Monday, May 25, 2020

Business Axe Commercial Research Essays - 1132 Words

Introduction with Background Information Company Axe is one of the 400 brands which is belonged to Unilever Company. The portfolio of this multinational company focuses on health and wellbeing mainly, including food, beverages, cleaning agents and personal care products. Many world-leading brands including Axe, Lipton, Knorr, Dove, Hellmann’s and Omo are some of these brands (unilever.com). Market Axe Brand, which was named Lynx in Europe, was first launched in France in 1983 as a teenage boys’ grooming category (theguardian.com). For its first 19 years since 1983, AXE brand has developed its market merely in Europe. Later on, in 2002, AXE was introduced to another big market-- the U.S and increased its target customers†¦show more content†¦However, according to most of the commercials they did before, their advertisements are well known for sexual humor and exaggerated scenarios and exaggerated scenarios that play into male fantasies. Significant changes about the campaign has changed in the year of 2014. The way how the company promoted the Axe Peace fragrance line gave a new idea to the public with its content and meaning behind. The new global campaign and commercial advertisement is related to peace. The concept behind the advertisement and its marketing campaign was developed with the Peace fragrance because Axe often visits college campuses an d they finds peace and harmony are the topics and themes that are supported by students (time.com). Thus, it aims to generate the awareness of the peace message, as well as encouraging people to take simple but meaningful actions that will have a positive impact on the future of their world. Also, partnered with international non-profit organization, Peace One Day, Axe brand set a Peace Day on 21st September, 2013 (unilever.com). $250,000 from Axe brand was donated to the organization and is promoting it in its advertisements and on Facebook page (businessinsider.com). Besides these, the promotional campaign also includes a Kiss-For-Peace Twitter hashtag. Users can submit photos of themselves kissing to Axe, and the best photos are being broadcast on electronicShow MoreRelatedEthical Policies Vs. Corporate Social Responsibilities1238 Words   |  5 Pagesand senses make use of right or off-base. Presently apply this as business definition, the ultimate goal of the company is t o make profits and there can be either positive or negative Impact by the company on operation of business. Simply business ethics is the behavior of the business in accordance with the society or community [1]. Unilever Company Code of Practice Paul Polman (CEO) of Unilever Company reported that its business earned reputation based on integrity and interests in accordanceRead MoreNew Product Entry Strategies1678 Words   |  7 Pagestruly profitable business growth in an otherwise depressing economic environment. In the example given below the product AXE DARK TEMPTATION has entered the market using the product differentiation strategy . The differentiatiom is mainly done on the chocolate feature which differentiates AXE DARK TEMPTATION from its competitiors Example 2 :Axe dark temptation was the new product by Axe which was launched using product differentiation strategy . The basic theme on which axe deodorants are launchedRead MoreIntroduction to Unilever1436 Words   |  6 PagesRotterdam, Netherlands and Unilever PLC in London, United Kingdom. Both Unilever companies have the same directors and they operate as a single business. The current non-executive Chairman of Unilever N.V. and PLC is Michael Treschow while Paul Polman is Group Chief Executive. Unilever owns over 400 brands, amongst the largest selling of which are Aviance, Axe/Lynx, Ben Jerrys, Dove, Flora/Becel, Heartbrand, Hellmanns, Knorr, Lipton, Lux/Radox, Omo/Surf, Rexona/Sure, Sunsilk, Toni Guy, TRESemmà ©Read MoreEssay on Pre-campaign Analysis: Old Spice Brand Image1560 