Sunday, December 29, 2019

Essay about Sex Discrimination - 1597 Words

Introduction Discrimination involves action toward individuals on the basis of their group membership; Baron and Byrne (1994) defined discrimination as prejudice in action. Discrimination can take a very overt form (e.g., refusal to hire women into certain jobs), but in many instances, gender discrimination involves the degree to which the workplace is open to versus resistant to the participation of women. Although many discussions of gender discrimination have focused on the ways managers and supervisors treat men and women, gender discrimination could involve managers, co-workers, subordinates, clients, or customers. In general, gender discrimination include behaviours occurring in the workplace that limit the target person’s ability†¦show more content†¦Additionally, some specific features of the workplace appear to contribute to prejudice and discrimination against both men and women. This research will try to identify and assess gender issues and discrimination in the workplace by looking at various types of sex discrimination, features of the workplace that contribute to gender discrimination, employers retaliation against workers who claim sex discrimination, and conclusively, legal ways of proving sex discrimination and their remedies. Types of Sex Discrimination The Sex Discrimination Act 1975 (as amended) identifies three types of discrimination. These are: (1) direct discrimination; (2) indirect discrimination; and (3) victimisation (Chandler et al., 2003). The 1975 Act, with certain exceptions, applies equally to men and women. It not only forbids discrimination on grounds of sex or gender reassignment but discrimination also against married persons in the employment field. The 1975 Act is, of course, primarily directed towards the protection of women (SDA 1975, ss 1,2,3 4). Features of the Workplace that Contribute to Gender Discrimination Gender discrimination occurs in a number of settings. Men and women are perceived differently, are assigned different roles and are assumed to have different characteristics in most settings, for example household chores likeShow MoreRelatedSex Discrimination Essay1438 Words   |  6 Pagesyou have recently turned down Nancy Conrad for a position as sales supervisor.  Ã‚  Nancy believes the denial was due to her gender and she has filed a sex discrimination charge with the EEOC.  Ã‚  Explain the steps the EEOC will use to process the charge; include Nancy’s options during the process.  Ã‚  Determine the likelihood of success of Nancy’s discrimination claim from the EEOC data base (available through www.eeoc.gov). Describe the basic precautions you should take so you might prevail in her claim. Read MoreThe For The Sex Discrimination Act1006 Words   |  5 PagesThe Sex Discrimination Act 1975 is an act of the parliament of the united Kingdom which protects men and women from discrimination on the grounds of sex or marital status. Employment, training, education, harassment, the provision of goods and services, and the disposal of premises have been concerned by the act. There are four different ways of discriminating racially. These are; Indirect Discrimination; this can occur where there is a policy, practice or procedure which applies to all workers,Read MoreSex, Religion, And Discrimination1132 Words   |  5 PagesHistorically, there has been race, sex, religion, and many other sources of discrimination worldwide. America has come a long way in bringing justice to those who have been discriminated, and to prevent it from happening by implementing relevant policies. However, it is apparent that traces of these historical discriminations have followed us onto the new era of the 21st century. In the past few months alone, there were a few laws executed to stop inequity allowing for: †¢ Same sex marriage, and †¢ Gay/lesbianRead MoreThe Effects Of Sex Discrimination On The Workforce Essay859 Words   |  4 PagesTitle: Sex Discrimination in the workforce Research Topic Sex discrimination is defined when a person is treated unfairly or with less favourable attitude/ characteristics than a person of the opposite sex. The factors that has influenced me to select this specific topic is due to the actuality that sex discrimination against women in the workforce is never taken into consideration by the community. Women in Australia have been fighting for the right to equal pay since the early century. AustraliaRead MoreEssay On Sex Discrimination In The Workplace1014 Words   |  5 Pagesthe courts to be a protected class under Title VII s prohibition of sex discrimination in the workplace? I agree that transgender employee should be considered by the courts to be a protected class under Title VII’s prohibition of sex discrimination in the workplace. Title VII of the Civil Rights Act of 1964 makes it illegal to discriminate against someone on the basis of race, color, religion, national origin, or sex. Sex refers to the biological and physiological characteristics that defineRead MoreRace, Sex, And Religious Discrimination1479 Words   |  6 Pagesmake a difference. Although laws have been put in place to end this, there are still many instances in which countless people are