Tuesday, May 19, 2020

The Yellow Wallpaper Literary Analysis - 1486 Words

The setting of these two stories emphasize, on visually showing us how the main characters are based around trying to find freedom despite the physical, mental and emotional effects of living in confinement. While on the other hand, dealing with Psychology’s ugly present day behavior showing dystopia of societies views of women during the time period they lived. Comparatively, the relationships between the two main characters in the stories portray women’s yearning for freedom with different types of confinement. Psychological and physical confinements are terms that we can see used through out both stories. While â€Å"Story of an hour† basis its character being emotionally confined, and her great awakening being the room in which she grasps†¦show more content†¦Upon hearing the news of her husband’s death, Mrs. Mallard â€Å"wept at once, with sudden, wild abandonment† (Chopin 65) Specifically, Chopin makes us believe Mrs. Mallard was never happy, even from the shock in the beginning to a new outlook; she never had the life she wanted. She sits calmly down: There stood, facing an open window, a comfortable, roomy armchair.(Chopin 65) Mrs. Mallard in turn shows us that the word â€Å"comfort† is used to imply a different reaction than we would expect normally from losing a loved one. Discovering w hen she looks out the window she views life in a different way. Mrs. Mallard starts studying the nature outside the window: The delicious breath of rain was in the air. In the street below a peddler was crying his wares. The notes of a distant song which some was singing reached her faintly, and countless sparrows were twittering in the eaves.(Chopin 66) Bringing attention to new life, and a fresh start I believe the author was emphasizing on. At the same time we see as she runs off to her room. â€Å"When she abandoned herself a little whispered word escaped her slightly parted lips. She said it over and over under her breath: free, free, free!†(Chopin 66). This feeling; the feeling of freedom is obviously something Mrs. Mallard hasn’t felt for a very long time I believe. Mrs. Mallard has felt restrained and controlled throughout her whole marriage, emotionally and physically by her husband as we see in theShow MoreRelatedLiterary Analysis : The Yellow Wallpaper992 W ords   |  4 PagesLiterary Analysis: The Yellow Wallpaper In the story The Yellow Wallpaper by Charlotte Perkins Gilman she writes of a woman severely oppressed in her marriage. The women in the story is an open mind individual. John; her husband is a psychologist and thinks that his wife has a mental disorder because of all the free thinking and puts her through the rest cure. Through analysis of the story, we can see that this story displays a creepy tone in order to depict a serious matter at a time when women’sRead MoreLiterary Analysis Of The Yellow Wallpaper1226 Words   |  5 PagesIn the story, The Yellow Wallpaper the author Charlotte Perkins Gilman brings to life the tale of a woman suffering from post partem depression. Her husband is a physician and makes the mistake of keeping her closed off from the world. (John) thinks that the right thing to do is to keep her alone in an unfamiliar room. In this room, there is a bed that is nailed down to the floor and a yellow wallpaper that at first, she despises. However, she eve ntually becomes obsessed with it and goes completelyRead MoreLiterary Analysis of The Yellow Wallpaper860 Words   |  4 Pages wrote The Yellow Wallpaper, showing her disagreement with the limitations that society placed on women during the nineteenth century. According to Edsitement, the story is based on an event in Gilman’s life. Gilman suffered from depression, and she went to see a physician name, Silas Weir Mitchell. He prescribed the rest cure, which then drove her into insanity. She then rebelled against his advice, and moved to California to continue writing. She then wrote â€Å"The Yellow Wallpaper,† which is inflatedRead MoreLiterary Analysis Of The Yellow Wallpaper1512 Words   |  7 PagesIn 1892, Charlotte Perkins Gilman published the story, â€Å"The Yellow Wallpaper†; a short story that addresses the sensitive topic of inequality between men and women during the nineteenth century. The courageous feminist discusses an issue that many were afr aid to talk about, the inhumane treatment of women diagnosed with hysteria. She was the voice for the helpless women who didn’t know how to speak up during this revolting oppression. Gilman created the striking novel by using powerful images toRead MoreLiterary Analysis Of The Yellow Wallpaper1111 Words   |  5 Pagesobstructing man he’s vanquished on the floor and she walks over him, as it were!† The woman in the story of â€Å"The Yellow Wallpaper† is seen as a wife to a successful man, a woman who is sickly but well taken care of. In her mind she is trapped and finds a means of escape through the wallpaper, she finds the full escape she craves but at the cost of her mind. The house and the wallpaper are a metaphor of her life. The woman in the story is seen as sickly by those around her, and maybe she reallyRead MoreLiterary Analysis Of The Yellow Wallpaper2144 Words   |  9 PagesWith these views in mind, it is common knowledge that in 1892 Charlotte Perkins Gilman published her well-known short story â€Å"The Yellow Wallpaper† to address a large problem from her time. This story was controversial and groundbreaking because most people at that time did not understand Postpartum Depression. Most doctors believed only in what they could see, and as a result, the majority thought that women were just nervous and had slight hysterical tendencies. Gilman experienced first hand theRead MoreLiterary Analysis The Yellow Wallpaper589 Words   |  3 PagesIn Charlotte Perkins Gilmans â€Å"The Yellow Wallpaper† we are introduced to a woman who enjoys writing. Gilman does not give the reader the name of the women who narrates the story through her stream of consciousness. She shares that she has a nervous depression condition. John, the narrator’s husband feels it is â€Å"a slight hysterical tendency† (266). She has been treated for some nervous habits that she feels are legitimately causing harm to her way of life. However she feels her husband, a physicianRead MoreLiterary Analysis Of The Yellow Wallpaper1174 Words   |  5 PagesThe Woman Rocks the Cradle Charlotte Perkins wrote the short story The Yellow Wallpaper. For this analysis paper, I am only going to mainly talk about three characters and they are as follows: the narrator (some call her Jane), John (a certified physician and the husband), and the narrator’s brother (also a physician). This story starts off with the narrator talking about the new transition she has made with her husband John into a new house. On the very first page, she begins to explain how sheRead MoreThe Yellow Wallpaper Literary Analysis803 Words   |  4 PagesThe Truth is Insanity The Yellow Wallpaper by Charlotte Perkins Stetson is a short story told from the viewpoint of a young woman who has been taken to a house in the countryside to improve her health. The concept of truth explored within the story is equivocal as the way in which the characters are presented is inhibitory when deciding what is true and what is not. To begin, the young woman’s mental and physical health is a great point of dispute between her and her husband, John, as he â€Å"assuresRead MoreLiterary Analysis Of The Yellow Wallpaper By Charlotte Perkins Gilman1138 Words   |  5 PagesFebruary 2016 Literary Analysis of Symbolism in The Yellow Wallpaper During the late 1800’s, life for women was much different than it is today. Home and family were expected to be their priorities rather than education or the pursuit of a career in the professional world. Married women were not allowed to own property, keep the wages they earned or sign contracts. No woman could vote either. In short, women in the 1800’s were essentially second class citizens. In The Yellow Wallpaper, Charlotte

