Thursday, April 4, 2019

Security And Confidentiality On The Internet Information Technology Essay

harborive c everywhereing And Confidentiality On The net in shine Information Technology EssayOn 9th of November 2009 The meshing teacher requested 3000 word handle related to the FETAC Internet module. This report was to be submitted by 14th of January2010. The topic of the report is Security and Confidentiality on the Internet with reference to cookies, vir personas, engraveion, digital signatures, firewalls, filtering softw ar and personal privy(p)iveness.Recommendations were requested.2. Method of ProcedureI found roughly of the randomness on the internet. In order to obtain the relevant teaching, I put ond Google Search railway locomotive with signalisewords in English Internet Security, Privacy on the Internet, Malw ar, Computer Viruses, Cookies, Firewalls, Filtering Softw be, encoding, Digital Signatures, Computer Protection, Threats on the Internet. drawwords in Lithuanian Privatumas Internete, Saugumas Intenete, Kompiuteriniai Virusai, Ugniasien-s, Filtravimo P rgramin- ranga, ifravimas, Skaitmeninis paraas, Pavojai Internete.Also, some printed sources of culture such as books and a periodical press in English and Lithaunian were adopted.Several pages for each topic were directed to confirm that the instruction was correct and fully understud. That hepled me to ferment conclusions and to give recommendations.3. Findings3.1 Importance of SubjectWith the progress of affordable technology to a greater extent of us store much and more of our life in situations and bytes. By the end of 2009 there was more than 1,5 billion Internet users in 260 countries on every continent. The Internet is non a single net, still a vast army of connected net plant situated all over the world, easily accessible by personal calculating machines, notebooks, netbooks, smartphones, PDAs, game consoles, forward-looking TVs, same photo cameras or even kitchen appliances as hi-tech f disengageges and microwaves in a variety of ways.Today, the Internet uses gateways, routers, broadband connections, Wi-Fi spots and Internet gain providers (ISPs) to make itself available at all ms. Individuals and organizations worldwide preempt reach almost either point on the network without regard to national or geographic boundaries or time of day, there is some exceptions regarding to Internet censorship. now, it chasten about hard to contract the contrast without any connection to the Internet, because of its excellent source of marketing, convenience, high speed, low cost, and almost unlimited possibilities. Institutions of education, hospitals, commits, institutions of usual service, providers of mobile service and internet, utility companies and of course our government has our personal reading on their ready reckoners and they argon connected to the Internet.With the birth of accessible Networking Sites such as Bebo, Facebook, MySace, Twitter ect., we sharing our pictures, personal details, our thoughts and lives with friends and if we argon not tutorshipful with everybody on the Internet. dependable Facebook on its own has more than 400 million users.Even more, with new generation of Internet- Cloud Computing, individuals and business users are storing less entropy on their hard drives and more in the cloud- remote servers, operated by giants standardised Google and virago. notwithstanding, while using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the reckoner strategys will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on opus and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They stinkpot slew or tamper with information without touching a piece of paper or a photocopi er. They set up create new electronic files, run their own programs, and even hide all evidence of their un veritable body process.So if we are climax and locking the door in our house to prevent criminals gain access to our valuables, we must take care of our house and life in the digital world and use all possible auspices and privacy on the Internet measures against the threats.WORLD INTERNET USAGE AND POPULATION STATISTICSWorld RegionsPopulation( 2009 Est.)Internet UsersDec.31,2000Internet UsersLatest DataPenetration(%Population)Growth2000-2009Users %of TableAfrica991,002,3424,514,40067,371,7006.8 %1,392.4%3.9 %Asia3,808,070,503114,304,000738,257,23019.4 %545.9 %42.6 %Europe803,850,858105,096,093418,029,79652.0 %297.8 %24.1 %Middle East202,687,0053,284,80057,425,04628.3 %1,648.2%3.3 %North the States340,831,831108,096,800252,908,00074.2 %134.0 %14.6 %Latin America/Caribbean586,662,46818,068,919179,031,47930.5 %890.8 %10.3 %Oceania / Australia34,700,2017,620,48020,970,49060.4 %175.2 %1.2 %WORLD TOTAL6,767,805,208360,985,4921,733,993,74125.6 %380.3 %100.0 %Copyright 2001 2009, Miniwatts Marketing Group3.2 Personal Privacy supply privacy does not exist on the Internet, but it is possible to minimize the risks. Most protection breaches are not done by technology, but by social engineering. In surety, plurality is the most raving mad factor of all, yet its the one thing thats often forgotten. A company may bentup firewalls, security packet, locks and fingerprint s keepners, but if they forget to establish and enforce a well designed security policy, they cave in forgotten the most important part.The easiest way to get a password from someone is just to conduct In more likely situations, an attacker may entirely call random people and profess they are a tech support person trying to fix a problem, and ask for secret information as part of the diagnostic.PretextingPretexting is the way of stealing information by providing just a subaltern bit of known information, and pretending to be someone youre not. Thats how identity thieves female genital organ call banks and, after a few tries, by simply providing canonical information somewhat the target, get all the data they want.PhishingPhishing is when you beget an email that looks like its from your bank, Paypal, online shop or another secure site you use, and asking you to login to confirm your information.It works in this way the criminals sets up a sacksite which looks like the genuine one and then sends phishing email to thousands of people, until they find somebody. Then when the person tries to login, his login information is intercepted by the bad guys and used to steal valuable information.MalwareMalicious programs, especially Key loggers crapper record what keys on the keyboard you are pressing when login to secure websites, to obtain your username and password. Often Key loggers are incorporated together with Trojan Viruses, programs which pretends to be utile bundle i.e. anticomputer virus or computer livelihood programs, to send stolen information to the criminals.Privacy threats on Social Networking SitesInternet users perplex to be very deliberate with the offstage information that they share on the web. Internet is becoming very popular way to relegate with people. Most people who give too much of private information about themselves arent aware about the risks they taking. There are people who can pretend to be your friends, gain information and use this information against you for blackmailing, psychological terror or for access to secure private pages.Conclusions and RecommendationsThe offenders are always inventing new methods to steal private information. We have to be aware about that, constantly refresh our knowledge about security and existing scam schemes and take all possible security measures by using trusted up to date security software. Never click a link in an email from unknown sender, never download from an untru sted source, and always type in the address of your financial sites to access them. Need to avoid to expose sensitive information online especially to the people we dont know very well.Also we have to remember that these attacks kindredly can be done offline. Most identity thefts are done by people simply going through rubbish bins and getting confidential data that was thrown out, like a bank statements, invoices, payslips ect. We cant do much to secure our personal data collected and stored by businesses and institutions which can as well be stolen or misused, just hope that they will take same hefty care as we do.3.3 CookiesWhat are Cookies?Cookies are a piece of text that a web server sends to web browser and are stored on a users hard disk. Main purpose of cookies is to help prepare customized web pages with our settings, interests, shop habits. It works in similar way to loyalty cards i.e. if we bought a book in Amazon internet shop, next time when we come back to Amazo n first it will offer similar books to our purchase.Cookies do not act maliciously on computer systems. They are text files that can be deleted at any time. Cookies cant be used to spread viruses. But because any personal information that we gave to a web site will be stored in a cookie some people can accept it as a threat to privacy and anonymity. To prevent misuse of information in the cookie if its stolen, information in the cookie is encrypted.How do They Work?When we visit a site that uses cookies, it can ask the browser to place one or more cookies on the visitors hard drive. It will watch to it our name and password, fill in form i.e. delivery addresses and basically what we do in the page. Next time, when we come back to the site the web browser sends back the cookies that belong to the site and then we will see personalized Web page with our details. Generally cookies help us to save a little bit of time. And we always have possibility to switch it off, however internet shopping web pages requires cookies to accesses them.How Could I retard/Manage Cookies?If we want to delete cookies we have to follow these stepsInternet Explorer Tools /Internet options/Security /Set security level to high or custom level/Cookies/Disable.Mozilla Firefox Tools/Options/Privacy/Cookies/Uncheck/Allow sites to set cookiesOther options are to use designated Cookie Managing software or to use advanced Antivirus programs which in addition have the option to control cookies, to block cookies that we dont want and save only the cookies that we want.Conclusions and RecommendationsI think that cookies are useful because we can get personalized information to read, do not spend time on security questions where it is necessary to enter a password, we dont have to spend time filling up same forms. Cookies do not collect information saved in the computer, it can contain only private data that we give to a website on our own free will. And if we dont want some cookies we are able to finish them from computer when we want. Some websites such as internet banking, e-shops and similar are impossible to use the right way without allowing the cookies.3.4 VirusesWhat is a Virus?Computer viruses are small malicious program codes, which are designed by using various techniques to hide themselves inside the executable files. Their aim is to replicate, spread between the computers using dismissible media or network and to interfere with computer operation slowing down computer, damaging or deleting data, distressing users and wasting time by showing annoying massages.Virus can be classified by several characteristic depend on the origin, on the way how they contaminate computer, on the place where they hide, on the damage that they can cause However, the computer virus is only one type of the malicious software or malware, but majority of computer users referring to all malicious programs (Trojan horses, worms, rootkits, spyware and so on) as the viruses.Type of Virus divers(prenominal) viruses can have many common characteristics and constantly appearing viruses with new specifications or combinations.Resident Virus. load the replication module into RAM memory when is executed, after this virus can infect all files that are accessed by user or direct system. If the antivirus program fails to spot the virus in the RAM it can infect all scanned files.FAT Virus. The File Allocation Table is a fundamental element in the system it works like an index, keeping information where is the files stores on the hard disk drive (HDD), which sectors are empty etc. If this vital index is repealed by virus, it makes impossible for computer to locate files. It withal can overwrite the files or entire directories corrupting them permanently. Sometimes the only solution to fix the computer affected by FAT virus is to format hard disk drive. Huge downside of this is that all information on HDD will be permanently erased.Virus of Direct-Action. Sometimes r eferred as Non-Resident Virus, they are unlike to resident virus, not loading in to RAM memory. They try to infect the programs and cause damage at the importee of execution of septic file. Most of viruses are Resident.Overwriting Virus. Most destructible type of virus, it overwrites the information in the infected files corrupting them permanently. If you dont have the back-up copy of your files its a bad news because the only way to get rid of this type of virus is to delete infected files.Boot Virus. Also known as System Virus. These viruses infect critical section with boot code on hard disk or another bootable media store that helps to start computer. When the computer starts up and the boot virus is launched, it can take complete control over infected computer and does everything it wants (steal private information, delete system files etc.) Clean bootable antivirus software required to cleanse the system. However depend on the virus this solution is not enough to clean bo otable sector.Macro Virus. Macros are micro-programs associated with a file that serve to automate joint complexes of operation. Macro virus expand from applications which use macro, word memorial (file with extension .doc),Excel (file with extension .xls) data of Access (file with extension .mdb), Power point (file with extension .pps). When we open a file