affected by modern day discrimination. Race, sex, and religious discrimination are arguable the three most prevalent forms of these issues still ongoing today. My assigned roundtable’s topic was on sex discrimination specifically. We were asked to focus the recent hiring practices of the Hooters restaurant chain. What was unique to this case was that men were the genderRead MoreSex Discrimination at Walmart Essay1132 Words   |  5 PagesSex Discrimination at Wal-Mart OMM640 Business Ethics and Social Responsibility Dr.: David Britton May 14, 2012 Betty Dukes along with five other women filled a law suit against Wal-Mart Inc. in 2001 for discrimination against women, denying them their raises and also their promotions. Betty Dukes and the other women hope that they can stand for hundreds of thousands of other women who might have been similarly affected by this type of behavior when they wereRead MoreSexism, Prejudice, And Discrimination On The Basis Of Sex1610 Words   |  7 PagesSexism is the prejudice, stereotyping, or discrimination on the basis of sex. Sexism is regarded mostly towards women. Sexism affects everyone but not effecting everyone evenly. For women, they suffer from sexism socially, educational, political, religious, social, etc. The idea of sexism is that the men have more power than the women. Women get judged differently than men do. Women get judged in the workplace which limits them to certain jobs. The stereotypes that women are under are unbelievableRead MoreSex Discrimination in the Americ an Workplace Still Stands848 Words   |  3 Pagessense of discrimination against women when it comes to the corporate world. Although women’s overall presence in the work force has seen a boost in numbers in America, men today still get paid more than their female counterparts. To begin with, differences in the pay of workers between both genders seems to be an ongoing issue ever since the time women joined men in the work place. For that reason, â€Å"America made a commitment to equal pay for equal work regardless of the worker’s sex† when theyRead MoreSex Discrimination Law Suit Against Walmart861 Words   |  4 Pagesfemale employees at Walmart filed a class action sex discrimination law suit against Walmart stores in the district court of Columbia. The case talks about discrimination going on in the workplace a group of woman who were discriminated by their gender. Betty Dukes and five other woman were being discriminated they were under paid and denied advancement opportunities. The allegation were that the company’s policy resulted in worldwide discrimination. Walmart was promoting more men than woman this

Saturday, December 21, 2019

How Does Language Allow Self Reflection Organize...

We use language to reflect upon ourselves and what we want others to think of us. Language allows self-reflection in this way. It helps us gain an understanding of who we are as individuals and as leaders. It allows us to analyze and/or monitor our communications. In order for us to be truly effective at leading others, we have to be effective at leading ourselves. If we are not able to really know ourselves, we are only being deluded into thinking that we can lead ourselves. Self-reflection also lets is identify and own our traits, both our personality and our leadership traits. Self-reflection lets us monitor our communication and adjusts it to be effective; it also allows us to recognize our core values, not only by naming what we†¦show more content†¦Broad concepts are being used to transcend specific, concrete activities and to enter the world of conceptual thought and ideas. Due to us thinking abstractly we do not have to consider every specific object and experience i ndividually; we are thinking in general terms instead. We also have a language that can stereotype. Our human capacity enables us to abstract distort thinking by generalizing things and people. An example of this would be all women love the color pink; this would be more of a negative because some men also like pink. Language allows hypothetical thought by giving us a much broader perspective of self-reflection and thought. Language lets us think hypothetically because we use symbols. The way we use symbols is by naming the ideas that we develop; in order for those ideas to stay in our minds and for us to reflect on them. An example would be putting the time, energy, and effort into career searching, at this present moment having a career may not be present, but once going on several interviews it could become a reality. In order for us to answer certain questions about where we see us in the future or about memories about our childhood we must think hypothetically, meaning that we are thinking about experiences and ideas which are not a part of our concrete and/or present situation. We can plan, vision, remember, set goals, consider different course of action, and picture possibilities because we are thinking hypothetically.Show MoreRelatedMetz Film Language a Semiotics of the Cinema PDF100902 W ords   |  316 PagesFILM LANGUAGE FILM LANGUAGE A Semiotics of the Cinema Christian Metz Translated by Michael Taylor The University of Chicago Press Published by arrangement with Oxford University Press, Inc. The University of Chicago Press, Chicago 60637  © 1974 by Oxford University Press, Inc. All rights reserved. English translation. Originally published 1974 Note on Translation  © 1991 by the University of Chicago University of Chicago Press edition 1991 Printed in the United States of America 09 08 07 6Read MoreDeveloping Management Skills404131 Words   |  1617 Pages10/12 Weidemann-Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibitedRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages Organizational Behavior This page intentionally left blank Organizational Behavior EDITION 15 Stephen P. Robbins —San Diego State University Timothy A. Judge —University of Notre Dame i3iEi35Bj! Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services:Read MoreOverview of Hrm93778 Words   |  376 PagesHuman Resource Management (MGT501) VU MGT - 501 T his subject/course is designed to teach the basic principles of Human Resource Management (HRM) to diverse audience/students, including those who are studying this as a supporting subject for their bachelor degree program. This course is designed to provide you the foundations of HRM whether you intend to work in HRM or not, most of these elements will affect you at some point in your career. Either you will be working with some organizationsRead MoreBrand Building Blocks96400 Words   |  386 Pagesand they have used that strength to put pressure on prices. Whereas a decade ago, the manufacturer largely controlled information, retailers are now collecting vast amounts of information and developing models to use it. As a result, there is an increasing focus on margins and efficient use of space. Suppliers, particularly those in the third or fourth market-share position with only modest loyalty levels, are exposed to harsh pressure to provide price concessions. A decade ago, private-label brandsRead MoreManaging Information Technology (7th Edition)239873 Words   |  960 PagesColor Text Font: 10/12, Times Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within the text. Microsoft ® and Windows ® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright  ©2012, 2009, 2005, 2002Read MoreMarketing Management130471 Words   |  522 Pagesto customers and for managing customer relationships in ways that benefit the organization and its stakeholders. Hence it can be surmised that marketing is basically meeting unmet needs for target markets, identifying those unmet needs and planning how to meet them through products, services, and ideas. Communicating the value to them along with pricing which is affordable and profitable and also distributing the products so that customers have appropriate accessibility and have quick and easy deliveryRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagesand others . . . This book was printed on recycled paper. Management http://www.mhhe.com/primis/online/ Copyright  ©2005 by The McGraw−Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without prior written permission of the publisher. This McGraw−Hill Primis textRead MoreDecision Theory: a Brief Introduction28334 Words   |  114 Pages...............79 12.2 Arrow s theorem .........................................................................81 References ....................................................................................................82 3 Preface This text is a non-technical overview of modern decision theory. It is intended for university students with no previous acquaintance with the subject, and was primarily written for the participants of a course on risk analysis at Uppsala University inRead MoreCoaching Salespeople Into Sales Champions110684 Words   |  443 Pagesfor anyone who reads this book. If the reader will embrace Keith’s philosophy around coaching, they can certainly expect to win in all areas of their life, while making a profound and measurable impact on their salespeople’s performance and attitude.’’ Dr. Denis Waitley Best-Selling Author of The Seeds of Greatness and The Psychology of Winning ‘‘There is no other single activity to boost sales that works better than sales coaching and this book is the best ever written on how to do it well.’’ Brian

Thursday, December 12, 2019

Climate Change Politics Essay Sample free essay sample

Kyoto Protocol –* December 1997* Signed by 168 states* First internationally legal binding mark for the decrease of green house gas emanations * Target – cut green house gases by 12. 5 % based on the 1990 degrees by 2012 * Emphasis on developed countries- developing states. ie China and India – exempt from cuts * This protocol non enforced until 2005 * Largest sabotaging factor – USA failed to sign the protocol * KEY as USA is responsible for a one-fourth of all green house gas emanations * Why – influence of political persons. Clinton argued that the deficiency of accent on the function of developing states on the issue of clime alteration would intend the senate would non sign the protocol. * George W. Bush – clime alteration skeptic – questioned influence of worlds on clime alteration – and so publish non addressed. * Obama – encouraged positive action towards undertaking clime alteration – but small done. Merely arrived to Copenhagen Summit on last twenty-four hours – and created a weak agreement