Thursday, October 31, 2019

International security environment Essay Example | Topics and Well Written Essays - 500 words

International security environment - Essay Example As the conventional/traditional military prove itself outdated and no more useful in modern warfare, the irregular threats compel the military to transform its structure and technology. The unique position of the U.S. Military in international security and its leading role in counter terrorism/counter-insurgency compel it to be innovative and refined. From this view point, the future military service can be predicted and it provide due importance to sophisticated training and innovative technology. For instance, the 9/11 terrorist attack forced the government to shape the Office of Force Transformation (OFT) to transform the US Military to be competitive in present and future missions. So, it is quite evident that the future military services will be more aggressive than present. Barnett points out that future may prove the maximization of U.S. Military influence in every nook and corner of the world. Apparently, one who is in military service must be prepared to be in any part of th e world to serve the nation. Besides, Barnett states that globalization leads to increase in standard of living, but some areas are disconnected from its influence and is still underdeveloped. This disconnection resulted in non-integrating gap among world countries, and acts as a threat to national security of the U.S. government. In the work- ‘American defense policy’ by Paul J. Bolt, Damon V. Coletta, and Collins G. Shackelford points out that: â€Å"Our next war in the Gulf will make a historical tipping point- the moment.

Tuesday, October 29, 2019

Eid Celebration and Poors Essay Example for Free

Eid Celebration and Poors Essay Abstract Acknowledgement We are highly grateful to almighty Allah who gave us the power to complete this report and we would also like to a very special thanks to our honorable teacher to Mr. Tahir Iqbal DIHE ,   for providing us a golden opportunity to do this research whose help , stimulating suggestions, knowledge, experience and encouragement helped us in all the times of study and analysis of the project. without whom this report was almost mpossible. It was a really good learning experience working under him. We would also thanks to all of those who supported us in any respect during the completion of the project. There are many traditional celebrations throughout the world. There is Christmas, Thanksgiving, and Easter. Not everyone or every culture, so to speak observes these celebrations. It depends on your background, culture, and beliefs. Every year within our culture and religion we celebrate (Eid) al Fitr. Eid is the Muslim holiday that marks the end of Ramadan, the ninth month of the Islamic calendar, the month in which the Quran was revealed to the Prophet Muhammad it is the month of fasting Eid is an Arabic word meaning festivity, while Fi? means conclusion of the fast; and so the holiday celebrates the conclusion of the thirty days of dawn-to-sunset fasting during the entire month of Ramadan. The first day of Eid, therefore, falls on the first day of the month Shawwal. Eid is almost like Christmas, with family gathering, festive attires, giving of gifts, and food, this holiday is very memorable. In Pakistan, as the holy month of Ramadan comes to an end, charities and markets find the mselves overcome by a burst of activity. We call ourselves Muslims, yet we don’t want to lose out on this wonderful opportunity to rip people off in the holy month of Ramazan. We create an artificial price hike, raise the prices to double and triple to earn a windfall profit†¦ because who knows when the chance to ‘hit the hardest where it hurts the most’ will come again. The entire nation adorns a garb of piety from the evening of the first day of Ramazan till Chand Raat. Western society has a lot to learn from us Muslims; they don’t quite understand the essence of unity, do they? Like naive creatures they actually lower their prices around Christmas time and go on a complete slash of prices right after Christmas. These people actually want consumers to afford the luxuries of life and celebrate with their loved ones. It seems like they haven’t learnt their lessons of a capitalist society well enough. No wonder people in that part of the world live longer and are hideously obese! On Eid day and the holidays that followed, we saw numerous pictures on television channels of  people celebrating the occasion in parks, on the beach and at family gatherings but this is just one face of Eid. For many others — perhaps, tens of thousands of people — Eid remained a far less festive occasion. The parents who could not buy clothes or new shoes for their children ; nor did those unable to put together a decent meal even on this occasion. During the religious festival, the household spending touches its peak Our survey revealed that in Karachi even low income group spend nothing less than Rs1000 per person in the family. This is inclusive of all expenditures that include spending on dresses, footwear, accessories, edibles, household durables and transport. The informal survey indicated the varying composition of spending in the family budget of different social classes. The proportion of spending on poor increases as income climbs. While in families of modest means, the Eid budget is consumed by basic needs, food, clothing, etc . Problem Statement The commencement of the month of ramadan is going to bring in not only the frenzy of the upcoming Eid festival but also something else which is increased tension and worry that is caused by the uncontrolled price hike of the daily essentials. Each year before the month of ramadan, the prices of the daily essentials increase twise or even thrice as much. Its difficult for lower income families to manage their budget in Ramadan and Eid due to increases of prices. The poor have got poorer and those who thought that they were well off a few years ago are busy reassessing their value – something to do with fitting into the elite. , a person (unskilled worker or the people at the lowest rung such as guards, sweepers or seasonal workers) making Rs5,000 (about $75) per month living off a make- shift hutment in a shanty township (kutchi abbadi) supporting a family cannot spend his full salary on Eid shopping. The market sources confirmed that inflation has jacked up the prices but the rise in prices of fabric, footwear and ordinary accessories is much less in percentage as compared to hike in the prices of edibles. â€Å"The food inflation is backbreaking high at 25-35 per cent. For a variety of reasons, the rates of ordinary local fabric and garments have risen marginally by 5-10 per cent†, a market analyst observed. According to a Gilani Research Foundation Survey carried out by Gallup Pakistan, 88% of Pakistanis said their preparations for Eid suffered due to inflationary pressures. Eid is our religious festival and give the massage of sacrificing and share the joys but now days it becomes celebrate as cultural festival and we forgot this massage | | | | |Variable to be Studied | | |Independent variable: | |†¢ Price hike | | | |Dependent variable: | | | |†¢ Family of Middle class | |†¢ Family of working class | |†¢ Family of lower class | Research Hypothesis H1:- Does the price hike affect the budget of lower income families H2:- Does the price hike affect the purchasing power of lower income families H3:- Does the price hike affect the Ramadan spending of lower income families H4:- Does the price hike affect the Eid celebrations of lower income families. H5:- Does inflation affect the Eid shopping very highly Research Objective The main objective of this research is Find out and analyze the problems which are faced by lower income families due to high inflation that how they manage their budgets specialy in Ramadan and how the celebrate their Eid with low income. Sources of Information Primary Sources:- Questionnaires Interviews Secondary Sources:- New Articals Online Articals Websites Method Of Data Collection A self administered questionnaire interview was conducted to collect the data from the target population on basis of non probability based sampling techniques. The people belonging to above mentioned three classes will be approached for this purpose. Questionnaires were developed for the interview which were distributed in different social Classes. To obtain the relevant information, population interviewed consisted of house wives and people from all walks of life. The questionnaire was designed to measure the impact of price hike on low income families. Likert scale was used for dependent variable different social classes independent variables price hike ranging from 1 to 5 where 1 is coded as â€Å"strongly agree† to 5 is coded as â€Å"strongly disagree†. Sampling Techniques Convenient Sampling:- Non Probability based Convenient sampling technique has been used for this purpose of data collection. Sample was taken from the Karachi city, through structured questionnaire , Instruments of Data Collection:- Close ended Questionnaire with likert scale has been used for data collection Sample Size: A total of 300 questionnaires were administered to potential respondents chosen from various areas of Karachi. A total of 250 usable questionnaires were returned, giving a response rate of 87%. Data Analyses ; Findings Discussion ; Conclusion Recommandation List Of References Apendix

Sunday, October 27, 2019

Role of Line Managers in Human Resource Management (HRM)