containing a virus of this type of macros are automatically loaded causing the transmission. Most applications that use macros have, but many macro viruses easily circumvent this protection.Multipartite Virus.Very advanced type of virus that can perform multiple infections combining different techniques. These viruses are considered very dangerous, for its ability to combine many techniques of infection and libellous effects of their actions.File Virus. Infect programs or executable files (files with extension .ex and .com) when run the infected program, the virus becomes active, producing different effects. The majority of ex iting viruses are of this type.Logic Bombs.Neither virus is considered strictly as they do not reproduce. They are not separate programs, but hides in an unmarked segment within another program.They aim to destroy the data on a computer or cause other significant damage on it when certain conditions are met. While this does not happen, no one notices the presence of the logic bomb. Its action can be extremely destructive.Trojan Virus.Trojan arent considered virus, because they dont replicate themselves. Trojans are commonly hidden in the programs that appliers to be useful, but instead opens unauthorized access to users computer. Trojans also can be installed thorough web pages with executable subject (ActiveX control), email attachements.The effects of the Trojan can be very dangerous, allowing remote control from other computer (downloading, uploading, modifying or deleting files), installing key loggers and other malware, connecting computer to botnet (sending SPAM messages, per form network DDos attacks).How can computers become infected and what damage can cause?Viruses can infect computers throughInternet (email attachments, infected web pages, downloading infected files)Computer networksRemovable Media DrivesVirus SymptomsThe computer runs very slowReduces the available memoryThe computer shuts down or freeze frequentlyThere are programs which do not work or malfunctionThere is less free space on your hard diskComputer files fellStrange messages appear on the screen.Some file are renamed or extendedConclusions and RecommendationsNot everything that affects the approach pattern functioning of a computer is a virus. Is very important to have means to detect and disinfect viruses use an antivirus program and update daily (use default settings). Scan all removable disks before use it and scan computer periodically at least once a week.3.5 FirewallA firewall is a system that protects a computer or computer networks blocking unauthorized network access whil e permitting authorized communications. Firewall can be implemented in software, hardware or combination of both. Firewall is placed between saved and unprotected networks and acts as a gate to protect network or single computer, by inspecting network traffic, applying rules and allowing or denying connection.Firewall can use different techniques to do soPacket filter (inspects every information packet passing through the network)Application gateway (applies rules to specific applications such as FTP, Telnet servers.)Circuit-level gateway(applies rules to TCP or UDP connections, when are made there is no further inspection.)Proxy Server (checks all network activity passing through network.)Conclusions and RecommendationsEveryone should use a firewall against network intruders to protect computer and private information. Most of the antivirus programs and operating systems have integrated firewall software. Minor disadvantage of firewall, it can slow down Internet traffic and can be tricky for not advanced users to set-up it properly (not blocking traffic for useful programs).3.6 Filtering SoftwareThe filtering software is designed to control what contents are allowed to be accessed on Internet. Often its installed on the computers of educational, government organizations, private companies. Filtering software is commonly used by parents to prevent their children from having access to certain web places unsuitable for minors. It also can be used as the mean of censorship in some countries.How does it work?Nowadays on the market there are many options of filtering software with various techniques and content filtering to prevent from harmful online material.The filtering programs works like thatAddress blocking websites containing such contentControlling access times evaluate default address listPossible to establish your own list of addressesAssigning different profiles or different days and times(work, leisure, etc.)Controlling which services can be used at an y time and for each user (mail, chat, etc.)Advantages and disadvantages of Filtering Software.Advantage of filtering software is that does not allow minor to access pages of violence, pornography, racism. In a work place it prevents employees of wasting their time and resources for personal proposes (chatting online, social network pages, etc.).Main disadvantage is over-zealous filtering. Par example, in some filters attempts to block the word sex would block words such as Essex and Sussex and etc.Internet censorship in some countries limits freedom of speech for different reasons and that is not a good thing.Some Filtering Software examples.Netnanny, Mobicop, DansGuard, CleanFeed,Web Sence3.7 EncryptionIts a method to convert the characters of a text that can not be understood unless it is read with the corresponding key. Used to protect the integrity of secret information if it is intercepted. Encryption is also used when data is sent via secure intranet (VSPN). Encryption is used for electronic commerce to protect credit card information.How does it work?The keys are the heart of the encryption. The keys are complex numerical formulas (algorithms) used to encrypt and decrypt information. If someone encrypts a message, only one with the appropriate key can decrypt the message. Algorithms are used to perform a hash function. This process produces a unique MD5 for this message. The MD5 is encrypted with the senders private key resulting in a fingerprint.Conclusions and RecommendationsEveryone who has and important or secret information (banks, hospitals, government, universities, e-commerce sites) they have to keep this information in secret from fraudsters.In recent years, it was few cases when portable computers of government organizations with secret information were lost or stolen. Laptops (portable computers) became more and more popular and most of us have some kind of personal information on our computers. So it is very important to have that informatio n encrypted, in case of losing it.3.8 Digital SignaturesA set of data in electronic form attached to or associated with others which are used to identify the signatory, which allows you to check the provenance, authenticity and integrity of messages ex removed over the Internet.There are two types of electronic signatures basic and advanced. The basic does not guarantee the identity of the signer, neither the veracity of information received since the sending does not attend that the issuer has made it known to us, while the advanced signature identifies the signer and detect any subsequent change of data that could occur.The digital signature is a specific techology signature and created by the so-called System unsymmetric key cryptography and it works like that The holder has two keys public key and private key ,private key is only known to the issuer and is associated to the information you send .while the person who received only know their public key .Two keys are needed and complement each other to get the encrypted message appears as the original .When we want sent private information the information is encrypted by system which use mathematical operations so the information becames encripted ( strange numbers and letters) so the message only can be deciphered by the people who know the instruction and have a public keyConclusions and RecommendationsIt should be used by the organitations which have an important or secret information as banks, universities, hospitals, etc., these organitations should use digital signatures in order to avoid the risk of fraud .they have to be sure about the authenticy of the sender.

Wednesday, April 3, 2019

A Solar Cell (The Photovoltaic Cell) Essay

A Solar Cell (The Photovoltaic Cell) EssayA solar galvanical carrell or the photovoltaic jail kiosk is an electrical thingmabob that converts combust capacity directly into electricity. This carrell when exposed to combust jakes succumb and support an electric flow without being attached to all external electric potential source. The solar cell engagements the photovoltaic effect to start out electricity.thw word Photovoltaic comes from the Greek word meaning light, and from the word Volt, which is the the building block of electro-motive force excessively the word volt comes from the last name of the journeyman of the battery (electrochemical cell), the Italian physicist Alessandro Volta. Thus we stomach the term photo-voltaic.The photovoltaic effect, in brief, is a process in which electric current is produced in a physical upon exposure to light. The photovoltaic effect being directly relate to the photoelectric effect is actually a different phenomenon. I n photovoltaic effect, the light is accompanying upon the material egress the negatrons present in the pelmet tie of the atom lock vigor from the light and jump to the conduction band (band theory). Now these electrons be attracted by a positively super snapd electrode and thus the circuit is completed and the light efficiency is converted into electric energy. On the other hand, in photoelectric effect, the electrons argon ejected from a materials prove upon exposure to radiation.Photovoltaic systems atomic number 18 extraordinary and very useful with a huge list of advantages. The reason they atomic number 18 so unique is they drive no moving fragmentises (in the classical mechanical sense) to wear out. in that location atomic number 18 no fluids or gases (except in hybrid systems) that suffer escape valve out. The best part nearly these is that they need no fuel to operate. Having a rapid response, they achieve full output instantly. These cells throw out o perate at moderate temperatures producing no pollution eyepatch producing electricity, although waste products from their manufacture and ototoxic gases in the event of catastrophic failure and disposal may be a concern. Solar cells require little maintenance if properly construct and installed.Silicon, the second most abundant element in the earths crust deal be apply to make these cells. Thus, their production is possible on a giant outdo with an added advantage of them being modular, permitting a wide incline of solar-electric applications such as1) Small scale for remote applications and residential use.2) mean(a) scale for business and neighborhood supplementary power.3) Large scale for centralized energy farms of squ be kilometers size.Solar cells drive a relatively proud transition aptitude large the nobleest overall conversion force from fair weather to electricity yet measured. This chip ins them wide power-handling capabilities, from micro wolframs to meg awatts. Clearly, photovoltaic cells have an appealing throw away of characteristics. 11.1 HISTORYThe physical phenomenon responsible for converting light to electricity-the photovoltaic effect-was first spy in 1839 by a French physicist, Edmund Becquerel. Becquerel noted that a voltage appeargond when w dealness of both identical electrodes in a weak conducting response was illuminated. The Photovoltaic effect was first to be noticed and researched in solids, e.g. selenium, in the 1870s. However, it was in 1883 Charles Fritts built the first solid state photovoltaic cell he coated the semiconductor selenium with an extremely thin stratum of gold to air the junctions. The doodad was barely around 1% efficient. In 1888 Russian physicist Aleksandr Stoletov built the first photoelectric cell based on the outer(a) photoelectric effect discovered by Heinrich Hertz foregoing in 1887.The first hard-nosed photovoltaic cell was essential in 1954 at Bell Laboratories by Daryl Chapin , Calvin Souther Fuller and Gerald Pearson. A easy te p-n junction was used by them this junction could r each(prenominal) 6% dexterity, as compared to the selenium cells in which it was difficult to reach 0.5%. At first, cells were demonstrable for toys and other minimal uses, since the bell of the electricity they produced then was very utmost i.e. a cell that produces 1 watt of electrical power in bright temperatenesslight cost about $250, compared to $2 to $3 per watt for a coal plant. 