Analysis Of Disney s Purchase Of Lucasfilm - 1181 Words

Building trust when bargaining is key to successful negotiation agreements. Negotiators that build trust and are better prepared have a numerous advantage in having the negotiations to go in their favor as well as for the other party. Preparations should take place before the negotiations even begin, this provides a more productive outcome. Disney’s purchase of LucasFilm in 2012 demonstrated how well prepared Disney came to the table for negotiations with George Lucas. Company Background The Walt Disney Company The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise with five business segments: media networks, parks and resorts, studio entertainment, interactive media, and consumer products. Disney is a Dow company with revenues of over $40 billion in its Fiscal Year 2011. (Disney to Acquire Lucasfilm LTD 10/30/12) Lucasfilm LTD Founded by George Lucas in 1971, Lucasfilm is privately held, fully-integrated entertainment company. In addition to its motion-picture and television production operations, the company’s global activities include industrial Light Magic and Skywalker Sound, serving the digital needs of the entertainment industry for visual-effects and audio post production, LucasArts, is a leading developer and publisher of interactive entertainment software worldwide, Lucas Licensing, which manages the global merchandising activities for Lucasfilms entertainmentShow MoreRelatedDisney s Roster Of Heroes1013 Words   |  5 Pagesand Iron Man in Disney s roster of heroes (USA Today). Disney Chairman and CEO Robert Iger, along with Star Wars creator George Lucas, set the financial world and nerd-universe on their ear when they announced that Disney was purchasing Lucasfilm for the out-of-this-world sum of $4 billion (the same amount they paid for Marvel) (Screenrant). Disney is buying Lucasfilm for $4 billion, adding the legendary Star Wars franchise to the entertainment giant s stable of characters. Lucasfilm is 100% ownedRead MoreDisney Company : The World s Most Prominent Conglomerate1618 Words   |  7 Pages the Internet, music, and recreation, The Walt Disney Company is one the world’s most prominent conglomerate. Although it is known internationally for its princesses, pirates, and the iconic Mickey Mouse, Disney’s holdings include: a portfolio of cable networks (ABC, Disney Channel, ESPN, and more), film studios (Disney Animation and Pixar), Marvel Entertainment, and the internationally celebrated Disney resorts, amusement park, and cruises. Disney excelled in expanding a company’s purpose and assetsRead MoreWalt Disney Company : The World s Largest Motion Picture Multimedia Entertainment Companies Essay1634 Words   |  7 PagesThe Walt Disney Company is one of the world s largest motion-picture multimedia entertainment companies in the wor ld. Disney has several sectors in their company, which include two large well-known theme parks in The United States, which are Disneyland and Disney World. Disney also has sectors in a production company, several other multi-media companies, consumer products, resorts and spas. In the early 1920’s, a young man by the name of Walter Disney had a dream of becoming a newspaper artistRead MoreDisney Pixar Case2049 Words   |  9 PagesDate: October 24, 2012 ------------------------------------------------- Re: The Walt Disney Company amp; Pixar, Inc. – To Acquire or Not to Acquire? For more than a decade, Disney and Pixar have enjoyed a very profitable and productive partnership. Disney provided rich resources and entertainment business insight, including marketing and distribution acumen, which allowed Pixar to grow far beyond a software producer to the leader in computer-generated animated movies. Conversely, Pixar revitalizedRead MoreThe Disney Studios Industry And Competitive Analysis4241 Words   |  17 PagesINTERNAL BRIEFING DOCUMENT SUBJECT: The Walt Disney Studios Industry Competitive Analysis BACKGROUND The Walt Disney Studios was founded by brothers Walt Disney and Roy O. Disney as Disney Brothers Cartoon Studio on October 16th, 1923. Early production focused on short films and several all-animated cartoon series. Disney’s first foray into full-length animated features resulted in the seminal 1934 film Snow White and the Seven Dwarfs. Their first fully live-action film, Treasure Island, releasedRead MorePorter s Five Forces Framework992 Words   |  4 Pages5 forces analysis Porter s Five Forces Framework is a tool for analyzing competition of a business of an industry in terms of its profitability. The most unattractive industry would be one approaching pure competition, in which available profits for all firms are driven to normal profit levels. The five-forces perspective is associated with its originator, Michael E. Porter of Harvard University. This framework was first published in Harvard Business Review in 1979. Each industry generates profitsRead MoreDisneys Design3035 Words   |  13 PagesBased on the case study titled Disney Design, we would like sharing how The Walt Disney Company can be so successful in till today in the entire world mainly due to its successful organizational management. Walt Disney was established in the year 1923. As each and everyone know Walt Disney is the 11th world most valuable brand with a market capital net-worth of USD 179.5 billion by May 2015, according to the Forbes Magazine. It was stating from 1923 at California and it is still so popular in movieRead MoreWalt Disney6486 Words   |  26 PagesFinancial Ratio Analysis 6. Strategic Analysis SWOT Matrix Strategic Position and Action Evaluation (SPACE) Matrix Grand Strategy Matrix Internal External (IE) Matrix Quantitative Strategy Planning Matrix (QSPM) 7. Recommendations 8. Conclusion 9. References COMPANY BACKGROUND VISION AND MISSION STATEMENT Company Background The Walt Disney Company represents a truly immense organization composed of four strategic business units (SBUs) which are Disney Consumer ProductsRead MoreLeadership Steve Jobs Essay1004 Words   |  5 Pagesto make music players and cell telephones that consumer cherished. His small telephones were packed with so much processing power; they appeared as though scaled down Macs. He likewise made critically-acclaimed movie animation, inspiring Disney enough to purchase out his product organization, Pixar. Jobs last development was the tablet computer, which uprooted the PC. Jobs imagined the tablet as an amplification of the brain, an approach to get to data on the go constantly.   (Kalla, 2012) The objectiveRead MoreThe Walt Disney Company Report15335 Words   |  62 PagesCompany Research Paper The Walt Disney Company Pranay Kumar George Batah Shuxian Shen Sheng Hao Koo â€Å"We have complied with university honor code in completion of this assignment and I attest that this work is ours and ours alone.† Professor Suzanne Weiss Contents 1. Executive Summary 2. Company Background 3. Management 4. Situation Analysis 5. Ethics and Responsibility 6. Human Resource 7. Globalization 8. Operation and Production

Wednesday, May 6, 2020

Supply Chain Business Intelligence Technologies, Issues...