Words   |  7 PagesPre-campaign Analysis Research Research is a crucial step in determining the problem or issue faced by the organisation (Gregory, 2000). Old Spice conducted their research and found that the brand’s image was fading away along with their sales at the start of 2010 (Rowe, n.d.). The image that the public had in mind was that Old Spice’s products were something their â€Å"grandfathers† would buy and use (Effie Awards, 2011). Sales had dropped due to the increased number of competitors for bodyRead MoreThe Ethical Dilemma of Sexual Appeal in Advertising Essay2621 Words   |  11 Pagesadvertisement that carries a â€Å"sexy† message in it than one that does not. The purpose of this paper is to respond to the question, â€Å"how ethical is it for advertisements to use sexual appeal as a means of marketing and selling consumer goods?† In this research paper, I will discuss the ethical dilemma of sexual appeal in advertising and argue that sex should not sell. Before introducing any type of appeal into an advertisement, it is important to know and evaluate the audience that will be receivingRead MoreSanofi Aventis Swot Analysis1750 Words   |  7 PagesNovember 2012 The Business Environment â€Å" Sanofi-Aventis, between innovation and acquisition† Wafi Djebbar Table of Contents Executive Summary 3 1. Introduction 3 2.Sanofi Description and Background......†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.......4 3. Sanofi Business Environment 4 3.1. Political Factors 4 3.2. Economic Factors 5 3.3. Social Factors 7 3.4. Technological Factors 7 3.5. Environmental Factors 8 3.6. Legal Factors†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8Read MoreSexism And Its Effects On The Media3229 Words   |  13 Pageshamburgers or sandwiches in a very weird, uncomfortable and seductive way. For the 2015 Superbowl, Carl’s Jr. but out an advertisement that was said to be the most sexist ad of the Superbowl. The 30-second commercial, titled â€Å"Au Naturel† was promoting their All Natural burger. The premise of the commercial was a naked lady, model Charlotte McKinney, walking through a famer’s market eating a Carl’s Jr. burger. Through carefully placed items like fruit and vegetables, McKinney’s naked body is hidden, untilRead MoreScheduling The F requency And Timing Of The Promotion1589 Words   |  7 Pagesappropriateness of business information used to make strategic decisions. The two functions I am going to be talking about is finance and marketing for my organisation which is HM. Marketing: Marketing is the action or business of promoting and selling products or services, including market research and advertising. Market research is the action or activity of gathering information about consumers needs and preferences. HM need to use market research in order to improve their business and make furtherRead MoreThematic Comparison Of Literature Of Smart Cities1625 Words   |  7 Pagesbroad and comprehensive approach to improve the efficiency of city operations, citizens’ quality of life and the economy. The axes which move the development framework and improving the smart city are the economy, people, governance, mobility, environment and living. The development of smart city requires managing a complex system of factors in the line of the above axes. This is because everyone s dimensions give the actual value that is required to achieve the target. The smart city is definedRead MoreDove Marketing Research Paper3297 Words   |  14 Pages We used many methods to study young adult males and their purchasing patterns. We believed that it we were able to recognize their patterns, it may lead us to the reasons behind the lack of brand awareness in young adult males. The ethnographic research that was conducted led us to conclude that young males take into consideration many different factors when purchasing body-care products. The consumer that was observed studied the price, scent, and packaging when choosing the product. This consumer