Role of Line Managers in Human Resource Management (HRM) Human resource planning (HRP) or workforce planning is one of the classic human resource (HR) administrative tools in the estimation and identification of HR requirements used to meet the organization long-term objectives and economic opportunities. It is therefore defined as the systematic process for analysing the organization needs on how many employees are needed and what kind of knowledge, skills and talents is required in order to satisfy the organization needs (Armstrong, 2009:486). Line managers are required to provide information from their respective departments regarding to the strength of their workforce and what skills is required at the present and in the future. Thereafter, it is duty of the HR manager to gather and analyze these data which will help them to actualize the strategic plans of the human resource and by putting in mind to apply the economic theory when the demand is high the supply is low and vice versa, which will help the HR manager view the exact scenario in the organization and the labour market (D.Haffner handout I, 2010:20-21). HRP does not only assess the organizations current climate and its future labour but it does helps in the management planning of any needed recruitment, training and development of the right employee and the evaluating the progress of the organization which in turn helps in providing information to the managers regarding the need to review their forecasts and programs (Susan E. Jackson et al., 1990:223). Connecting business plan with HRP The objectives of any business vary from one organization to another which could be either short-term or long-term. Due to the constant and rapidly changes in the business, economic and social environments, these factors has played a great impact in many leading organizations to emerge their business plans with HRP so as to adopt a long-term plan. HRP is therefore the key element in every organizational strategic business plan in ensuring that its survival is sustained in the marketplace. Thus this is one of the responsibilities of the human resource in developing the human resource strategies that will be applied into the business plans. This is supported from the quoting of Kathyrn Connors (vice president of Human Resource at Liz Claiborne), who believes that the success of any organization strategies is by implementing the HR plans as shown in appendix 1 (Susan E. Jackson et al.1990:223). The human resource planning model in Appendix 2 shows how the various activities which are interlinked to each other and how they influence each other towards the achievement of the businesss SMART objectives, plans and its development (Armstrong,2009:fig.29.1:490) In a study case of British Gas, which is the countrys leading energy provider has implemented workforce planning model to help them predict the needed engineers who will help in meeting their customers quench for services. The managers are constantly carrying out a forecast programmes that will help them visualize how many more engineers they require in the future so as to meet the needs of their customers. Thus the British Gas success is because of the application of the HRP content in their business plans and putting customer first (Thetimes100.com). Looking at the PEST and SWOT analysis of Bio Energy in appendix 3 has the potential of growing because of its great and cheap services. Since British Gas is one of its competitors, they could apply the HRP principles and model as the way British Gas have. By doing so, they would be the of the top energy suppliers in the world because of their environmental conscious advantage. 2. Recruitment and selection Recruiting and selecting appropriate staffs is a great challenge for many HR professionals. In most of the upcoming companies the demand for labour is high but the research conducted by many HR managers is poor and still have difficulty in differentiating between recruiting and selection, therefore appointing the wrong employees. Therefore, this paper defines recruitment as the various steps an organization undertakes to attract applicants to work for an organization and meet its objectives. Selection is part of recruitment process that is involved in pinpointing the successful candidates for the jobs under reasonable and relevant assessment (Armstrong, 2009:515). A successful organization, be it small or large, always has an organized and a solid workforce that is comprised of well competent and qualified individuals. The human resource manager (HRM) and the line managers participate in different stages of recruiting and selecting the prospective candidates for their company. Process of recruiting and selecting Assuming that a human resource plan has been conducted regarding on how many more staff members are required, the HRM is then required to develop the organizations procedures and policies relating to recruiting new staff and ensure that the selection carried out in unbiased manner. Unsuccessful recruitment is when the companys money is been spent and no outcome is obtained, therefore HRM is also required to strategically plan a recruitment procedure that would be effective to the company. It is then the duty of a line manager to write up the role profile required to fill in his team. Description of individuals competency to perform/operate for example operating equipment and individuals skills, abilities and experience should be included in the role profile. In any role profile there is always an additional part that informs about the terms and conditions of the employment. One can argue about experience requirement because some of the recruiters don not require experienced applicants because in the long run they provide training at their workplace. The line manager should not over exaggerate the content in the role profile because unreal profile could lead to disappointment and dissatisfaction of the recruiter if the applicants do not meet their role profile standard (Armstrong, 2009:515-517). The next step is selecting the best and cost-effective recruitment method to attract prospective candidates. Methods such as internal and external recruitment, recruitment agencies and consultants among others are used by different organizations in recruiting candidates. For example the UKs public sector prefers to advertise their job vacancies both internally and externally which they believe to a good practice. Footnote? Before commencing, it is important for HR manager to initially perform an analysis for their organization before doing a scenario planning especially when the labour market is tight (recession).This in turn helps them to analyse and use this to develop the value of the employee needed and the brand of the employer (Derek, 2009:47-48,57-58). A survey carried out by CIPD (2008) on recruitment found out that a high percentage of candidates relied on recruitment agencies and the lowest percentage used journals for seeking jobs (Armstrong, 2009:520) hence it is crucial for the any recruiter to recognizing the best source of recruiting candidates. Choosing the BEST selection tools Anne and Nancy (2004) have described in their research findings how HR managers have wrong perception on the types of tools used for selecting employees. Poor selection of candidate is due to either poor use of tools or less time spent when selecting, thus it is the duty of line managers to carefully select the appropriate tool ensuring its cost and validity and analyse carefully on the characteristics of the applicants. The use of psychometric tests plays a vital role in measuring individual candidates in their ability, intelligence and personality (Anne and Nancy, 2004: 305-308). For example in an organization such Enterprise Rent-A-Car, the largest car rental business in UK has a well organized workforce of over 65,000 employees. Enterprise applies the recruitment and selection model in Appendix 4 to recruit new skilled staffs. They use the online recruiting method which they believe that is the easier way the applicant can apply. After the recruitment process, the HR manager will carefully select the appropriate candidates by using a standard documentation that matches the candidates with the required roles, qualities and skills needed in the organization. The candidates are then assessed by taking part in practical exercises and finally being interviewed by the senior manager for his final view (Times100). Howard self drive is a small upcoming company that deals with renting cars like Enterprise do. Looking into its external and internal context in Appendix 5 you can see its success is threatened by limited number of skilled staff. By applying the recruiting and selecting model used by Enterprise then they would have a better chance of being successful because of selecting the appropriate candidate for their organization. 3. Training and development The most effective way for a company to continue achieving its business plans is by expanding its strategies on training and development activities for their employees in order to allow them to flourish their skills and abilities. The theory a valuable employee is one who is well trained and has learnt, hence has shown continuous develop has been used by HR managers to ensure that effective training is provided to their employees and allowing them to progress continuously (D.Haffner, handout 2, 2010:26). The HR manager is responsible for establishing learning and development strategies that will be followed to achieve the better skills for their employees. In the other hand, line managers are in charge of planning training sections for their employees and assessing their progress from their learning and ensuring that every one of them has had the opportunity to train and develop continuously. The provision of learning and training opportunities in an organization provides the employers assurance for employees development and commitment to stay in the organization. Therefore money spent on their training would be worthy but this could also mean that training these employees would make them more competent and may decide to seek employment leading to losses (Derek, 2009:66). Learning programmes could be conducted either by informal or formal, web-based, self-directed or the blend of either 2 or more of them. Informal learning is normally considered by many managers as a source for knowledge but it is the best way to acquire knowledge from the fellow employees as they go by. On-job learning could be another way for learning where one can be coached, mentored, job shadow etc. This type of learning is cost free and more effective (Armstrong, 2009:666-673). For example Tesco, the largest British retail is keen in providing their employees training opportunities and evaluate their skills and abilities at their position at workplace. Employees are provided both on-the-job and off-the-job training. Training techniques used in on-the-job training e.g. shadowing, coaching, and mentoring and job rotation which provides effective learning. Off-the-job training is provided if new skills are needed. Every employee has a self-development chart which shows the learning progress. In Tesco, it is the responsibility of the employees to assess themselves on their development by setting their own SMART objectives. 360-degree appraisal is also been used in Tesco to assess the performance of the employee where the stakeholders are provided this opportunity. The development progress of any employee is rated from Red to Blue. Therefore, Tesco has applied the systematic training and Boyatzis models in appendix 6 in their training and developing program in t heir company for effective customer service (thetimes100). From the Appendix7which shows the analysis of Ganesh supermarket. The manager should apply all the principles Tesco have used for training and assessing the competencies of their employees which will bring success in their organization. 4. Health and safety (HAS) There are many activities occurring in our workplaces which are today governed by legislation that requires the employers to implement in their organizations so as to protect and manage the Health and Safety of their employees and other people who might be affected. The UK health and Safety work Act 1974 states the duties and responsibilities of employers, employees and including individuals who are self-employed on issues regarding to health and safety (Alan, 1996: 52). Health and Safety policies It is the duty of the employer, HAS officers, HR and line managers to bring about the policies and programmes of Health and Safety issues so as to protect their employees. These policies and programmes do not only apply to employees alone but also the consumers, suppliers and nearby communities who will be affected by what the organization does and produces. An employer should always have a signed HAS policy statement which acknowledges the intended agenda regarding to the safety of the employees. Although the issue is that the employer should implement policies on HAS but this relies on the responsibility of each employee to conduct themselves using their common sense. Assessing and auditing It is important to identify and assess any risks that threatens the HAS in an organization and be able to take proper measurements on managing them. A risk could be assessed using a 3-point scale or Holts and Andrews (1993) complex rating scale (Armstrong, 2009:963) which will determine if these risks are hazardous to the employees. It is important that the involvement of HRM, line managers and employees in the auditing HAS programmes as to ensure safety measurements are applied constantly. Training in HAS It is essential for every employee to be trained on ways to handle safety when a hazard has occurred but the issue is that it is not implementing into action. Many organizations only apply training when an accident has happened and at the time when vigilance has risen. This point is supported by the illustration below which was obtain from Herald of Free Enterprise, kings cross and challenges (Mark,1998: 354): many of the principles of good training are widely known in management circles and organization of highly quality will adopt them as part of their explicit policy. Unfortunately it is also true that organizations may pronounce them publicly and yet at the operational levels treat them causally. Senior management may fail to realize that this is happening. The true state of affairs only emerges when some disaster occurs.. A successful health and safety management system (SMS) is one that comprises of strategic plans and the implementation of policies according to HSE publication and British Standard guide which should be set up in an organization. A SMS model in appendix 8 has been developed to be applied in the management of HAS which shows how different issue influences each other in the achievement of safety at the workplaces (Alan, 1996: For example FirstGroup, is the leading public transport company have developed safety culture as one of their activities and their first priority is to provide safety to both their employees and customers. The employers of FirstGroup have implemented the Health and Safety Act 1974 in their organization and provide Prevention Handbook to their employees. Each employee is provided and assessed in their safety training programmes ensuring that each one of them is competent in providing first aid when a hazard has occurred. They have also introduced Disability Discrimination Act 1995 in their organization policies in order to consider those applicants that are physically challenged to join their workforce. Safety-themes are also displayed in their intranet and published in the companys newsletters. Conclusion This article describes the important of the roles and responsibilities of HRM and line managers in these activities in an organization and how they support each in various ways. Human resource planning ensures that the need of the right people at the right time and place are selected who are competent and able to fulfil the business strategies of an organization. Recruiting and selecting the applicants is crucial step for any organisation because of the difficulty in choosing the appropriate method and tools for selecting the candidate of choice. Finally, the need of training employees is an important issue today so that they are well profound with their appointed roles and duties at their workplace and making sure that health and safety in their surrounding is established.