with merely a few states The Bali Road Map –* Known as the long term carbon monoxide operative action under the convention* Took topographic point 2007* Clear docket of cardinal issues to be negotiated up to 2009* These issues included: Action for accommodating to the negative effects of clime alteration. such as drouths and inundations Wayss to cut down Greenhouse Gas emanations Wayss to widely deploy climate-friendly engineerings and financing both version and extenuation steps. Adaptation Fund. The fund will assist developing states cope with the impact of clime alteration. which includes implosion therapy. drouths. heat moving ridges and rises in sea degree. It will be financed by the Clean Development Mechanism. It was agreed that version should be extenuation as a precedence. Break down of the â€Å"Berlin wall† between developing states and developed states. which means that developing states need to make their portion of cut downing C emanations. South Africa was committed to lend its just portion towards our common duty for the hereafter. * Issues – US. Japan + Canada opposed to the emanations ends * South Africa called on the USA to demo increased leading * Intensified competition between developed and developing universe Copenhagen-* 2009* Large construct up A ; high outlooks – earlier conferences had achieved small * Environmental groups + militants had built up public expectation+ taken portion in civic lobbying – outlooks were high * But – failed to present * States stand foring their ain national involvements and economic ends in front of international consensus * No understandings made* Obama – a ‘no show’ until the last twenty-four hours – failed to move as the world’s hegemonic president – he struggled to supply any leading * BUT – non a complete failure – the negotiations produced the Copenhagen agreement * Accord between the USA. China. Brazil. India and South Africa * Was recognized by 193 states * Highlighted the demand to restrict planetary temperature rises to no more than 2 grades above pre industrial degrees * Accord besides promised to present 30 bn USD to developing states over the following three old ages A ; 100 bn USD a twelvemonth by 2020 to assist hapless states cope with the impacts of clime alteration – would go known as the Green Climate Fund * 30 bn USD was non raised – merely reached 20 bn USD – half of which was provided by Japan – how money would be raised was ill-defined and so has been unsuccessful * Accord non lawfully adhering – but – calls made across the universe – note – Banki Moon Durban –* 2011* 2 hebdomads of dialogues* 195 parties to the UN clime alteration convention agreed on a route map * Idea proposed by EU* Attempted to pull up legal model for clime action by 2015 * Success – all states. developed and developing – including China + USA – signed up to lawfully adhering marks * BUT – still ill-defined – to what widen can planetary heating be curbed – this reflected in the extenuation marks states adopt * Durban understanding includes an recognition that there is a widening spread between the extenuation attempts presently promised and those required to maintain warming within the loosely recognized 2 °C safety bound. Doha –* 2012* Viewed as a stepping rock to the negotiations in 2015* BUT – argued that certain accomplishments were made – developed and developing states working together to organize a new planetary understanding * Structure of dialogues changed – developed and developing states sat together in one forum – antecedently divisions were of all time turning – ex Copenhagen * Doha has besides agreed that there will be a 2nd commitment period of the Kyoto Protocol * 37 states have signed for a 2nd stage * It will run from 1 January 2013 to 31 December. Jointly. these states will cut down their emanations 18 % below their 1990 degree between 2013-2020 * Issue of ‘hot air’ resolved – excess fresh C credits * Notes from after the clime alteration talk with Peter Vis The hereafter – Paris 2015 Peter Vis – is the UN tantrum to undertake the issue of clime alteration? Mr. Vis questioned this. Six twelvemonth spread between major conferences – Copenhagen and Paris – is this effectual? Many conferences are uneffective – Copenhagen – and so a six twelvemonth spread is uneffective. Conferences in between – following twelvemonth – Warsaw – seen as a write off. Why are the conferences merely successful every 6 old ages? The political procedure is so drawn out. Influence of the media and force per unit area groups – for illustration – Greenpeace Peter Vis stated that there would be a greater opportunity for co-operation over clime alteration in a smaller forum – he suggested the G20- the 20 richest states in the universe. Vis besides suggested the UN – but he believes that the UN is a confusing procedure for many delegates – if the organisation is confounding – covering with the issue of clime alteration will be confounding. Mechanisms within the EU to cut down emanations – extenuation and efficiency – EU policy on this – C trading. BUT – the issue with this – companies sell their excess quotas to other companies who go over their quotation mark. This puts an economic value on pollution – and this incentivizes concern. The