Friday, May 15, 2020

Illinois v. Gates Supreme Court Case, Arguments, Impact

Illinois v. Gates (1983) dealt with the admissibility of evidence, particularly anonymous tips to the police. The Supreme Court applied the totality of the circumstances test instead of a rigid two-pronged test developed under previous decisions. Fast Facts: Illinois v. Gates Case Argued: October 13, 1982, March 1, 1983Decision Issued: June 8, 1983  Petitioner: State of IllinoisRespondent: Lance Gates et ux.Key Questions: Did the use by the Bloomingdale Illinois police department of anonymous letters and a police affidavit as probable cause to conduct a warrant-less search of the home and car of Lance Gates and his wife violate their Fourth and Fourteenth Amendment rights?Majority Decision: Justices Burger, White, Blackmun, Powell, Rehnquist, and OConnorDissenting: Justices Brennan, Marshall, and StevensRuling: Although previous cases had established the requirements of a two-pronged approach, the majority found for Illinois, stating that the totality—combined letter and police work producing an affidavit—could be used as probable cause.   Facts of the Case On May 3, 1978 detectives at the Police Department of Bloomingdale, Illinois received an anonymous letter. The letter alleged that  Lance and Susan Gates  were engaged in an illegal drug smuggling operation. According to the letter: Ms. Lance would leave her home in Illinois on May 3 and drive to Florida.Once in Florida, her car would be loaded with drugs.Ms. Lance would fly back to IllinoisMr. Lance would fly from Illinois to Florida a few days later and drive the car and drugs back home. The letter also alleged that Lances basement had over $100,000 in drugs. Police began to investigate the matter immediately. A detective confirmed the car registration and address of the couple. The detective also confirmed that Lance Gates had booked a flight from OHare airport in Illinois to West Palm Beach, Florida on May 5. Further surveillance from the Drug Enforcement Agency on and after May 5 revealed that Lance Gates got on the flight, got off the flight in Florida, and took a taxi to a hotel room registered in his wifes name. The couple left the hotel in a car registered to them and drove north-bound on a route towards Chicago. The detective from the Bloomingdale Police Department submitted an affidavit, notifying a judge of his observations, and attached the anonymous letter to it. A circuit court judge reviewed those documents and issued a search warrant for the Gates home and car. The police were waiting at the Gates home when they returned from Florida. Officers found 350 pounds of marijuana in the car, as well as weapons and other contraband in their home. The circuit court ruled that the affidavit and anonymous letter were insufficient to establish probable cause for police to search the car and home. The Illinois Appellate Court affirmed that decision. The Illinois Supreme Court bench was divided on the issue and the U.S. Supreme Court granted certiorari to settle the question. Constitutional Question Did the police violate the Gates Fourth and Fourteenth Amendment rights when searching their home and car? Should the court have issued a search warrant based on the anonymous letter and police observations? Arguments The arguments focused on whether or not the credibility and basis of knowledge for the anonymous letter could be established. Attorneys for the Gates argued that the anonymous letter could not be used to show probable cause because it was anonymous. The author could never be shown to be reliable, one of the key standards for a two-part test for probable cause. Attorneys arguing against the suppression of the letter maintained the opposite. The detectives affidavit in addition to the anonymous letter provided sufficient grounds for a search of the Gates home and car. The search warrant had not been improperly issued and the evidence should not be suppressed. Majority Decision In a 7 to 3 decision delivered by Justice William Rehnquist, the Supreme Court ruled that the anonymous letter and affidavit could be used to establish probable cause to issue a search warrant. The Gates constitutional rights had not been violated. The Court argued that its rulings in two previous cases, Aguilar v. Texas and Spinelli v. United States, has been misapplied. Lower courts had rigidly applied a two-pronged test from those rulings in order to assess probable cause. The test required the court to know: the veracity or reliability of the informant.the informants basis of knowledge The anonymous tip that police had received about the Gates home failed to provide that information. According to the majority opinion, a totality of the circumstances approach would better help determine when there is probable cause to issue a warrant on the basis of an anonymous tip. Justice Rehnquist wrote: [P]robable cause is a fluid concept—turning on the assessment of probabilities in particular factual contexts—not readily, or even usefully, reduced to a neat set of legal rules. Veracity, reliability, and basis of knowledge should be considerations for the court, rather than rigid guidelines. The totality of the circumstances approach, according to the majority opinion, allowed magistrates to use common sense when making probable cause determinations, rather than asking them to follow rigid guidelines that might not fit the case in front of them. In applying the totality of the circumstances test, the court found that the anonymous tip and affidavit established probable cause for a search warrant. There was a fair probability that the writer of the anonymous letter received the information from the Lance or Susan Gates or someone they trusted, according to the majority opinion. Dissenting Opinion In two separate dissenting opinions, Justices William J. Brennan, John Marshall, and John Paul Stevens argued that the totality of the circumstances approach should not be used in place of the two-prong tests in Aguilar and Spinelli. Veracity and basis of knowledge should remain the two required factors for issuing a finding of probable cause. If some of the informants claims could be proved false, the anonymous tip would fail to provide a basis of knowledge for the court. In the Gates case, detectives had no way of proving when Susan left Illinois. She also failed to take a plane from Florida to Illinois as the anonymous tip had suggested. As a result, the judge should not have determined there was probable cause to search the Gates home and car. Impact The court extended the totality of the circumstances approach to anonymous tips corroborated by police statements. Instead of solely focusing on veracity and basis of knowledge to make probable cause determinations, magistrates issuing warrants could take other common sense factors into account. This loosened restraints on courts in terms of issuing search warrants. Source Illinois v. Gates, 462 U.S. 213 (1983).