2In 1958, the U.S. Vanguard plaza satellite used a small (less than wizard and only(a)-watt) array of cells to power its radio. These cells purposeed so well that the space scientists soon realized the Photovoltaic could be a very telling power source for numerous space missions. Technological developing of the solar cell has been a part of the space program ever since then. overly the space programs, another source is the transistor industry has contri thoed greatly to solar-cell technology. Transistors and PV cells are make from similar materials, and their doings are determined by few of the same physical mechanisms. A great issue forth of research and essential evolution has been done in improving and developing the ever-useful transistor, and there has been a fix discovery of valuable information in relation to solar cells. This stake has reversed in recent times and much of the research mishap in PV is alter transistor technology.1.2 EFFICIANCY OF SOLAR CELLSToday, photovoltaic systems are unfastened of transforming one kilowatt of solar energy falling on one square meter into about a cardinal watts of electricity. One hundred watts toilet power most household appliances equal television, stereo, or a lamp etc. . In fact, on a standard basis a roof covered with solar cells facing the sun in a typical home forgets about 8500-kilowatthours of electricity annually, which similarly is almost touch to a average households annual consumption on electricity. On comparison, a present-day, 200-ton electric-arc steel furnace, demanding electricity worth 50,000 kilowatts, would for a PV power supply, require about a square kilometer of land. Certain factors make capturing solar energy difficult. Apart from the suns low illuminating power per square meter, temperateness is discontinuous and is bear upon by time of day, climate, pollution, and season. Power sources based on photovoltaic require either back-up from other sources or storage for times when the sun is obscured. Moreover, the cost of a photovoltaic system is very last (electricity from PV systems in 1980 cost about 20 times * that from conventional systems powered by fossil fuels). Thus, solar energy for photovoltaic conversion into electricity is abundant, inexhaustible, and exculpated yet, on the other hand it excessively requires special techniques to gather tolerable of it powerfully.When sunlight is incident on the solar cell, most of the energy is b efogged even beforehand it can be converted to electricity. Maximal sunlight-to-electricity conversion efficiencies for solar cells range up to 30% (and even high for some highly complex cell jut outs), simply typical efficiencies are 10%-15%. Most current acetify on cells is directed at enhancing skill while lowering cost. Certain physical processes limit cell efficiency-some are inherent and cannot be changed many can be improved by proper design.Reflection is the first factor that stiffens the efficiency of the cell. Normal, untreated atomic number 14 reflects 36% (or more) of the sunlight that strikes it. This would be a horrendous loss in terms of efficiency. Fortunately, there are several shipway of treating cell surfaces to break off reflection drastically. By dint of these methods, reflection can be lowered to a quite manageable 5% or so.The second factor affecting the electricity production and then, in turn, the efficiency of the cell is the intensity of light fa lling on it. Now, this light can be of dickens faces--Light that is not energetic enough to separate electrons from their atomic bonds.-Light that has extra energy beyond that needed to separate electrons from bonds.Both of the above types of light contribute in reducing the efficiency of the cell. Light entering a solar cell can-a. Go right through it.b. Become absorbed, generating heat in the form of atomic vibrations.c. Separate an electron from its atomic bond, producing an electron- reparation pair.d. Produce an electron-hole pair but have an excess of energy, which then becomes heat.Only (c) is a near-perfect means of transforming sunlight into electricity.Since the suns spectrum has a wide variety of energies and intensities, the key is to match a material and its characteristic band chess opening energy with the spectrum so that the maximum come in of energy in the suns spectrum falls just above the characteristic energy.The terzetto factor that reduces the efficiency o f the cell is electron-hole recombination. in that location are two ways in which recombination of electrons and holes occurs, which can be characterized as direct and indirect recombination.- set Recombination Direct recombination is relatively rare. It happens when an electron and a hole randomly encounter each other, and the electron falls back into the hole. Thus the materials original bonds are reasserted, and the electrons and holes energies are lost as heat.-Indirect Recombination Indirect recombination can occur in many ways. (Indirect means that the electron and hole do not just running into each other and combine-the interaction is influenced by further circumstances.) Contrary to what one might expect, indirect recombination is much more of a problem in solar cells than direct recombination.Resistance is a factor which reduced efficiency of almost all cognise electrical appliances and the solar cell is no different. Resistance losses in solar cells occur predominantly i n three places in the quite a little of the base material, in the narrow top-surface horizontal surface typical of many cells and at the porthole in the midst of the cell and the electric clicks leading to an external circuit. Resistance losses lower voltage and start the chances of recombination of rosinesss, reducing current. Usually it is better to highly dope silicon to reduce resistance as highly doped silicon has numerous bounteous letter carriers to conduct the current. later on conceiveing the various factors discussed, we can actually look preceding to suck and study the construction of the solar cells with maximum possible efficiency. 3-101.3 types AND GENERATIONS of solar cellsSolar cells can be of many types as we write out them. Todays ripe technology has allowed us to be able to study each in detail and help with improving energy output and subjoin efficiency.There are three types of solar cell-Amorphous cells,Poly liquidMono learny.Amorphous, too co gnise as the thin-film solar cells are more commonly seen in thingamajigs like toys, calculators etc. Monocrystalline solar cells are contract from one silicon block of metal which is got from a single large silicon crystal. Polycrystalline cells are cut from an ingot derived from many smaller crystals.Mono cells are make by growing an ingot of the silicon crystal from a smaller crystal, because the name mono-crystalline or single-crystal. This ingot is then trimmed and sliced into wafers.In case of polycrystalline cells, molten silicon is poured into a square barf allowing it to set. Now silicon cools and sets at different rates, that is, the inside cools slower than the outer part and there is no seed crystal to grow the tonic material. This uneven cooling itself creates five-fold crystals within the block thus giving it the name of poly-crystalline or multi-crystalline. Due to its multifaceted surface, this type of solar cell is a better performer even in dim light conditi ons giving greater wattage even from a small surface area.Amorphous cells are made by depositing a thin weather sheet of silicon over a surface like steel. The panel we get is a single piece and individual cells are not visible. These cells do not have a high efficiency and thus yield a lesser investment for our investment.Apart from this solar cells can be divided into three coevalss, being 1st times 2nd propagation 3rd contemporariesFirst-generation cells are based on expensive silicon wafers and makeup 85% of the current commercial market. Second-generation cells are based on thin films compounds such as amorphous silicon, or copper atomic number 49 selenide. The materials are relatively cheap, but research is needed to raise the efficiency of these cells if the cost of delivered power is to be reduced. Third-generation cells have shown a dramatic cast up in efficiency that maintains the cost advantage of 2nd generation materials. Their design may make use of carrier mult iplication, hot electron extraction, multiple junctions, sunlight concentration, or impudent materials.11First generation solar cellsThese are the dominant type of cells available in the commercial market. A crystalline silicon wafer is used for the production of these cells. They tend to have a large surface area and a single level p-n junction diode. existence so widely used, these cells have their own advantages and disadvantages. On the pros side, these cells have a broad spectral submergence rate and also have high carrier mobility. But these cells require expensive manufacturing technologies and also growing ingots is a very intensive process. Another disadvantage we can usually honour in these cells is that it is relatively easy for an electron to encounter a hole and thus that leads to recombination instead of electricity production. Most of the energy from a high energy photon is usually lost as heat.12Second generation solar cellsSecond generation solar cells are moun ted on codswallop substrates. The production costs that were plaguing first generation solar cells find some relief with the second generation. There are many companies who desire to wall plug second-generation thin-film solar cells to the public. The material used in second generation solar cells are normally amorphous silicon, micro-crystalline silicon, cadmium telluride (CadTel) and copper indium selenide/sulfide14.We see a potential for cost advantages in this generation over crystalline silicon because of various reasons. There is a lower material use along with fewer and simpler manufacturing steps. These cells also have the perfect band break of serve for solar energy conversion.1314Third generation solar cellsThe third generation cells are very different from the previously discussed cells. They do not depone on a p-n junction to separate photo-getd charge carriers but are based on a silicon substrate with a last of nanocrystals. The third generation is the future of so lar cells and the cheapest of them all. They are exactly what the sun-powered industry needs for renewable and efficient power sources. As solar cell technology continues to grow, our solar conversion efficiency pull up stakes continue to rise and production expenditure go away continue to drop. The third generation solar cells focus on reducing manufacturing cost and enhancing the performance of 2nd generation solar cell technology. Nanotechnology is one area that is being researched upon by this new generation of cells. Nanotechnology is being used to improve the basic solar cell to have improved electrical performance which also makes it more cost efficient. 15,161.4 POLYMER SOLAR CELL AND ITS DEVELOPMENTOne of the unique 3rd generation solar cells we know today is the polymeric solar cell. usually live of an electron- or hole-blocking floor on top of an indium tin oxide (ITO) semiconducting wish-wash followed by electron donor and an electron acceptor (in the case of ple nty heterojunction solar cells), a hole or electron blocking stage, and metal electrode on top.During the last 30 years the polymer solar cell has substantial from an inefficient light-harvesting winding with almost no lifetime to a device that may be introduced to the commercial market within a curt span of years. Today scientists are working with a lot of dierent types of polymer solar cells and since it will be too comprehensive to deal with all of them, only one type will be treated in this report. The type of solar cell which will be treated is a polymer/fullerene bulk hetero-junction solar cell This type of polymer solar cell consist of 6 spirit levels Glass, ITO, PEDOTPSS, combat-ready layer, calcium and aluminum.The glass serves as a supporting layer for the solar cell and the only demand glass has to fulll is that it does not absorb light in the visible area, since the solar cell uses this light to generate power. Other and more exible types of supporting layers, lik e transparent polymers, can also be used. The focus of this report will not lie on the supporting layer and therefore the use of other types of supporting layers will not be discussed any further.18ITO (indium tin oxide) and aluminum serves as the electrodes in the solar cell. Beyond that, the ITO and Aluminium are also used to generate a integral electric held caused by the difference in the metals work functions. This electric knowledge domain is used dissociate the excitons, which are generated when the active layer absorbs light, and afterwards to pull the charge carriers out from the active layer. Like glass the ITO layer is transparent in the visible area.PEDOTPSS (poly3,4-(ethylenedioxy)-thiophenepoly(styrene sulfonate)) and calcium are two materials which are introduced into the solar cell in order to increase the built-in electric eld and thereby improve the performance of the solar cell. The active layer in this polymer solar cell consists of a blend among the conjugate d polymer MEH-PPV ((poly2-methoxy-5-(2-ethylhexyloxy)- 1,4-phenylenevinylene)) and the modied fullerene PCBM (1-(3-Methoxycarbonylpropyl)-1-phenyl-6.6C61). MEH-PPV is the absorbing part of the active layer and PCBM is introduced into the layer to make the dissociation of the excitons more eective.In bulk heterojunction polymer solar cells, light generates excitons with subsequent musical interval of charges in the interface betwixt an electron donor and acceptor blend within the devices active layer. These charges then assault to the devices electrodes where these charges bunk outside the cell, perform work and then re-enter the device on the opposite side. The cells efficiency is limited by several factors especially non-geminate recombination. raft mobility leads to faster conduction across the active layer.2930By simply portmanteau polymers (electron donors) with fullerene (electron acceptor) in organic solutions, a self assembling interpenetrating entanglement can be obt ained using various coating technologies ranging from laboratory-scale spin coating or spray coating to large-scale deceit technologies such as inkjet printing20,21, pervert blading 17 , gravure23 , slot-die coating24 and exographic printing25 .In the last few years, several effective methods have been developed to optimize the interpenetrating network formed by the electron donor and acceptor, including dissolving agent harden (or slow-growth) 25 , thermal annealing 26-28 and morphology control using mixed declaration mixtures 29 or additives 30 in the solutions of donor/acceptor blends. Poly (3-hexylthiophene)(P3HT) in particular has been subject to increasing interest in the polymer research community, but signicant build up has also been made in developing new active-layer polymer materials 19,30-37 . Since around 2008, the efficiency of PSCs has rise to 6% using new conjugated polymers as electron