Friday, October 25, 2019

Isaiah Essay -- essays research papers

Spring 2005 Professor: Book review Mission in the Old Testament CRITICAL BOOK REVIEW Bibliographical Data: Kaiser, Walter C. Jr. Mission in the Old Testament – Israel as a Light to the Nations. Baker Books: Grand Rapids, MI. January 2004. Information about the Author: â€Å"Walter C. Kaiser, Jr. is president and Colman M. Mockler Distinguished Professor of Old Testament at Gordon-Conwell Theological Seminary.† He has a Doctorate. He is also the author or coauthor of several books. He is a strong advocate for Christians making God’s missionary purpose a central theme in their lives. â€Å"Missions cannot be an afterthought for the Old Testament: it is the heart and core of the plan of God† (38). Walter desires for the church, to not only participate in blessing to the greatest of ability, but also to receive the supreme blessings the Lord has to offer us. Purpose of the Author: â€Å"God’s eternal plan was to provide salvation for all peoples; it was never intended to be reserved for one special group, such as the Jews, even as an initial offer! It is the history of this offer and the way it was carried out in Old Testament times that will form the heart of our study here† (10). Through this book Kaiser wants his reader to understand the correlation or the connecting point between the Old Testament and New Testament pertaining to missions. Kaiser wants the reader to understand that Genesis is the beginning for the call of missions, not the New Testament. He yearns for the reader to reflect on what he has to say and not only share his burden, but act on it. Kaiser’s main purpose and focus is to fully define, expound, and elucidate the Old Testament mission in a way that his readers’ could have a better understanding. â€Å"Mission points to a central action: the act of being sent with a commission to carry out the will of a superior. It is God who commissions and God who sends† (11). â€Å"Israel was to be God’s missionaries to the world-and thereby so are all who believe in this same gospel† (20). Kaiser puts things into simple terms and charges us or challenges all of us â€Å" Who will go?† Plan of the book: Walter Kaiser’s main theme or plan, if you will, of the book is to refute the notion that the theme of missions inaugurated with the Great commission, but instead missions is a main theme throughout the Bible’s entirety. â€Å" Thus this theme of a mission to the whole world for... ...After reading this book I now have a greater knowledge and understanding for missions. As I said earlier it is God’s will that we are all called to be some form of missionary. When people think â€Å"missionary† they automatically think foreign land, but that’s not what the word missionary means. Going to a foreign land is just one form of being a missionary. We are all called or charged by God to be some form of a missionary. Recommendation: I personally have benefited greatly from reading Mission in the Old Testament. At first when assigned this book I assumed it was a book only for those who are preparing to go into the mission field to be used as a guide and a tool, but as I later discovered that my assumption was wrong. Instead this book was written for anyone who desires to know God’s plan, God’s purpose, God’s will, and God’s call for their personal life. I also recommend it to be used in small study groups such as youth groups or a prayer meeting. I think every new and old Christian, if you will, should read this book. I myself have a greater knowledge and understanding of the Old Testament mission and like I said have a greater burden for God’s missionary plan and purpose.

Thursday, October 24, 2019

The Jamaican Early Childhood Curriculum Education Essay

The Jamaican Early Childhood Curriculum was late crafted. The course of study is built on the rule that kids learn best when content from assorted subjects along with accomplishments from the developmental spheres are integrated in line with the kids ‘s holistic position and experience of the universe. These rules are larning through drama, sequenced acquisition, single acquisition, the practicians ‘ multiple functions, inclusion of all scholars, integrated course of study and the spheres of development, the acquisition environment, appraisal in early childhood, affecting parents and community ( Davies, 2008 ) . While the course of study address assorted aims that need to be met in furthering Early Childhood acquisition and outlines the needed instructions, there are challenges to the execution of the course of study. Broadly talking, these factors are normally internal and external. These factors cut down the effectivity of the course of study and weaken the opportunity of effectual acquisition at the Early Childhood Level. The factors occur as challenges when there is a mismatch between the state of affairs that the course of study was designed to aim and the world. This difference causes the existent acquisition result to divert from the intended acquisition result. The course of study is usually assume that the pupil is runing at a peculiar degree, the pupils parent and environmental background offer a certain degree of support, and the instructor operates at a certain degree. The existent job occurs when the course of study does non provide for â€Å" the bulk instance † of pupil s. Internal factors normally include instructors, pupils, school substructure and resources. Teachers are the driving force of implementing the course of study efficaciously. A instructor ‘s creativeness, capablenesss and making enables him/her to reassign the content of the course of study in a meaningful manner that will link with the diverseness of scholars. Harmonizing to Jalongo and Isenberg ( 2012 ) a instructor ‘s cognition of the kids and the content of the course of study will enable him/her the ability to supply for the kids ‘s strengths and failing, their involvement and to develop the cognition, accomplishments, values, and temperaments they will necessitate to go productive members of the society. Hence the instructor ‘s function in developing the course of study is to determine what kids should larn and how they should larn it. In making so the instructor ‘s methodological analysis is indispensable in brining the course of study alive. Jalongo and Isenberg ( 2012 ) postulate that the instructor schemes and program for acquisition is the yarn that weaves the course of study. This they say is what of learning and the how of instruction. It ‘s hence, imperative that instructors plan for the pupils larning so as to provide for the diverse acquisition manners in their schoolroom. The methodological analysiss that the instructor employs should suit the pupil ‘s ability to derive cognition and develop the necessary accomplishments. Teachers should therefore choose content that are developmentally appropriate to accomplish required learning result. On the other manus a instructor should besides be competent and get acute penetrations on the capablenesss that kids posses in order to provide for holistic development. If this is non achieved so the execution of the course of study would hold fails to provide for the kids demands and development. The cardinal ingredient for any course of study is ever the scholar ( Jalongo and Isenberg, 2012 ) . They posit that a course of study should concentrate on what a kid know and can make and what a kid should cognize and can make. Hence the content of the course of study should take into history the demands, involvement, age and phase of development and the societal and cultural context if the kid. The kid as the scholar possesses the ultimate success of the course of study. This takes into history the abilities, accomplishments, background cognition and exposure /experience that the kid get before come ining the acquisition environment. Harmonizing to Puckett and Diffily ( 2004 ) being cognizant of the differences in kids ‘s development, strengths and challenges will let course of study contrivers and instructors to be after efficaciously in order to run into each kid ‘s developmental demands. Jalongo and Isenberg ( 2012 ) stated that a course of study should see the foll owers, Child development and acquisition, Child needs, abilities and involvement and Social and cultural context in which kids live. The considerations of these will enable the instructors to execute efficaciously within the instruction and acquisition environment. The school substructures and resources play a critical function in the bringing of the school ‘s course of study. External factors normally include parents, place and community. This is another driving force in the execution of the course of study. The importance of parental engagement is cardinal in the success of academic accomplishment. This sets the foundation of the learning attitude that kids carry to the acquisition environment. Support from parents increases the academic accomplishment in ulterior old ages. Burke ( 2010 ) concurred kids whose parents are actively involved in their instruction at an early age aids the nurturing of a kid ‘s instruction and overall development and is one of the nucleus indexs of ulterior accomplishment. It is through this engagement that kids understand and appreciate the importance of a solid instruction. The engagement of parents can interrupt or construct the execution of any course of study. Parents are incognizant of the powerful consequence that have on what and how the content of a course of study is designed and implemented. I strongly believe that parents are the first line of support for all kids. They are the primary beginning of socialisation and set the foundation for formal acquisition to take topographic point. The place is the initial environment for optimum nurturing and it ideally creates a sense of belonging. Admiting that meaningful parental engagement is need it ‘s non a â€Å" one-size fits all † . We have to take into consideration the socio economic position of these parents every bit good as their educational background. The background of these parents particularly in urban environments allows for restriction on the input they can offer to the execution of the course of study. Hence, few or no engagement occurs and the inability to keep instructors accountable for hapless course of study execution is hapless. Burke ( 2010 ) provinces that when parents are involved in the educational procedure of their kids and, as such, they will be able to include or add extra information a nd penetration from their ain personal experiences to instructors in order to back up their kid ‘s acquisition and development. The community is seen as the secondary beginning of socialisation.

Wednesday, October 23, 2019

E Payment

Chapter 1. Introduction 1. 1 Electronic payment systems and their place in electronic commerce 1. 1. 1 E-commerce and electronic payment systems 1. 1. 2 Limitations of traditional payment systems in the context of online payments 1. 1. 3 The need for new payment systems designed for e-commerce 1. 2 User acceptance: understanding and issues 1. 3 Research objectives 1. 4 Research scope 1. 4. The role of electronic payments in customer e-commerce activities 1. 4. 2 Approach and methodology Chapter 2. Classification and characteristics of electronic payment systems 2. 1 Classification of payment systems 2. 1. 1 Introduction 2. 1. 2 Primary classification of payment systems 2. 1. 3 Further classification of account-based systems 2. 1. 4 Further classification of electronic cash systems 2. 1. Payment mediation services vs. payment systems 2. 2 Identifying the characteristics of payment systems 2. 3 Advantages and limitations of payment models 2. 3. 1 Advantages and limitations of the elect ronic cash model 2. 3. 2 Advantages and limitations of the acount-based model 2. 5 Conclusions Chapter 3. User survey of electronic payment systems 3. 1 User acceptance of electronic payment systems 3. 2 Survey of users’ attitudes towards characteristics of payment systems 3. 2. 1 Survey participants . 2. 2 Questionnaire design and analysis 3. 2. 3 Survey results and discussion 3. 2. 4 Implications for user acceptanc Introduction 1. 1 Electronic payment systems and their place in electronic commerce In the early 1990s the business and consumer world encountered a new way of conducting trade business, which was named electronic commerce (e-commerce). Over the years electronic commerce has evolved into a popular and acknowledged way of conducting business.While researchers are still trying to understand it and gauge its importance and turnover, e-commerce is changing and growing incredibly quickly, producing such extraordinary results from both business and customer perspective that its phenomenon cannot be overlooked by anyone who has ever thought of conducting business, whether in online or offline environments. With many organisations and people labouring in the field of e-commerce it has become very clear that ecommerce is here to stay and organisations and customers are trying to get maximum benefit from it.E-commerce has become especially important in two interrelated dimensions, namely business-to-consumer (B2C) and business-to-business (B2B) e-commerce. Business to-consumer e-commerce is enabling customers to have an increasing influence on products created, how products are customised, and how services are delivered. Ecommerce offers customers convenient shopping methods for products, information and services, electronic banking, and personal finance management.It is making it easier for consumers to find the desired products and services, match them more precisely to their requirements, and compare prices, (Vulkan, 2003). Several business models have been developed to support various customers’ needs, among them are online portals, content providers, transaction brokers and community creators. For business-to-business relations e-commerce facilitates the form of organisation where companies rely on suppliers and product distribution to respond more effectively to the changing market and customers demand and to achieve more efficient operation.This type of e-commerce relationships offers organisations the possibility to work in the direct contact with producers, giving more room for customization and control over business activities. This helps to reduce the costs significantly by removing ‘middlemen’ from the supply chain. Good examples of companies that employ this business model are Dell and Cisco, (Guttmann, 2003; Laudon & Traver, 2002). Consequences that e-commerce brings for business-to-business relationships are eliminating inventory, and operational and distributional costs that indirectly provid e customers with lower prices.E-commerce can help businesses to increase production flexibility by ensuring timely availability of components from suppliers, to improve quality of the products by increasing cooperation between buyers and sellers and reducing quality issues, to increase opportunities for collaborating with suppliers and distributors, and to create greater price transparency — the ability to see the actual prices on the market, (Laudon & Traver, 2002). In this way e-commerce responses to the customer demand of lower prices and greater convenience. 1. 1. 1E-commerce and electronic payment systemsThe most popular definition of e-commerce is based on the online perspective of the conducted business. E-commerce provides the capability of buying and selling products, information and services on the Internet and other online environments. As for any trading activity, the issue of safe and reliable money exchange between transacting parties is essential. In an e-comme rce environment, payments take the form of money exchange in an electronic form, and are therefore called electronic payments. Electronic payments are an integral part of e-commerce and are one of its most critical as pects.Generally defined, electronic payment is a form of a financial exchange that takes place between the buyer and seller facilitated by means of electronic communications. An e-commerce electronic payment is a financial exchange that takes place in an online environment, (Kalakota & Whinston, 1997). Electronic payment systems (EPSs) are summoned to facilitate the most important action after the customer’s decision to pay for a product or service – to deliver payments from customers to vendors in a most effective, efficient and problem-free way.The role of e-commerce electronic payment systems is pivotal for future of ecommerce, whose further growth depends on the timely development of EPSs. The development of new types of e-commerce purchasing relation ships and business models has created the need for new ways of money exchange and new EPSs. For instance, online auctions, (Ribbers & Heck, 2004), has spurred the necessity for personto- person payment systems to allow online money exchange between individuals. Certain types of information products and services require small payments and micropayments.Businesses would like to sell information content that costs very little, accumulating revenues with high turnover. E-commerce EPSs can be designed for selling specific types of products, for example for trading copyrighted online content, such as music. Another unforeseen earlier requirement is conducting e-commerce using wireless mobile devices, such as mobile phones or personal digital assistants (PDA). The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce, (Laudon & Traver, 2002).In addition, ecommerce provides the possibility to enhance current payment systems or substi tute them with online variants. The need for online payments was first addressed by using extant payment methods of the offline world for online payments. For example credit cards, originally intended as an offline credit instrument, have become the major payment instrument for ecommerce. As e-commerce and online purchasing grows, the weaknesses of credit and debit cards, and cheques are becoming more apparent. These limitations are discussed in section 1. . 2. The lack of the fit-for purpose payment mechanisms and infrastructure is one of the main restricting factors that hold back the growth and evolution of ecommerce, (Guttmann, 2003; Laudon & Traver, 2002; O'Mahony, Peirce, & Tewari, 1997). 1. 1. 2 Limitations of traditional payment systems in the context of online payments Three factors are stimulating the development of electronic payment systems: reduced operational and payments processing costs, growing online commerce and decreasing the costs of technology, (Kalakota & Whin ston, 1997).Reduction of costs is one of the major reasons for research and development of EPSs. The central impetus for ecommerce and e-business is to provide a more efficient service, primarily in terms of costs. In this light, paying online with traditional payment systems such as credit cards is rather paradoxical, given that credit cards are one of the most expensive of all available mainstream payment means for both end consumers and merchants, defeated perhaps only by paper checks, (Lietaer, 2002; Laudon & Traver, 2002). Several limitations of traditional payment systems in the context of e-commerce can be outlined.Existing payment systems, such as credit cards, are inadequate for retail customer digital business from the following viewpoints: Lack of usability. Existing payment systems for the Internet require from the end user to provide a large amount of information, or make payments using complex elaborated web site interfaces. E. g. credit card payments via a web site ar e not the easiest way to pay, as these require entering extensive amounts of personal data and contact details in a web form, (Kalakota & Whinston, 1997). Lack of security.Existing payment systems for the Internet are an easy target for stealing money and personal information. Customers have to provide credit card or payment account details and other personal information online. This data is sometimes transmitted in an un-secured way, (Kalakota & Whinston, 1997). In practice this happens even in spite of introduction of secure transactions mechanisms, such as Secured Socket Layer. Providing these details by mail or over the telephone also entails security risks, (Guttmann, 2003; Laudon & Traver, 2002). Lack of trust.Users tend not to trust existing systems with the long history of fraud, misuse or low reliability, as well as novel systems without established positive reputation. In the present situation, money loss by customers is quite possible when using existing payment systems, such as credit cards, for Internet payments. Potential customers often mention this risk as the key reason why they do not trust a payment service and therefore do not make Internet purchases, (Lietaer, 2002). Lack of applicability. Not all web sites support a particular payment method, thus limiting customers’ ability to pay.Credit cards work only with merchants who have signed-up to the services of the corresponding credit card company, and do not support direct business-to-business or interpersonal payments, (Kalakota & Whinston, 1997). Lack of eligibility. Not every potential customer with money and intention to pay can make use of certain payment methods. Not all potential buyers can obtain credit cards due to credit history limitations, low income or other reasons, (ibid). Lack of efficiency. Some payments over the Internet can be too small to be handled by existing payment systems, because of overheads included in the processing of payments and transaction.Credit cards are too expensive for effecting small payments and are unsuited for small transactions. The minimum fixed fee charged to the retailer for processing a transaction could even surpass the value of the goods sold, (Guttmann, 2003). High usage costs for customers and merchants. Existing payment systems use a rather expensive infrastructure to facilitate the payment process. Credit cards are very expensive for end users, not in the least because of the enormous and growing size of fraud, which amounts to billions dollars per year.This loss is invisibly re-financed by users by the higher costs of credit card services. In addition, credit card payments are still heavily paper-dependent. Most credit card bills are sent in a paper form to customers by post, and the bills are mostly settled by posting paper documents, like checks of giro payments, which makes the whole cycle rather expensive. As mentioned above, this means that resources employed in processing of credit cards transactions re nder them rather ineffective for small payments, because the high overhead of credit cards, (Laudon & Traver, 2002; Guttmann, 2003).In online credit card payments credit cards are not physically available for inspection by the payee, (this situation is referred as ‘card not present’). This imposes higher charges for merchants, because the chance of fraud is higher; see section 2. 1. 3 for more discussion. Credit cards have low finality of payments because users can refute or repudiate credit cards payments in certain situations. Moreover, financial regulations in certain countries, e. g. in the USA and the UK, place the risks of repudiation, fraud, or non-payment largely on the merchant and issuing banks, (Laudon & Traver, 2002; APACS, 2002).These issues make credit cards less attractive to merchants. Certain authentication schemes, e. g. Verified by Visa and SecureCode from MasterCard allow to shit fraud liability from merchant to credit cards issuing banks, and can ea se this burden for merchants, (see www. verifiedbyvisa. com and www. mastercard. com). However, end users can found themselves paying more for the cards issued by the banks to refinance bank’s losses due to fraud. There are more concerns related to the credit card use in online e-commerce that are responsible for reluctant users acceptance of credit cards and e-commerce.According to the report published by marketing research firm IDC, (Asmussen, Raschke, & Arend, 2002), almost half of European users of the Internet do not buy goods online because they either do not trust the Web merchants or fear their credit card details will not be secure. According to analysts, total credit card fraud rose to $4 billion in 2002 (i. e. $2 for every card issued). Industry estimates that the amount of online credit card fraud could be in the $5oo million range, (Laudon & Traver, 2002).Authorities believe that hackers have stolen more than one million credit card numbers from E-commerce sites. It would not be a surprise that many customers use their credit cards with reservations. A survey by Visa of 15 Banks from 12 EU countries in 2002 found that online credit card payments account for nearly half of all complaints. More than one in five of these came from people who had not even shopped on the Internet, but were billed for online transactions, (Philippsohn & Thomas, 2003). Privacy issues are also associated with the use of existing payment systems.There are cases when users’ identities (i. e. personal data such as credit card numbers, names and addresses) were stolen when hackers break into websites’ databases and obtain personal information of the customers. Fraudsters then attempt to use this information to open new credit and bank accounts using the stolen identity, (Philippsohn & Thomas, 2003). These and other issues with existing payment systems such as credit cards render them not very suitable for online payments. 1. 1. 3 The need for new payment systems designed or e-commerce Despite that electronic commerce is a growing phenomenon, its future development is, to a large extent, hampered by the lack of appropriate payment systems. Since most of business-to-consumer payments over the Internet are performed currently via credit cards, an admittedly problematic payment medium due to costs, security and trust problems, the need for new payment systems clearly emerges from the existing situation, (Lynch & Lundquist, 1996; Wayner, 1997; Laudon & Traver, 2002; Guttmann, 2003).Research and development in Internet-based payments tried to resolve this situation by conjuring numerous online EPSs, a good proportion of which has been put to use. This was possible due to the stimulating factors listed above, and in the first place due to the availability and reduced costs of the enabling technology. However, the new payment systems, purposely crafted for the Internet, also could not avoid their own share of problems. This has led to the r eluctant use of new online electronic payment systems, i. e. esulted in low user acceptance of newly introduced payment systems by customers, (see section 1. 