Supply Chain Business Intelligence: Technologies, Issues and Trends Nenad Stefanovic1 and Dusan Stefanovic2 Zastava Automobiles, Information Systems Department, Kragujevac, Serbia nenad@automobili.zastava.net, www.zastava-automobili.com 2 Faculty of Science, University of Kragujevac, Serbia dusans@kg.ac.yu, www.pmf.kg.ac.yu 1 Abstract. Supply chains are complex systems with silos of information that are very difficult to integrate and analyze. The best way to effectively analyze these disparate systems is the use of Business Intelligence (BI). The ability to make and then to process the right decision at the right time in collaboration with the right partners is the definition of the successful use of BI. This chapter discusses the†¦show more content†¦These networks are expanding to include additional services provided by an increasing number of partners: customers, the government, financial services organizations, and so forth. Investments in systems or applications need to take into account the requirements or opportunities enabled by this increasing interconnectedness. Fig. 2. The Supply Neitwork However, despite the huge investment in SCM software systems, they did not provide desired Return On Investment (ROI). The main reason is that these systems mostly provide only transaction-based functionality. They lack the sophisticated analytical capabilities required to provide an integrated view of the supply chain. This is where Business Intelligence (BI) tools like data warehousing, ETL (Extraction, Transformation, and Loading), data mining, and OLAP (On-Line Analytical Processing) can help adequately analyze operational effectiveness across the supply chain. 1.1 Supply Chain Performance Measurement Supply Chain Performance Measurement (SCPM) is vital for a company to survive in today’s competitive business environment. Performance measurement is one of the key aspects of management. If a company does not have a clear understanding of how well its supply chains are performing, it will be very hard to manage them successfully. 220 N. Stefanovic and D. Stefanovic Until a few years ago, there were several reasons why most companies did not implement supply chainShow MoreRelatedINFS16021489 Words   |  6 Pagesï » ¿Strategic Business Objectives Operational Excellence New products, services and business models Customer and Supplier Intimacy Improved Decision Making Competitive Advantage Survival Value Chain Model Primary Activities Inbound Logistics (warehousing systems) Operations (machining systems) Sales and Marketing (electronic ordering) Service (equipment maintenance) Outbound Logistics (automated shipment scheduling) Support Activities Admin/Management (messaging/scheduling) InfrastructureRead MoreTraditional Legacy Management Reporting And Decision Support Systems1516 Words   |  7 Pagesand reporting so as to forecast accurately to follow the fashion trend and react rapidly to the target market. Appreciating the development of information technology, with its capability of offering connectivity and enterprise integration, supply chain, customer relationship management and business intelligence applications, not only improve the efficiency and effectiveness of the company’s supply network, but also satisfies business strategies such as customer satisfaction, consumer retention andRead MoreGeneral Motors Supply Chain Essay1574 Words   |  7 Pagesinherent with the automotive supply chain including: risk, visibility, inventory management, cost containment, customer demands and globalization. GM currently expects its suppliers to adopt a lean philosophy to ensure it becomes the low-cost producer of quality products. It employs Just-in-Time (JIT) manufacturing and utilizes distribution strategies including maintenance of regional distribution facilities and third party management of logistics. [1] An efficient supply chain is no longer capable ofRead MoreZara Fast Fashion Case Study - Solutions1210 Words   |  5 PagesZara – Solutions: Zara is a world famous Retail Chain based in Spain and is extremely successful in their supply chain. Questions: 1. What is Zara’s Business Model and its unique Supply Chain strategy? Zara’s business model can be broken down into three basic components: concept, capabilities, and value drivers. Concept is to maintain design, production, and distribution processes that will enable Zara to respond quickly to shifts in consumer demands. Capabilities: Zara maintainsRead MoreSupply Chain Management For Fast Fashion Industry1623 Words   |  7 Pagessustainable conscious collection in the supply chain process in the fast fashion segment of fashion industry; a case study based approach focusing on HM and its main competitors. Abstract In recent years, the rapid changes in the fast fashion industry, a highly concerned about environmental issues as well as the sustainability for the company. Thus, it is a big challenge for the company s global operations to think about how to use the market intelligence, sensitive response and do more eco-friendlyRead MoreGlobal Issue : New Information Technology Initiatives1625 Words   |  7 PagesGlobal Issue: New Information Technology Initiatives Introduction This paper aims to suggest three new IT initiatives for the company. It defines the term and presents the key concepts for each initiative. It discusses the advantages of implementing these initiatives, identifies the challenges, and suggests vendors who could help implement these initiatives in the company. The 3 initiatives are customer relationship management (CRM), business intelligence (BI) analytics, and agile development methodologyRead MoreRelevant Types Of E Business Models1701 Words   |  7 PagesRelevant types of e-Business models In this case analysis, we use the term e-Business as a broader definition of e-Commerce (EC), not just solely describing the buying and selling of goods and services, but conducting all kinds of business online such as servicing customer, collaborating with business partners, delivering e-learning, and conducting electronic transactions within an organisation. This has to be stated since in some sources, the terms EC and e-Business are considered equivalent. E-CommerceRead MoreEssay about IBM Case Analysis1455 Words   |  6 PagesCase overview: Change in the business from local to global prospect provided for great opportunity to grow and at the same time brought in more challenges in the organizational structure of the companies. This case provides for a detailed discussion about various challenges present in developing a global integration. There are various forces that narrated about the reasons for IBM’s decision to become a globally integrated enterprise (Kanter, 2009). Various requirements enabled in developing theRead MoreTechnology Innovation And The Internet Of Things1443 Words   |  6 PagesBig Data, The Internet Of Things, Smart Packaging Are The Future Of Brands Technology innovation and the Internet of Things (IoT) are forcing companies to adopt perpetual change. No industry, segment, or market is immune. Consumers are forcing both brands and the packaging industry to evolve to focus on bringing products to the market that reduce costs and increase revenues†¦while driving brand awareness, sustainability, competitiveness, food safety, shelf life, and consistency. Further, the packagingRead Moreâ€Å"Coca-Cola Is Everything†1204 Words   |  5 Pagesexplore concepts such as supply chain management, switching cost, and business intelligence and apply them to Coca-Cola’s internal collaboration efforts. Sources in the paper have cited the use of social media tools through Facebook and loyalty programs. Warden (2013) has called Coca-Cola king of social of media. This paper will compare Coca-Cola’s social marketing abilities to that of Pepsi’s social media tools. Research will conclude that Coca-Cola has used various technologies to achieve worldwide

The Human Rights Of The United States - 768 Words