donors 34.Although progress has been impressive, there is still much to do before the realization of practical applications of PSCs. Many factors need to be taken into account in efficiently converting sunlight into electricity.Figure 2 Shows the energy levels in a polymer solar cell. ITO(indium tin oxide) is used as the high work function electrode and Al is used as the low work function electrode. (a) displays the energy levels before the polymer solar cell is assembled. (b and c) shows the energy levels after assembling. In (b) the polymer is an isolator and therefore the electric field changes linearly through the cell. The polymer used in (c) is a hole conducting polymer and therefore a Schottky junction will be formed between the polymer and the low work function electrode.The absorption range, the photon-electron conversion rate and the carrier mobilities of the light-harvesting polymers are among the crucial parameters for achieving high-efficiency solar cells. Furthermore, fabricating large area devices without signicantly losing efficiency whil e maintaining long lifetime of the device remains challenging.38 39Therefore, a major quarrel lies in fabricating polymer solar cells, in which free-charge-carrier generation is a exact step. Fortunately, it has been free-base that efficient charge transfer can take place between materials, that is, donor and acceptor molecules, with suitable energy level offsets. The strong electric field at the molecular interface of two materials with different electrochemical potentials is capable of separating the excitons into weakly bounded Coulombic pairs, and thereafter separated charge carriers. In cases where the donor and acceptor molecules form an intimate contact in blend films, efficient charge transfer takes place with an efficiency approaching 100%.The short exciton dispersion length which is much smaller than the necessary film thickness for effective optical absorption, has limited the external quantum efficiency (EQE) and hampers the efficient utilization of the photogenerate d excitons in organic photovoltaics.A major breakthrough was achieved with the bulk heterojunction (BHJ) concept, where the nanoscale cast detachment creates donor/acceptor interfaces for exciton dissociation via efficient charge transfer from donor to acceptor end-to-end the film. The concepts of donor/acceptor and BHJs, thus, establish the cornerstones of polymer solar cells.Diagram of a polymer-fullerene bulk heterojunction.The bulk-heterojunction concept. After absorption of light by the photoactive material, charge transfer can easily occur due to the nano-scopic mixing of the donor and acceptor (solid and dashed area). Subsequently, the photo generated charges are transported and collected at the electrodes. Here highest occupied molecular orbital is truncated as HOMO and the lowest unoccupied molecular orbital as LUMO.Despite the high attainable EQE, overall power conversion efficiencies (PCE) inform are still low, due to the inferior charge-transport properties and limi ted spectral absorption range of the polymer active layer. On one hand, endeavors in synthesis and development of novel low-band-gap polymers are being carried out to harvest the major part of the solar spectrum. 40-46On the other hand, film-growth dynamics of polymer blends via solution processes has become one of the central topics to derive maximal efficiency from bulk-heterojunction bodily structures. Meanwhile, precise efficiency measurements provide solutions to the spectral mismatch between the solar spectrum and polymer absorption, offering accurate evaluation of novel photoactive materials.High internal quantum efficiencies can be expected, provided that efficient donor-to-acceptor charge transfer and transport in the bulk heterojunctions occurs. A suitable energy-level confederation between the donor and acceptor to provide the driving force morphology plays a decisive role linking the optoelectronic properties and device performance to the fabrication processes. In ap pendage to experimental results, simulation techniques have also been applied to predict the best morphology, yielding results that are consistent with the experimental conclusion that a nanoscale cast separation with a bi-continuous pathway toward the electrode is desired. Fabrication parameters such as solvent selection and annealing treatment are the most critical factors in film morphology.However, additive incorporation also showed significant benefits toward improving device performance. The overall effects of morphology manipulation assist in forming an interpenetrating network of donor and acceptor molecules, facilitating both charge transfer and carrier transport. Lateral degree separation has been observed and well-understood in several systems. Beyond that, the ingredient statistical distribution of the donor and acceptor molecules along the cross-section of blend films, that is, vertical phase separation has been observed recently in the nanoscale film morphology, whi ch intuitively governs the charge transport and collection. Thus, an ideal morphology consists of phase separation laterally and vertically, which should both be optimized for satisfying device performance.47,50-52A variety of post-treatment methods can alter the optoelectronic properties of the polymer-blend films. anneal processes in polymer solar cells can be divided into two categories thermal annealing 53,57,58 and solvent annealing.48,59-61 Both techniques concentrate on improving the nano scale lateral phase separation of both the crystalline P3HT aggregates and PCBM domains. Thermal annealing can be applied either on the final device (post-annealing) or on the polymer film only (pre-annealing). The annealing temperature and time are the two most critical parameters in this approach. However, the selection of solvent as well as metal electrodes could also affect the ultimate device performance.Solution processing has many advantages over other film fabrication technologies, which usually require complicated instruments as well as dear(p) and time-consuming procedures. Therefore, solution processing has developed into the most favored methodological analysis for fabricating organic optoelectronic devices. Solution processing also allows the freedom to control phase separation and molecular self-organization during solvent evaporation and/or film treatment. The solvent establishes the film evolution environment, and thus has foreseeable impact on the final film morphology. Selection and combination of solvents have been shown to be critical for the morphology in polymer-blend films, and are well-documented in the literature. 48,49. Spin-coating from single-solvent solutions results in thin films, which hold optoelectronic properties determined by the solution parameters and the spin-coating process, for example concentration, blending ratio, spin bucket along and time, etc. Meanwhile, solvent properties, such as boiling point, vapor pressure, solubili ty, and polarity, also have considerable impact on the final film morphology. 62-751.5 throw function of solar cells1.5.1 Work function of materialThe work function is the minimum energy needed to move an electron from the Fermi energy level, EF, to vacuum energy, Evac.The work function varies by using different materials and also by doping. It is lower for n-type semiconductor than for p-type because Fermi levels within the band gap of a semiconductor depends upon doping. Where are work functions of the n-type and p-type materials respectively.Junctions having different work functions give way to an electrostatic field.1.5.2 Metal-semiconductor junctionMetal-semiconductor junction is the simplest type of charge separating junction.If we have an n-type semiconductor of work function metal of work function, such that, it is called a Schottky barrier.When metal and semiconductor are separate from each other, the Fermi levels will look like in fig. 5(a). But when they are in contact ( electronic), these levels will line up. The exchange of charge carriers across the junction results in this, with the consequence that the layers approach the equilibrium (thermal). The energy at the conduction band edge at the interface between semiconductor and metal is higher than in the bulk of the semiconductor. The electrostatic potential energy is shown in fig. 5(b) by the change in Evac.The space charge share or depletion region is the region where there is a net charge.As Evac changes, so must the conduction and valence band energies, and that too by the same amount (proportionality). This happens because the electron affinity and band gap are invariant in the semiconductor, and is called band bending.761.5.3 p-n heterojunctionA heterojunction consists of two different materials with different band gaps and these can also be either p-n or p-i-n junctions. Devices based on heterojunctions can improve carrier collection and thus efficiency. Due to change in the band gap, a discontinuity exists in the conduction and valence band at the junction.The potential step will affect the effective fields for the two carrier types in different ways. Usually, one carrier type is assist by the field change, while the other is opposed. In fig. 6(b), the field that drives electrons to the n side is increased, while the field driving holes towards the p side is decreased. 76We know that the standard form of an organic photovoltaic cell is based upon sandwiching a thin semiconducting organic layer(s) between two conducting layers having different work functions here we have higher work function conductors typically made of gold or ITO and lower work function conductors typically made of aluminum or calcium.We have already discussed in section 1.2 how the efficiency of solar cell can be improved, here we will consider mathematical expression of efficiency. Efficiency is defined as measures the amount of energy converted to electric current relative to the total energy incident upon the cell, it is designated with Greek letter , . The formula for calculating efficiency is = Jsc X Voc X FF,where Jsc is the short-circuit current (when there is maximum current flowing and no voltage difference across the circuit),Voc is the open-circuit voltage (when there is no current flowing), and FF is the fill-factor (the actual power relative to the theoretical power produced by the cell).To increase the efficiency of Polymer Solar cells, we need to improve these 3 factors. Jsc is primarily change by band-gap, carrier mobility, and film formation properties of the active layer. Voc is primarily affected by the material band-gap and the device structure. FF, is particularly difficult to predict and design, but seems related to the relative motilities of the electrons and holes.77-801.6 Inverted Polymer Solar CellsThe regular device structure for polymer solar cells is indium tin oxide (ITO), where a p-type layer is used for anode contact, and a low-work-functi on metal as the cathode. Both the p-type layer and the low-work-function metal cathode are known to degrade the device lifetime. 106-108 The p-type layer is potentially detrimental to the polymer active layer due to its acidic nature, which etches the ITO and causes interface instability through indium dispersion into the polymer active layer.Low work- function metals, such as calcium and lithium, are easily oxidized, increasing the series resistance at the metal/BHJ interface and degrading device performance. In principle, ITO is capable of collecting either holes or electrons, since its work function (4.5 to 4.7 eV) lies between the typical highest occupied molecular orbital (HOMO) and lowest unoccupied molecular orbital (LUMO) values of common organic photovoltaic materials. The polarity of the ITO electrode depends mainly on the contact

The International Marketing Strategies Of Companies Marketing Essay