implicit in issue with this is that it is non effectual. as the value of C has become excessively low. Hot air – the purchasing of trim excesss from states with states whom have a big left over quota of C. This is now banned in the EU – but this is still possible in other states – notably Russia – where the issue derived from. New EU budget – 20 % of the budget will travel to ‘climate related issues’ – money non comparative to the clime alteration committee. Part of that 20 % could travel to the conveyance committee – so that they can better conveyance substructure to go more effectual. Adaption – adapt to the effects of clime alteration. Much of the EU budget will travel to version schemes. Peter Vis does non believe that we will make the 2 degree bound of temperature rises – but that it will in fact go to four – the marks are merely unapproachable. He suggested that the manner to undertake this is to contrive and introduce new engineering that can accommodate to climate alteration. ‘Necessity is the female parent of invention’ – Boserup – Peter Vis quoted this Mention to Bangladesh – what will go on at that place – due to ongoing deluging – there will be increased out migration and people seek safety – and this will make struggle within neighbouring states where refugees flee to. This is the hereafter for hapless and climatically unstable states who will in future resort to resource wars. Doha – a positive consequence – extended the Kyoto Protocol to 2020 – with 31 states subscribing up to the extension. However – this is still hapless as many have non agreed to protocol. The hereafter? – Paris 2015 should bring forth a new lawfully adhering understanding that will be ratified at a cardinal conference in 2020 – therefore – action will so get down to be taken in 2020. On one side – you have the job of states who won’t subscribe up to lawfully adhering understandings – this undermines the efforts to collaborate over climate alteration – but on the other side – you have economic and political mechanisms for version.

Thursday, December 5, 2019

Review on Android Application Development Business System

Question: Describe the Review on Android Application Development for Business System. Answer: Review on Week 2: In the week 2 slide of the Mobile application development the activities, fragments and intents are discussed. The slide states the life cycle of the activities and the use of fragments for customizing the user interface of the application. The slide also helped to understand the idea of intent. The user interface of an application contains the activity window and for the development of an application zero or more activities can be used. The activities are used to make the interaction process attractive. There are different types of activities like onCreate(), onResume(), etc. and they can be used to display a process dialog (Meier 2012). The activities can be linked with the intents and it enables the different activities used in different application to work jointly. It may happen that there are two intents with same name and in this case the user is required to choose the default intent. The data can be passed over the different activities using the intent. The fragments are used to develop an application but the lower version of android does not support this feature, many of the activities consists of the fragments. Multiple fragments can be combined to form an activity and it can be reused multiple times in the app (Annuzzi, Darcey and Conder 2014). The fragment can be added dynamically and for this the fragment manager can be used. The fragment is used to call the built-in applications and for calling the intent is used. The intents can pair the data and the actions and it also helps to notify the user displaying notification messages. Review of Week 3: The user interface is the main component of an android application because the user interacts with the system through the UI of the application. A pre built user interface is provided for the development of the application and different modules are provided that helps the developer to build an attractive graphical user interface (Lee 2012). Other modules can also be added which adds extra interface like notification, dialogs and menus. The menu bars used in the application can be replaced by action bars. The action bars are highly customable and are used in most of the application as a default paradigm for navigation. The action bars gives the user a familiar user experience and the user finds it easy to use the app. The user interface can be created using programs and codes. Horizontal view swiping can be applied with the application of ViewPager, and the activities in the view can be overridden (Clark et al. 2012). The ViewPager uses XML layout and it can be reused in multiple sect ion of the application. The implementation of the navigation panel can also be used in the development of the user interface of the application and it allows the developer to add navigation drawer, provide back navigation, etc. Multiple screens can also be built with different screen size such that the application can run on different devices with different screen size (Sokolova, Lemercier and Garcia 2013). The views can b