2). User acceptance of electronic payment systems At this stage the situation with the development of online EPSs is far from ideal. A survey on electronic money developments by the Bank for International Settlement reports a rather low level of EPSs use, even in the most advanced countries, (BIS, 2000). According to the European Central Bank, the proportion of online payments among cashless payment instruments in the European Union is rather low.The report admits that although there has been a lot of discussion on the use of EPSs and their importance â€Å"it is still not a widely used medium†, (ECB, 2001). The lack of customer demand, the diversity of technological standards and the lack of support by financial institutions are mentioned among the reasons preventing the development of electronic payment systems, (ECB, 2003). Some experts estimate that about 85% of all Internet transactions are done with credit cards that were not originally designed for the Internet, (Philippsohn & Thomas, 2003).According to a survey by marketing research firm Jupiter Research, credit cards are still the dominant payment method for online purchases, accounting up to 95% of online transactions in the United States, (Jupiter Media Metrix, 2000). This demonstrates still low user acceptance of alternative electronic payment systems, designed specifically for e-commerce. 1. 2User acceptance: understanding and issues End user acceptance of such sensitive technology as money-circulating payment systems is the critical key aspect of the whole path of payment systems’ establishment.Without such acceptance no technology can successfully exist on the market, and payment systems are not an exception. According to Dillon & Morris (1996) user acceptance is â€Å"the demonstrable willingness within a user group to emplo y information technology for the tasks it is designed to support†. This definition can be enhanced with the understanding that the user perception of information technology (IT) can be influenced by objective characteristics of technology, as well as by human factors and interaction with other users and related parties.For example, the social information processing model (SIPM), (Salancik & Pfeffer, 1978), suggests that attitudes towards technology are influenced by opinions, information, and behaviour of others. User acceptance is a pivotal factor determining the success or failure of any information system project, (Davis, 1993). Many studies on information technology report that user attitudes and human factors are important aspects affecting the success of an information system, (Davis, 1989, Burkhardt, 1994, Rice & Adyn, 1991). The arguments in section 1. and in the following paragraphs suggest that this is the case also with EPSs. Besides SIPM, a well-known approach to e xplaining and modelling user acceptance is the Technology Acceptance Model (TAM), (Davis, 1989). TAM suggests that users formulate attitudes toward the technology that depends on whether they perceive the IT to be useful and easy to use. However, TAM does not take into account other factors that may be critical to user acceptance or rejection of such specific technology as EPSs, such as security, trust, privacy and involved risks.Extending the SIPM assumption, user acceptance of online EPSs could be affected by a number of factors and parties, creating a broader sense of the social context of EPSs in the Internet environment. User experience with an EPS can be influenced or manipulated by various aspects, such as marketing, publicity, the reputation of the bank behind the system, trust towards the company operating the system and technology behind the system, and convenience of the user interface, see also Guttmann (2003), Kalakota & Whinston (1997), Egger (2003). Figure 1. attempts to illustrate the social context in which parties and factors could possibly influence user perception and experience with electronic payment systems. These parties and factors should be taken into consideration when exploring issues of user acceptance of online EPSs. They are either required for a successful operation of a payment system (banks), its promotion (marketing organisations), or monitor and regulate its operation (government). For example, the company operating the payment service will have to address users’ concerns about security, privacy and trust.Users can be influenced in their experience by other parties than the operator itself, e. g. the bank or financial institution that facilitates the payment transactions, see Figure 1. 1. Customers can be influenced by the user interface, or by other parties involved in the payment service, such as technical partners. Since e-commerce EPSs operate in the Internet environment, the reputation and impression of the syste m can be easily communicated to other users via online communities, creating yet another social impact on the system.Therefore, social influences, e. g. opinions and behaviour of other users, like family and friends, and reputation of banks and the parties involved, should be taken into account for user acceptance of EPSs. This argument can be supported by above-mentioned SIPM, (Salancik & Pfeffer, 1978). Issues such as trust, usability, applicability, security, and convertibility are extremely important because they can influence subsequent decisions of people whether to use a payment system or not.There are several obstacles to user acceptance of EPSs: developers not only have to sell the service to potential users, they also have to convince the users to entrust their money to a third party institution, to rely on the payment system in their business and personal finance, and to use it frequently for convenience, reliability, specific applications, services and for a variety of o ther reasons. To achieve this high standard of user acceptance, the creators of a payment system should bear in mind user-related factors from the very beginning of the conception of the payment system.Designing for user acceptance of online electronic payment systems is thus the main issue put forward by research described in this thesis. An open challenge remains for designers and developers of novel Internet-based payment systems to meet user expectations, requirements, preferences and needs in design and operation of the systems. Resolving these issues is critical for the development and operation of new payment systems and future growth of e-commerce. 1. 2. 1User factors in payment technology The importance of user-related factors can be demonstrated in the example of the notorious problem of security of information systems.There are thousands of security mechanisms, matched with a growing number of hacks and security breaches, (Flynn, 2001, p. 61). However, the nature of secur ity issues is changing with the constant improvement of information technology. While security technology is becoming increasingly sophisticated and tamper-proof, experts in information security admit that user factors are the most important issues for security problems. The vast majority of all security issues in IT environments is caused or assisted by users inside organisations, rather than hackers and other utsiders. Security experts know many stories about people exchanging their passwords, or IT managers attaching notes with logins and passwords to their monitors, or about hackers finding these notes in the trash. To avoid this kind of mistakes, experts are talking about enforcing security policies in organisations, to be able to address user-related factors in security, (Flynn, 2001). Therefore, security practices have embraced user-related factors. This example helps to illustrate the importance of user-related factors in the design and operation of information systems.The f ollowing example illustrates a failure of a payment system due to neglecting to focus on user and market needs. The Chipknip â„ ¢ and Chipper â„ ¢ smart card payment technologies, (Nannery, 1998), were introduced in the Netherlands in early 90s. Both systems were intended to provide a way of paying small amounts in everyday transactions, which people would normally pay with cash. However, these two systems competed with each other for some time, being incompatible, so customers could not pay with the competitor’s card at certain shops, (BIS, 2001).Eventually, this created problems of interoperability and limited the user base for both systems. Another obstacle was that the card readers were installed in shops where people already had another method of payment – debit cards, which worked very effectively and efficiently and which were used by most people for all kinds of payments. In a way, Chipknip and Chipper duplicated the functions and applications of debit ca rds. On the other hand, the real need for Chipknip and Chipper for small payments at parking lots, vending, and public transport tickets machines was not met.A serious situation arose regarding the high costs of accepting Chipknip for merchants. As the result, the union of Small and Medium Enterprises in the Netherlands threatened to boycott Chipknip, (Het Financieele Dagblad, 2001). In this case, an important factor stimulating the development of EPSs was not met, namely the reduced operational and processing costs. Despite of a certain potential for uses acceptance of e-purse technology (Van Hove, 2004), this situation is changing slowly.All these issues led to a low acceptance of Chipper and Chipknip technologies. Chipper International decided to stop operations and support of Chipper in the Dutch market, (Libbenga, 2001; BIS, 2001); Chipper has fused with Chipknip, and while some issues have been addressed, the expected applications for this smart-card technology are yet to come . The example above helps to illustrate the complexity of human and marketing factors in the context of payment systems and their crucial influence on the eventual success of a payment system.Therefore, for successful design of electronic payment systems from the user perspective it is important to find out what user-related factors and systems’ aspects have the most direct impact on user acceptance and which of them can cause problems when neglected in design. 1. 3Research objectives 1. 4Research scope 1. 4. 1 The role of electronic payments in customer e-commerce activities The process of paying is an essential part of customers’ online buying activities. These activities are well described by the Consumer Mercantile Activities Model, (Kalakota & Whinston, 1997).The model comprises prepurchase interaction, purchase consummation and postpurchase interaction phases. The payment activity takes place within the purchase consummation phase, Figure 1. 2. â€Å"The purchas e consummation phase specifies the flow of information and documents associated with purchasing and negotiating with merchants for suitable terms, such as price, availability, and delivery dates; and electronic payment mechanisms that integrate payment into the purchasing process†, (Kalakota & Whinston, 1997). The buyer arrives to payment activities after identifying products of services to be purchased.The buyer and seller conduct then a mercantile transaction. In a mercantile transaction the buyer and the seller exchange information followed by the necessary payment. The payment methods they use should be mutually negotiated and agreed on (ibid). Therefore, in order to conduct a successful e-commerce mercantile transaction the buyer should at least be willing to use the payment method offered by merchants. From this viewpoint, user acceptance of e-commerce EPSs is critical for the completion of the purchase consummation phase and the whole purchasing process. It can be there fore bserved that the payment process and the user involvement in it are highly important for e-commerce activities. Scope of payment systems Business-to-consumer Payment Systems This research is focused on user acceptance of new payment systems in consumer ecommerceenvironments. The main focus of the presented work is therefore Businessto- Consumer e-commerce EPSs, which are designed with the main purpose to facilitate payments for consumer e-commerce. Taking into account the B2B systems would have made the scope too broad to handle within this research. Payment Systems designed for the WebCurrently, consumer e-commerce is done mainly via the WWW (Web) service of the Internet. The market for conducting e-commerce payments via wireless PDAs, mobile phones and other Internet services is still under development, (Bohle, 2001a), and therefore does not have a wide user basis and usage experience. Thus, in the scope are Web-oriented online e-commerce EPSs and Web e-commerce applications. Scope of payment tasks Because the scope of the defined business relations is Business-to-Consumer, the payment tasks in the focus of this thesis are related to consumer e-commerce and trade of goods and services.In these tasks there should be at least one 1) business party involved and 2) one physical person, who is conducting purchasing activities in an ecommerce environment. Scope of target activities These activities include those that are related to buying goods and services, and essentially represent consumer e-commerce. The scope of these activities is embracing a significant and, arguably, the most important part of the consumer e-commerce represented by B2C relations. Purchasing goods: tangible, require shipping, intermediated (by shipping companies). Purchasing information and software: intangible, immediate, not intermediated (by shipping companies). Purchasing services: intangible/tangible, not always immediate, can be intermediated (by service companies). The followi ng activities are therefore excluded from the scope because they are not in line with the defined scope of electronic payment systems, namely B2C consumer ecommerce. Consumer-to-Consumer (C2C) money payments and exchange.C2C payments do not belong to B2C e-commerce, (Figure 1. 3), e. g. personal auctions payments, debt settlement. Specific payment applications, for instance, gambling or adult-content sites. In this context the sites place specific requirements on B2C relations and userrelated factors, e. g. on privacy. Related activities Additional activities that have to be explored are the influence of pre- and postpurchase interaction phases, according to Kalakota and Winston (1997) on the user experience with a payment system on the whole.It is very likely that correct introduction,application and follow up of payment products and services in retail e-commerce are important for user acceptance of EPSs, and therefore the pre- and post-purchase interaction phases cannot be reaso nably disregarded when investigating the payment process. The user experience within these phases could affect their decision as to whether to use the e-commerce service at all, without even arriving at the payment process itself. Amount of money The minimum amount of money within the scope was chosen to be above â‚ ¬2.This means excluding small and micropayments. The nature of payment tasks in case of micropayments is different from higher amounts. For instance, users may wish to automate this kind of payments to avoid the need to authorize a payment of â‚ ¬0. 01 every time, while with bigger amounts they are likely to have control over each transaction. Furthermore, different researches show that at this moment there is little market for services that support small and micropayments, (Bohle, 2001b). In the focus are therefore small to medium sized payments, e. g. from â‚ ¬2 to â‚ ¬1,000.The upper payment limit is set to â‚ ¬1,000 to indicate that highest amount with in the scope of this research. The suggested range of payment amounts is typical for the current status of the domain and is similar to range of payments with existing offline EPSs, like credit, debit and smart cards, (Lelieveldt, 2001; Bohle, 2001a). Larger payments can be expected to raise different user acceptance issues, because of more user attention to risks, security, efficiency and other aspects of transactions with such amounts, (Humphrey, 1995). 1. 4. 2 Approach and methodologyThis research employs practices of the multidisciplinary scientific field of Human- Computer Interaction in order to research issues of user acceptance and user-related factors in online e-commerce electronic payment systems. Specifics of HCI research The nature of Human-Computer Interaction is such that it has to employ various scientific, research and design disciplines and cross borders between them for successful research. HCI is different from other disciplines in that it studies interaction bet ween people and artificially created artefacts, and not an independent natural phenomenon, like in other disciplines.This complex nature of HCI and its research goals compel researchers to adopt both inductive and deductive approaches to science, as described in Mackay & Fayard (1997). In the deductive approach the purpose is to generate a set of hypothesis that can explain real world phenomena. The scientist proposes a theory about a phenomenon, and formulates a hypothesis to be tested in an empirical research. In order to verify the hypothesis, an experiment is conducted, and with the revision of its results the theory is re-examined and an updated hypothesis is created.This approach is employed by the experimental study of this thesis. The inductive model aims to construct the most precise description of the real world, as opposed to explanation. The scientist observes phenomena in the real world without having a preconception or theory of what they are looking for. Then the scie ntist attempts to create a model of the world that explains the phenomena. By returning to the real world the model can be validated and changed if there are contradictions between the model and the studied phenomena.The qualitative study in this thesis employ this approach for requirements elicitation and creation of the design recommendations. The research process applied in this thesis, aimed to gain validated design knowledge, can be described as an iterative circular or spiral movement. This process is best described by Figure 1. 4, adapted from the work of Rauterberg (2000). This approach asserts to combine â€Å"analytical strength of empirical validation methods (e. g. , observation, experiment, inquiry, etc. with the synthetic strength of system design†. This triangle structure conceptualizes the three most important components of HCI research: â€Å"(1) the collection of ‘design relevant knowledge’, (2) the ‘interactive system’ in differen t possible representation forms, and (3) the several possibilities to represent a ‘user’ for (empirical) validation†, (ibid). The following sections describe how using diverse research activities helped to combine these components in the research reported in this thesis. Outline of the thesis The diagram in Figure 1. illustrates a combination of the research and design activities of this thesis. These activities included acquiring design knowledge on ecommerce EPSs, applying the knowledge to a commercial payment system designed by an industrial party, and empirical validation of the design knowledge. Chapter 2 presents a survey of literature on EPSs, which was necessary for understanding EPSs. The outcome this survey is a classification and a set of characteristics of EPSs. The importance of the characteristics of EPSs had to be confirmed with potential users of EPSs.Chapter 3 describes an investigation into the importance of the characteristics of EPSs to end use rs by means of a survey of consumer attitudes towards EPSs. The user survey helped to identify what characteristics should be given more attention in the design of EPSs. However, the knowledge about the importance of the characteristics did not inform how they should be realised in design of EPSs. To acquire a deeper understanding of these issues, a qualitative research in the form of a diary study was conducted, Chapter 4.The diary study aimed to understand how EPSs are experienced and perceived by users in the context of actual use and how EPSs can be designed to meet users’ needs. As the outcome of the diary study, implications for design of Internet-based payment systems have been derived and formulated as design recommendations. To ensure that the application of the design recommendations benefits user acceptance of EPSs, an experimental study was conducted, that is described in Chapter 5. This study helped to substantiate the validity of a subset of the design recommend ations.It was hoped to find the ideal situation where it is possible to apply the hypothesised design knowledge to a real-life system, rather than testing them in the laboratory, in order to achieve high realism of the results. Due to the participation of industrial parties, this situation has become available. The experimental study involved two parts: 1) a real-life EPS was redesigned in accordance with the proposed DRs, 2) an experimental comparison of the redesigned system with the old one has indicated improvements of user attitudes in several aspects, thus demonstrating the validity of the design recommendations.Chapter 2 2. 1 Classification of payment systems 2. 1. 1 Introduction This chapter presents a framework for classification and characterising of electronic systems that facilitate paying in an e-commerce environment. This framework is an attempt to describe and to relate the wide variety of the payment systems, with more than 150 payment mechanisms invented worldwide. This chapter also presents a survey of literature on EPSs, which has been a necessary step for understanding payment systems. The outcome of this phase of the research is a classification and characterisation of electronic payment systems. . 1. 2 Primary classification of payment systems The principal classification of EPSs is based on the form of money representation and the principle of money transfer. Existing payment systems can be divided into two groups: electronic cash mechanisms (or electronic currency) and credit-debit systems, (Medvinsky & Neuman, 1993). Electronic cash resembles conventional cash, when parties exchange electronic tokens that represent value, just as banknotes and coins determine the nominal value of conventional cash money.The credit-debit approach in the context of electronic payments means that money is represented by records in bank accounts, and this information is electronically transferred between parties over computer networks. Another terminologic al approach offered by Wayner (1997), based on the type of information that is exchanged, distinguishes between ‘account-based’ and ’token-based’ systems, which, respectively, corresponds to credit-debit systems and electronic cash in the definition of Medvinsky and Neuman. A similar distinction is found in Camp et al. 1995), who distinguish between notational and token forms of money. A different view on classification of EPSs is offered in Asokan et al. (1997), where payment mechanisms are classified based on the temporal sequence of money flows between the payer and receiver of the payments. Various attempts of classification of payment systems are also reported in Kuttner and McAndrews (2001), and Schreft (2002). These references are aggregated into the classification of electronic payment systems, illustrated in Figure 2. , which was first reported in Abrazhevich (2001b). The figure illustrates the further classification of EPSs, described in the foll owing sections. It provides examples of EPSs in each subcategory; some of these systems are described further in the text. The figure illustrates if the systems are only theoretical developments, that were only tested as limited pilots, and that have never been implemented for the commercial use. Payment mediation services that aggregate various EPSs in one payment infrastructure are described in section 2. 1. 5. 2. . 3 Further classification of account-based systems In the group of account-based systems, one can distinguish between 1) generic online EPSs that use simple account-based model for serving Internet payments, 2) systems that use the debit and credit cards model, and 3) specialized payment systems that, for instance, were designed for trading content online such as music. Some researchers consider credit cards systems as a separate group of payment models, (Medvinsky and Neuman, 1993), others consider them to be a variant of the credit-debit type.This classification adopt s the latter distinction. The basic principle of account-based systems is that the exchange of money between accounts is maintained by a payment service provider. Users can authorize charges against their EPS accounts, as they would do with usual bank accounts, though the ways of authorization are different for various systems. With the debit approach, the customer maintains a positive balance of the account and money is subtracted when a debit transaction is performed.With the credit approach, charges are posted against the customer's account and the customer is billed for this amount later or subsequently pays the balance of the account to the payment service. One of the most widely used systems for electronic payments is the debit card, which as the name suggest, is a clear example of a debit system, (Evans & Schmalensee, 1999). Debit cards combine the service of Automatic Teller Machines (ATM) cards and cheques. When customers pay with a debit card, the money is automatically de ducted from their checking bank account.In contrast with the credit cards, the spent money comes from the bank account directly. Many banks issue a combined ATM/debit card that looks like a credit card and can be used in places where credit cards are accepted. In this case, when users pay with a debit card, the payment will still be processed as a debit transaction. Other payment mechanisms that use the credit-debit model are Yahoo PayDirect, Pay- Pal. com, and theoretical payment projects like NetBill (Sirbu and Tygar, 1995), and NetCheque (Medvinsky and Neuman, 1993).A special group of account-based instruments that are currently in wide use are credit card systems. A great part of trade on the Internet is done using credit cards and these payment systems should not be overlooked. The biggest advantage of this approach is that the customers, who have already received credit cards offline, can use them directly for online payments. This also results in high scalability, as no addit ional installations are necessary. Credit cards provide a large customer base for merchants who accept them, thus their applicability is quite high.There are critical security issues associated with the use of credit cards in an online environment. When using credit cards over open networks, encryption mechanisms, such as widely used Secure Socket Lauer (SSL), in principle can prevent a hacker or eavesdropper from intercepting the customer's credit card number. There are some schemes that even hide card numbers from the merchant, providing protection against intercepting the card details from merchant databases or against fraud by the merchant. Nevertheless, these incidents happen regularly (Caunter, 2001; IFCC, 2003; Wales, 2003).It is important to note, however, that without some form of customer registration with a payment service or substantial proofs of identity, credit cards can be very risky to pay with and can be easily abused. Even encrypted Internet credit card transaction s do not include the owner’s signature, and anyone with knowledge of the customer's credit card number and expiration date can create a payment order. An important aspect of credit card payments in the online world is referred to as card-not-present (CNP) transactions.CNP transactions are those where neither the card, nor its holder are present at the point of sale, e. g. in orders by mail, telephone, fax or the Internet. The buyer does not have to demonstrate the physical presence of the card, or the card and the buyer do not have to be co-located. This imposes issues with card validation, security and fraud. CNP transactions are widely used in mail order/telephone order purchasing (MOTO) which also do not require co-location of buyer and seller. To secure transactions of this type, credit card companies ask for additional information, such as name, address, etc. that can be used to verify their identity, for instance, if the ordered goods should be mailed to the billing add ress associated with the credit card. Other information often required is the additional 3-4 digits code, printed on the back side of the card and not present in the credit card number. Merchants ask the customer to read this code from the card in a card-not-present order. The merchant then asks for verification during the authorization process. The issuer (or credit card processor) validates the code and relays the decision to decline or approve the transaction to the merchant.Nevertheless, the MOTO transactions incorporate limited protection against credit card fraud. Credit card CNP transactions could sometimes employ even less identity verification information. Since no signature involved in CNP transactions, the buyers can opt out of any order, if they claim they did not agree with the purchase, (O'Mahony, Peirce, & Tewari, 1997). The charges for orders cancellation are borne by merchants in the form of the higher costs for processing of CNP transactions. In addition, merchants could be liable for the whole amount of the disputed order, (APACS, 2002).Furthermore, because online payments are administered as standard credit card charges, the costs are too high to make this method unsuitable for payments below â‚ ¬1 and hence inefficient. Credit card companies are constantly lowering the minimum amount that can be paid to enable small payments, but charges for merchants still remain high. It should be also taken into account that cards are issued by banks and organisations, which after a screening, decide whether they can issue credit cards to certain customers.Customers with a low income, an imperfect credit history, might not be eligible for a credit card. This may restrict the customer base to a certain degree and limit user and merchant acceptance of credit cards as a payment method. 2. 1. 4 Further classification of electronic cash systems Electronic cash is stored in a digital form and serves as a cash substitute for the Internet or other informatio n systems. Electronic cash represents value in some form and can be spent with merchants, who deposit money in their own accounts or can spend it in other places.It can be represented by electronic ‘bills’ and ‘coins’, certificates, packets of data, or electronic tokens in one form or another. When using electronic cash systems, customers purchase electronic digital tokens from the issuing company using a conventional payment system, e. g. credit cards, electronic checks, or even paper currency (for example, via a reverse automatic teller machine which accepts cash, or when purchasing prepaid cards). Some of the systems allow converting electronic cash back into another form of money (Medvinsky and Neuman, 1993), which is very important for convertibility of the systems.Another distinction amongst electronic cash systems is between those that use smart cards for the storage of tokens and those where tokens reside only on user’s accounts and computer networks. The former are often called electronic purses (e-purses), the latter are sometimes addressed as ‘online cash’ or ‘Web cash’. Examples of e-purse electronic cash systems are CAFE project, (Boly et al. , 1994) and Mondex (Martin, 1994). Tokens in these systems exist and travel in the computer environment,for example, on a currency server or customers’ hard disk.Mondex is a smart card payment system that was designed to enable person-to-person as well as Internet payments, (Van Hove, 1999, p. 141). The card can be used to make small payments, store personal and application-specific information, and serve as a telephone card. Web cash representatives are E-cash, E-gold, Millicent (Glassman & Manasse, 1995), PayWord and MicroMint (Rivest & Shamir, 1996), and NetCash system (Medvinsky and Neuman, 1993). It has to be noted that these systems are mostly theoretical work and have not been implemented on the market. Systems that employ smart cards e. g. Chipknip, Chipper in the Netherlands, Proton in Belgium, and Visa Cash can be also placed in the category of electronic cash and also called e-purses, however, in representing money they hardly use tokens. In this case, the numerical data stored on the card is changed when a payment takes place. Judged by the principle of the operation and use they act like electronic purses. The value is stored on a card and if the card is lost, the money is gone, in a fashion similar to cash. It has to be noted that smart cards like Chipknip are not principally designed for Internet payments and are used mainly at point-of-sale terminals.There have been nevertheless pilot tests of facilitating paying over the Internet with Belgian Proton smart card EPS, but the use of Proton on the Internet is now discontinued. An important development towards standardisation of e-purses is establishing Common Electronic Purse Specifications with the goal to define requirements needed to implement a globally i nteroperable electronic purse program, while maintaining full accountability, (see www. cepsco. org). CEPS, which were made available in March of 1999, outline overall system security and certification.Being established by the key parties in electronic purse cards, and supported by organisations from over 30 countries, CEPS paved the way for the creation of an open global electronic purse standard. For cardholders it means that they will be able to use their electronic purse cards domestically and internationally with the knowledge that the card will be accepted wherever the acceptance mark is displayed. Visa Cash is an example of CEPS implementation, (see www. visa. com). Prepaid card EPSs can be also included in the same category of electronic cash, because the principle of their work resembles the use of e-purses, such as Chipknip.Users can buy a prepaid card for a specified amount. Prepaid card systems are specifically designed for Internet payments. Users can pay with a prepaid card by entering on merchant sites the card’s unique number, which corresponds to the card’s nominal. The value of the card is decreased by the amount paid to the merchant. To better understand what issues that surround electronic payment systems, it makes certain sense to introduce a definition of payment mediation services, which use existing payment systems as mediators to provide extra services. 2. 1. 5 Payment mediation services vs. payment systemsTo further refine the focus of this research, we have to make one important distinction, which is between payment mediation services and payment systems. This distinction particularly makes sense in the context of electronic and Internet payment mechanisms. Payment mediating services have appeared as a response to the imperfection and inefficiency of current payment systems for the Internet. They extend the services of the existing systems and operate as mediators between merchant, payment systems and users. Their goal is to help merchants to accept as many payment systems users could possibly want to use when paying over the Internet.In payment mediation services the existing payment infrastructure from many payments providers is aggregated to provide broader services, or to overcome shortcomings of the available payment options. Figure 2. 2 describes the relations between merchants, EPSs and payment mediation services. The difference between payment mediation services and payment systems can be summarized in that a payment mediation service is as an intermediary between payer, business, and payment system, while there is no such middle tire for payment systems. The payment process in this case is transparent to the users of a site.A mediating service provider ‘intercepts’ payments from users, processes them, and credits the account of the owner of the site when the authorization and transactions are completed. For example, there are numerous companies among mediating services provid ers that facilitate acceptance and processing of various credit cards. A special class of payment mediation services has emerged, that provides convenience for paying bills for businesses and end users. An example of payment mediation services is providing bill payments for end users and companies, for instance, utilities or telephone bills.Over a Web front-end provided by the billing systems, customers and companies can pay bills that are normally paid offline by paper cheques or bank transfers. Some systems even provide additional services such as automated accounting merged with online payment facilities. Syndication of payment services Another angle on payment mediating systems is viewing them as a form of syndication of payment services in an online environment. The notion of syndication originates from the entertainment world, where it forms the fundamental organizing principle.With the advent of the ‘new economy’ and the use of the power of Internet distribution, syndication can be recognised as an emerging model for e-commerce. In this context syndication would mean selling the same information to many different customers, who render and integrate it with other information in various value-adding ways and then redistribute it. According to this principle, businesses involved can play three or more roles: originators who create original content; syndicators, who collect and package digital information to meet specific customers’ needs; and distributors who deliver digital content to customers, (Werbach, 2000).In the context of online payments, payment mediation services can be seen as syndicators of the original services offered by payment systems. Payment mediation services syndicate e-commerce EPSs, offering merchants the way to accept a variety of payment systems. Examples of payment mediation services A good illustration a payment mediation service is Bibit Billing Services (www. bibit. com). This Dutch company specializes in Int ernet payment and billing services. The service supported about 70 payment methods from 18 countries by 2004.When customers want to pay on a Web site of a Bibit’s client, they select one of the provided payment methods. The payment process goes as follows: 1. A customer selects products on sale in a virtual shop. 2. For payment, the customer is then redirected to Bibit Payment Service. 3. Within Bibit Payment Service, the customer can select a payment system he or she would like to pay with, provided it is supported by Bibit. The customer makes the payment with the system of his or her choice. 4. After a successful payment, Bibit notifies the merchant that the order can be shipped and transfers the money to the merchant.The processing of the transactions, which is conducted entirely by Bibit, is therefore transparent to the customers of the site and the client company. The company business model, which utilizes a number of payment systems, relies on providing extra services t o facilitate payments, and therefore it fits into the definition of a mediating system. It is interesting to note that the service allows the use of micropayments, by accumulating charges for products like news, articles, stock and research reports, online games and charging users on a subscription basis.Examples of other payment mediation services are Orbiscom (www. orbiscom. com), iBill (Ibill. com), PayTrust, (www. paytrust. com), DataCash (www. datacash. com), PayNet (www. paynet. ch). Systems that conceal real customer’s credit card numbers by providing them a unique temporary card number for each transaction have gained certain popularity among payment mediation services. The customers can then use this unique number in a normal credit card transaction, and their real credit card will be charged.This temporary card number expires after every transaction and would not be approved for the subsequent use. The data of real credit cards of customers is not exposed to parties online in online transactions. In this case the payment mediation services are using credit cards infrastructure to provide extra security and anonymity (ABN-Amro e-wallet, O-Card by Orbiscom. com). By using these measures merchants expect to accept more secured payments without changing the way shoppers pay and without changing existing payment processes or infrastructure.The research summarized in this thesis is concerned mainly with payment systems and not with mediating solutions for existing payment infrastructure. Payment mediation services on the Internet emerged because of the absence of relevant payment solutions or have problems that prevent their successful use by merchants and users. Many of EPSs are probably transitory systems, unable to completely solve problems that appear in the context of the Internet paying process, because the problems originate in the payment systems they use; see discussion on PayPal. om in section 2. 4. While syndication of EPSs by payment med iation services provides in the end a better level of service than individual EPSs they use, it also places the payment mediation systems out of the scope of this research, which is exploring ways to design better individual EPSs. 2. 2 Identifying the characteristics of payment systems As observed in the example with Chipknip and Chipper in the previous chapter, there are a lot of factors that determine the success or failure of payment systems, and not all of them are of technical nature.As mentioned already, user acceptance depends on many issues, such as consumer choice, preferences, advertisement, a state of the market, etc. The discussion of diverse aspects of electronic payment systems can be found in many works on development and research of payment systems. Attempts to classify and describe the requirements and characteristics of payment systems such as security, reliability, convertibility, efficiency, traceability, and others can be found, among others, in the works of Med vinsky & Neuman (1995), Langdon et al. (2000), Lynch & Lundquist (1996), Wayner (1997).It has to be noted however, that these studies are mainly focused on technical aspects of electronic payment systems, which is not the only facet that is important in this field. Below the characteristics of payment systems are extended to account for user-related aspects of EPSs. These characteristics can be also used for assessment of payment systems, as described further. The list of characteristics of payment systems Anonymity, privacy This characteristic reflects the desire of users to protect their privacy, identity and personal information.In some transactions, the identities of the parties could be protected by anonymity. Anonymity suggests that it is not possible to discover someone’s identity or to monitor an individual's spending patterns. Where anonymity is important, the cost of tracking a transaction should outweigh the value of the information that can be obtained by doing so . As an illustration, when a customer pays with a debit card, the purchase is registered at the vendor and bank’s databases. It is possible to find out what amount was paid and what actually was purchased. Thus debit card payments are not anonymous.On the contrary, when one pays with cash at a shop or in a marketplace, no one can say by examining the cash that money came from the payer, as there is no direct information about this payer’s personality associated with the banknotes. Thus, cash is an anonymous payment system. Currently, the right of users to choose how their personal information is disclosed is viewed as privacy. There are privacy laws in several countries that limit usage of personal information by banks, authorities and other parties, including online businesses and payment systems, like European privacy acts or similar directives, e. . European Commission Data Protection Directive. Applicability The added value of a payment mechanism is dependent upon how useful it is for buying something. Applicability (or acceptability, as it is often referred in literature, (Medvinsky & Neuman, 1995)) of a payment system is defined as the extent to which it is accepted for payments at points of sale, or at online e-commerce sites in this case. For instance, cash is accepted widely and virtually everywhere in the offline world and thus has a very high level of applicability.Debit cards and credit cards have a very high applicability, as one can pay with them in a variety of places. The applicability of a payment system may vary from country to country. For example, in Germany and in the Netherlands cheques are no longer common due to the steady growth of other payment methods. However, in the UK and the USA cheques are still quite a common method of payment and the level of their applicability is quite high. Authorization type Authorization type is referred in the literature as the form of a control over the validity of transactions, (Lynch and Lundquist, 1996; Asokan et al. 1997). The authorization type can be offline or online. Offline authorization means that users of the system can exchange money while not connected to a network, without a third party mediating for the transaction. Paper cheques are an illustration of offli

Tuesday, October 22, 2019

Free Essays on I Heard The Owl Call My Name

The quote in question 1 reflects Mark’s status in the tribe well. As the quote states Mark eventually became part of the village and the villages became his family. This however was not an easy accomplishment, for most of Mark’s early period among the villages the villagers were cautious of him and kept their distance from him. This was until one afternoon when returning to the village Mark and Jim stopped the boat to see a run of salmon swimming upriver to spawn in the clear water. Mark then recited a few lines of prayer about the salmon which the Indians spoke about with great respect to Jim. The salmon in Indian myth is referred to as the swimmer. The salmon prayer is symbolic of the continuous cycle of life and death. After being in the village for a period Mark begins to realise time has lost its defining contours. When Mark first arrived in the village the future loomed huge, then the present had consumed him, however toward the end Mark states â€Å"...like the raven or bald eagle flying high over the village, must see part of the river that had passed the village that had not yet reached the village one and the same.†(p 123). Mark has learnt enough of the meaning of life to be ready to die, he has done this by living in the village where sadness, richness and the tragic poignancy of life’s inevitability were accepted and not hidden behind a smoke screen like the way typical westernised humans deal with lives tragedies. In the novel the indians are not portrayed as emotional people. They do not let let their actions become blinded by emotion. The indians in this novel are logical and rational. This is aparent after the death of the weesa-bedà ³, the only people showing emotions were professional mourners who wailed in shifts for three days and three nights (p 15). It is apparent after Marks Death that his impact on the village was as much physical as it was emotional. This is proven when Keetah walks in o... Free Essays on I Heard The Owl Call My Name Free Essays on I Heard The Owl Call My Name The quote in question 1 reflects Mark’s status in the tribe well. As the quote states Mark eventually became part of the village and the villages became his family. This however was not an easy accomplishment, for most of Mark’s early period among the villages the villagers were cautious of him and kept their distance from him. This was until one afternoon when returning to the village Mark and Jim stopped the boat to see a run of salmon swimming upriver to spawn in the clear water. Mark then recited a few lines of prayer about the salmon which the Indians spoke about with great respect to Jim. The salmon in Indian myth is referred to as the swimmer. The salmon prayer is symbolic of the continuous cycle of life and death. After being in the village for a period Mark begins to realise time has lost its defining contours. When Mark first arrived in the village the future loomed huge, then the present had consumed him, however toward the end Mark states â€Å"...like the raven or bald eagle flying high over the village, must see part of the river that had passed the village that had not yet reached the village one and the same.†(p 123). Mark has learnt enough of the meaning of life to be ready to die, he has done this by living in the village where sadness, richness and the tragic poignancy of life’s inevitability were accepted and not hidden behind a smoke screen like the way typical westernised humans deal with lives tragedies. In the novel the indians are not portrayed as emotional people. They do not let let their actions become blinded by emotion. The indians in this novel are logical and rational. This is aparent after the death of the weesa-bedà ³, the only people showing emotions were professional mourners who wailed in shifts for three days and three nights (p 15). It is apparent after Marks Death that his impact on the village was as much physical as it was emotional. This is proven when Keetah walks in o...