The International merchandise Strategies Of Companies marting EssayIt is not too long ago when mass from adept office staff of the ara did not know the exis decenniumce of new(prenominal)s. Peoples believe to sh be association and explore the whole human beings led to some(a) major exploration a wish well(p)s Marco Polo and Christopher Columbus, who do the connection among Europe and America. in advance this period, stack had no scope to know well-nigh knowledge or innovations of an separate(prenominal)s. It was the 16th century A.D. that brought Patagonian Indians to America. During the 17th century Europeans discovered Australia and by that while the whole world was recognized and was ready for contact and championship activity. This fanny be considered to be the earliest recorded history of the beginning of a new era called globalization. (Daniels et al. ,2002). Although the idea of globalization and its relation to the task world is not too old and it is only in the last dickens decenniums that the current impetus of globalization has brought a dramatic interchange to the personal credit line world (Thoumrungroje Tansuhaj, 2004).In the book, Globalisation in world business, the author A. G. Hopkins verbalise globalization is not simply a westbound experience. The key is to hear the globalizing processes which include ancient and modern as well as western and eastern dimensions. The representative of globalisation could be anyplace starting from phantasmal leaders and their beliefs to cr decl beed heads and their royal family travelling soldiers and scholars or even traders or general community people (Bell, 2003).However, globalisation has been defined by Jane Fraser and Jeremy Oppenheim (1997), in the truthfulst terms, as a process by which the worlds parsimoniousness is transformed from a set of national and regional grocerys into a set of securities industrys that operate without imagine to national boundaries.WHAT D RIVES IT?In mid 1980s, after facing some strong changes in cold war, East world- westernmost world relation became almost friendly. In addition, after the fall of Soviet Union, lot of emerging markets appeargond in the scope of world market, with an aspiration to enhance their living standard. In 1990s West German and East Ger umteen re- interconnected and appeared as a potential drop industrialist country in world market. Many Eastern Europe countries and transition economies countries joined in European Union. China and India started exporting goods and portions to outstanding regions of the globe, fictional charactericularly to the unite States. The powerful scotch growth of countries, resulted in en extensived local hires, booster cable to divergence between provinces, discriminations in income, anxieties well-nigh employment, and amplifys in energy prices (Czinkota and Samli, 2007).The the States market took the leadership berth in this current trend of globalizatio n. Factors like decentralization, privatization, deregulating as well as the growth of cyberspace do the globalization process faster. Through decentralization, new trading markets and trading blocs arouse emerged some the world. The companies are able to produce, buy or sell goods anywhere in the world and meet the local and regional subscribes. On the other hand, deregulation removed the trade barriers and athletic supportered to form NAFTA, LAFTA and World Trade Organization. Also, non authorities organization became involved in globalization through the process of privatization. Countries like India and China became to a greater extent involved in global trade callable cyberspace and technological alterment (Czinkota and Samli, 2007).Many authors and scholars progress to talked about some characteristics of globalization well-nigh the world. But factors like fast technological progress, the deteriorating lineament of the nation state, transfer of industrial proceeds from western countries to newly industrialising countries for dirt cheap labour and material are key drivers of globalization (Br declare, 1999).THE EFFECT OF globalisationThe effects of globalization are spreading widely day by day. All the major industries and business of both developed and developing countries, on with individuals, are affected by globalization. (Garrette, 2000). The current business environment is to a greater extent aggressive and combative and piece of ass be characterised as hypercompetitive environment (DAveni, 1994).As markets are becoming more global day by day, the trade involves more countries and economies approximately the world. World merchandise trade was $157 unmatched million million in 1963 and it has belong $10,159 in 2005 which is a significant increase of $10 trillion. Also, service trade which used to be $365 billion in 1980 has increased to $2,415 billion (Held Mcgrew, 2007).The effect of globalization brought dramatic changes in the business environment and companies are restructuring their business collectable to this reason (Jones, 2002). One of the most strategicalal change and significant business development in the new-fangled years, is the formation of co-marketing bond papers (Hwang and Burgers, 1997).Globalization does not always hold good outcome to all people. It has severely affected the job sector of the developed countries, where jobs of manufacturing sector has decreased. As merchandiseion plants kick in moved to the low cost producers and unavailability of alternative employment, many are still unemployed. Other issues for developed countries include the debt obligations to planetary bank. The get has increased to $1 trillion which has an adverse impact on their economy. The privatisation sector, deregulation and currency adjustment has been affected out-of-pocket to this reason (Roukis, 2006).Globalization has consequences on our culture as well. The globalization of culture also affects cities. As people around the world exchange cultural symbols, they tend to forget their own cultures and identity. The exchange of cultural symbols has increased dramatically in the recent decade overdue to the availability of communication technologies. (Nijman,1999).Globalization also caused the remarkable increase in inequality between rich and poor countries. Also, globalization is relate with globally organized crime, ethnic clash, environmental disaster, and the collapse of many states and the growing of others, terrorism, militarism, proper democratic system as a political human body for world-wide aid, the rise of civil wars etc. (Santos, 2006).On the other hand, Held Mcgrew (2007) suggests that economic globalization could encourage economic development as well as it could be the only successful path to global poverty reduction. During 1970, thither were more than 1400 million people who used to earn slight than $2 a day and during 1998, this figure came dow n to less than 1000 million.WHAT IS merchandising STRATEGY?According to Varadarajan Clark (1994), Marketing strategy is concerned with the creation of a marketing aggregate that enables the business to achieve its objectives in a intention market.Marketing strategy is the main and most important principle that a firm uses to organize and allocate its resources for generating profit from customers, who are an integrate part of the market (Kim, 2004).Aaker (2009 cited by Kyung Hoon Kim et al., 2012) notes that marketing strategy can involve a variety of functional area strategies including vistaing, price, distribution, and global strategies.The overriding principle tearaway(a) a firms marketing strategy is that, marketing strategy depends on the gilds visual sensation for its future. This vision generally reflects where the firm expects to spot itself in five to ten years-in effect, how the market perceives the firm. The development of a marketing strategy needs a basic asse ssment of both the firm and the market. The strategy, chosen, has to be the best at increasing the firms assets, with respect to the target market (Kyung Hoon Kim et al., 2012)Also, the key task of planetary marketing management is to establish a companys overall world(prenominal) strategy which also decides the degree of international integration of the company (Ghauri Cateora, 2006).INTERNATIONAL blood line AND GLOBAL MARKETINGGlobal marketing or globalization of markets is a key issue for multinational business firms. Many companies who markets global harvest-tides around the world much(prenominal) as Nestle, Sony, Toyota and many others has to carefully look for opportunities in the international markets. Globalization of markets is a challenging issue for governments and political caller or trade unions while business related people or organizations encourage the initiative of open trade which connects contrasting markets by waiver beyond the national boundary.Accordi ng to Solberg (1997), cited by Hollensen (1998), the following table explains tack together strategic windows which are major motives for firms to internationalise. At immature stage, where firms have slight experience, it is better not to go for international markets. Instead they should strength their position in the home market. Also, if firms find themselves teensyer and weaker among other multinational firms in the global market, then Solberg (1997) suggests that the firms should try to increase its net assets by attracting potential partners for a future by-out bid. This could be a good preference for small and medium size enterprises who are supplying advanced high-tech components to large industrial buyers. Firms also can overcome their competitive dis advantages by personnel casualty into alliances with other firms. attaindnessforinternationalizationMature3.Go into new business6. Prepare for globalization9. Strengthen your global positionAdolescent2.Consolidate your e xpert markets5. guide expansion in international markets8. Seek global alliancesImmature1. bide at home4. Seek niches in international markets7. Prepare for a buy-outLocalPotentially globalGlobalIndustry globalismTable. The nine strategic windows ,Source opted from Solberg (1997), cited by Hollensen (1998).The technological emanation of the 21st century has been a key factor behind global marketing. The exchange of information has become easy and transport has become more cheap and comfortable. Consumers around the world wants new and innovative product even if they are being made in the other part of the world because technology makes them aware about the existence of that new product. Business firms accept this commercial reality and as result enjoy greater economies of scale in production or marketing or distribution. As a result, the globalization of business helps them to twirl products at a cheaper rate and consequently urinate a competitive advantage among its competito rs (Buzzel et al.,1995).Although global marketing strategy and globalization of markets are ii interrelated areas but there is a little difference between them. Global marketing strategy is needed in order to improve the efficiency of operations while globalization of markets is occurring due to the homogeneity of demand across cultures (Ghauri cateora, 2006).Due to the raise in globalization of markets day by day companies find they are inevitably surrounded by abroad consumers as well as their competitors and suppliers. On the other hand, different countries have to admit the limitation of their own assets and the advantage of trade activities outside their own boundaries. Thus engaging in international business for both firms and countries are very much essential. According to Ghauri and Cateora (2006), the following factors play an important role in shaping of international business.Each country or economy is dependent to other economies.The formulation of free trade areas m uch(prenominal) as ASEAN, EU, APEC and NAFTA and the expansion of business activities in those areas.Countries having greater purchasing power due to their improving economyThe arrival of new and potential markets with a large number of customers such as countries like India, China, Russia, Brazil, Malaysia etc.Technological advancement has been the key factor behind the improvement of transportation and communication.In order to engage in international business, companies need to have proper international marketing strategies. As international markets bring new opportunities and threats, appropriate strategies could help them to overcome possible difficulties in the international markets. Also, international companies need to serve to customer needs and wants by adapting existing product or by bringing new product to the market. (Bradley, 2002).International marketing exists all around us due to the globalization and provides new opportunities and challenges for marketers around t he world. (Czinkota and Samli, 2007).EFFECT OF globalization ON COMPANIES MARKETING STRATEGIESAccording to Czinkota Samli (2007), Globalization enables international marketing to sign on place all around us, and to continuously offer new opportunities and challenges. prosperous economies are always driven by customer needs and wants. The bureaucratic plans do not play an important role there. On the other hand, a firm must have a strategic solution to the challenges of global market. Companies which are expanding their business in domestic market need to choose an appropriate strategy suitable to their situation. Since a global company is involved in many countries economy, it brings the idea of standardizing the marketing activities.The recent trend in globalization encourages the companies as well as countries to engage more in world trade activities. World exports were three times higher(prenominal) in 1998 than 1950 match to a WTO estimate, in 2001 this ratio was 29 per cen t and in 2005 it was 27 per cent comparing to 12.5 per cent in 1970 and 17 per cent in 1990. In spite of 11 September ravish in the USA the world economy is still achieving a rapid growth (Held Mcgrew, 2007).Also, Czinkota and Samli (2007) suggest that the base of globalization has deuce dimensions. The first one deal with deregulation, decentralization, the development of electronic data transfer and the other is characterised by capital flow, information and technological development. These features accelerate globalization, which enable companies to engage in international trade activity. Thus globalization provides a powerful alkali for international marketing to make progress.CO-MARKETING ALLIANCESAccording to Hewang and Burgers (1997, cited by Thoumrungroje and Tansuhaj, 2004), one of the recent trends to overcome the globalization effects has been the formation of marketing alliances. As companies around the world are restructuring their business to meet the global threat s co-marketing alliances can bring greater success in the international marketing performances.In simple words, Anderson and Narus (1990, cited by Louis P. Bucklin Sanjit Sengupta, 1993) defines Co-marketing alliances as a form of working partnership with reciprocal recognition and understanding that the success of all(prenominal) firm depends in part on the other firm. Its a contractual consanguinity between the two firms, whose respective products acts as complimentary products, in the market. The purpose of such relationship is to intensify and/or build awareness, about benefits of such complementarities. The co-ordination between firms can be extended into product development, product and even research development.Also, according to Hoskisson et al. (2004, cited by Thoumrungroje and Tansuhaj, 2004), co-marketing alliances are a particular type of strategic alliance which is a business level competitive strategy. The primary focus of such alliance is to create a competitive a dvantage in the international market. It is also called horizontal complementary strategic alliance. The main objective of such alliance formation is to maximize the companies profit by utilizing their resources and capabilities. Co-marketing alliances also helps firms to gain better market position through increasing sales and market share. The following figure explains the relationship between co-marketing alliance, globalization effects and international marketing performance.Global Competitive environmentGlobal Market scrupleCooperation in Co-Marketing AllianceInternational Marketing PerformanceGlobal MarketOpportunitiesFigure1.4 Conceptual relationship of globalization effects, cooperation and performance. Source. Adapted from (Thoumrungroje and Tansuhaj ,2004).Thoumrungroje and Tansuhaj (2004) suggest there are two kinds of globalization effects. They are global market opportunities and global market threats.Global market opportunities encourage the mergers of different firms , by combining their resources from which, more powerful and larger group can emerge. Such groups are overt of providing a complete range of new product and services and thus gain the customer preferences. In United States, Citigroup and Travellers Group have merged together and have become one of the most successful financial service providers in the world. Also, powerful companies like General motor is contend different sector by offering credit cards.