registered in each of the windows to pop up notification and handle the multiple views of a single event. Review of Week 4: There are different view classes like the TextView, Button, EditText, ImageButton, ImageView, Radio button, Spinner, Radio group, AutoCompleteTextView. The view classes are used in android app development it generally inhabits a major portion of the screen and is used in the frames of the application (Holla and Katti 2012). The views creates the output and the input fields of the app. The fields may be of different types like text field, image field or radio field. The view group acts as the layout to hold the different view properties. The developed contains the views nested in different view classes. The text view is a class and holds the text contents and allows the user to view or enter texts or numbers. The image view is used to displays image in the application (Dalmasso et al. 2013). The checkbox is used to select more than one option or one option provided to the user. The radio button allows the user to select an element and the other element provided is automatically unchec ked. The button view creates a button on the screen and can be of different types like image button or normal button (Darcey and Conder 2012). There are other views like the progress bar view which shows the progress of the task running in background, autocomplete text view that shows a list of suggestion to complete the process, picker view that allows the user to select the date and time. Using the views the usability of the application can be increased the list view can be applied to display a list of items and allowing the user to select their choice from them. The spinner view can also be used for selecting and fragments can be used to customize the user interface and list the items from an array and save their preference for the application. Review on week 5: In the previous week we have learned about the various views that can be used to build the application. The fifth week presentation states the use of the views to display images and creation of different types of menus. The menus can be of two types such as the optional menus and the context menus. Previously the views were used to display text but images can also be displayed using the view the function used to display image is the imageView, ImageSwitcher, GridView and gallery (Holla and Katti 2012). In the gallery view the image is displayed in a centrally locked horizontal scrolling list. The image switcher works with the gallery view and animation and transition are added in this type of view. The grid view is used to display the images in a two dimensional scrolling array. The option menu is used in the application to display information of the current activity. It can be activated touching on the menu option. The context menu is used to display the information of a particular view and it is activated by long pressing the menu option. For creating an option menu in the application two methods are needed to be implemented in an activity i.e. onCreateOptionMenu() and onOptionsItemSelected() (Plaza et al. 2013). There are some additional views like the analog and the digital clock views used to display the current time and web views that allows web contents to be displayed in the activity. Review on data persistence The data persistence is used in the application development in android and it is mainly used to reuse the data in different parts of the application. There are two types of persistent techniques to save the small lumps of data in shared preference i.e. using traditional file system and RDBMS with SQLite database (Mednieks et al. 2013). Different techniques are discussed that would help in the creation of private data and access it. The data can be stored in files using the FileInputStream or FileOutputStream class. The storage option for storing the data is required to be chosen by the developer and it can be modified later. Review on Week 6: The content providers are used in the application development process to access a structured data sets. The data can be encapsulated and thus this increases the security of the data. The content providers act as a standard interface to connect the data of one process with the code of another process. ContentResolver and ContentProvider can be used to communicate with the provider (Wei et al. 2012). The android OS itself contains content provider and it manages the contact information, audio and videos and it can be accessed by the application for usage. There are pre-defined query strings that can be used as a resource for the application. Filters can be added in the content provider for building custom content provider (Holla and Katti 2012). To build a content provider is necessary to design a data storage and designing the content URI. The SQLite can be used for managing the database. Review on Week 7: Some extra feature can be added to the application like sending SMS messages for verification of the registered mobile number or send email from the application. Adding this feature in the application would make it attractive and tracking function can also be added to it. The SMS messages can be sent programmatically using the built in SMS app but there is a