From the beginning of time the excessive desire for money and power of the few has led to stepping on and taking away the basic human rights of the masses. From the slaves of the ancient days to the under paid of today. The working man has hungered not just to live pay check to pay check, but to live comfortably after putting in a good days work. To be able to go to the hospital over work related and non-work related injuries without spending the rest of their lives in debt. To work in decent conditions where the demand for speed and mass production is set at a reasonable pace. In the meat industry it has been a century long war to win basic human rights. In the 1950’s butchers and slaughterhouse workers made decent wages that could support their families. Things shifted when companies started getting too big wanting larger and larger profits with lower and lower production costs. The worker is then treated the same as the animal to be slaughtered. In order to affect change th e working masses organized. Uniting under one cause against the evil of corporate greed. When cattle first came to America with the Europeans it was a simpler time. The cattle were set lose to graze in the forests and slaughtered as needed. In the 1800’s livestock started becoming more and more domesticated. They were breed, raised to work the fields, and sold or traded as needed with the local community. As town populations grew larger so did the need for commercial butchers. Cows were slaughtered asShow MoreRelatedThe United States And Human Rights Violations Essay1901 Words   |  8 Pages argue that the United States fails to encompass moral values by supporting anti-democratic ideals, so that they can increase their militaristic presence and protect economic interests in the world. Since the last century, the U.S has used the power of evil governments to slightly expand the presence of their military and ensure the safety of commercial interests. From Cuba in the early 20th century to numerous Middle Eastern countries in the 21st century, the case has been evident that the US willRead More The United States, the United Nations, and Global Human Rights4796 Words   |  20 PagesThe United States Positioning as a World Superpower: Its Subsequent Influence in the United Nations and Views Regarding Human Rights â€Å"America stands at this moment at the summit of the world.† -Winston Churchill, 1945 As World War II came to a close, a new need for an international peacekeeping organization became apparent in order to maintain peaceful relations among nations in the post-World War II era. The United Nations (UN) came into effect on October 24, 1945 for this very purposeRead MoreThe United States And The Universal Declaration Of Human Rights Essay1421 Words   |  6 PagesThe United States and twenty-six other nations formed the United Nations in 1945, three years later in 1948 the United Nations released the Universal Declaration of Human Rights and the U.S. was in favor for it. Article 25 of this Declaration states Everyone has the right to a standard of living adequate for the health and well-being of himself and of his family, including food, clothing, housing and medical care and necessary social services. One would think that a country in favor for the UniversalRead MoreThe United States Universal Declaration Of Human Rights2223 Words   |  9 Pagesremedies† inste ad. The state of Ohio responded by taking the family to court to attempt to force the girl into chemotherapy, which they argued was necessary to save her life. The court ruled in favor of the government, and in response the family fled the country, arguing that the treatment violated their cultural and religious norms, and there was no assurance that it would be effective. This case brings up several complicated issues of human rights that implicate principles from the United Nations’ UniversalRead MoreGuantanamo Bay and Human Rights Violations by the United States1536 Words   |  6 PagesIntroduction Guantanamo Bay, Cuba is originally a naval base that was once used to house detention facilities for Haitian and Cuban refugees fleeing to the United States. It was also used as a refueling station for Navy ships. It was then converted into a high level detention facility to house enemy troops captured in the War on Terror campaign by Secretary of Defense, Donald Rumsfield. It has three main camps that house the prisoners. These prisoners of war were later referred to as enemy combatantsRead MoreThe Prison Of The United States : An Odd Form Of Protection Of Human Rights1658 Words   |  7 PagesTitle: The Prison Industry in the United States: An Odd Form of Protection of Human Rights Name: Yi Jia SID: 1466752 As a nation that constantly alleges its irreplaceable position in the world that with obligation to protect human rights, United States has finally â€Å"fulfilled† their promise to the inmates in prison in 2009. Since the overcrowding prison population far exceeded the designed prison scale, three federal judges from Supreme Court dubbed perhaps the most radical injunctionRead MoreWomen Of The United States And The World Is Violating A Person s Human Rights1364 Words   |  6 Pages Over the year the United States and the world was and still is violating a person’s human rights. For century’s women, African Americans, gays, and lesbians were the grunt of such unfair treatment. Men thought a women place was in the home, cooking, cleaning, and taking care of the kids. Whites thought that black people did not deserve any rights because of their skin color. People where against gays and lesbians because of their sexual preference. In some countries women are not allowed toRead MoreHealth Care Issues Of The United States Universal Declaration Of Human Rights2635 Words   |  11 Pages Outline I. Introduction A. Hook The best chance of survival is having food and shelter to come back to every night after a long day full of workloads and stress. B. Thesis Health care is a basic human right every citizen in the United States should receive and be granted no matter the circumstance. II. Points A. Article #1 - Health Care Legislation 1. Before Obama signed the PPACA into law, insurance companies held most of the power over policyholders. 2. When Obama took office, he vowed toRead MoreUnited States Of Americ A Human Rights Defender For A Long Time Around The Global785 Words   |  4 Pages The United States of America had been known as a human rights defender for a long time around the global, but with the brutal torture actions performed by the Central Intelligence Agency, human rights that the America defended for so long seems to be questionable. Is it ok to violate international/ US laws as long as it benefits us? Moreover, does the so-called â€Å"enhanced† interrogation as effective as the CIA claims which helped gather valuable information from detainees that successfully help stoppedRead MoreCEDAW Essay1131 Words   |  5 PagesCEDAW, the international community has made significant progress towards the global normalization of human rights and the internalization of human rights laws into domestic policies and norms. Alongside the development of Human Rights, CEDAW has grown from a weak and largely unenforceable document into a widely-accepted international framework for the protection and advancement of women and women’s rights. Rather than act ing as a strict enforcer of hard-law, CEDAW acts more so as a universal set of guidelines

Computer Security Breaches