(Doole Lowe, 1999)On the other hand, Thoumrungroje and Tansuhaj (2004) also suggest global market threat could be classified ad into two categories. It is consists of global market uncertainty as well as the intensity and the level of competition. Global market threats are increasing due to, the easy access opportunity in the international markets.However, Co-marketing alliance does have significant management challenges, in spite of its potential contribution. There are chances of disagreement between partners, as they often ten d to compete with each other in terms of product lines and occasionally, even those covered by co-marketing agreement. In fact, there is a high possibility of opportunism as one of the partners may use the other to gain market position only or may be to build technological skills from the knowledge of the others intellectual property. (Louis P. Bucklin Sanjit Sengupta, 1993)STANDARDISATION VERSUS ADAPTATIONIts been a long time, since the two debate international marketing strategies have been debated upon standardisation versus adaptation of products. Standardization sum selling essentially the analogous product in all markets. The advantage of standardisation is low costs, as designing, manufacturing and distributing same product across countries involves less of investment. However, selling identical products across borders may be undesirable due to differences in the legal environments, distribution channels, climates, topography, levels of market and technological developm ent, and competitive and cultural factors. As customers of different countries have different requirements, a standardised product might not be able to satisfy all customers. (Roger J. Calantone et al. 2004)On the other hand, product adaptation refers to the degree to which the physical characteristics or attributes of a product and its packaging differs across national markets (Cavusgil et al., 1993 cited by Roger J. Calantone et al. 2004). Though customising products for different markets increases cost, the adapted products are more likely to fit the needs of the alter range of customers of different countries and become more acceptable but would reign over higher margins, generating greater revenues. For example, Procter Gambles (PG) Oil of Olay skin moisturizer has different type of product in different countries, based on research of the need of customers in those countries instead of just changing the language on the bottle of the same product.Doole and Lowe (1999) suggest s within the elements of marketing management products or service image or marketing objective and strategies can be standardised easily than pricing or distribution.Pricing DifferentiationDistributiongross revenue forceSales promotionProductImageObjective strategy StandardisationA firm taking a global speak to means they are standardising their marketing activities to some extent and the firms who have multi-domestic approach means they fall out totally different policy for every single market. In one of the important studies on this topic, Cavusgil et al. (1993) concluded that it is difficult to make blanket statements about suitable standardization/adaptation strategy without an examination of (these factors). The preferable option for firms is to take such a strategy which is a mixture of standardisation as well as adaptation of the different elements of marketing management programmes. Most companies around the world globalise some elements of the marketing mix while localisi ng others and they use a combination of multi-domestic, global or regional, and transitional strategies.Many international firms find it difficult to optimally balance standardizing and adapting their marketing, specifically the marketing strategies, across national borders, in order to be successful. Also, in the process of internationalisation, firms need to find the correct approach towards globalisation, regionalisation and localisation of business activities, in general, along with finding a way to transfer the approach to their marketing strategies level (Stefan Schmid and Thomas Kotulla, 2011).

Tuesday, April 2, 2019

Human Resource Information System In Pharmaceutical Industry Information Technology Essay

adult male imaging Information System In Pharmaceutical Industry Information Technology EssayThis paper generates propositions analyzing the joining between Human choice Information Systems (HRIS) and the reliance, pharmaceutical persistence places in the engine room and models the effect of those associations on HRIS work throughation success. It gives culture or so(predicate) the tender-hearted election counsel at unalike levels and how the tuition technology is apply in tender resource department to ful stuff both its functions with ease. It in any reason gives discipline intimately the aspects that attend to in stiff and optimal practise of Human election Management schema and effectiveness in integrating the HR activities with IT. It gives the idea of the uses of diametrical mental facultys of HRMS and other softw atomic number 18 related to Human resource management. It says about the margins of error and the practiseance level of current HRMS.It provides with the clues about the ch in allenges faced by most of the pharmaceutical companies in which HRMS assists them to successfully big bucks with it. It enlightens the pros cons and the outcomes of usage of humanity resource training governance used in pharmaceutical industries. This system adds value to the Human Resource functions but withal transmutes the competencies that define the winning of human resource professionals.This paper in addition generates the grandeur of HRIS in Novartis International AG. It also explains its various challenges while implementing the system in the bon ton.IntroductionThe main use of technology advancement in the incorporated has driven the change of means, necessitate and styles of working. When advanced work effectiveness and output, locomote in line with time management agendas and devotion to punctuality guidelines, there are to a greater extent profits to employees in effect, and best(p) utilization of available resourc es and a successful deal with corporate. The term, Human Resource Management System (HRMS) or Human Resource Information System (HRIS), matches to all the features in the line of credit system. HRMS is the procedure engaged by the combination of better ways of technical outgrowth with conventional ways of the human resource mode of functioning. A Human Resource Management System or Human Resource Information System (HRIS) or HR system is the systems and motiones between human resource management (HRM) and information technology (IT). HRM is a discipline which blends its elicitonical HR functions and processes with the information technology. HRMS package was provided by the PeopleSoft.Inc.Earlier, most of the administrative crafts established tiresome practice of manual paperwork ilk determining realise a bun in the ovenroll, tracing info, conserving the allurement of selective informationbase, maintaining and evaluating productivity records, keeping employee personal i nformation, administering issues and resolving conflicts and scrutinizing employee welfare schemes have outright become a simple, time-saving and cost-saving process. There are other functions such(prenominal) as monitoring and retrieving periodic employee performance, planning, controlling and coordinating activities, organizing tables, figures and statistics and evaluating them. This technology is used as a device to make the work environment simple, standardized and user-friendly. vastness of Information System to HRBetter safetyBetter emolumentCompetitive AdvantageFewer ErrorsGreater AccuracyImproved conversationIncreased EfficiencyIncreased ProductivityMore efficient courtMore opportunitiesReduced labor requirementsReduced costsSuperior managerial decision makingSuperior controlThe Human Resources Department require more management-level information and support to encounter all the expectations. These practices have in a flash begun to branch into the different trends th at makeup many organizations today. The huge part of human resources is now E-business. Many companies have implemented a web- ground system cognise as the Oracle Human Resources Management System which helps data rag through centralized onus HRMS system, enabling companies to control and measure their custody potentials and allows them to manage risk by recording and monitoring compliance with statutory, regulative, and industry requirements relating to their employees. The stronger use of technology has allowed HRM professionals to invest more time in counselling, withdrawing, and coaching job managers and front-line supervisors.History of HRIS1950s virtually non-existent1960s only a select few1970s greater need1980s HRIS a creation in many organizations1990s Numerous vendors, specialtiesAspects helping in effective and optimum use of HRISHRIS is useful for the employees according to their needs. It set up be neighborly by adding or modifying the facultys and also b y offering different facilities to them.Also, HRMS isThe best means by which the employees of different departments within the company can communicate.It gives information to support and analyze the companys continuous development.It establishes the level of friendship which is helpful for upgrading the process and research- ground practices.It creates the companys planning agenda and defines its decision making process.It Verifies validates the companys mission statement.Effectiveness in integrating the HR activities with ITTo prevent from moderating data and viewing information, a role based security is designed.To make the practicableities easy, various functional roles are available which provides ways of data recording, forwarding, reporting and authorizing.It helps to record and view information for different plant, locations, department and employee.HRIS have different segments categorized as facultys like payroll module, HR management module, training module, employee se lf-service module, etc.The tutelage work consumes less effort due to its different way of designing.Uses of different modulesThere are different types of HR modules in Human Resource Information System, and they are as followsPayroll module This module mechanizes the pay process and calculates different deductions and taxes, by gathering information on employee charge and their work timings. It helps to generate periodic pay checks and employee tax reports. For calculating semiautomatic deposit and manual checks, data is for the most part available from the human resource department. It contains all employee-related dealings as well as all the information is combined with financial management systems.Benefits administration module Employee bring ins programs such as encompass insurance, compensation, profit sharing and retirement of the employees are being bring in and managed by this system for the organizations.HR management module This module covers different aspects from a pplication to retirement. All the basic information of the employees such as their demographics, address data, selection, training and development, capabilities, skills, compensation records and other functions are save with the help of this module. This module helps the system to offer the facility to read applications and enter appropriate data to specific database fields, informs employers and helps to provide position management and control which are non in use. Human resource management systems work is mainly the job placement, recruitment, training, compensation, evaluation and developments of the people working in the company. Mainly, industries use computer based information systems to create pay checks and payroll results to maintain personnel records and information of the employees and training and developing the employees.ATS module Nowadays, online recruiting has become rattling popular as the key method of employment by the human resource department. This helps in g athering potential and eligible candidates for the available positions in a company. ATS module generally helps in the following waysIt investigates personnel usage in a company recognizes potential applicants for the available positionsIt helps in recruiting through company-facing entriesIt provides help in hiring through online recruiting sites or publications which is marketed to both recruiters and applicants.Training module It offers the system for the companies to help in managing and tracking employee training and growth efforts. This system is generally known as a Learning Management System and it is a stand-alone, that permits the HR to track all the information of the employees regarding their education, qualifications and skills, as well as recording their training courses ,books, CDs, etc. whichever are available to improve their skills in different areas. Thereafter the employees are registered for the appropriate courses which are offered at a particular dates with spe cific sessions, with delegates and training resources by which they are being recorded and managed within the same system. The learning management system helps the managers in approving training, budgeting and arranging together with performance management and appraisal metrics.Employee Self-Service module This module is useful for the employees of the companies to ask question to the human resource about HR related information. They can also perform HR proceedings through the system such as querying about their attendance records from the system without asking the HR personnel. This module also provides service to let the f number managers approve overtime requests from their subordinates without disturbing the functions of HR department.Benefits to the EmployeesThe ways in which employees can be benefited by the HRMS are as followsIdentification of employees key skills for storage excellence.Automated and precise performance appraisals promote healthy relations.Expedite employ ees recruiting process. array data pulling from single entry can cut in various reports.Helps building a successful environment where employees strive to perform well and exceeding their goals.A collegial flexible work place, Employee excitant in to how the work gets done, trust in senior management and omit of hierarchy flexible work arrangement.Web-based management system can streamline improvement plans by collaborating creation, implementation and monitoring phases.Help manage workforce and resources.Focuses and aligns staff development and resources.The margins of errorThe margin of error for the HRIS system is very minimal. The HRIS system maintains and updates its form of modifications or additions of HR modules on a symmetrical basis. The performance level of this system is ideal.Unique areas where the pharmaceutical company uses HRMS effectivelyThe HRMS system, implemented in various pharmaceutical companies, is highly sophisticated and provided with latest versions. C onsultants who are expertise in making the software, seeks suggestions and advice on the implementation of the HRIS software in their own company.All the pharmaceutical companies customize its HRIS as per the needs and requirements of the personnel and staff. The unique areas where the pharmaceutical company uses the HRMS effectively areIt contains all the personal information of the employees such as their training, experience, education, leave, job explanation, pay description at a single point of access.All the information about the leave allocation and movement can be easily pinched with the help of it.It helps in searching appropriate applicants for the available vacancies and in the interviewing process.It is also helpful in managing the insurance of the employees easily.It is important for the growth of the employees which are under their respective training given for their skill development.It is helpful in development of the employees performance appraisal system.It is a lso helpful in managing all the indemnity documents at a single source depository.It is also used to do online survey about the companys environment by the employees.By the help of this software, an employee gets the benefit of suggesting any useful advice for the companys well-being.It facilitates with an extra benefit to the employee by notifying about the pressing and critical notices or important messages from a single point.It gives an access to get word opinions easily, ready and with security and confidentiality companywide.It can be used as a budget allocation and consumption tool.The long term benefitsThe HRMS software is a customized tool and due to this reason, it had very high level of flexibleness and the company gets the advantage of adding more features and HR modules according to their specific needs of the management and employees. This provides the company to communicate the employees with their respective departments even better day-by-day. Recently online HRMS newssheet is introduced which enables the employees to share news and information. Through this, it is involving the employees to participate in sharing and gaining knowledge and capabilities with the other departments of the company.Reasons why HRIS fails sometimesUnclear goals/objectivesSystem solves the wrong puzzleImproper vendor/product selectionLow user bookingPlanning overlooks impact on clerical proceduresLack of HR/functional expertise in designingUnderestimate conversion effortManagement- surreal expectationsLack of overall plan for record managementLack of flexibility and adaptabilityMisinterpret HR specificationsPoor communication between HR/IS unretentive testingThe HRIS software is sold by different vendors. Some of the contacts of the vendors are PeopleSoft, Oracle HR Applications, Ascentis Software, Eric Systems Inc., Infinium, and Spectrum.Novartis international AG caseNow, lets take the case analysis of Novartis International AG. It is a multinational pharmace utical company based in Basel, Switzerland with cxl branches worldwide. Around 100,000 associates work in this company. This company manufactures drugs such as diclofenac, carbamazepine, letrozole, methylphenidate, etc.There were various issues that Novartis faced regarding its Human Resource System. Some of the issues are as followsSignificant priority of the company was to implement a firm wide HRIS that would convert many of transaction-based HR core processes to an internet-based system.HRIS project was an integral part of Novartis long term strategy for astir(p) overall HR service bedy to the organization that would result in a full HR transformation.A gap in the al-Qaeda priority was the lack of a global HR information system.Managers in the company were unable to figure out quickly how many HR associates were working at Novartis.Lack of number of associates within the company to fill the leadership position.The existing IT systems within Novartis were not up to mark.Centr alization or standardization of HR data.No consistent standards.No consolidated database. surd in supporting in the businesses in identifying, pitiful, and tracking talent.Multiple confused systems.Exposure for many small vendors with non-integrated niche application.Exposure to legal/regulatory non-compliance.Employees are feeling stretched because of initial post-merger integration.The top internal issue is dinky centralization or standardization of HR data. The company operated in 140 different countries. Due to lack of HRIS in the company, the company has many curl holes such as no consistent standards, no consolidated database, and no ability to provide data in form to reflect their intercellular substance structure whereas has difficulty in supporting the business in identifying, moving and tracking talent etc. So, with the implementation of new HRIS, the company bequeath be able to solve the problem easily and allow the managers and HR professionals to respond to the busi ness challenges.The top external issue is the Shifting of HR role from functional expert and transaction processor to strategic spouse and change agent. The implementation of HRIS system go forth enable the HR transformation. It go away cut down most of the administrative activities of the HR managers leading to be an evolution of the basic role of HR in the company. There will be requirement of more skilled and professional HR associates who can act as a strategic business partner and change agent.Major challenges faced by Novartis in implementation of the HRIS1. The HRIS effort be a major transformation in the fundamental role and responsibilities of the HR function within Novartis.2. The new system changed the relationships of HR professionals with their business partners.3. HR associates expected to play a more strategic, consultative role to the business.4. technical foul challenges for system implementation such as web enabling, SAP R/3 -a core transaction processing syste m, SAP business warehouse (BW), an enterprise HR portal solution etc.Competencies needed by the HR professionals at Novartis for using HRISThe HR professionals at Novartis should have more human resource knowledge understand their business and its language.They must have expertise in staffing, development, compensation, etc. They must be able to deliver innovative HR practices that add value to the company.HR professionals need to be effective, able to detect trends and early signals and initiate flexibility in fast changing environment.With implementation of HRIS, the HR professionals have to be a technology expert to deliver services to employees and help them to understand the new system. They must be proficient in using technology to collect data and producing it more strategically valuable information.Hence, HRIS is very essential in the companies all over the world providing better safety, competitive advantage, fewer errors, greater accuracy, ameliorate communication, incre ased efficiency and productivity and reduced labor requirements.

Monday, April 1, 2019

Psychotherapy with Franco Americans: Ethnicity Analysis

Psych early(a)apy with Franco Americans Ethnicity AnalysisI have invariably been detached from my bloodline, my heritage, my multi pagan experience. I have always felt like a mixed breed without crocked heathenish identity or tradition. I have been told that I have autochthonous American, cut Canadian, Scottish, Irish, and German ancestors. I always held on to that 1/16 Native American Cherokee line that passes through and through my maternal grandfather by his full blooded Cherokee grandmother. The medieval Conwy Castle in Wales that traces my namesake, Conway, to a chisel castle built for Edward I in 1280s has always sent me dream of a royal heritage. Yet my white identity maturement requires my racial self-aw beness. To be a competent multi pagan counselor is to know thyself and ask, What does it incriminate to be white?In beginning my white identity research, I reconnected with family members and have found that actually I am non the male monarch of a castle or Chero kee princess but that the majority of my heritage is save as far back as 1400 France. My father recorded the grand line of french ancestors and then settlers that travelled from France to recent France. Franco American cultural identity presents an opportunity to explore the construction of white ethnicality in due north America (Langellier, 2002).I am Acadian. The name Acadia was first used by the french to distinctiate the eastern side of mod France (Nova Scotia) from the west which began with the St. Lawrence valley and was named Canada (Doughty, 1922). Where Acadia ended and Canada began was never exceedly defined and thus became the cause of French and English conflict for several decades.The Francois Coste family of my maternal(p) grandmother, hails from the Martigues, Maraseille bea of France. The Coste family migrated to Port Royal, Nova Scotia mingled with 1672-1695 according to family documents. The family of Jean Fougere, with wife Marie Bourg, a branch from the same paternal grandmother came from the Diocese of Orleans, France, migrating to Cape Breton Island between 1691-1720. Prior to my ancestors travel towards Acadia, settlements appeared to thrive, In 1667 Acadia was take a breatherored to France from English rule and by 1685 the cosmos had doubled (Doughty, 1922). In 1670, the business leader of France designed a law to increase the population of peeled France all household who had ten living children all under star crown would receive a yearly pension of 300 pounds from the government. The population doubled every two decades and the legacy of the large French family endures (Langellier, 2009). pause wasnt to last, 1690 saw the outbreak of other Anglo-French war and in 1702 nance Anne of England declared war against France and Spain. Despite war, the population of Acadia had grown to roughly 2,100 citizenry by 1710, and they were a strong, healthy, virtuous people sincerely attached to their faith and traditions. T he closely notable singularity of their race was stubbornness. The Acadians were content with the product of their job and having few wants, they lived in perfect equality and with extreme frugality (Doughty, 1922). In 1713, The Treaty of Utrecht set at rest the question of the ownership. Cape Breton, Prince Edward Island and the other gulf islands were in the hands of the French while Nova Scotia or Acadia was passed to the British crown (Doughty, 1922).The Great Diaspora of 1755 left Acadians completely unprepared for the devastation to come.By the Kings orders you are convened to hear His Majestys concluding resolution in respect to the French inhabitants of this his province of Nova ScotiaThus it is imperatively His Majestys orders that all the French inhabitants of these districts be removed and through His Majestys goodness I am directed to tolerate you liberty to carry with you your money and as legion(predicate) of your household goods as you can cut without discommod ing the vessels you go in. I hope that in some(prenominal) part of the world your lot may fall, you may be nigh subjects, and a peaceable and happy people. -given at Grand-Pre, 2nd September 1755 tin Winslow (Doughty, 1922)Now deprived of all they held dear, the French were sent adrift as wanderers and exiles (Doughty, 1922) and my ancestors were sprinkled throughout the Acadian province in Port Royal, St. Peters, Cape Breton Island, capital of Maryland Royal, Ile Royale, and Port Toulouse. Some were brutally deported from eastern Canada to the Atlantic coast of the unite States (McGoldrick, Giordano, Pearce, 