need to set user permission before using the SMS service. Receiving the SMS message need the object BroadcastReceiver and it enables to fetch information from the default SMS application (Darcey and Conder 2012). It is also required to prevent other application to get the messages and thus a small programming is need to done that would block other apps to fetch information. The activity of the application should run in background such that when any message is received it displays the message on the screen. For sending emails from the application the user have to configure their account or it can be done programmatically or by usi ng the default built in application (Dalmasso et al. 2013). Review on location based service For combining the google map with the app the gps of the mobile is used. This can accurately locate the current position of the device. For setting up the new project phonegap or eclipse can be used. The integration of the google map in the application can be used as a location tracker (Bugiel et al. 2012). The address of a particular location can be fetched and the location feature can also be used to detect the current position. Reverse geocoding can be applied to calculate the longitude and latitude of the selected position and find the address of that location. Review on Week 8: The application developed might need to gather data from the internet and update the information available in the system and for this there is different approach. HTTP, XML, Jason or socket service can be used to connect to the internet. The HTTP is used to download the webpages and other binary data like videos, gifs, or audios. Permission must be granted to the app to use the internet (Jackson 2013). There are pre-defined methods that can be called to operate different task like downloading or decoding. The downloading process can run in background to increase the usability of the application. If some plain text is downloaded they are stored in strings. The web services are accessed using the XML files at first the web service is connected and the contents are stored in the XML file. Using XML files can increase the size and cost, it requires more CPU resource and thus reduces the efficiency of the application. Thus an alternative of the XML i.e. Jason (Java Script Object Notation) is used to store the web contents (Linares-Vsquez et al. 2015). The response of a web service is read as a string in JSON and the string is stored in an array. Socket programming can also be used for more secure connection to the server. The Http connection is stateless and for more secure application this cannot be used and thus socket programming come into play. It is used for the chat servers for one to one communication (Georgiev et al. 2012). The socket programming uses the TCP/IP protocol the message is sent to the server and the server return the message to the destination client. Review on Week 9: Developing the android service is the most important factor for the success of an application. The application are built that uses less resource and runs smoothly in background without using the user interface. The overriding function are used to create this service like onBind(), onStart() or onDestroy() (Gargenta and Nakamura 2014).The services are declared with a tag and intent and the long processes are kept in separate thread in the AsyncTask class. Timer can be added for the long process that would run the service after a defined interval. The application must be tested before going online and for the testing the developers must use a methodology. It is required to have a proper analysis of the working criteria of the built application and the targeted device on which the app should work. The testing is much important for the success of the application because there are numerous apps available in the market and the user finds the app unresponsive and lacks in some feature, they quickly moves to a new app (Zhang et al. 2013). The testing should be done on the quality of the application and it should be noted that the application meets all the user requirements. There are many testing through which the application have to pass like the functional, lab, performance, memory interrupt, usability, installation and certification testing. The application should be tested in multiple devices with different screen size and hardware configuration. Review on Week 10: The application developed should be attractive with an attractive icon that defines the application. The use of the splash screen can also make the application attractive, screenshots can be added in the app store to make the user understand the application. A short description about the working of the application would also make the user confident to use the app. When the application is submitted in the app store it should be categorized and a relevant keyword is also needed that would be used to search the app. For making the application available in the app store the needs to be verified and 30% of the profit is required to be paid to the app store at an interval of 30 days. The revenue invested in the advertisement of the app is exempted and all the terms and condition must be read carefully. The marketing strategy for the promotion of