Monday, December 30, 2019
A Brief Note On Cyber Crime Through The Years - 1482 Words
The Importance of Cyber Security in America ââ¬Å"If you spend more on coffee than on IT security, you will be hacked. Whatââ¬â¢s more, you deserve to be hacked. -Richard Clarke Cyber Crime through the Years Since the late 1980ââ¬â¢s, cyber security has been a growing industry. Viruses such as the Morris Worm proved to the world that the internet was not a safe and secure architecture. In later years the Michelangelo virus, Melissa, and Concept began to push the IT industry for research on cyber security and antivirus protection. Hacking over the years has shown us that certain individuals have manage to breach even the most protected government networks. Jonathan James otherwise known as ââ¬Å"c0mradeâ⬠was a notorious hacker in more recent years. He was convicted and sent to prison for hacking many networks including Bell South, Miami-Dade, the U.S. Department of Defense, and NASA. James was only fifteen years old at the time these events took place. He managed to hack into NASA s network and downloaded source code on how the International Space Station worked. The combined value of this download came out to nearly $1.7 million. After the attack, NASA was forced to shut down their network for three weeks so they could investigate this intrusion. The investigation itself cost over $41,000. Another hacker, named Kevin Mitnick, earned the title ââ¬Å"Most wanted computer criminal in computer historyâ⬠by the U.S. Department of Justice. Mitnick was caught infiltrating national defense warningShow M oreRelatedCyber Laws and Cyber Crime3575 Words à |à 15 PagesIntroduction 2 3 Cyber crime 2 4 Classification of Cyber crime 2 5 Status of Cyber Crime 6 6 Cyber law 7 7 Cyber Law in India 8 8 Advantages of Cyber Law 9 9 General Suggestions and information 10 10 Suggestions for better security 10 11 Conclusion 11 12 Reference 12 Abstract: Cyber law and cyber crime is becoming an important issue for socialRead MoreHacktivism Essay1832 Words à |à 8 PagesIntroduction Walk through the grocery store or go to buy a computer or a car, you will see labels for no steroids or additives, ââ¬Å"This item meets energy star requirementsâ⬠, or an EPA rating sticker. These primarily have come about from activist and lobbyist. Activism has definitely shaped our society for better or worse. Activism has long been a practice in American society. Only recently has the Internet become a factor in political participation. Hacktivism has brought a new method of activismRead MoreTft2 Task 44005 Words à |à 17 PagesTFT2 Cyber Law Task 4 Jordan Dombrowski Western Governors University Situation Report It has come to my attention from the security analysts of VL Bank and victims that commercial customers of VL Bank have been involved in identity theft and fraud. Multiple user accounts were created without authorization claiming the identity of our customers. These fake accounts were used to make twenty-nine transfers of $10,000 each, equaling $290,000. The bank transfers were being sent to several U.SRead MoreThe Growing Problem of White Collar Crimes in India19963 Words à |à 80 PagesThe Growing Problem of White Collar Crimes in India ââ¬Å"The practitioners of evil, the hoarders, the profiteers, the black marketers and speculators are the worst enemies of our society. They have to be dealt with sternly, however well placed important and influential they may be; if we acquiesce in wrongdoing, people will lose faith in usâ⬠- Dr Radhakrishnan Methodology The research methodology used for the present research article is traditional DoctrinalRead MoreTerrorism And The United States1981 Words à |à 8 Pagesfor the past 40 years that is what has been happening in cities all across the United States. Gang related terrorism is extremely high in inner cities all across the country and the Crips are the largest gang that operates in America. In 1970ââ¬â¢s California the Crips were created as a response to protect their neighborhoods but have grown to much more than that. Today there are over 33,000 members of this terror organization who use murder as one of their top fear tactics. Through their promotion ofRead MoreDigital Images And The Digital Image2731 Words à |à 11 Pagesused in the covert exchange of information, steganography is used in many other fields such as preventing e-document forging , copyright etc . For the past decade, many steganographic techniques for still images have been presented. Terrorist through Cyber-crime are also getting benefit from steganography. Lots of research works are also found for hiding data in music files, and even in a simpler form such as in HyperText Markup Language (HTML), executable files and Extensible Markup Language (XML)Read MoreRole of Intelligence in Indiaââ¬â¢s Security5420 Words à |à 22 Pagesnext decade ââ¬â Role of Intelligence I feel greatly honoured and privileged to have been asked to deliver the R. N. Kao Memorial Lecture this year. I believe, it is the sixth in the series started in 2007 by Shri Tharakan, the then Secretary, Ramp;AW . It feels good to be following the five distinguished speakers who have delivered the lecture in previous years. Before this distinguished gathering, it is hardly necessary to enumerate the achievements of Shri Ramji Kao, one of the most celebratedRead MoreIntimate Partner Violence ( Rdp ) Or Domestic Violence3392 Words à |à 14 PagesIntroduction Intimate Partner Violence (IPV) or domestic violence (DV) reportedly affects more than 5 million Americans each year (Goodley Fowler, 2006). IPV is the most common cause of nonfatal injury to women it the United States (U.S.). It is an ongoing issue that was first widely recognized as a major societal concern in the 1970ââ¬â¢s (Nicholls Hamel 2015). It is a significant problem with critical consequences for an individuals overall health and well-being. IPV not only has acute effectsRead MoreCyber Security And Internet Security Essay7416 Words à |à 30 PagesABSTRACT The term paper begins with a brief Introduction of CYBER SECURITY, This term paper is designed to give you information about vulnerabilities in CYBER SECURITY , Frameworks that get affected By CYBER SECURITY Measures to protect DATA SYSTEM in cyber security In the end it tells us about Various International Indian cyber security LAWS INTRODUCTION PC security, otherwise called cybersecurity or IT security, will be security connected to figuring gadgets, for exampleRead MoreThe Human Rights Act Of The Uk4192 Words à |à 17 PagesOver the last 20 years there has been a concerted effort by the government to erode our civil liberties and infringe upon our most fundamental human rights. Whether it be ââ¬Å"paternalisticâ⬠state snooping authorised by the Home Secretary Theresa May, closed courts and ââ¬Å"secret justice,â⬠the seizure of travel documents, reintroduction of exile as a punitive measure or restrictions placed on individuals through Terrorism Prevention and Investigatory Measures, legislation has noticeably become more draconian
Sunday, December 22, 2019
My Personal Experience Of God - 7569 Words
Thessa G. Smith 103 Stratford Road-Greenwood, SC 29649 864.377.0400 tgsmith@umcsc.org Thessa G. Smith 103 Stratford Road ââ¬â Greenwood, SC 29649 Cell phone: 864.377.0400 tgsmith@umcsc.org Disciplinary Questions ââ¬â Part I Describe your personal experience of God and the understanding of God you derive from biblical, theological and historical sources. I have a personal relationship with God the Father through the redemptive power of Jesus Christ and the keeping power of the Holy Spirit. I spend time daily in prayer, meditation and reading of the scriptures. My understanding of God is found in The Apostle Creed which states: I believe in God, the Father Almighty, maker of heaven and earth; And in Jesus Christ hisâ⬠¦show more contentâ⬠¦This point happened ââ¬Å"before the foundation of the worldâ⬠Ephesians 1:4. And there you are, at the beginning. God knew you before there was a ââ¬Å"before,â⬠at a time when the Father loved the Son, also ââ¬Å"before the foundation of the worldâ⬠John 17:24. You begin as part of a trinitarian plan, not yet as a created reality, but with the people whom the Father gave to the Son from out of a world he had not yet made John 17:6. What is your understanding of evil as it exists in the world? Adam and Eve was placed by God in a perfect newly created world. They were free and commissioned to rule the earth with authority and dominion without any restrictions on how to accomplish this task. However, Adam was instructed by God not to eat from the tree of the knowledge of good and evil, which would reflect his dependency on God: ââ¬Å"You may eat freely of every tree of the garden; but of the tree of the knowledge of good and evil you shall not eat, for in that day thatShow MoreRelatedMy Personal Experience Of God2602 Words à |à 11 Pagesà ¶ 324.9a - Describe your personal experience of God and the understanding of God you derive from biblical, theological, and historical sources. My personal experience of God is based on my life experiences and a personal relationship with Jesus Christ. I have experienced Godââ¬â¢s presence in my life and I have felt the Holy Spirit guiding me. I first felt Godââ¬â¢s call as a teenager and prayed that one day I would become a pastor. But my new Christian faith was not strong enough and I soon succumbedRead MoreMy Personal Experience Of God2177 Words à |à 9 PagesDescribe your personal experience of God and the understanding of God you derive from biblical, theological and historical sources. I was born in South Korea between my father who was skeptical and my mother who was faithful for believing God in the Korean Methodist Church. For this reason, it was natural for me to attend a Korean Methodist church. At that time, I did not know what the church is doing and why I should attend the church, but what I learned about church was what I am redeemed by JesusRead MoreMy Personal Experience And Understanding Of God1722 Words à |à 7 PagesMy personal experience and understanding of God has resulted from what God has revealed to me. F. Belton Joyner, Jr. says, What we know about God is what God has revealed to us. Over the course of my life God has been revealed to me through God s love and grace. When I was twelve years old, I accepted Jesus Christ as Lord and Savior of my life. In the years prior, God was continually drawing me closer to God, even before I was aware I needed God. We are made aware of our need for repentance throughRead MoreThe United Methodist Churchâ â¬â¢s Book of Discipline Essay1169 Words à |à 5 PagesThe United Methodist Churchââ¬â¢s Book of Discipline states, ââ¬Å"Wesley believed that the living core of the Christian faith was revealed in Scripture, illuminated by tradition, vivified in personal experience, and confirmed by reasonâ⬠. This statement outlines the concept of the Wesleyan Quadrilateral. Interestingly, John Wesley never actually used the term ââ¬Å"quadrilateralâ⬠and the American Methodist scholar, Albert C. Outler, who later stated that he regretted doing so as it has been misconstrued, namedRead MoreThe Argument From Religious Experience1460 Words à |à 6 PagesReligious Experience The argument for God, based on personal Religious experiences, is an argument that cannot be refuted by others. While others may not have the ability to prove the existence of God, through anotherââ¬â¢s experiences, they also cannot disprove this existence. A personââ¬â¢s personal experiences are something that no other person can determine, nor argue. My experiences are my interpretations for the occurrences within my life, therefore, another person cannot determine what my true experiencesRead MoreA Personal Relationship With Jesus1520 Words à |à 7 Pageshe Origin of a Personal Relationship Concept ââ¬Å"Personal relationship with Jesus.â⬠Being an Atheist, Iââ¬â¢ve had hundreds of arguments with Christians about Jesus and religion in general. No matter what evidence I provided, the Christian always seemed to bypass it with the Personal relationship cop out. They would tell me they donââ¬â¢t practice religion, and that they have a personal relationship with Jesus. They would insist that I take five minutes of my time at night and call on Jesus while Iââ¬â¢m allRead MoreMy Personal Christian Worldview1439 Words à |à 6 PagesMy Personal Worldview My personal Christian worldview is full of heavy doses of God, and plenty of drizzles of the Bible, and it was born from a combination of how I was raised, my life experiences, and my assumptions. This worldview is heavily involved as I bring up my children to love God, and do my best to be a good wife to my husband. Most of all, this combination has filled my heart and soul with the conclusion that God is my all! I was raised in a Christian home where my parents taught Godââ¬â¢sRead MoreA Summary On Charismatic Faith And Ministry1693 Words à |à 7 PagesCharismatic Ministry. Here Thimell continues his systematic approach to the book, but now switches to the rest of the story, the work of the Holy Spirit in our lives today. Thimell takes a very academic and cerebral approach to the gospel. His lack of personal encounters and stories are evidence to that fact. However, this is a refreshing approach that presents the gospel with just the basic facts and not many frills. I believe that Thimellââ¬â¢s purpose in writing this book was not to give an exhaustive bookRead MoreThe Spiritual Discipline Of Practicing The Presence851 Words à |à 4 PagesChristward direction, constantly being thankful and doing everything for God. This reflective essay will cover numerous aspects of the spiritual discipline of practicing the presence, including my original understanding, a significant Christian historical figure, and denomination comparison. Furthermore, different personal experiences of practising the presence, specifically individual, group and corporate, as well as a reflection on my original ideas and closing with ways to encourage practising the presenceRead MoreBruce Almighty Reflection1001 Words à |à 5 PagesPeople usually think that for God to speak to a person it has to be something completely extraordinary, however this is not the case as you can find God in all things. To understand the benefits and drawbacks of extraordinary and ordinary more clearly, contemporary examples such as movies, novels, or personal experiences are very useful. The movie Bruce Almighty is an example of a way God can reveal himself in an extraordinary way. The main character, Bruce, is an egotistical news reporter who seems
Saturday, December 14, 2019
Susan B. Anthony Speech Free Essays
Effective Speech Susan B. Anthony Speech 1873 Susan B. Anthony was born on February 15, 1820 and she was one of the many women in the nineteenth century to fight for womenââ¬â¢s rights. We will write a custom essay sample on Susan B. Anthony Speech or any similar topic only for you Order Now She would travel all over the nation and create petitions for the right for women to vote and also slavery. She was an abolitionist, an educational reformer, a labor activist, and of course a womenââ¬â¢s right campaigner. As brave as she was, she voted illegally in the presidential election of 1872 in Rochester, New York and arrested. They had fined her 100 dollars but did not imprison her, which she refused to pay. The next year, Susan presented a speech explaining and demanding that women had the right vote just as much as men did. She states, ââ¬Å"It was we, the people; not we, the white male citizens; nor yet we, the male citizens; but we, the whole people, who formed the Union. (1873)â⬠. She pointed out that the constitution itself stated that people as a whole would help and contribute to justice and establishment in the United States. Most importantly, Susan Anthonyââ¬â¢s speech in 1873 was effective in every way. Although, it took as long as 14 years after her speech for women to have the lawful right to vote and exactly one hundred years after her birth, she campaigned and petitioned all over the nation and was part of several organizations against slavery, womenââ¬â¢s suffrage and the labor movement. She fought and petitioned for the thirteenth amendment which was to outlaw slavery. She was threatened by many people and humiliated but nothing stopped Susan from continuing to fight for everyoneââ¬â¢s rights. I define effective as being helpful and successful, in Susanââ¬â¢s case, it wasnââ¬â¢t successful right away, but her intelligence throughout all the years after her arrest, made her stronger and thatââ¬â¢s what made her goal become a success, she never gave up. The speech took place in 1872 in Rochester, New York after she voted for the presidential election. It was after the judge had fined her with $100 to pay for unlawfully voting for a candidate. The court room was filled with politics, former presidents, women and men that supported her words. She stood alone at the Canandaigua Courthouse and gave her speech before her sentencing. She stood handcuffed but nothing stopped Susan B. Anthony from expressing her feelings towards the authorities that were trying to keep her from voting. Susan opened her speech by addressing it to each and every single person in the room. She did not mention only men or only women but stated, ââ¬Å"Friends and fellow citizensâ⬠. Her main ideas that she was mainly focused on getting across were the constitution itself explained how we the people were to help establish a better and equal America. She did not understand why the constitution contradicted itself because later, women were still not allowed to vote. She also explained, if the government wouldnââ¬â¢t allow women to vote, they were degrading us. ââ¬Å"For any state to make sex a qualification that must ever result in the disfranchisement of one entire half of the people, is to pass a bill of attainder, or, an ex post facto law, and is therefore a violation of the supreme law of the land. By it the blessings of liberty are forever withheld from women and their female posterityâ⬠(Susan B. Anthony 1873). In this quote she strongly expresses her feelings and beliefs, if the government were to ever pass that law, liberty and equality were to be taken from women forever. Women all over the nation supported her and felt the same exact way. She used effective language and everyone understood where she was coming from. Susan was very motivating and persuading, not only in her speech but many of the other speeches she had presented in the past in court rooms, events in town during the womanââ¬â¢s suffrage movement. She created petitions all over the nation to get people to support her so she would have many reasons and supporters when the time would come. The speech wasnââ¬â¢t so conversational but more of a last words speech before she was sentenced. She had many goals she wanted to achieve but her main concern was to be able to have the same rights as men had. Men at the time had the right to vote, and were eligible to run as a candidate in a presidential election. They treated women as animals that were not capable of managing anything and had no say in who would be the best choice for America. Many people were emotionally affected by Susanââ¬â¢s speech because she wasnââ¬â¢t only fighting for herself but for other women and also slaves. She did not only think about herself but others too. People realized that she casted this vote for women and slaves so that the government would know that Susan was no longer taking any disrespect from her fellow citizens. Iââ¬â¢m not sure if she was well prepared because when she had given her speech she was in court. She probably felt a lot of pressure because this speech determined if they would really listen to her or sentence her to a long time in jail or bombard her with fines from he government. The text from the speech is well said and well thought out, every word came out one hundred percent strong and she spoke with powerful words. If you pay attention on how she stands up for women and the slaves at the time, she was very serious and completely heartbroken because of the decisions and laws that the government had created at the time. ââ¬Å"To them this government is not a democracy. It is not a republic. It is an odious aristocracy; a hateful oligarchy of sex; the most hateful aristocracy ever established on the face of the globe; an oligarchy of wealth, where the rich govern the poor. An oligarchy of learning, where the educated govern the ignorant, or even an oligarchy of race, where the Saxon rules the African, might be endured; but this oligarchy of sex, which makes father, brothers, husband, sons, the oligarchs over the mother and sisters, the wife and daughters, of every household ââ¬â which ordains all men sovereigns, all women subjects, carries dissension, discord, and rebellion into every home of the nationâ⬠(Susan B . Anthony 1873 Speech) Susan believed that the government ad only focused on the negativity. Instead of them trying to educate the ââ¬Å"ignorantâ⬠, why wouldnââ¬â¢t they try to educate ââ¬Å"just peopleâ⬠in general? Not everyone had the same opportunities as other so why not give them the opportunity to learn and share that knowledge. She also didnââ¬â¢t understand why the head of household was always addressed as the father, or if the father died the son would take his place for example in a royal chain, if the king dies, the son automatically became king. The rich were always the superior because they had the money. I support Susan B. Anthony completely because even though, it took many years for the law to become effective, she did everything possible to help out women and slaves. She risked her life in some situations, was arrested for illegally voting knowing she couldnââ¬â¢t vote but did anyways for the sake of women. She has motivated me to want to be superior in a large company one day. The CEO of many companies are always men and very few women. Society has painted a picture out for us that make us think automatically that the CEO of a popular firm or chain is man instead of a woman. Also, America back in 2008 had the chance to vote a woman for president, Hilary Clinton, but we did not because we felt as if she wasnââ¬â¢t capable of running a country all on her own and America wasnââ¬â¢t ready for a woman president. Others believed that if she were to have won the election, Bill Clinton wouldââ¬â¢ve helped her run this country which is a very negative comment to say. There is nothing I would have changed about her speech but what I would have changed was the timing of the law becoming effective. Susan was an extraordinary woman who had courage, determination, and motivated many other women after that to continue her footsteps. How to cite Susan B. Anthony Speech, Papers
Friday, December 6, 2019
Li Fung Internet Issues Essay Example For Students
Li Fung: Internet Issues Essay Written Case #1 Li Fung: Internet Issues Li Fung is a Hong-Kong based import-export trading company that provides value-added services across the entire supply chain in a borderless manufacturing environment. The growth strategies for the company are a combination of an organic model, acquisitions, and use of E-Commerce technologies to extend the supply chain to new markets. Li Fung hopes to offer its supply chain services to the small and medium-sized enterprise (SME) market by developing an Internet portal. In the prevailing business environment, it has not been cost effective to trade with SMEs since orders were small and below the factory minimums for production. Through a proposed Internet portal, Li Fung hopes to aggregate orders across multiple SMEs to capture the necessary economies of scale. The company is ready to beta-test the portal, but is now worried whether the SMEs will adopt the new model, and whether this new Internet portal would weaken the existing trader-based organizations that serve the large corporate customers. 1. Li Fung (A): Internet Issues (pp. 20) 1. 1 Li Fung Company Background (pp. 3 5) Founded in 1906. $2 billion dollar company (At the time of the case), listed under HKG on the Hong Kong Stock Exchange. Comprised of a global network of partners and clients. 69% of total sales from the U. S. Products include a mix of hard goods (quality controlled products such as toys and sporting goods) and soft goods (clothing and apparel). Profit margin for soft goo ds was between 6% 8%. Profit margin for hard goods was between 10% 30%. 1. 1. 1 Holistic Supply Chain Management (SCM) (pp. 5 6) Li Fung is an SCM chain in itself, producing finished products from raw materials. Provides a number of value-added services within its global supply chain. Value-added services include: Reduced turnaround time. Reduced matching and credit risks. Greater quality assurance. Lower cost and more flexible sourcing. Up-to-date fashion and market trend information to clients. 1. 1. 2 Corporate Culture and Compensation (pg. 7) Although a public company, William and Victor Fung remained as key executives. Victor handled strategic issues and long-term planning. William handled day-to-day operations. Li Fung recognized new-age and forward thinking as important aspects for sustained advantage. Enforced a culture that was humble, agile and responsive and externally focused. The corporate structure was decentralized allowing for adaptability and rapid reaction to seasonal fashion shifts. Promotions and compensation were based on merit. And executive bonuses were determined by profits (no ceiling). 1. 2 Tripartite Growth Strategy (pp. 7 10) In 2000, Li Fung viewed the future success determined by: Organic growth Expansion through acquisitions And extension of its supply chain to new markets via the Internet. . 2. 1 Organic Growth (pp. 7 9) What would drive organic growth would include: More orders from existing clients. New mandates from strategic clients. And an extended and diversified network around the globe. Established the modified three-year plan in 1996: The first three-year plan (1993-1995) looked to fill gaps in its network of offices to cover new sourcing markets. The second three-year plan (1996-1998) looked at margin expansion to increase profitability and looked to double profits every three years and achieve $3 billion in annual sales Li Fung outperformed Hang Seng Index by 75% in 2000. . 2. 2 Acquisitions (pg. 9) Li Fung would gain new client accounts through the acquisition of rival sourcing companies, and in the process, integrated operations, bringing the operating margins of these acquired units up to Li Fung levels. List of Acquisitions by date: 1995: Sourcing company Inchcape Buying Services (Dodwell) equal in size to Li Fung 1999: Export trading operations companies Swire Group, Swire Maclaine and Camberley. By August 2000, Li Fung was five-times the size of its closest competitors (William E. Connor and Associates and Colby International). . 2. 3 E-Commerce (pg. 10) Li Fungs global intranet was first launched in 1995 and provided: Real time orders and shipments. Digital imagery for online inspection. Troubleshooting. Secure ex tranets were launched in 1997 and linked Li Fung directly to key customers (10 such extranets were in place by 2000). Secure extranets: Allowed for online product development as well as order tracking. Eliminated paper trail of hard copy documentation. Streamlined communication as orders moved through the supply chain. 1. 3 Competitive Threats (pp. 10 11) .u199ff2f5f6398de54f23a2a5b4205a23 , .u199ff2f5f6398de54f23a2a5b4205a23 .postImageUrl , .u199ff2f5f6398de54f23a2a5b4205a23 .centered-text-area { min-height: 80px; position: relative; } .u199ff2f5f6398de54f23a2a5b4205a23 , .u199ff2f5f6398de54f23a2a5b4205a23:hover , .u199ff2f5f6398de54f23a2a5b4205a23:visited , .u199ff2f5f6398de54f23a2a5b4205a23:active { border:0!important; } .u199ff2f5f6398de54f23a2a5b4205a23 .clearfix:after { content: ""; display: table; clear: both; } .u199ff2f5f6398de54f23a2a5b4205a23 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u199ff2f5f6398de54f23a2a5b4205a23:active , .u199ff2f5f6398de54f23a2a5b4205a23:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u199ff2f5f6398de54f23a2a5b4205a23 .centered-text-area { width: 100%; position: relative ; } .u199ff2f5f6398de54f23a2a5b4205a23 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u199ff2f5f6398de54f23a2a5b4205a23 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u199ff2f5f6398de54f23a2a5b4205a23 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u199ff2f5f6398de54f23a2a5b4205a23:hover .ctaButton { background-color: #34495E!important; } .u199ff2f5f6398de54f23a2a5b4205a23 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u199ff2f5f6398de54f23a2a5b4205a23 .u199ff2f5f6398de54f23a2a5b4205a23-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u199ff2f5f6398de54f23a2a5b4205a23:after { content: ""; display: block; clear: both; } READ: CONTENTS 3 Introduction 4 The Human Heart 5 Sympto EssayRather than strictly looking for quantity, Li Fung focused on narrow and deep relationships with its customers. William Fung viewed the Internet as just another communications technology. Victor Fung viewed the Internet as a revolutionary technology that would change speed of information transfer but not the business model. 1. 3. 1 Bubble In (pp. 11 13) Li Fung looked to develop an in-house e-commerce solution, adding two technical directors to its board (one, a CEO from a technology company and the other an academic). 1. 3. 2 Enter Castling (pp. 11 13) Li Fungs focus in e-commerce would be on a combination of technology and supply chain reform (that would ultimately transform the retail end). The e-commerce solution would also focus on both old and new school economic ideas. Through LF International, Li Fungs venture capital group, Li Fung invested in the Internet startup company called Castling. Castling used the Internet to defend the offline old economy companies such as Li Fung, while simultaneously extending their own online presence. As a strategic partner, Castling created lifung. com. Lifung. com: 20% of lifung. coms staff came from Castling 0 full-time professionals (expanding to 80). 25 consultants. 1. 4 SME Target Market: B to small b (pp. 13 16) Market research conducted by Li Fung showed that small- and medium-sized enterprises (SMEs) would be the best target population for an e-commerce (lifung. com) initiative since: SMEs generally paid the most for both hard and soft goods. And SMEs were usually only offered a limited range of options in product specifications and oftentimes overlooked by suppliers more concerned with serving larger clients. For Li Fung, historically, it was not cost effective to trade with SMEs. However, an aggregated B2B portal could offer SMEs an array of products while also profiting Li Fung through: Economies of scale. Li Fung could concurrently manufacture the aggregated orders while giving SMEs enough differentiation of choice to enable them to each have a different product. Table B (pg 14) provides a side-by-side comparison of what lifung. com offered over existing competitors in the online market (taking into account product differentiation, price, reliability and information flow). 1. 4. 1 B2B Parameters (pp. 14 15) Startup capital of $250 million through the creation of 60 million shares. Implementing Li Fungs supply chain management know-how allowed for virtually no inventory risk. Lifung. com would operate standalone (although integration at some level was required) from Li Fung (the parent organization). Lifung. com would run without fear of having to produce instant profits. 1. 4. 2 E-Commerce Execution (pp. 15 16) The Fungs believed that due to the power Li Fung had in back-end logistics infrastructure, reliable procurement, market knowledge and brand reputation, other e-commerce companies would not be able to compete with lifung. com. 1. Future Ventures (pp. 16 18) Li Fung looked to e-commerce as an integral constituent of its strategy of expanding and diversifying its traditional offline business. Li Fung expanded the B2B initiative to include Electronic Stock Offer (eSO). eSO looked to create an efficient system for reaching out to Li Fungs supplier base and posting surplus stocks on the Internet. Additionally, the tool would provide a more efficient a nd cost-effective platform where Li Fung could sell to buyers primarily interested in purchasing more. 1. 6 Outlooks and Prospects (pp. 8-19) The trend towards business casual attire in the American workplace offered considerable upside for retailers of polo shirts and khakis and thus for sourcing agents such as Li Fung. During the economic downturn, Li Fung looked to outsourcing to remain competitive and minimize costs. Jitters existed between executives wondering what the actual impact would be to Li Fung (on the old economy and existing key partners and clients). Lastly, would lifung. com break away from Li Fung, or would it remain within the confines of the brick and mortar organization?
Subscribe to:
Posts (Atom)