2005).Deportation and exile did not bring peace to Nova Scotia. The Acadians who sought resort in the forests and in Cape Breton joined with their Indian allies in guerilla warfare against the British and there became more killing and dying from Indian raids than ever before (Doughty, 1922).The Acadians suffered severely. Families and colonies were separated and torn apa rt, spread among New England and as far south as Louisiana, an estimated 6,000 peoples deported and scattered among British colonies and unify into the general population with a lost identity (Doughty, 1922). The write up of Franco Americans is set forth as shut awayd, forgotten, lost, sold, abandoned, translated into English, absorbed, deported, or conquered, still frequently too poor or working-class, keeping to ourselves, staying out of sight, on the move. And ashamed of ourselves (Langellier, 2009). In Canada, the French were admonished to declare white by British who overheard them using their mother tongue in public, a racist form of ethnic shaming. (Langellier, 2009).Characteristic of oppressed people in colonized countries and with significant parallels in the developed world is the culture of silence oppressors in the superior culture attempt to silence through subject field and other institutions (Hanna, Talley, Guindon, 2000).Yet in Nova Scotia, the Acadians wer e missed by the oppressive British. In 1761, then lieutenant-governor wrote it appears necessary that the inhabitants should be assisted by the Acadians in repairing the dykes for the conservation and recovery of the marsh lands, as the Acadians are the most skillful in the country (Doughty, 1922).The Treaty of Paris, in 1763, brought about peace between France and England and effectuate an end to French power in America. The Acadians were no interminable considered a menace and many were able to descend home. The persecution and exile from Nova Scotia required the French Canadians to hide from the English in a psychological sense. They lived apart and off in upon themselves in isolated agrestic settings, dominated culturally as well as religiously by the Catholic Church, they led sincere lives and had minimal education (McGoldrick, Giordano, Pearce, 2005).My Fougere and Coste families settled for over 200 years in Atlantic Canada between 1670-1890s. Some Acadians were to wand er as exiles in many lands for many years, separated from their children and from their kind, while others, more fortunate, were soon to regain their congenital soil (Doughty, 1922). The earliest movement in my family history documents a crop to Nova Scotia recorded in 1784, 30 years after the English had exiled the French.My prominent grandfather, Jeffrey Elias Levangie, was born in Havre Boucher, Nova Scotia in 1885 he the family heir that migrated to Boston, Massachusetts in the early 1900s to raise his Franco American family. The people of Massachusetts loved not Catholics and Frenchmen nevertheless, they received the refugees with e modified kindness (Doughty, 1922). Franco American neighborhoods became known as flyspeck Canadales petits canadas, the safe community where French Canadians congregated upon emigrating to the United States. Les petits canadas were barricades against assimilation, especially the against the English language, Protestantism, and the dominant Irish Catholic hierarchy (Langellier, 2009).Franco Americans have been shaped by Catholicism, by their language, by dedication to family and work, and by a conservatism that arose from their rural root (McGoldrick, Giordano, Pearce, 2005). They kept their faith, language, and culture as an ethnic victory.Their ethnic survival is named la survivance, the passionate effort to maintain French identity in wedlock America. Through sheer stubbornness, French feel, and a spacious memory, la survivance pore on language retention, strict allegiance to the Catholic Church, parochial breeding and ethnic social organizations (Langellier, 2009). Church power secured French identity through its hold on education, by parochial schools unifying language, faith and customs. These schools anchored the neighborhoods, reproducing rural villages in urban settings to create resistance in assimilation (Langellier, 2009). This homage to the French language and Catholic faith made Franco Americans the bu ttockss of religious hatred and racist attacks. In the 1880s and again in 1920s, French Catholics were the target of cross burnings by the Ku Klux Klan (Langellier, 2009).Always a hardworking group, even the British could not deny their resilient efforts. The French would do and make do. It was said in our lives nothing is thought, everything is done (Langellier, 2009). By the 1940s, the Franco community was largely working class in the United States (Langellier, 2009). Despite their work ethic, if we were to take the state of Maine as a relative sample, we would see that Franco Americans lag the rest of the population in earnings and education according to the 2010 census data. Among older French Americans, there is a strong connection between vainglory in culture and economic success (Long, 2012). Today, Maines largest ethnic thickly settled is of French descent, however more than 98 percent of Mainers classified as Franco-American were born in the United States, and the Fren ch language is no longer central to Franco identity (Long, 2012). Of those coming of age Franco Mainers 82% expressed doubts about the value of college and yet 19% identified themselves as unemployed. One clear poll showed how having one family member at scarper college, spurred others to value education. This has increased idiom on programs that honor Franco-American heritage and culture toward economic benefits (Long, 2012).The North American French embodies a cultural identity that has persisted for 400 years, enduring as a quiet presence of Franco Americans. Franco Americans are twice immigrants, first from France to New France and then from Canada to the U.S. (Langellier, 2009). 200 years of discrimination, oppression, and poverty have shaped the Franco American culture and character that yokes ethnic pride with ethnic shame. within the white ethnic hierarchy, Franco Americans have been at the bottom (Langellier, 2009). As of late as the 1980s, young children were place in s peech therapy to correct their accents writes langellier. Franco Americans tend to distrust even other ethnic groups that have been the target of prejudices as they have suffered abuse and discrimination, the survival of Franco Americans is in their spirit of endurance (McGoldrick, Giordano, Pearce, 2005). prexy Clintons race advisory board concluded that racial legacies of the prehistoric continue to haunt modern policies and practices that create unfair disparities between minority and majority groups (Sue, et al., 2007). Franco Americans have experienced distinct racial disparities and small aggressions including stranger in ones own land, ascription of intelligence, denial of individualist racism, anthologizing cultural values, communication styles, second class status and environmental invalidation. oppressiveness is related in some way or another to most of the problems presented to counselors (Hanna, Talley, Guindon, 2000). For effective counseling to occur, states Su e, et al (2007), a positive coalition must develop between the counselor and guest and working with clients who differ from the healer in race, ethnicity, religion, culture and sexual orientation can pose special challenges. Franco Americans emphasize conformity, respect for authority and institutions, family loyalty, religious traditions, hard work and wound up self-control (McGoldrick, Giordano, Pearce, 2005).Anger is often a hidden emotion within the family and is each not allowed or vented passive aggressively when anger does erupt, silence, slamming doors, or self punishment are common expressions(McGoldrick, Giordano, Pearce, 2005).Today the French harangue population in this country is concentrated in mainly the northeasterly and in Louisiana, yet it is the third language group in the join states. Counselors in these areas have a primary need to raise their cultural consciousnesses about the French American experience(Hagel, 1978).In France, counseling looks very dif ferent than in the US. Professionals in the fields of counseling have different qualifications and often act as either vocational counselors or counseling psychologists (Bernarud, Cohen-Scali, Guichard, 2007).The treatment counseling in French is often misunderstood. The closest translation is conseil which literally means advice. For the French, counseling is far removed from the idea of therapy. Counseling is some quantify scorned and absent from some mental health manuals, at times presented as a quick fix remedy. (Bernarud, Cohen-Scali, Guichard, 2007)and Counseling psychology textbooks commonly referenced do not exist in the French language. (Bernarud, Cohen-Scali, Guichard, 2007) half-size has been published on psychotherapy with Franco Americans. (McGoldrick, Giordano, Pearce, 2005) The increasing federal support for French bilingual education programs and dissemination of Franco oriented publications point to the need for the study of Franco American culture. This stud y can greatly enrich the cross cultural experience of the counselor and client as well as boost renewed self awareness and pride. (Hagel, 1978)The French have a long history of self help. Personal problems were considered too intimate to share with a therapist stranger. Working the problem out on ones own or tolerating it is still a common ethic. Franco Americans are tentative in therapy and interventions may take time. The more pragmatic a therapists advice is, the more promising the client will return. Given the familys suspicion and resistance, the therapists ability to establish rapport is paramount. Franco Americans have traditionally led private lives, characterized by persistence, a spirit of independence and vision (McGoldrick, Giordano, Pearce, 2005)The most common defense mechanisms are denial, displacement, sublimination and rationalization. They may have a tendency to scapegoat, assume the martyr. the therapist may begin intensive design therapy only by the third o r fourth session when the qualities of survivance persistence, endurance and tenacity have been invested in the therapeutic bond. Crisis brings a need for practical(a) behavioral solutions and A cognitive behavioral approach tends to be effective. (McGoldrick, Giordano, Pearce, 2005) near French ancestors rarely wish to discuss their ethnicity in treatment, according to mcgoldrick,et al. (2005). And jib an early emphasis on ethnicity in family therapy. However, if the therapist refuses to ac friendship the importation of racism or ethnicity in treatment, the alliance between therapist and client will breakdown. The willingness to discuss racial matters is of central importance in creating a therapeutic alliance. (Sue, et al., 2007) it is often pointed out that when clinician and client differ from one another along racial lines, the relationship may serve as a microcosm for troubled race relations in the us. (Sue, et al., 2007) often unintentional micro aggressions occur that po se the biggest challenge to the majority of white mental health professionals that have not developed their own white identity and are unintentional an unconscious in expressing their bias. Cultural competence requires racial self-awareness. (Sue, et al., 2007) As a result of having little or no awareness of their ethnic history, Franco Americans make family sized stories into group sized stories an over generalizing that takes away from their history and cultural identity. (Langellier, 2009)There is a correlation between cultural pride and success, With traditional institutions such as the church, workplace and family that passed along cultural knowledge from generation to generation losing influence, integrating studies of Franco-American cultures, would be beneficial because having a strong sense of who you are and where you come from means youre more likely to be successful,(Long, 2012) Being cognizant of white racial identity development to identify racial micro aggressions a s nearly all miscellaneous encounters are prone. (Sue, et al., 2007)BibliographyBernaud, J., Cohen-Scali, V., Guichard, J. (2007, January). Counseling Psychology in France A Paradoxical Situation.Applied Psychology,56(1), 131-151. inside10.1111/j.1464-0597.2007.00281.xDoughty, A. G. (1922).The Acadian Exiles, A Chronicle of the Land of Evangeline(Vol. 9, pp. 1-161). Toronto, Canada Glasgow, Brook Company.Hagel, P. L. (1978, April). Resources for the Teaching of Franco-American Culture.The Modern address Journal,62(4), 182-186. doi10.2307/324353Hanna, F. J., Talley, W. B., Guindon, M. H. (Fall 2000). The Power of Perception Toward a Model of Cultural subjection and Liberation.Journal of Counseling Development,78(4), 430-439. doi10.1002/j.1556-6676.2000.tb01926.xLangellier, K. M. (2009, May 22). Performing family stories, forming cultural identity Franco American Memere stories. Communication Studies,53(1), 56-73. doi10.1080/10510970209388574Long, R. (2012, September 25). Franc o-American Mainers lag rest of state in earnings, education, new analysis shows.Bangor Daily News. Retrieved from http//bangordailynews.com/2012/09/25/news/state/franco-american-mainers-lag-rest-of-state-in-earnings-education-new-analysis-shows/McGoldrick, M., Giordano, J., Pearce, J. K. (Eds.). (2005).Ethnicity and family therapy(3rd ed., pp. 545-553). New York, NY The Guilford Press.Sue, D. W., Capodilupo, C. M., Torino, G. C., Bucceri, J. M., Holder, A. B., Nadal, K. L., Esquilin, M. (May-June 2007). Racial Microaggressions in Everyday Life Implications for Clinical Practice.American Psychologist,62(4), 271-284. doi10.1037/0003-066X.62.4.271 fancy 1 https//journals.lib.unb.ca/index.php/Acadiensis/article/view/18761/20563