Wednesday, May 6, 2020

The Debate Over The Internet - 886 Words

The Internet in the year 2009. We send e-mails, make calls over the internet and discuss topics we take an interest in. Even our banking is going virtual. But what we take for granted today was only a vague idea fifty years ago. In order to understand how we got this far Let’s go back to 1957, when everything began. Before 1957 computers only worked on one task at a time. This is called batch processing. Of course, this was quite ineffective. With computers getting bigger and bigger they had to be stored in special cooled rooms. But then the developers couldn t work directly on the computers anymore – specialists had to be called in to connect them. Programming at that time meant a lot of manual work and the indirect connection to the computers led to a lot of bugs, wasting time and fraying the developers ´ nerves. The year 1957 marked a big change. A remote connection had to be installed so the developers could work directly on the computers. At the same time the idea of time-sharing came up. This is the first concept in computer technology to share the processing power of one computer with multiple users. On October 4th 1957, during the Cold War The first unmanned satellite, Sputnik 1, was sent into orbit by the Soviet Union. The fear of a Missile Gap emerged. In order to secure America s lead in technology, the US founded the Defense Advanced Research Project Agency in February 1958. At that time, knowledge was only transferred by people. The DARPA planned aShow MoreRelatedEssay on The Debate Over Internet Censorship1547 Words   |  7 PagesThe Debate Over Internet Censorship Many people believe the Internet has become the World’s Emancipation Proclamation. They believe that this newfound cyber-freedom will free countless generations of people. These people will be of every race, creed and color, whose lives, up until now, have been restrained by the paradigm of governments. Whether it is the United States Government, or the government of a foreign nation, the Internet will be our new Underground Railroad of cyberspace. Read MoreThe Debate Over Net Neutrality Laws Essay1638 Words   |  7 Pagestelephone calls over the internet or voice over internet protocol, complains to the Federal Communications Commission (FCC) about an unknown service provider blocking their telephone service. The FCC investigated the complaint and found that Madison River, a telephone company, was responsible and ordered them to stop blocking data sent from Vonage (Higginbotham, 2010). This incident was one of the first cases of an internet service provider discriminating against data sent over the internet because VonageRead MoreThe Internet Is Closing Our Minds1233 Words   |  5 PagesIn the debate â€Å"When it comes to politics, the internet is closing our minds,† the side that argued for the motion is the side which best argued their ideas by providing consistency throughout the debate and successfully utilizing a number of techniques in order to win their argument. The side that was for the motion used clear and consistent arguments that were backed by data. They used examples in their argument that the audience could understand and relate to easily. The language and tone usedRead MoreArticle Review On Net Neutrality1171 Words   |  5 Pages Internet Regulation Junior Research Paper Dustyn Baker Dustyn Baker Period 4 Mrs. Ford: English 6 2-20-15 Net Neutrality Net Neutrality has been argued over for more than a decade, even since the internet became public. It is one of the most controversial topics of the 21st century, and everyone has a different opinion. The united states of America s executive branch believes that the internet should have no â€Å"gatekeepers†, someone or business that doesn’t allow some material through to viewersRead More Should the Internet be censored? Essay861 Words   |  4 Pages Should the Internet be censored? From colonial times to the present, the media in America has been subject to censorship challenges and regulations. The Internet has become a vast sea of opportunity. Everyone is seizing the moment. The good and the bad of society have reduced the meaning of the Internet. Menace threatens each onlooker, as people browse the many pages of Cyberspace. As the new technological advances help to shape our society, one cannot help but think of the dangers waiting to preyRead MoreWomen Are Not Equal !1601 Words   |  7 PagesEalasaid Munro that the US is experiencing a fourth wave of Feminism. She claims â€Å"the internet itself has enabled a shift from ‘third-wave’ to ‘fourth-wave’ feminism†. I have seen a new arguments promoting feminism all through out media and I have heard discussions from friends and family. My mother, who claims to be a Femi-Nazi, posts links on my Facebook about woman s issues and rights. All over the internet and YouTube I see vi deos that host Emma Watson, the strong female character from the HarryRead MorePrivacy, The State Of Being Away From Public Attention1614 Words   |  7 Pagesstruggle to find middle ground between a private environment and a secure environment, but the dawn of technology and the Internet has made this struggle even more difficult. The Internet has drastically decreased the expectation of privacy of any and all individuals that have ever used it. Technology in general can pose a threat to an individual’s physical and virtual security. The Internet has also brought forth a sense of anonymity to those looking to conceal their true identities, some of which planRead MoreImpacts of Not Preserving Net Neutrality: Tiered Internet Service1440 Words   |  6 PagesImpacts of Not Preserving Net Neutrality: Tiered Internet Service 1 INTRODUCTION Net Neutrality is the principle that Internet users should be able to access any web content or use any application without restriction or limitation from their internet service provider [1]. Net neutrality can be further broken down into four core concepts as described by Daniel J. Weitzners, non-discriminatory routing of packets, user control choice over service levels, ability to create and use new services and protocolsRead MoreInternet Governance1726 Words   |  7 Pages Introduction The definition of Internet Governance remains broad and dependent on the context of the situation. It is important to understand that the term is not restricted to the activities of governments, however for purposes of this paper I will primarily be exploring the arguments and issues surrounding legal regulation of the Internet including factors shaping the debate such as the political environment, open information sharing, and the significance of international collaboration on thisRead MoreDefinition of Human Rights Across the Globe1601 Words   |  7 Pagesinternational law, practice, unauthorized government organizations and regional foundations has been a public concern across the world. However, despite the applications made by these associations, human rights uninterruptedly continues to provoke skeptical debates about the natural and justifications of human rights to this period. Currently, the primary concern of is what is considered a â€Å"right† and what a â€Å"r ight† is able to provide for an individual. The idea of human rights has been a general conflict to