Question: Discuss about the Computer Security Breaches. Answer: Hyatt data breach According to Krebs (a popular cyber security analyst, 2016), any customer who used the services offered by Hyatt hotel between August and December 2015 is likely to have had their credit card data stolen. In fact, during this period unknown cyber criminals infiltrated the organisations 250 hotels across 50 different countries. An official statement by Hyatt Hotels Corporation further detailed the problem stating that majority of its payment systems were compromised by card stealing malware that targeted customers data. However, the said malware was precisely installed in the restaurants owned by the hotel with minimal intrusions detected in the other recreational facilities i.e. spas, shops, golf courses and parking (Krebs, 2016). Analysis of the Problem In an attempt to curb cyber security, many financial institutions are offering debit and credit cards that are incorporated with access chips. These access chips are meant to help retailers to track transactions through checkout systems that thoroughly read customers data off the said chips while maintaining cyber security compliance regulations (BITS, 2011). Similarly, Hyatt payment systems promoted credit and debit card payment where customer data was and is still encrypted in the existing chips. However, many of these cards shoulder little amounts of plain text data, stored in the magnetic stripes of the overall payment item. Therefore, when the cards are swiped in a transaction including fraudulent transactions, the data owned by the customer is placed at risk. Moreover, unlike in the past when data was primarily stolen off magnetic strips and replicated, Hyatts problem escalated beyond this basic rational where stolen data (plain text) was shipped to the United States and used t o make further security breaches (BITS, 2011). How was the data stolen The perpetrators installed data-stealing malware into Hyatt payment system, this was done using counterfeit cards which were used in certain managerial locations. Therefore, the cyber criminals first obtained customers card information, most likely through the magnetic strips which were then used as a loophole to access and infect Hyatt systems (Osborne Day, 2016). Moreover, the malware was designed to steal extensive records including; names of the cardholders, numbers, verification codes and the expiration dates. In all, these items were used by the organisation to confirm payment onsite at any given location. Therefore, with each transaction, the malicious program harvested credential information with minimal alerts to the staff or the management. Solutions First the loophole, despite the presence of encrypted chips most transaction cards (debit or credit) holds plain text data in the magnetic strips. This outcome exposes any organisation and its customers to security breaches. Therefore, by allowing customers to swipe the magnetic stripe exposes them to grave danger. A practical solution to this problem is to have chip readers within all the organisations facilities (Wattles, 2015). This provision eliminates the need for magnetic strips which are essentially used by criminal masterminds to steal the data they require. Furthermore, the said solution has seen tangible results are evidenced by the reduced counterfeit incidences in other G20 countries other than the United States who still fail to regulate the card liabilities (Krebs, 2016). Secondly, the organisation should instigate and stop intrusion through all targeted areas. In most cases hackers will use system vulnerabilities to carry out attacks, this includes malware, security liabilities and even personnel. On behalf of the system, the information technology department must develop prevention solutions that shut down the relevant vulnerabilities thus maintain an optimum level of security. For instance, password violations are a common phenomenon since most users will stick with default passwords. Advising customers to change the said passwords is a step in the right direction that minimises intrusion incidences (Symantec, 2011). Furthermore, in a case where a data breach is experienced such as the one seen in this case study, the organisation should in the future have detection systems that alert the administrators of possible data violations to prevent extended attacks. Hyatts systems were infected for more than four months without detection, which increased the severity of the problem. Moreover, these detection systems can identify and stop insider breaches that are caused by broken enterprise processes, for instance, an outdated antivirus. In addition to this, they automate security controls where security configurations on firewalls and even patch management are done with minimal input from the users. These functionalities introduced by detections systems can also be combined with event management systems to curb data breach incidences especially during outbound transactions where Hyatt systems were mostly affected (Prince, 2017). JPMorgan chase hack case In 2014, the renowned financial institution JPMorgan Chase experienced one of the biggest cyber-attacks seen in recent times. In the attack, accounts owned by both household users and small businesses were compromised. Moreover, the attack saw cyber criminals hack several computers within the financial organisation and the publisher of the financial institution. This hack allowed the perpetrators to access and steal customers personal information. In all, the attack is said to have affected more than 100 million loyal customers (Crowe, 2015). The Problem After a thorough assessment of the attack, JPMorgan revealed that the data breach targeted customer information such as contact details; names, addresses, numbers and email addresses. Moreover, the intrusion further compromised the organisations internal systems by collecting confidential data owned by the users. However, as stated by the organisation, the breach did not affect the customers financial records including the money they owned (Weise, 2014). This conclusion was provided because the details of account records were never affected by the attack including passwords, IDs, and social security numbers. Nevertheless, this information was completely contradictory with independent surveys done the New York Times that stated that the hackers obtained the highest possible level of administration within the institutions financial system. In essence, the cybercriminals had extended privileges on more than 90 servers owned by the bank. This access gave them the root control over the banks system including the transfer of funds, confidential information and the likelihood to close accounts. In a nutshell, the perpetrators could do whatever they wanted to do with the said system. Now, according to J. Thompson (2014), such attacks that have extended access but have zero money stolen are suspect to future attacks. Therefore, the hacker initially, intended to identify the organisation vulnerabilities for future exploits but were caught before proceeding with their extensive plan. The Attack Information is the most variable asset seen today and organisations such as banking institutions protect this asset with maximum security protocols including dynamic intrusion detection systems. However, the attack on JPMorgan system was started using a basic intrusion technique as compared to the sophisticated mechanisms thought by the public. To start with, the hackers stole an employees login information which was then used to access the system. After gaining access to the system, the hackers then used their newly acquired privileges to manipulate the pump and dump stock exchange schemes. This manipulation allowed them to generate lucrative deals on online financial proceedings such as online gambling which generated millions of dollars (Farrell Hurtado, 2015). Nevertheless, the root of the problem was stolen credential information that was later used to access the companys servers using computers in different locations throughout the world. Moreover, the criminals used the affiliate organisations owned by the institution to access their information. For instance, a website owned by a charity race hosted by JPMorgan was the first intrusion point. This cover up i.e. using affiliates and not the organisation itself, allowed the perpetrators to go undetected for an extended period of time (Goldstein, Perlroth and Corkery, 2014). Furthermore, the simple flaw was able to explain why other related organisations were unaffected by the security breach particularly at a time when controversial economic sanctions had been deployed by the United States. Prevention of the Attack From the analysis done on the security breach, it was clear that a simple flaw was the root cause of the problem unlike previously thought where experts proposed malicious bugs or Softwares sourced from the dark web. This kind of attack is easy to guard against as seen in other countless occasions. Many organisations the likes of JPMorgan invest heavily in computer security more so, on authentication and authorization, i.e. the access methods of this attack. Therefore, even though the attackers acquired login credentials of an employee, the security systems should have been able to detect and stop the violation. For one, a common practice seen today is the application of two-factor authentication mechanisms. In essence, institutions that host confidential information use different techniques to provide users access to their systems, these techniques verifies the identity of the user beyond resemble doubt. For instance, having acquired the login credential, JPMorgan should have genera ted a one-time access code for the user to access the system, this would have defiantly stopped the attack (TRC, 2015). However, the attack on JPMorgans system showcased a common problem seen in many organisation today, that of network vulnerabilities. As highlighted by many security experts, many organisation today fail to secure their systems at certain periods of the year when their focus is shifted to other crucial activities such as payment processes done during high turnover sessions. Moreover, this problem is aggravated by the acquisitions done by the organisations. These acquisitions make it difficult to integrate security systems owned by the parent company with those of the affiliate organisation and as a result of this weakness attacks are easily conducted through the weaker affiliate systems. A solution to this problem is to develop separate security measures for the acquired organisations, this ensures security is maintained prior to the integration (TRC, 2015). Nevertheless, despite the extensive challenges faced, organisations like JPMorgan whose annual returns surpass billions should employ basic if not sophisticated cyber security techniques. For instance, the multiple authentication techniques mentioned above where multiple factors are used to grant authority e.g. biometric, token and passwords must be used. Moreover, routine analyses should be done on existing systems through network management systems that evaluate transferred data packets for any alterations (Valdetero Zetoony, 2014). These simple security techniques could have prevented the attack on JPMorgans system even if the login credentials of one of its members was stolen. References BITS. (2011). Malware risks and mitigation report. Financial services roundtable. Retrieved 03 March, 2017, from: https://www.nist.gov/sites/default/files/documents/itl/BITS-Malware-Report-Jun2011.pdf Crowe. P. (2015). JPMorgan fell victim to the largest theft of customer data from a financial institution in US history. Retrieved 4 March, 2017, from: https://www.businessinsider.com/jpmorgan-hacked-bank-breach-2015-11?IR=T Farrell. G Hurtado. (2015). JPMorgan's 2014 Hack Tied to Largest Cyber Breach Ever. Bloomberg. Retrieved 4 March, 2017, from: https://www.bloomberg.com/news/articles/2015-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds Goldstein. M, Perlroth. N Corkery. M. (2014). Neglected Server Provided Entry for JPMorgan Hackers. Deal book. Retrieved 4 March, 2017, from: https://dealbook.nytimes.com/2014/12/22/entry-point-of-jpmorgan-data-breach-is-identified/ Krebs. (2016). Hyatt Card Breach Hit 250 Hotels in 50 Nations. Retrieved 4 March, 2017, from: https://krebsonsecurity.com/2016/01/hyatt-card-breach-hit-250-hotels-in-50-nations/ Osborne. C Day. Z. (2016). 250 Hyatt hotels infected last year with payment data stealing malware. ZDNet. Retrieved 4 March, 2017, from: https://www.zdnet.com/article/250-hyatt-hotels-infected-last-year-with-payment-data-stealing-malware/ Prince. K. (2017). 8 Ways to Prevent Data Breaches. IT business edge. Retrieved 4 March, 2017, from: https://www.itbusinessedge.com/slideshows/show.aspx?c=79585slide=9 Symantec. (2011). 6 steps to prevent a data breach. Retrieved 4 March, 2017, from: https://eval.symantec.com/mktginfo/enterprise/other_resources/b-6-steps-prevent-data-reach_20049431-1.en-us.pdf TRC. (2015). Data breach report. IDT911. Retrieved 03 March, 2017, from: https://www.idtheftcenter.org/images/breach/DataBreachReports_2015.pdf Valdetero. J Zetoony. D. (2014). Data security breaches; incidence preparedness and response. Washington legal foundation. Retrieved 03 March, 2017, from: https://www.bryancave.com/images/content/2/2/v2/2285/DataBreachHandbookValdeteroandZetoony.pdf Wattles. J. (2015). Hyatt Hotels data hacked. CNN tech. Retrieved 4 March, 2017, from: https://money.cnn.com/2015/12/23/technology/hyatt-malware/ Weise E. (2014). JP Morgan reveals data breach affected 76 million households. USA today. Retrieved 4 March, 2017, from: https://www.usatoday.com/story/tech/2014/10/02/jp-morgan-security-breach/16590689/

Market Analysis of Tesla

Question: Discuss about the Market Analysis of Tesla. Answer: Introduction: Tesla is the well known American automaker company which also stores the energy source. It specializes in the production of electric cars, the equipment of battery charging and the components of the powertrain. This organization produces several types of cars such as Tesla Roadster as the first sports car of electric, the luxury electric vehicle of the Model S and many more. According to Asseraf Shoham (2014), the innovative product and unique marketing strategy help to capture the world market easily in the competitive situation. It spreads its business all over the world mainly in United States, Europe, Asia, Canada and Australia successfully. Moreover, the partners of this company are Toyota, Panasonic, Daimler AG and Airbnb which help to foster the growth of Tesla (About Tesla | Tesla Australia, 2017). From the current study, it can be stated that Tesla delivered approximately 50,000 cars in 2015 from which near about 17,000 cars are demanded from Australia. The city New South Wales, Victoria and the Northern Territory of Australia has a high demand for Tesla's car from which it earns a huge amount of profit. The amount of revenue is approximate $4.05 billion in the year 2015 (Tucker, 2017). In this research analysis, the brief analysis has been done on the marketing strategies of Tesla. In order to evaluate the marketing strategies of Tesla, the brief overview of the company and its products, services, target markets and the suppliers of the company have also been discussed. Moreover, the marketing strategies used by Tesla have been stated through the pricing, promotion and distribution strategy. On the other hand, a comparative study has been made with the marketing strategies of the rivals. The SWOT analysis reveals the strengths and weaknesses of this organization. Lastly, the suitable recommendation has been provided on the improvement of marketing mix products of Tesla along with the sustainability aspects. Background of the company: Tesla is a car producer company related to the automotive electronic storage industry. It was established in the year 2003 by the group of engineers of Silicon Valley. The primary motive of the engineers was to prove the fact that the electric cars are better than the cars of gasoline-powered. The mission statement of Tesla is to move forward the transition of worlds transport and energy through the sustainable way. As a result, this organization launches the unique types of cars with the incredible power, zero emissions and instant torque. However, each and every new generation can afford the Teslas car only because of their effective pricing policy (About Tesla | Tesla Australia, 2017). By launching advanced types of cars and technology in the automaker industry, Tesla has been able to create its strong position in the competitive market. It gives the energy sustainable vehicles which are better than the gasoline-powered cars. By sharing the technology and using the auto pilot and Tesla glass advanced technology, it can control the gas emission power of the cars. The Tesla Motors awarded the Global Green of USA product or industrial design for its production of Tesla Roadster which is Lithium-ion battery made and all-electric made. Moreover, they also achieved the Secure and Sustainable World Awards by Green Cross International and Global Green by the USA. In short, Tesla receives the Environmental Leadership Award which signifies that it strictly focuses on the environmental sustainability factor during the production period (Tesla Energy | Tesla Australia, 2017). As per the high demand of Teslas car in Australia, it captures the overall market successfully. Its position in respect of the Australian market is significant as it can accelerate the share price from $30 to $291 in the year 2012. On the other hand, the company forecast the information that in next few years it can be able to increase its profit from $80 million to $100 million (Electric car maker Tesla charges into the Australian market, 2017). Products and services of the company: The main products of Tesla are the Automotive Electric Vehicles (cars) which focuses on the energy consumption factors. The Model S, Model X and Roadster have a high demand in the Australian market. Moreover, beside these models of cars, the associated products of the model cars such as Adapters, Charging, Tires, Tire Covers and Wheels are available on Tesla shop. Apart from this, Tesla launches five unique products which control the gas emission along with maintaining the environmental sustainability such as Autopilot 2.0, Tesla Truck, Ride-sharing service, Model 3 and Home Energy Storage devices (Knight, 2017). On the other hand, Tesla spreads its business over launching the products of phones, smart meters, communication and phone towers, NBN boxes transformers and the overhead high voltage power lines which have a high demand in the Australian market. In this perspective, it can be concluded that the services of this company are excellent and effective. As opined by Park et al., (2014), by selecting and producing the products of electric energy, the organization can ensure to pursue the good and healthy lifestyle of the customers. Tesla always highlights on the customer satisfaction factor for which they change and improve their service quality and concentrates on the healthy and emotional issues (Tesla plates, Tesla Pendants, Tesla Phone Tags, Geopathic stress reducers, Electromagnetic stabilizers, 2017). Target market and suppliers of the company: Like the North America, Tesla targets its business as the first market in Australia for the products of Powerwall residential type battery storage method. The main cities of Australia are recognized as the target market of Tesla which also considered as the growing list of energy partners of Tesla (Vorrath, 2017). Furthermore, Tesla found that Australian market is the key market place for efficient and cheap solar and the storage system. To manufacture and sell their products related to the solar city and solar roofing, the modern and developed cities of Australia are the target market of Tesla. By following the mission statement of Tesla, the Australian market is a suitable market for expanding the automotive industry which mainly concentrates on the generation of sustainable energy power. Moreover, the Home Battery Systems of Tesla Powerwall 2 has a significant demand in the Australian market from which it earns a huge amount profit (Vorrath, 2017). Most of the raw materials namely bauxite, boron steel, copper, rubber, silicon, leather, carbon fiber and many more things gathered from the best mining industries of the world (Sharma, 2016). They supply the raw material to Tesla and Tesla makes it better and useful by implementing the technology. Marketing strategies used by the company: The marketing strategies of Tesla are unique and effective to catch the market demand. The pricing policy, advertisement and promotional event and the distribution method are efficient to give the tough competition to the rivals. Now, the marketing strategies of Tesla have been discussed in the following manner. Pricing: The organizational head of Tesla Motors of Australia set the price of the car by considering the vision of the brand name. It is a well known famous brand of car which produces and launches some unique types of car that have maintained the environmental sustainability system. As a result, it has a significant and modest price. Now, the price of Model S by Tesla is slightly lower in the region of ACT than New South Wales and Victoria. The price is near about $120,000 of the Model S there due to the non-existence of the stamp duty (Leading the charge: Inside Tesla's quest to put Australia on the grid, 2017). Moreover, to attract more and new customers towards them, Tesla offered some discount. The way from Sydney to Melbourne is covered by the Supercharger stations of Tesla. Now, Tesla offered the free charge in this route to all customers in the year 2014. Mostly, it set its price in that way which all the customers can afford it smoothly (Wright Snook, 2017). Specifically, Tesla provides the best quality and advanced technology cars which have a high demand throughout the world. However, it has the problem of range anxiety which creates the adverse effect on the price of the products. Now, it is trying to overcome this issue to maintain its good will in the market. Promotion: Though it is a well known brand of cars and high demand in the world market, it does not concentrate on the investment of paid advertisement process. They do not believe in the marketing of their products through the paid advertisement or sponsorship programmed (Birk, 2015). The main motive of Tesla to doing this is that reinvestment in the production procedure. According to the concept of Tesla, they want to reinvest the money into the production procedure instead of advertising. This marketing strategy will help to gift the advanced and modern technology cars and many more things to the customers. As a result, it naturally makes its advertisement (Leading the charge: Inside Tesla's quest to put Australia on the grid, 2017). Distribution: The distribution process of Tesla also significant and effective which help to run the business successfully. The distribution process and service coverage of Tesla are very much effective. There are approximately 85% of the reservation holders of Model S within the 50 miles from the Service Center of Tesla and 92% within the 100 miles. It signifies the fact that service and distribution are their main priority to please the loyal customers. By merging with the automotive franchise dealers, they distribute and reach their cars towards their customers. The Fisker dealer ties up with the Tesla organization for distributing their products. Moreover, Tesla opens some new store in the main cities and location of Australia to reach the people easily. Comparison of the marketing mix strategies to its competitors: Tesla is one of the famous cars producing company related to electric vehicles which has a direct competition with the Ford Motors, General Motors, Toyota Prius, Honda Civic and Smart Car and many more. The Ford Motors gives the new information to the customers that they will invest the extra amount of $4.5 billion in the production of more electric cars by 2020 (Innovation, 2017). Moreover, the battery powered of Chevrolet Bolt by General Motors is expected to come on the market in 2016 providing the range of 200 miles. On the other hand, it also gives the advantages of clean vehicles along with the targets of the zero emission. Now, the marketing strategy of General Motors is changed to the environmental sustainability factor on the production of electric vehicles (General Motors Corporate Strategy | GM.com, 2017). Apart from this, Ford Motors emphasize on the sales promotion, advertisement, direct and personal selling of their products along with making the good relations with the public. On the contrary, Tesla does not consider the promotional event as the marketing strategy. Moreover, Fords sets the premium price and market-oriented price for their products which is lower than the price of Tesla. The Chevrolet Bolt by General Motors gives the tough competition to the Model 3 through reaching to the average customers. In this perspective, Toyota focuses on to maintain the low cost of their products along with the use of the traditional mediums for advertisements. Furthermore, they capture the huge dealership networking system throughout the world (Toyota Special Offers, 2017). Though Tesla has faced the tough competition by them, it still maintains its position in the market by applying the strong marketing strategies. SWOT analysis: According to Bull et al., (2016), with the help of SWOT analysis, the associated strengths and weaknesses of an organization can be accounted. The SWOT analysis helps to evaluate the organization in the structured planning way. Moreover, it assesses the opportunities and threats of the business venture along with the strengths and weaknesses (Hollensen, 2015). The SWOT analysis of Tesla has been critically discussed in the following manner. Strengths The unique position of Tesla in the Auto market: Tesla is not only a car selling organization, but also it delivers the cars with new technologies. It offers the electric vehicles and automobiles for the luxury market. Moreover, in the long range, it dominates the market and captures the market over the business of gas-powered cars. Robust amount sales growth: Tesla has been emerging its business rapidly. The increased amount of customers demands ensures the prospective business growth of this organization (Krebs, 2016). Due to an increase in the sales of Model S, Model X and Model 3, the sales figure rose from 27% to 59% approximately. As a result, Tesla provides the lower price of the car such as $35,000 to the customers. This organization is the sole producer of electric cars and the strong suppliers of the manufacturers namely Toyota. Tesla has the strong and efficient technological experts for performing the electric transmissions system and driving train. It can develop the vehicles and produce new types of products. Tesla concentrates on the environmental sustainability factor during the production period. It reinvests their profit to use the new technology during the time of production of cars (Steenkamp, 2017). Weaknesses Burning through the cash flows: Tesla invests a significant amount of cash due to the investment purpose in the research and development section. To get the transformative technology in cars, it spends lots of money on RD which is approximate $200 million in a year. It creates the adverse impacts on the cash flows of Tesla. The pressure of High debt: It has near about $2.5 billion long-term debt in the balance sheet. Due to insufficient cash flows and a smaller amount of cash on the hand, the high debt appeared on the balance sheet. The high debt would result in the delay in capital expenditures and investments which hamper the foster growth of Tesla (Oliveira, 2014). The prices of the products are high than their competitors. The costs of the production are high due to diseconomies of scale (Krebs, 2016). Opportunities The Australian governments support Tesla for their environmentally friendly nature by lowering the duties and tariffs. The improvement in the process of quality control will help to reduce the cost of the production (Liu et al., 2014). By launching the Model 3 at the cheaper rate, it can reach to the average customers easily. Threats The pricing strategy of Tesla is not so much significant in the automotive industry. The new technology combustion engine gives a tough competition to them (Blakeman, 2014). Tesla has faced a severe problem of liquid cash and the budget deficit issue which holds back the growth of the company. Table 1: SWOT analysis of Tesla Source: (As created by author) Conclusion: Based on the above analysis, it can be inferred that Tesla has a strong market demand for the electric vehicles in the automotive industry. The innovative production process, strong brand image, high control during the production of the vehicle and mostly maintain the environmental sustainability factor by controlling the gas emissions make them different from the others. However, the high cost and prices, debt burden and lower level promotional event hold back the prospective growth of this organization. In this perspective, Tesla needs to improve the technological system to reduce the price and cost of their products. The new facilities, presence in the international market and sales operation should be properly advertised so that it can reach to all customers. The RD procedure needs to be continuing for upgrading the technology and products. Thus, by following the above-stated recommendations, Tesla can achieve the foster growth easily. Reference List: Asseraf, Y., Shoham, A. (2014). 3 The impact of strategic orientations on export marketing strategy: new classification and typology.Research Handbook on Export Marketing, 60. Birk, D. (2015). Tesla Motors, Inc. Market Analysis and Definition. Blakeman, R. (2014).Integrated marketing communication: creative strategy from idea to implementation. Rowman Littlefield. Bull, J. W., Jobstvogt, N., Bhnke-Henrichs, A., Mascarenhas, A., Sitas, N., Baulcomb, C., ... Carter-Silk, E. (2016). Strengths, weaknesses, opportunities and threats: A SWOT analysis of the ecosystem services framework.Ecosystem services,17, 99-111. Hollensen, S. (2015).Marketing management: A relationship approach. Pearson Education. Krebs, S. (2016). Silent by design? Tesla's Model S and the discourse on electric vehicle sound: Tesla Motors Germany, Model S 85D (2015).Sound Studies,2(1), 93-95. Liu, Y. E., Kang, Y., Wu, H., Chen, C., Hon, E. (2014). Tesla Motors Inc. Case Synopsis.Burnaby BC: Simon Fraser University. Retrieved,10(18), 2014. Oliveira, J. P. (2014). Sustainable development, strategy and costs at Tesla. Park, J., Rast, J., MacDoughall, T., Nitti, B., Sinton, D., Geissler, A., Roseli, K. L. (2014). Marketing Plan for Tesla Motors Model S. Sharma, S. (2016). The Tesla Phenomena A Business Strategy Report. Steenkamp, J. B. (2017).Global Brand Strategy: World-wise Marketing in the Age of Branding. Springer. Wright, T., Snook, C. J. (2017).Digital Sense: The Common Sense Approach to Effectively Blending Social Business Strategy, Marketing Technology, and Customer Experience. John Wiley Sons. Official websites and newspaper articles: About Tesla | Tesla Australia. (2017).Tesla.com. Retrieved 29 January 2017, from https://www.tesla.com/en_AU/about Electric car maker Tesla charges into Australian market. (2017).ABC News. Retrieved 30 January 2017, from https://www.abc.net.au/news/2014-12-03/electric-car-maker-tesla-charges-into-the-australian-market/5938528 General Motors Corporate Strategy | GM.com. (2017).Gm.com. Retrieved 30 January 2017, from https://www.gm.com/investors/corporate-strategy.html Innovation. (2017).Ford Corporate. Retrieved 30 January 2017, from https://corporate.ford.com/innovation.html Knight, E. (2017).Tesla earmarks Australia for battery invasion.The Sydney Morning Herald. Retrieved 30 January 2017, from https://www.smh.com.au/business/comment-and-analysis/tesla-earmarks-australia-for-battery-invasion-20151104-gkqmf3.html Leading the charge: Inside Tesla's quest to put Australia on the grid. (2017).Marketing Magazine. Retrieved 30 January 2017, from https://www.marketingmag.com.au/hubs-c/tesla-australia-interview/ Tesla Energy | Tesla Australia. (2017).Tesla.com. Retrieved 30 January 2017, from https://www.tesla.com/en_AU/energy Tesla plates, Tesla Pendants, Tesla Phone Tags, Geopathic stress reducers, Electromagnetic stabilisers. (2017).Ehh.com.au. Retrieved 30 January 2017, from https://www.ehh.com.au/ Toyota Special Offers. (2017).Toyota Australia. Retrieved 30 January 2017, from https://www.toyota.com.au/special-offers-and-great-value Tucker, H. (2017).This is how many Tesla cars are in Australia.Business Insider Australia. Retrieved 29 January 2017, from https://www.businessinsider.com.au/this-is-how-many-tesla-cars-are-in-australia-2016-1 Vorrath, S. (2017).SolarCity, Tesla see Australia as key market for cheapest solar and storage.Renew Economy. Retrieved 30 January 2017, from https://reneweconomy.com.au/solarcity-tesla-see-australia-as-key-market-for-cheapest-solar-and-storage-48029/ Vorrath, S. (2017).Tesla Model X Australian price revealed.Renew Economy. Retrieved 30 January 2017, from https://reneweconomy.com.au/tesla-model-x-australian-price-revealed-54130/ Vorrath, S. (2017).Tesla targets Australia as 1st market for Powerwall, deliveries in 2015.Renew Economy. Retrieved 30 January 2017, from https://reneweconomy.com.au/tesla-targets-australia-as-1st-market-for-powerwall-deliveries-in-2015-2015/