the application can be developed by answer a set of questions like who are the targeted users, what are their requirements and if it is fulfilled by the application, etc. The apps are generally built by a third party company and they must built it to make it a successful product. A number of strategies can be applied for the promotion of the app like offering free version of the app, subscription based service, selling ads through the app, etc. A proper analysis should be done on the present market condition and adopt policy to survive in the market with the competitors. Review on Week 11: In the week 11 the difference between the research and the scholarship is taught. The scholarship is the process of different study materials from different sources. Research is a process used for the analysis of the current system and collection of data about the system. This lesson is taught to make us understand about the positive and the negative effect of using the mobile technology (Gudmundsson et al. 2016). The definition of science is also taught and ways to gather knowledge is described in the lesson. The important terms of philosophy and the use of the knowledge for the analysis are also taught. Some of the important terms like the Metaphysics, Ontology and Epistemology are also discussed in this week. Ethics and its paradigm are discussed; there is different approach for the identification of the paradigm such as the Interpretive, critical and logico-empirical paradigm (Jackson 2013). The historical overview of the empiricism, rationalism, philosophy, logico-empirical para digm is also discussed in the class week 11. The interpretive or constructivist and critical theories are also discussed in the class. Lastly the research process model is discussed and the steps involved in the development of the model are taught and the type of research that is to be performed is also discussed in the class. References Annuzzi, J., Darcey, L. and Conder, S., 2014.Introduction to Android application development: Android essentials. Pearson Education. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R. and Shastry, B., 2012, February. Towards Taming Privilege-Escalation Attacks on Android. InNDSS(Vol. 17, p. 19). Clark, D., Edmonds, C., Moore, A., Harlow, J., Allen, K., Winchester, W.W., McCrickard, D.S. and Estabrooks, P., 2012, May. Android application development to promote physical activity in adolescents. InCTS(pp. 566-568). Dalmasso, I., Datta, S.K., Bonnet, C. and Nikaein, N., 2013, July. Survey, comparison and evaluation of cross platform mobile application development tools. In2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)(pp. 323-328). IEEE. Darcey, L. and Conder, S., 2012.Android Wireless Application Development Volume I: Android Essentials. Addison-Wesley. Gargenta, M. and Nakamura, M., 2014.Learning Android: Develop Mobile Apps Using Java and Eclipse. " O'Reilly Media, Inc.". Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D. and Shmatikov, V., 2012, October. The most dangerous code in the world: validating SSL certificates in non-browser software. InProceedings of the 2012 ACM conference on Computer and communications security(pp. 38-49). ACM. Gudmundsson, V., Lindvall, M., Aceto, L., Bergthorsson, J. and Ganesan, D., 2016. Model-based Testing of Mobile Systems--An Empirical Study on QuizUp Android App.arXiv preprint arXiv:1606.00503. Holla, S. and Katti, M.M., 2012. Android based mobile application development and its security.International Journal of Computer Trends and Technology,3(3), pp.486-490. Jackson, W., 2013. Android Intents: Inter-Application Programming. InLearn Android App Development(pp. 383-410). Apress. Lee, W.M., 2012.Beginning android 4 application Development. John Wiley Sons. Linares-Vsquez, M., White, M., Bernal-Crdenas, C., Moran, K. and Poshyvanyk, D., 2015, May. Mining android app usages for generating actionable gui-based execution scenarios. InProceedings of the 12th Working Conference on Mining Software Repositories(pp. 111-122). IEEE Press. Mednieks, Z., Meike, G.B., Dornin, L. and Pan, Z., 2013.Enterprise Android: Programming Android Database Applications for the Enterprise. John Wiley Sons. Meier, R., 2012.Professional Android 4 application development. John Wiley Sons. Plaza, I., Demarzo, M.M.P., Herrera-Mercadal, P. and Garca-Campayo, J., 2013. Mindfulness-based mobile applications: Literature review and analysis of current features.JMIR mHealth and uHealth,1(2), p.e24. Sokolova, K., Lemercier, M. and Garcia, L., 2013. Android passive MVC: a novel architecture model for the android application development. InProceedings of the fifth international conference on pervasive patterns and applications (PATTERNS13). IARIA(pp. 7-12). Wei, X., Gomez, L., Neamtiu, I. and Faloutsos, M., 2012, August. ProfileDroid: multi-layer profiling of android applications. InProceedings of the 18th annual international conference on Mobile computing and networking(pp. 137-148). ACM. Zhang, Y., Yang, M., Xu, B., Yang, Z., Gu, G., Ning, P., Wang, X.S. and Zang, B., 2013, November. Vetting undesirable behaviors in android apps with permission use analysis. InProceedings of the 2013 ACM SIGSAC conference on Computer communications security(pp. 611-622). ACM.