Tuesday, May 5, 2020

Data Protection Measures †Myassignmenthelp.com

Question: Discuss about the Data Protection Measures ? Answer: This study deals with the case study on Sarbanes Oxley International. Data protection management provides backup to the files to ensure that the task are safe and the data is easily recoverable in the future (Sim-Tang et al. 2013). It is necessary to have effective data protection management as it will help in effective processing as well as methodologies to secure the data with utmost integrity. The modern practices on data management help in storing the services with proper back up so as to enable less of troubleshooting. This is a tool that helps in providing visibility to issues that is not possible with only backup application. This company has to undergone various criticism related to posing additional regulation that leads to lack of competitiveness with countries like USA. SOX manage with the financial statements so ensure quality assessment by the Board of Directors. Limitation is faced in order to protect the data as there is vast amount of data generated on a daily basis (Chen Zhao, 2012). The company fails to store in an automated manner that leads to loss of files in the future run. It is important to practice data protection management so that important files are saved and backup are there for future reference. Data protection is necessary in an organization in the recent world. It is known that data are mostly recorded electronically so organization should engage in installing software that will help them to manage with records in an effective manner. Reference List Sim-Tang, S. Y., Fraisl, D. J., Hoeber, A. N. (2013).U.S. Patent No. 8,544,023. Washington, DC: U.S. Patent and Trademark Office. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE.