects. Cellpoint, a supplier of location-based services (LBS) software, provides the applications used to track remote assets such as fleet vehicles and construction equipment, and also provides telemetric products that allow remote machine-to-machine communications (Secker, 2001). It is also possible to trace a stolen car or a missing child that is carrying a specially designed radio device. 3. 4 Time-critical impulse purchasing Mobile phones are carried by their owners almost everywhere and kept switched on most of the time, especially in Europe, where mobile users are not charged for incoming calls.Consumers can thus not only gain access to wireless services wherever there is a network presence but also keep tabs on time-critical information such as stock market reports or urgent messages. Time-sensitive and simple transactions are another key to stimulate m-commerce. For some applications of m-commerce such as scanning news or purchasing books or other retail items, real-time transactions are not necessary. Nonetheless, there is a great deal of value in being able to monitor dynamic information through wireless handheld devices, such as aircraft flight status, shipping status, seat reservations or stock prices, and to alert the user when the information is updated (Shaffer, 2000; Schwartz, 2000; Leung and Antypas, 2001).There will be even more value in emergency situations such as medical care, traffic accidents, emergency road service, and crime reporting. Particularly with the mandatory ALI (automatic location identification) data supplied by a few key vendors such as Xypoint, U. S government emergency systems like E911 (Enhanced 911) could be improved (Jones, 2000). The United States’ FCC (Federal Communications Commission) mandates that the location of wireless callers be identified during a 911 emergency call. The MapInfo ® (www. mapinfo. com) Location Management Platform (LMP) is used to enhance a carrier's 911 service by automatically routing 911 calls to an appropriate Public Safety Answering Point (PSAP) for handling and dispatch. 3. 5 Special Market NichesMass-market consumers will be the really big users of m-commerce applications. And the customer base is large enough for potential revenue in the medium to long term (Sweeney, 2001). A single killer application would not work for everybody and there is going to be a whole set of niche applications that are relevant to each target audience. The mobile industry believes that location-based service advertising will have stimulated m-commerce so much that operators would eventually offer free phone charges to subscribers who are prepared to have advertising on their screens on a permanent basis. In particular, youth has a very powerful influence on this market (Secker, 2001).Actually, young p eople have been a major target of various m-commerce applications, particularly SMS and DoCoMo iMode services (Herman, 2000). Besides focusing on youth, mobile operators also suggest marketing future mobile data technology much more aggressively to business users (Parsons, 2000). In any case, for new m-commerce opportunities, carriers should be cautious about implementing applications that require changes in consumer behavior. If many technology hurdles are to be overcome, along with a corresponding unreasonable change in behavior, the application is unlikely to succeed. Additionally, price marketing is by far the most important in creating m-commerce value (Lamont, 2001).Mobile carriers therefore need to develop unique offerings for each target market segment or services targeted, according to geographical location and demographics (Schneiderman, 2001). Learning about and analyzing customer psychology, and taking marketer perspectives would help carriers segment the mass-market and target specific to m-commerce applications. We actually need to shift our way of thinking to exploit the uniqueness of m-commerce applications that can be brought to bear in our lives, rather than to be confined to thinking within the limitations of mobile devices. The factors that need to be considered for m-commerce applications are summarized in Table 2.Table 2. Key Design Factors and Typical Applications | | | |Factors |Typical Applications | | |Mobile communications (for business and personal contacts) | |Mobility |Scheduling and coordination (: e. g. appointment arrangements, reminders, | | |teleconferencing, etc. ) | | | |Location-sensitive |Travel navigation (driving or walking directions) | | |Local tours (exhibitions, shopping malls, etc) | | |Locating local services (restaurants, gas stations, etc) | | |Locating moving objects (missing children, stolen cars, etc) | | |Short Message Services (SMS) | |Time-critical |Time-critical information (flight schedules, weather rep orts, traffic information, stock| | |prices) | | |Emergency services (medical care, accident and rescue services, crime stoppers) | | |Personal identification (secure entrance with biometrics check) | |Personal identity |Electronic payments (e-Wallet) | | |Personalized location-aware advertisement | | |Language-specific services (automatically switch to or translate to desired language) | | |Demographic segmentation (oriented to young people or business people). | |Special market niche-targeted |Country segmentation (tailored to specific country) | | | | 4. Synergy of Three Driving Forces For m-commerce growth we identify three major forces that impel its growth: technology innovation, evolution of new value chains, and active customer demand.We propose that the synergy of these three forces will eventually lead to the success of m-commerce applications. 4. 1 Technology Innovation Technological progress is likely to bring about some novel applications for m-commerce. Here we identi fy several major technologies, improvements in which are expected to have a significant influence on m-commerce. The primary concern is with the capabilities of handhelds, the fundamentals of mobile networks, the accuracy of geographic location information, and security solutions. (1) Handhelds Low-cost, truly pervasive devices that present multi-modal information and perform transactions naturally can dramatically change what many people do and how they do it (Feldman, 2000).In the next several years, wireless devices will improve in interface design and information presentation. In countries like China and Japan, where the written language has never fit well with a Western keyboard, handhelds that employ handwriting or speech recognition seem ideal (Herman, 2000). Wireless keypad mnemonics can also make the entry of data easier for consumers (Young, 2001). Subscriber identity modules (SIMs) may take over due to their competitive advantage over voice or keystroke activation (Chanay , 2001). Newer devices will use expandable color screens capable of displaying up to 12 lines of text, more user-friendly keypads, and higher communication bandwidth (Lucas, 2001).Smart card memory capacity will reach 1MB by 2005. The processing capability of smart cards has increased and has given users the ability to enjoy more computationally intensive, high-value, transaction-based operations that require such features as digital signing and encryption (Moustafa, 2000). For those who crave the cutting edge, there are DoCoMo’s (in Japan) impressive third-generation handhelds, which can capture and send high-quality color movies almost in real time (Kunii, 2001). By using a DoCoMo camera-phone, it is possible to imagine being in a store shopping for a gift for a child and calling your spouse to show her what you are thinking of buying.Besides improvements in user interfaces, applications and underlying middleware configurations will allow for interactions to switch communic ation modes smoothly without losing clarity or the thread of conversation. The Java Card Forum has developed specifications for implementing Java on smart cards. Support of Java on SIMs will allow wireless terminals to reach the Java developer community, simplifying the development of new services (Carrara, 2000). Overall, next-generation devices are expected to combine the functions of Personal Digital Assistants or PDAs (data exchange) and cell phones (verbal communication). (2) Network infrastructure The current (second) generation of wireless networks and handhelds supports data rates of only 9. 6 kilobits per second, far below the 64 Kbps capabilities of landline copper wires.GSM (Global System for Mobile Communication), the most common cellular standard, is being extended by the GPRS (General Packet Radio System), which can support data rates of 112 Kbps, almost twice the rate of a standard computer modem and enough to support high-quality streaming audio. True third-generatio n (3G) networks, based on the UMTS (Universal Mobile Telephone System) standard, are predicted to raise the maximum rate to 2 Mbps — one-fifth of the bandwidth available on the standard Ethernet in today’s offices (Barnett et al. 2000) According to Ovum, 3G will first take hold in Asia and Europe, with the rest of the world trailing a year or two behind (Fitchard, 2001).Currently, the leader in the field is Japan’s existing second-generation, or 2G, digital networks that provide always-on connections for data transmission and support a wide range of online services – from news, weather, and ticket-booking to downloads of games and ring tones (Kunii, 2001). Therefore, in the next several years, hybrid elements of 2G, 2. 5G and 3G will be in play simultaneously on wireless operator infrastructure. Bluetooth is a short-distance, radio-based, point-to-point technology that, theoretically, can go up to 1 Mbps, and has already entered the market (Herman, 2000). It will be very useful for enabling location-based applications. It allows a wireless device to exchange data with PCs, laptop computers, point-of-sale devices and other wired devices without being physically connected by wires or adapters.Bluetooth is supported by more than 1,400 telecommunications and technology companies, including Motorola, Intel, and Lucent Technologies (Lucas, 2001). (3) Geographic location technology Location-based personalized services have been heavily touted as a major application for m-commerce. In order to deliver such services, mobile devices (particularly cell phones) should be able to keep track of an individual’s physical location as he or she moves about. Some companies are focusing on underlying technologies or services such as radio-based methods for determining where users are calling from, or software and systems that blend location data with other information (Shaffer, 2000).The FCC (Federal Trade Commission) has stringent requirements for location services, in which carriers have to offer network-based systems that deliver location information with an accuracy of 300 meters for 95% of calls and 100 meters for 67% of calls (Brewin, 2001). For instance, an FCC ruling requires all wireless carriers to find a way to pinpoint the location of the users dialing 911 emergency services. Although the requirements are meeting resistance from various carriers that say they cannot reach that level of accuracy or at least need more time to do so, some can meet the requirements with the portion of their networks that uses the GSM (Global System for Mobile Communications) standard. (4) Security technology The lack of security is said to be one of largest barriers in delaying m-commerce implementation.In particular, security is a vital issue that affects the use of mobile technology in financial services, when account details and other confidential information move across the networks (Dezoysa, 2001-2). With regard to securing tr ansactions, PKI (public key infrastructure) is believed to be the best method to secure end-to-end transactions (Moustafa, 2000). Besides securing wireless transactions from the cell phone to the m-commerce provider, the phone must also be secured from fraudulent use. Traditionally, the SIM card that stores the subscriber’s account information is used for identifying and authenticating the subscriber to the network. There are industry standards for SIMs used in digital wireless phones that help ensure that all SIM-based terminals can support any SIM applications and services a provider develops (Carrara, 2000).Dual chip phones even have an additional SIM-size slot for an independent multi-application chip card targeted at payment, such as a bank-issued WIM card (wireless identification module) or EMV card (a payment standard defined by Europay, Mastercard, and Visa International) and other banking solution applications (Dezoysa, 2001-2). In the near future, wireless biometric services will emerge as a common solution (Young, 2001). A biometric is a unique physical or behavioral characteristic of the human body, which may be checked automatically. The absolute verification of a user makes biometrics the highest security level. Biometrics come in many forms.In 2000, fingerprints were the most widely used biometric, accounting for 50% of the market, followed by hand geometry (15%), face recognition (12%), voice recognition (10%), handwritten signature recognition (8%), and iris scan (4%) (Biometric Industry Report, 2001). In recent years, biometrics have gone digital, and modern electronic systems are capable of distilling the arches, loops and whorls of conventional fingerprints into a numerical code. As an example, Champion Technology, a Hong Kong company, has launched a fingerprint recognition system, which takes only a few seconds to accomplish recognition (Leary, 2001). Biometric authentication offers some promise of strong and convenient security for cell phones, in which the subscriber’s signature or fingerprint can be thought of (mathematically) as a large random number (Crowe, 2001).These are easy for the owner to present to a machine but difficult for others to fake, and they cannot be lost, stolen or borrowed. The growing m-commerce industry eventually will settle on a set of solutions to all of the different security problems, building end-to-end solutions that are secure, cost effective and easy for consumers to use. However, successfully implementing good quality solutions relies upon the acceptance of standards (either de facto or negotiated) within the highly interdependent functions of this industry. 4. 2 Value Chain Evolution As we discussed above, m-commerce is primarily rooted in the cash-rich mobile phone industry.Therefore, equipment vendors and network operators have been dominant in the m-commerce world. And in some sense, the mobile operators own virtually all of the value chains (Donegan, 2000). Unfor tunately, this operator-dominated value chain is not able to successfully deliver flawlessly integrated personalized services for mobile phone users, which is crucial to the success of m-commerce (Swartz, 2001-2). In theory, mobile operators could compete at all levels of the m-commerce value chain, from the provision of basic technical services to the supply of lucrative, customer-facing content, but this is simply not possible, since this will spread their skills and resources too thin.This has been abundantly demonstrated in the e-commerce marketplace, where different companies tend to invest and to focus on their specific expertise at particular levels of the value chain. There are some exceptions, where dominant companies such as Microsoft and General Electric attempt to extend their reach vertically. Companies normally should concentrate on areas in which they naturally hold a competitive advantage. In m-commerce, mobile communication operators thus need to make difficult deci sions about which parts of the value chain to compete in – and how – and which parts to avoid. There are many critical roles that they may be able to play and a number of business models that may be suitable in these roles (Tsalgatidou and Pitoura, 2001).Some mobile data industry observers believe that, although Europe has a more advanced mobile communication infrastructure, the European approach to the m-commerce market will fail (Darling, 2001). They suggest that many European service providers want to own the customers and to support all the applications that customers want to perform. Some mobile operators may even want to become banks or content providers in their own right but, even though carriers have all the critical capabilities in place, including location, shopping, e-wallets, promotion and personalization, without partnerships with knowledgeable merchants and intermediaries, prospective customers will have nothing to access. Therefore, partnerships between -commerce providers, interested content providers, and other businesses are critical to the success of m-commerce. Providing complex data services is a very different business from running a voice network, so carriers have to choose partners to provide content, and decide which services to offer their customers. In pursuing value-added services, more entrepreneurial companies have the products and capability to get them integrated and delivered to handhelds (Goldman, 2000). Also, since capitalizing on the promise of m-commerce requires an in-depth understanding of consumer behavior, significant opportunities arise not just for providers of telecommunications services, but also for companies that have a rich and thorough knowledge of consumer behavior.However, from the merchants’ point of view, building m-commerce applications will present huge challenges, so companies need to leverage superior consumer insights to develop powerful branded solutions with value outside their t raditional markets, particularly when forging alliances with telecommunications carriers (Nohria and Leestma, 2001). In a value chain, each party plays its specific role and gets its own benefits. Customer service charges depend on how much value the user receives, so there will be different pricing and business models for individual services (Secker, 2001; Darling, 2001). Revenue sharing in m-commerce value chains, particularly in those of location-based services (LBS), involving mobile operators, equipment vendors and application developers, will require a significant amount of negotiation. As an example, CT Motion is an LBS application developer and equipment vendor, providing operators with a platform to enable deploying and managing LBS.CT Motion licenses its platform to operators, with an initial fee to cover basic hardware costs and licensing. Additional payments to CT Motion depend on the revenue stream from application users. Thus, revenue share will essentially depend on t he value of the application. For example, a company delivering a car theft recovery service is doing most of the work and so it might receive 95 percent of the revenue. For a simple application, the majority of the revenue will go to the operator and the platform enabler (Secker, 2001). In Table 3, we list the roles in an m-commerce value chain, the major players, and their corresponding sources of revenue. Table 3. Roles and Profit Sharing in the Value Chain | | | | |Role |Tasks |Major players |Sources of revenue | |Equipment Supplier |Manufacturing innovative handhelds and |Nokia, Ericsson, Motorola, etc |Selling phones, equipment, or | | |equipment | |sharing revenue with network | | | | |operators for discounted cell | | | | |phones | |Network Operator |Developing and maintaining |Traditional carriers such as |Charges from increased network | | |infrastructure to support mobile data |Vodafone, Orange, Deutsche |traffic | | |communication |Telekom, AT and NTT DoCoMo | | |Service Hosting |Providing basic enabling services such |Existing Web-hosting companies |Shared revenue with application | | |as server hosting, data backup, systems|and system integrators such as |providers | | |integration and security control |Oracle | | |Portal Provider |Offering simple, categorized |Internet portal service providers|Fees charged to application | | |information search facilities crucial |such as Freeserve, AirFlash, |carriers and advertisers | | |to m-commerce applications. |Room33, Microsoft, Yahoo, AOL | | | | |[email  protected] | | |Billing |Handling various sophisticated illing |Network operators such as |Transaction fees or interest | |Facilitator |mechanisms such as air-time-based, user|Vodafone, Orange, Deutsche |charged to merchants or consumers | | |patterns-based, specific |Telekom, AT, NTT DoCoMo and | | | |application-based, location-based, etc |banks and credit card companies | | |Application Provider |Providing various end-user services |Existing Intern et content |Revenue from customers for | | |such as ticket booking, e-mail |providers such as Yahoo, AOL and |services or products purchased | | |checking, news scanning, and |retail merchants (Coca-Cola, | | | |location-based services (LBSs) |PepsiCo, Procter & Gamble, etc) | |To help observe the maturity of the various value chain components of m-commerce outlined in Table 3, and to understand where further development must occur, it is informative to consider the inter-corporate linkages of m-commerce. This can be done according to corporate contributions to required infrastructure, associated support services, and delivery of these services to customers. To this end, we have adapted the well-known University of Texas e-commerce model of Internet Economy Indicators (Whinston et al, 2001). In their model, there are four layers (Internet infrastructure, Internet applications infrastructure, Internet intermediary, and Internet commerce).M-commerce differs significantly from e-commer ce, as we have pointed out, although there is some overlap in the functional nature of both. In our m-commerce value chain model, we also propose four layers: 1) Communications Infrastructure, 2) Applications Infrastructure, 3) M-commerce Intermediary, and 4) Mobile Commerce. Reading from the top of Table 3, the Communications Infrastructure layer includes equipment suppliers and network operators. The Applications Infrastructure includes service hosting, portal providers, and software companies that develop related software products and platforms. The M-commerce Intermediary layer includes billing facilitators, content providers, brokers, and market makers.Finally, the Mobile Commerce layer includes application providers that sell goods and services to customers. The interconnected and interdependent nature of these four layers of the value chain cannot be over-emphasized. Thus evolution in one layer will affect the other layers. For example, advances in the communications infrastr ucture, such as the widespread implementation of G3, will support new developments such as wireless video and bring more potential retail applications of mobile commerce that may be both time and location sensitive. But services to support these will require further evolution in both applications infrastructure and intermediaries. 4. 3 Active Customer DemandWhat is missing from m-commerce is compelling content that will make people want to use their handhelds to buy something. Consumers remain unconvinced about the wireless Web and user apathy towards wireless data services is believed to be one of the main factors delaying m-commerce implementation (Kelly, 2001). We propose that it is current narrowly-focused m-commerce applications (mainly on mobile Web systems) but not the fundamental nature of m-commerce, that frustrates consumers. The great advantage to people of eliminating fixed attachments to physical space, allows more strategic, creative, and flexible decisions and actuall y getting things accomplished (Kalakota and Whinston, 1996).Instead of waiting for killer applications to stimulate passive consumers, we propose that fundamental consumer demand is the active force that can improve the chance of m-commerce success. The success of the cell phone industry has already proved the significance of this active driving force. Today there are an estimated 115 million cellular phone users in the U. S. (Schooler, 2001). Market growth has been quite encouraging. Compared to the U. S, in Asia and Europe mobile telephony adoption is even more advanced (Herman, 2000). In Japan, the number of cell-phone users has already reached 66 million (Kunii, 2001). 64% of the people in Finland have a mobile phone, while the rate in Sweden stands at 55. 2% (Kruger, 2000).In China, the enthusiasm for mobile phones has exceeded all forecasts, and the mobile subscriber base will probably reach 250 to 300 million in 2005, up from 68 million in 2000 (Sliwa, 2001). Recently, the po pulation of cell phone users in China has reached 135 million, making it the world leader. Beyond enjoying the basic service of mobile verbal communication, consumers are beginning to demand much more from their cell phones. Two-thirds of Japan’s cell-phone users subscribe to one of many mobile data services offered by the country’s three cellular operators. Even though the actual demands vary according to different geographical locations and demographics, consumers have played a decisive role in the success or failure of m-commerce efforts.Most potential m-commerce successes will arise from consumer demand for additional value in their daily lives, and there is unlikely to be a single killer application that can spark m-commerce success. What consumers need is an adaptable package that can accommodate various m-commerce services (personalized location-specific and time-sensitive). It is the variety of cost justification criteria adopted by consumers (in turn determine d by demographics, regional cultures, current fashions, etc. ) that fundamentally affect their decisions concerning specific m-commerce services. According to a Nokia research study that focused on m-commerce services in the U. K. South Korea, Italy, USA, Brazil and Finland, the proportion of respondents that would carry out a transaction of more than U. S. $25 using a mobile device, ranged from 24 to 54 percent (Dezoysa, 2001-1). Also, 90 per cent of all end-users surveyed that would consider using m-commerce, either now or some time in the future, would be willing to pay for its use. However, this is on the assumption that the mobile device is free. It is still uncertain whether the cost of next generation phones can be subsidized by operators and, if they are not, how the added cost of paying over $150 for a mobile phone might well affect this figure (Dezoysa, 2001-1). DoCoMo recently sold about 10,000 videophones at a U. S. $500 price, with service limited to Tokyo (Kunii, 2001) .In Europe, the cost of providing advanced handhelds equipped with high tech features is also likely to be in the neighborhood of $500 or more (Carrigan, 2001). For the additional cost of high tech handhelds to be acceptable, consumers will expect to be able to access many additional services that are of value to them. In Europe, where mobile users are not charged for incoming calls, consumers can thus not only gain access to wireless services wherever there is a network presence but also keep tabs on time-critical information such as stock market reports or other urgent messages (Barnett et al. 2000). Such consumers are more likely to take advantage of these services.The focus in m-commerce needs to be on delivering simple, time-sensitive, and compelling applications that do not require a lot of training. If it takes too much time (e. g. more than 5 minutes) to conduct an m-commerce transaction, it might as well be done with a PC. One example is notification about tickets to entert ainment and sporting events. A consumer can contact a ticketing agency, such as TicketMaster, to request notification of availability of tickets for sale for an upcoming concert. When tickets meeting the consumer’s criteria become available, TicketMaster sends a message to the consumer’s wireless device and asks if the consumer wants to buy them or not. This is a simple yes-or-no transaction (Lucas, 2001).Any applications that require consumers to input much information will not work, because of keyboard limitations. For example, a visit to Barnes & Noble’s WAP site to enter credit card number, address, and shipping information requires more than 100 keystrokes (Swartz, 2001-2). 4. 4 Synergy of three driving forces The success of m-commerce relies on the synergy of three driving forces: technology innovation, value chain evolution and active customer demand. Technology innovation provides more useful functions with lower prices, creating value for customers and stimulating customer demand. Technology innovation also demands high-level collaboration through the value chain.Active customer demand provides rich revenue sources for the value chain and stimulates technology innovation and the development of new applications. Value chain evolution ensures the collaboration of multiple parties through appropriate profit sharing, which in turn supports more technology innovation. Through positive interaction loops the three driving forces will eventually contribute to the success of m-commerce. This synergy is graphically illustrated in Figure 1. 5. Conclusions Are we ready for m-commerce? Differing perspectives of m-commerce may lead us to opposite answers. But our research into the nature of m-commerce shows that m-commerce applications are fundamentally different from those delivered in the Internet- based e-commerce environment.Simply transforming e-commerce services to cell phones or PDAs will merely expose the limitations of wireless handhel ds and result in frustrating end-user experiences. Therefore, as we examine any speculation about m-commerce applications, we must attempt to exploit the unique features of mobile devices as well as to avoid their weaknesses. Furthermore, the eventual success of any m-commerce strategy depends on the synergy of the three driving forces we have identified: technology innovation, value chain evolution, and active customer demand. Acknowledgement: This research was sponsored by the research grant from Natural Science and Engineering Research Council of Canada.The authors are grateful for the anonymous referees’ constructive comments and valuable suggestions on the improvement of earlier version of the manuscript. References: Barnett et al. (2000), Nick Barnett, Stephen Hodges, Michael J. Wilshire, â€Å"M-commerce: an operator’s manual†, The McKinsey Quarterly; New York; 2000, No. 3, pp. 162-173 Biometric Industry Report (2001), â€Å"2000 Market Review†, Bi ometric Technology Today, Jan. , pp. 9-11. Brewin, (2001), Bob Brewin, â€Å"M-commerce hits snag as cell carriers balk†, Com