Sunday, January 26, 2020
Skill Acquisition And Movement Control Physical Education Essay
Skill Acquisition And Movement Control Physical Education Essay The object of this paper is to describe the proccesses on which an athlete applies proccesing models, and develop those models for selection of selected sports skills. Skills are difined as an athletic ability to choose the right technique at the right time, and succefully reproduce that skill with ease and cosistancy. Motor skill learning is an active process, interrelated with cognition. Skill concepts are aspects of cognitive concept learning in physical education that focus on learning the way the body should move while performing motor skills (Gallahue Cleland, 2003). Skill is a persons degree of compitence in dealing with an action using internal and external stimulus to achieve a goal. Connolly and Brunner (1974) describe skill as indiviuals ability to consitently achieve a goal(s) under a wide variety of conditions. Motor skills learning occurs in three stages: The cognitive stage: This stage is characterised by the efforts of the learner to understand the task. In motor skills this is the stage of plan formation. A great deal of concentration and effort is required. Associative stage: During this stage the learner approaches maximum efficiency and the qualities of the task are refined. Autonomous stage: The task is performed with little, if any, conscious control. Performance becomes consistent. Motor programmes like restitution, partial restitution and substition are linked to the brain where the cognitive proccess interact with the controller (central nervous system), see figure 1. These motor programmes contain all the information required to make a movement : Which muscles that are to be to use. The order in which muscles are used to be used. The phasing and degree of contraction of muscles that will be used. skill aquisition chart fig1a.bmp Figure 1. A closed loop central system adapted from (Kelso, 1982, Adams, 1971). For instance the example of kicking a football which is inline with the movement in this paper. Skills are aquired over time, it is belived that a professional athlete at the top of their sport would of trianed over 10,000 hours, to achieve the level of skill needed to compete at elite level for thier particular sport. Williams and Hodge (2004) outlines this saying The pratcice history profiles of experts in a variety of sports suggests that an investment of over 10,000 hours of pratice is requires to reach elite levels of performance. The proccess of learning demands insight into the task and selective attention to the pertinant sources of information within the person and within the environment .Learning is traditionally defined as the proccess that results in relatively permanent changes in behaviour brought about by experience. It implies a change so profound that we have truley altered our operating knowledge base. It also implies that we have access to and have benefited from information base and analytical proccesses of the skill we have learned. We not only can perform the skill (ie, solve the problem), but we can also apply the knowlege and control accured to future behaviour (Higgins. 1991). Development of a sports skill. Information processing model is based upon the following: Input is the information from the surrounding environment which the player or athlete is aware of and uses to decide on a responce. So the environment needed to maximise this for the player/athlete would be to intorduce this to everyday sporting situations. Decision making refers to a combination of recognition, perception and memory. The player or athlete uses recognition, perception and memory to select an appropriate responce to the demands of the situation. Output is determined by the responces made and the movement which inturn become inputs in which player/athletes percive the outcome of his or her responces thus becoming the basis for further decision making. A view of the information proccessing model and its complicated links can be seen in figure 2. information proccessing model.bmp . Figure 2. Information proccessing model. Transfer of learning skills The early stages of skill learning are charaterized by a high degree of cognitive- concious invovlvement on the part ofthe learner in analyzing the motor problem or engaging in the task analysis (Higgins. 1991). The player/athlete is attempting to understand both what is expected and how to solve both the startagies and the principles of the movement, and how this is compatiable with the variables of the task. The player/athlete will not be able to engage in any motor skill behaviour until this proccess occurs. That is until the player/athlete understands the means ends relationship. The player/athlete is developing a totally complementary system for solving the problem. He or she must learn to meaningfully organize all behaviours that support the intricatley interwined information gathering and preformatory aspects of the task. At the same time, the learners performance is limited by his or her current knowledge and currently available organizational capacities (Higgins. 1991). The problem for the learner is to understand the nature of the motor problem to be solved so that a coordinated pattern of specfic movement can occurrs. So the main goal of the first phase of learning is to discover a relationship between the task variable and the movement required. The player/athlete now has to learn movement that is broken down into segement for learning with a goal in mind being the means end relationship. As the coach, they are responsible for teaching new skills and movements to players/athletes or improving their existing skill and movement levels. Learning these skills and movements is made simple if certain stargatgies as a coach are adopted in how the skill and movement are taught. The three approaches are expalined as follows: Whole Practice is the ideal situation a skill movement should be taught as a whole. The player/athlete can then appreciate the complete movement and execution of the skill. This whole method can sometimes mean the player having to handle complex movements e.g. executing a shot on goal. Part Instruction is When a skill is complex (a sequence of steps like the cruyff turn or the Beardsley shuffle), then it is more appropriate to breakdown the complex movement into its elements. The elements can then be taught separately and then linked together to develop the final skill.Focusing on the mechanics of the movement. When part instruction is used it is important that the player/athlete is demonstrated the whole skill so that they can appreciate the end product (means- end relationship) and understand how the set of parts will develop the skill. Whole Part Whole Instruction a combination of the two where the learning process becomes a more interative cycle: try the whole skill, break down in elements and train these. Finally, bringing it all back together again as one complete skill and movement. The patricular skill and movement that this paper will focus on is the components of kicking a football. Breaking the skill and movement down in to segements will help the palyer athlete understand the all variables within the skill/movement and the means-end relationship. Kicking is a complex motor task which we learn as children. The player/athletes kicking skill develops rapidly between the ages of four and six, and by the age of nine the pattern is mature it does not develop further (Barfield, 1998). Acquring mature patterns of fundamental movement skills during early childhood is necessary for succesful participation in games and sport (Rink, 2002). Figure 3 shows how the particular movement of the kick is broken down at this early stage of learning. kick2.bmp Figure 3. The componets of the kick adapted from (Barfield, 1998). The ultimate goal of breaking the skill/movement down is to effect change in the behaviour of the player/athlete. The most common biomechanical difference between the elite and novice footballer is that elite footballers use a refined and consistent movement pattern where novices use a variable and inconsistent one (Phillips, 1985). If the componets are broken down further to what muscles perform and which actions they perfom, it becomes clear that movements originated from the control centres as described on p.3 and that motor programmes are linked with the storage of this information to repeat the same movement in the future. Figure 4 shows the break down of the body part, the muscle and actions they perform. Body Part Muscle Action Trunk Abdominals, psoas major, erector spinae and spinal Postural muscles. Stabilisation of rotation to the right. Right Hip Gluteus maximus and Hamstring group. Extension. Left Hip Gluteus med, gluteus min, hamstring group and adductor Magnus. External rotation and eccentric extension. Right Knee Hamstring group and popliteus. Flexion. Left Knee Quadriceps group. Eccentric extension. Right Ankle Plantar flexors. Plantar flexion. Left Ankle Plantar flexors. Eccentric plantar flexion. Left Shoulder Middle and anterior deltoid and supraspinatus. Abduction. Figure 4. The muscular action during kicking preparation (right-footed kick), adapted from (Barfield, 1998). Some Players/athletes need additional input from visual stimulus, in the use of video play back of the movements they have performed. This enables them to break down an analyse their movements in a third person perspective (looking on as the coach sees it). This then enables the player/athlete to then adjust to the slightest millimeter, making the acquisition of that movement or skill more refined. Thus installing a new motor programme for that particular movement. Other players/ athletes use verbal language as additional stimulus in the form of command and propmts to change the movement. In additon some players/athletes use both as additional stimulus, other stimuli can come from intrumental learning. This proccess installs variables on how players/athlete respond to the stimulus from the caoch and the environment around them. Instrumental learning is also called operant conditioning and based on rewards and punishments in order to strengthening the responses that lead to positive outcomes and the avoidance of negative outcomes. For example if a player/athlete is priased for achiveing a certain movement then they will be more likely to attain that movment. So in theory prasing the athlete for correct practice encourages them to consistanly perform the variables and movement more efficent. Instrumental conditioning is of the opinion children may have attitudes about topics they do not fully understand (e.g., tactics,managaement), but they may hold similar attitudes as their adults counterparts up until thier teen year In their later teens. Subsequently, teens begin to evaluate attitudes and views independent of parents attitudes and views. So in the terms that they say they cannot complete the gaol or task, it may be the fact that they do not wish to complete the goal or task as they know they may already be able to acheive the task. See figure 5 for a model of instrumental conditioning. Figure 5. Model of Instrumental Conditioning Instrumental Conditioning involves three key elements, these are: a response an outcome (the reinforcer) a relation, or contingency, between the R and O The Instrumental Response is usually an arbitrary motor response and there are limits on the types of responses that can be modified by instrumental conditioning relevance, or belongingness, is an issue in instrumental conditioning as well as in Pavlovian conditioning. Conclusion Cognitive and motor proccess are at the essence of learning, their complex structures and proccess allow the player/athlete to store cognitive and motor programmes for the future. Skills and movement are repeated through cloosed loops and information processes. A skill developed during the process of learning, behaviour tends to develop efficiency. That is, there is a tendancy towards consistent application of underlying set of principles that are mechanically, environmentally and psychologically-morphologically derived and task specific (Higgins, 1991).These principles are certainly observed as variant characteristics of movement. Movements are in essence strucutred around congnitive and motor programs. In turn motor skills are the ability to use movement as a problems solving tool. The demands met by this are inherent within the tasks encountered by the player/athlete, and must be analyzed, understood and resolved in a self referential fashion.
Saturday, January 18, 2020
Bernard Madoff Fraud
Abstract This report allows the facts to be known concerning the still mysterious case of Bernard L. Madoff and his longtime investment securities activities, which eventually turned into an enormous fraud of incomparable size. In this report, you will begin to understand how Bernard Madoff was able to execute such an elaborate fraud. The illegal business behavior found in this case is too numerous to count however, quite a few will be identified. In addition, the roles of the perpetrators, accomplices, and their involvement in this scheme will be made known.This fraud had such an enormous impact on the victims, we will examine several implementations that the private investors could have implemented to protect themselves. An assessment of the perpetrators motives and the identity of some internal controls that could have deterred or prevented the fraud from occurring will be explored also. We will discover the action of the SEC and document how the fraud was discovered and investiga ted, including what should have been identified as ââ¬Å"red flagsâ⬠. And finally, a variety of legal actions arose when the Madoff fraud was uncovered, which is leading to more litigation currently and in the future.The Bernard Madoffââ¬â¢s Fraud Introduction Bernard L. Madoff was the mastermind and the admitted operator of the biggest Ponzi scheme in American History. His Ponzi scheme is considered to be the largest financial fraud in U. S. history. He stole millions maybe billions of dollars from unsuspecting clients. Lives were shattered and fortunes ruined. He was a very savvy business man and trader until his investment scandals were revealed at the end of 2008. Bernard Madoff is a former American businessman, stockbroker, investment advisor, and financier. He is a former non-executive chairman of NASDAQ stock market.As the former chairman of the NASDAQ, Bernard Madoff had built a reputable business domain that continuously paid admirable dividends to investors; howev er, during the investigations by several federal government agencies, devastating facts against Bernard Madoff proved that he was running an elaborate ponzi scheme in order to attract a large number of investors from all over the world. (NBC, 2009) (ââ¬Å"Bernard Madoff Fraud,â⬠2012) Bernard Madoff managed and controlled his ponzi scheme by using an Investment Securities Limited Liability Company he founded in 1960.He was chairman of this company and continued to operate his scheme until he was discovered in 2008. The fraud concerning Bernard Madoff was and still is the being covered by the media and it is suspected that the United States Securities and Exchange Commission (SEC) was notified and made aware on more than one occasion about this matter but they chose to ignore the information given to them. Perhaps there are more charges that can be filed, although Madoffââ¬â¢s numerous offenses may already be enough to keep him in prison for the rest of his life. Markopolos, 2010) (ââ¬Å"Bernard Madoff Fraud,â⬠2012) How Madoff Executed the Fraud Madoffââ¬â¢s scheme to defraud his clients at Bernard Lawrence Madoff Investment Securities (BLMIS) began as early as 1980 and lasted until its exposure in 2008. Bernard carried out this scheme by soliciting billions of dollars under false pretenses, failing to invest investorsââ¬â¢ funds as promised, and misappropriating and converting investorsââ¬â¢ funds to benefit Madoff, himself, and others without the knowledge or authority of the investors.To execute the scheme, Madoff solicited and caused others to solicit potential clients to open trading accounts with Bernard Lawrence Madoff Investment Securities (BLMIS) on the basis of a promise from him. He promised to use investor funds to purchase shares of common stock, options and other securities of large, well-known corporations, and representations that he would accomplish high rates of return for client, with limited risk. (ââ¬Å"United stat es of,â⬠2009) Among other things, MADOFF marketed to clients and prospective clients an investment strategy referred to as a ââ¬Å"split strike conversionâ⬠strategy.Clients were promised that Bernard Lawrence Madoff Investment Securities (BLMIS) would invest their funds in a basket of approximately 35-50 common stocks within the Standard & Poor's 100 Index (the ââ¬Å"S&P l00â⬠), a collection of the 100 largest publicly traded companies in terms of their market capitalization. MADOFF claimed that he would select a basket of stocks that would closely mimic the price movements of the S;P 100. MADOFF urther claimed that he would opportunistically time those purchases, and would be ââ¬Å"out of the market intermittently, investing clients' funds in these periods in United States Government issued securities such as United States Treasury bills. MADOFF also claimed that he would hedge the investments that he made in the basket of common stocks by using investor funds t o buy and sell option contracts related to those stocks, thereby limiting potential losses caused by unpredictable changes in stock prices. ââ¬Å"United states of,â⬠2009) Madoffââ¬â¢s Illegal Business Behaviors Exposure Federal prosecutors filed a total of eleven charges against Bernard Madoff. The first of those charges was for securities fraud. The crime of securities fraud involves false claims of investment security holdings, and misinformation regarding stocks and brokerage advice. Sensational insider information is also considered a component of this criminal activity. Another major charge involved three counts of money laundering, both domestically and through international accounts.Money laundering is the funneling of revenue acquired illegally into new monetary arrangements, with the intent of concealing this revenueââ¬â¢s original origins. Plus, in connection with both his securities and investment adviser businesses, prosecutors also charged Madoff with mail and wire fraud. These offenses involve initiating schemes using either the United States Postal Service or telephone systems toward obtaining money and/or property in a false or unlawful manner. (Tomaszewshi, 2010) Perpetrators Involved in Bernard Madoffââ¬â¢s FraudItââ¬â¢s certainly not uncommon for oneââ¬â¢s son or daughter to enter into an identical business relationship as a successful family member such as a parent. However, in Bernie Madoffââ¬â¢s case this approach was taken to extreme levels of nepotism. Peter Madoff entered his brotherââ¬â¢s firm in 1967, and as business prospered he began to accumulate several executive titles: Senior Managing Director, Head of Trading, and even Chief Compliance Officer for both the broker-dealer and more secretive investment advisor business models.Bernieââ¬â¢s sons Mark and Andrew joined the firm in the mid-to-late 1980s, and eventually were made co-directors of Madoff Securities International in London, England. Bernieà ¢â¬â¢s nephew Charles joined up in 1978, and became the Director of Administration for the investment firm. And Peterââ¬â¢s daughter Shana was hired on in 1995, and served as in-house Legal Counsel and Rules Compliance attorney for the broker-dealer business. Other parties greatly impacted by Bernie Madoffââ¬â¢s activities were his business associates and their many clients over the decades.For example, Frank Avellino and Michael Bienes themselves funneled over three thousand clients to Madoffââ¬â¢s investment advisory business. Madoff had consistently advised the pair to remain unregistered in their dealings. But when the SEC accused the duo of illegally selling securities, Madoff pretended ignorance of their activities, even though he had secretly instructed them all along. For their trouble, Avellino and Bienes were forced to pay a fine of three hundred and fifty thousand dollars and shut their business down.Other notable business partners eventually left in the lurch by Madoffââ¬â¢s growing fraud would go on to include Jeffrey Tucker and Walter Noel of Fairfield Greenwich Group. Non-related people who had worked under Bernie Madoff also became tainted from the association following his arrest. This employee group includes those who may have had indirect dealings through Madoff subsidiaries like Cohmad Securities Corporation. However, the idea also applies to those employed directly, such as former executive assistants Elaine Solomon and Eleanor Squillari.Jeffry Picower was in industrialist and philanthropist who seemed to be a favored Madoff beneficiary, and made outlandish profits from his investments with Madoff. From 1996-2007 there were 14 instances of greater than 100% yearly returns and 25 of greater than 50%. From 1996-1999 his regular trading account made from 120-550% a year. Some evidence of backdating trades, instituted by Picower, has been presented by trustee Irving Picard. In December, 2010, his estate returned $7. 2 billion in profits to the government. Picower died before the settlement. (Tomaszewshi, 2010) Motives of the PerpetratorsThe various perpetrators who were involved in Bernard Madoffââ¬â¢s Ponzi scheme had different kinds of motives that were completely against the provisions evident in federal laws. Jeffry Picower had over twenty four different accounts with Investment Securities LLC and he operated them closely with Barbara who was also his wife. The motive of Jeffry Picower and his wife in Investment Securities LLC was to benefit from the cash windfall generated from devious deals according to reports; his investment into Madoffââ¬â¢s company was once worth over one billion dollars. Kirchner, 2010) Annette Bongiorno was a senior employee at Bernard Madoffââ¬â¢s illegal company and among her roles at the firm she was to brief investors concerning their returns which were all fictitious. Ezra Merkin was an investment expert who assisted Bernard Madoff to drain off extraordinary amount s of money from clientsââ¬â¢ accounts and it later emerged that he had a conflict of interest in the Madoff company. With its headquarters in Connecticut, Fairfield Greenwich Company misled investors into buying stakes at Madoffââ¬Ës illegal firm and in return, the company received huge amounts of cash from Bernard Madoff. NBC, 2009) Frank DiPascali was also another essential figure in Bernard Madoffââ¬â¢s illegal investment scheme. One of the frauds committed by Frank is that he engaged in countless number of international money laundering activities to benefit Madoffââ¬â¢s scheme. In addition to this, DiPascali also gave Mr. Madoff expert advice on how to go about his illegal businesses without being caught or detected by the federal authorities. (Arvedlund, 2010) (ââ¬Å"Bernard Madoff fraud,â⬠2012) Controls That Could Have Deterred the Fraud from OccurringDespite the fact that Bernard Madoffââ¬â¢s investment fraud was one of the largest to ever rock the Unit ed States of America, there are various strategies that might have prevented or deterred the fraud from occurring. To begin with, the United States Securities and Exchange Commission (SEC) should have without delay acted on the numerous signals that it received from different quarters. As the main regulatory authority of American investment activities, it would have been easy to identify weaknesses in Bernard Madoffââ¬â¢s shady deals.A major loophole in the federal laws of the United States of America also had a significant input towards enabling Bernard Madoffââ¬â¢s illegal activities to spread at a very rapid rate; for instance, there is a provision that stipulates private companies in the United States should only pay 5% of their annual revenues. (NBC, 2009) (ââ¬Å"Bernard Madoff fraud,â⬠2012) Implementations That Investors Should Have Used to Protect Themselves While some investors may yet believe they were tricked into believing Bernie Madoffââ¬â¢s elaborate con fidence game, it is also arguable that there were means to protect themselves at their disposal.One method would be to practice due diligence whenever one is presented with new financial opportunities. Many investors were led astray on the poor advice of their won friends and family, which isnââ¬â¢t a fiscally sound means of verification. Independent research needs to be done on the workings of any financial organization, even those that are supposedly reputable on the surface. One should investigate third-party custodial relationships at investment firms, and review their auditing practices. (Tomaszewski, 2010) Another way to avoid fraud is to actively request documentation.Hand written notes from intermediaries are highly suspicious evidence that revenue is being transacted in a professional manner. Getting activity in writing must be joined to verifiable account numbers for auditing. Finally, a forceful amount of skepticism will often prevent one from falling into schemes whic h seem on the surface to be easy money generators. For instance, one should never believe the speculators on television. An unlicensed financial consultant is about as reliable an agent as allowing unreformed gambling addict free access to oneââ¬â¢s personal treasury.Investors should not assume that overseers are actually doing their jobs, as even they might be in on the take. (Tomaszewski, 2010) The United States Securities and Exchange Commission (SEC) Involvement Critics and popular journalists from prominent media houses in the United States of America have called into question the manner in which the Securities and Exchange Commission handled the fraud case involving Bernard Madoff. This is due to the fact that even the commission itself has acknowledged that it should have detected Madoffââ¬â¢s illegal activities as soon as they began.The first major mandate or responsibility of the Securities and Exchange Commission is to interpret the laws pertaining to federal securit ies; such as, the commission should have detected the fundamental flaws in Bernard Madoffââ¬â¢s investment activities at an earlier stage. The second major responsibility of the Securities and Exchange Commission is to work closely with international state and federal authorities towards ensuring that investment securities are controlled and channeled in the right paths. Arvedlund, 2010) Most notably the Securities and Exchange Commission failed to fulfill its mandate of evaluating the conduct of privately owned companies like Investment Securities LLC for a very lengthy time. The commission should have also been at the forefront of investigating the investment advisors who collaborated with Bernard Madoff to divert huge amounts of money from unsuspecting investors into their accounts. However, the Securities and Exchange Commission published a detailed report in the year of 2009 that documents how Bernard Madoffââ¬â¢s scam escaped their attention for all those years. (Strober , 2009) (Millstone, 2010)How Madoffââ¬â¢s Fraud was Discovered and Identifiable Red Flags His business came to be under the doubts of various financial analysts as early as 1999. They believed that the returns claimed by the company were only theoretically impossible. But organizations such as the Securities and Exchange Commission (SEC) completely ignored the doubts and Madoff continued with his overtures for almost another 10 years. He finally got caught in December 2008. He was trapped after he confessed about his dishonesty to his very own sons. He confessed to his sons of his investment business being nothing but a big Ponzi scheme.His sons now reported his fatherââ¬â¢s fraud to the Federal Bureau of Investigation. Though Bernie confessed to have had started his Ponzi scheme in the 1990ââ¬â¢s, investigators think otherwise. They believe the Ponzi scheme and defrauding of investors had begun in the 1980ââ¬â¢s itself. Now what actually happened was that in the very fi rst week of December 2008, Bernie Madoff discussed his dilemma over having to pay his clients an amount of almost $7 billion as he didnââ¬â¢t have that much funds. Now within the very next two days Bernie told his sons that he made a huge profit and had decided to give away an early bonus, amounting up to $173 million.This confused the sons and they called for an explanation from their father. This is when their father confessed that his whole company worked through a ââ¬Å"giant Ponzi schemeâ⬠. On December 11th 2008, Bernie Madoff was taken into house arrest. Had the stock market not had been in a sharp decline in 2008, who knows how much longer the fraud could have continued. (Degrace, 2011) After writing that Madoff offers the biggest due diligence lesson for investors, some argued that the red flags are only obvious in hindsight and wouldnââ¬â¢t have been so clear if one had to make the decision before Bernardââ¬â¢s admission of running a Ponzi scheme.So letââ¬â ¢s count the red flags to see if they were numerous enough and obvious enough to be easily recognized. (1) Madoff Investment Securities was both the broker dealer and investment advisor. (2) Madoff traded in the same securities that he recommended to advisory clients. (3) Madoff not only was the broker dealer, creating a conflict of interest where his firm was trading in the same securities as he was trading for clients, but he actually had custody of the assets. (4) They got into some hot water over some small compliance issues. Madoffââ¬â¢s firm was censured and fined a small amount $7,000.This meant they did have a blot on their records. (5) Jim Vos, head of Aksia ââ¬â a hedge fund advisory firm, noticed that although Madoffââ¬â¢s firm was supposedly highly advanced and automated, they sent paper copies of their trading records to clients instead of providing electronic access to the firmââ¬â¢s trading platform. (6) Madoff Investment Securitiesââ¬â¢ auditors were Friehling & Horowita, a 3 person team which consisted of one lone CPA with a small 13ââ¬â¢ by 18ââ¬â¢ office in New York. It hardly had adequate room to monitor a firm that traded a good chunk of NYSE and NASDAQ volume. 7) Shockingly enough, Madoff didnââ¬â¢t take the usual 2/20 fees most hedge funds do. Instead he only profited from the trades that his firm was doing for the ââ¬Å"investment fundâ⬠, claiming that this was enough. Given this form of compensation, it is very possible most ââ¬Å"sophisticated investorsâ⬠assumed that Madoff was involved in some sort of shenanigans but turned a blind eye for those stable returns. (8) Madoff Investment Securities was a family business, with Madoffââ¬â¢s brother, sons and daughter as well as his niece (married to a previous compliance officer) all worked at the firm. ââ¬Å"The madoff red,â⬠2008) The Case Resolution Bernie was charged of federal offences like securities fraud, mail fraud, wire fraud, perjur y, and money laundering, false statement making only to name a few. He pleaded guilty and was banned from security investment business for a lifetime. He was sentenced to the highest degree of punishment possible under this act; an imprisonment of 150 years. He was sent to the Federal Prisons of North Carolina where he is registered as inmate number #61727-054 and his release from prison is dated November 14, 2134, a day he shall never see keeping in mind that he is now aged 71 years. Degrace, 2011) Conclusion Investment portfolios are one of the most recommended ways to enhance economic development not only at a personal level but also at a national level. However, Bernard Madoff chose to follow the short-cut to success by defrauding billions of dollars from investors. He begun very humbly by establishing a company called Investment Securities Limited Liability Company; he had begun with a figure of $5,000 as a penny stock broker but apparently, he had accrued this money from his p revious job where he worked as an installer of water sprinklers and also a guard.This took place in 1960 but little did investors know that it would grow to become the largest Ponzi scheme in the history of the United of America. Bernard Madoff drew assistance from all kinds of corners; various perpetrators who were involved in Bernard Madoffââ¬â¢s Ponzi scheme had different kinds of motives that were completely against the provisions evident in federal laws. However, all this culminated in the arrest and sentence of 150 years in prison on the 29th of Junes 2009. References 1. Arvedlund, E. (2010). Too good to be true: the rise and fall of Bernie Madoff. Penguin Group. . Bernard madoffââ¬â¢s fraud. (2012, June 07). Retrieved from http://www. customwritingtips. com/component/k2/item/8295-bernard-madoffââ¬â¢s-fraud. html 3. Degrace, T. (2011, April 14). Bernie madoff fraud the history of the $50b Ponzi scheme scam. Retrieved from http://www. stockpickssystem. com/bernie-madof f/ 4. Kirchner, B. (2010). The Bernard Madoff Investment Scam. NJ: Pearson education, Inc. 5. Markopolos, H. & Casey, F. (2010). No one would listen: A true financial thriller. NJ: John Wiley & Sons. 6. Millstone, K. (2010, March 09). How madoff pulled it off.Retrieved from http://www. cbsnews. com/2100-500395 162-4862910. html 7. NBC (2009). How Madoff got away with fraud. Accessed on 8th December 2011 from http://www. theprosandthecons. com/videos/fraud/bm-how-madoff-got-away-w-fraud. htm 8. Strober, D. H. (2009). Catastrophe: The Story of Bernard L. Madoff, the Man Who Swindled the World. Phoenix Books. 9. The madoff red flags, let's count them. (2008, December 17). Retrieved from http://www. tradersnarrative. com/the-madoff-red-flags-lets-count-them-2154. html 10. Tomaszewski, K. (2010, November 21). Bernard lawrence
Friday, January 10, 2020
The Foolproof 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Strategy
The Foolproof 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Strategy What to Expect From 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra? You can do a mini-lesson with a little group. The expression conclusion denotes the end portion of a bit of writing. The kids who want help will get it and the remainder of your class will obtain a refresher. You should have your reasons, and our primary concern is that you wind up getting a great grade. The Most Popular 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra We are also famous for our adherence to our customer's prerequisites, the promptness of our reaction to the customer's needs and our delivery punctuality. As you pay for homework, we provide those options at no cost. Today, we need to take a step back from the research procedure to make sure we understand the right format for paragraphs. However, lots of students struggled with altering th e wording of their original thesis and instead wished to copy the precise thesis again. 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra for Dummies Here are a few characteristics which include writing effective concluding sentences. They frequently restate the main idea expressed in the subject sentence. Same is true with ending sentences. Also, remember that you don't add anything new in concluding sentences. This sentence sets the tone for the remaining portion of the paragraph. A concluding sentence shouldn't be too long or too short. Here are some tactics to form an excellent concluding sentence. The conclusion sentences should give the reader an awareness of completion or closure. On the opposing side of this paper, write the features of a good concluding sentence. You may go back to your seats. I understand when you return to your seats you will have the ability to compose amazing conclusion paragraphs. If we return to our beloved su bject paragraph an excellent conclusion sentence would be, For every one of these reasons, math is my favourite subject. We are already prepared to compose our conclusion paragraphs. Concluding statements should give the sensation of summarization of your whole body paragraphs. Including a strong conclusion at the conclusion of the writing leaves a potent effect on the readers. This is your final chance to contact the reader. Readers invest a whole lot of time and emotions in your writings, because of this, it's your duty to provide appropriate closure. Your readers ought to be at ease as soon as they finish reading your writings. Look at all these mistakes. Introducing 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Discover how to compose a compare and contrast essay from us to make sure you produce a fantastic academic paper, or even better, call us to find out more about buying one of our reasonably priced essays. Every essay followed the ex act same standard structure. A thesis takes an important part in the entire essay writing process since it essentially sets the mood for the entire essay. Your thesis is the fundamental argument your whole essay will revolve around. I've been teaching five paragraph essay structure and everything which goes with it for a great deal of years now. Writing Concluding Sentences Most folks think TV shows are purely entertainment, but they can likewise be informational. Whatever They Told You About 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Is Dead Wrong...And Here's Why The conclusion paragraph is critical since it sums up everything you've learned as a researcher and permits you to support your ideas about this issue. It ought to be a clincher rather than simply a summary. A conclusion stipulates some last judgments on the major subject of the text and terminates a topic on a rational point. An effective conclusion is thorough and elaborative, it gives a crystal clear and robust idea regarding the entire text. It doesn't make a difference to us, whether you're too busy on the job concentrating on a passion undertaking, or simply tired of a seemingly infinite stream of assignments. For this activity you'll need a partner. They'll be expected to turn and speak to their partner in this lesson. Turn and tell your partner another case of a last sentence. Turn and tell your partner another means to compose this statement. The New Fuss About 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Our customer support will gladly tell you whether there are any special offers at the present time, and make sure you are getting the very best service our business can deliver. The sources you use have to be authentic to your topic, also referred to as authoritative, and has to be logical to the message you're trying to get across, or pertinent. Click the image below to get to the join page. Each card has an exceptional writing example! Utilizing a quotation at first or end of the paper gives a superb impression. They have to compose the whole five paragraphs to find all the practice they require. It summarizes the full essay or write-up to provide an appropriate logical ending about the subject and includes important essential points to show the logic. In other words, you wrap up the key points in 1 sentence. It must supply the key points of the paper to support the last judgment. All the significant essential points ought to be wrapped up and summarized. First this is a rather pleasant city which is filled with very honest folks. One more thing is my village had a huge population of individuals who are all black. Here there's more space between houses and they're a whole lot bigger too. Here, folks care more for the environment so it's a much cleaner city. Within this city people seem different because everyone comes from various places. Writing is a skill that some one can learn. When writing any form of academic paper, an individual should be able to get familiar with the basics of writing. I try to meet up with students during the next day which did not correctly finish the paragraphs since they will struggle with the remainder of the writing process unless they have a strong foundation in paragraph writing. What Does 5th Grade Writing Samples of Conclusion Paragraphs for a Compare and Contra Mean? After discovering our website, you will no longer will need to bother friends and family with these kinds of requests. We'll deal with them, and for a sensible price, as we understand that students generally don't have lots of money to spare. However, you can be certain that you're getting a fine work for the price tag you're paying. You may also acquire a variety of discounts on our site which will help you to save some more money for future orders or anything you want to spend them on. There's, naturally, a limit on the range of pages ev en our finest writers can produce with a pressing deadline, but generally, we figure out how to satisfy all the clients seeking urgent assistance.
Wednesday, January 1, 2020
Interview Questions On Behavioral Interviewing - 858 Words
Interview Questions and Prepared Answers. Behavioral interviewing is a relatively new, but widely used mode of job interviewing. The behavioral interview technique is used by employers to evaluate a candidateââ¬â¢s experiences and behaviors in order to determine their potential for success. This approach is based on the belief that past performance is the best predictor of future behavior. In fact, behavioral interviewing is said to be 55 percent predictive of future on-the-job behavior, while traditional interviewing is only 10 percent predictive. The interviewer identifies desired skills and behaviors, and then structures open-ended questions and statements to elicit detailed responses. A rating system is developed and selected criteria are evaluated during the interview. Even if you donââ¬â¢t have a great deal of work experience, companies expect you to be able to relate past experiences ââ¬â from undergraduate or graduate school, campus activities, volunteer work, membe rship in an organization, etc. ââ¬â to the job for which you are interviewing (Bliga, 2016). What are telephone interviews? They are real interviews held over the phone rather than face-to-face. You will usually be interviewed by a member of the graduate recruitment or HR team. Telephone interview will usually be given to candidates who have passed the online application and/or psychometric test stage of the graduate recruitment process and is used to sift out applicants to be invited to a face-to-face interview orShow MoreRelatedSituational Interview For Your Dream Job1154 Words à |à 5 Pagesbeen a part of a behavioral or situational interview for your dream job? The recruit, select, and hire process is essential for choosing the right person for a job. In this process, interviews are conducted in the selection portion. A job interview is a one on one, panel, or group conversation between the applicant and representative of an company. The purpose of an interview is to assess whether the applicant should be hired and/or continue through the hiring process. Interviews giv e insight intoRead MoreThe Advantage Of Therapeutic Communication In Motivational928 Words à |à 4 PagesThe advantage of therapeutic communication in motivational interviewing is establishing grounds for the clients to develop self- openness and confidence to talk about their health challenges and make behavior change. In this paper, I will be discussing the importance of verbal communication skills of motivational interviewing. Verbal communication in motivational interviewing is information sharing between two or more parts by using spoken speeches to convey their intended behavior changes ( ). TheRead MoreEvaluating A Good Candidate For Their Organization1467 Words à |à 6 PagesStructured Interviewing Analysis There are many different interviewing processes that companies use to determine who qualifies as a good candidate for their organization. Interviewers must be knowledgeable in their career and prepare a unique set of predetermined questions that appertain to what the company is looking for in future employees. In a thorough search about structured interviews, also known as a ââ¬Å"standardizedâ⬠interview, several components and coding words attracted more attention thanRead MoreToward Intentional Interviewing and Counseling1652 Words à |à 7 PagesIntentional Interviewing and Counseling INTRODUCTION: WHAT IS THE ââ¬Å"CORRECTâ⬠RESPONSE TO OFFER A CLIENT? * There are many potentially useful responses in any interviewing situation. * Reflecting the clientââ¬â¢s emotions can be helpful. * Selecting one aspect to focus on can be useful, and then later you can examine other dimensions by asking an open question. * Our tasks: * Respect the client * Use appropriate skills and strategies * Seek to alleviate stress INTERVIEWING, COUNSELINGRead MoreMotivational Interview Two. According To The Centers For1097 Words à |à 5 PagesMotivational Interview Two According to the Centers for Disease Control and Prevention (CDC) (2014), only 21% of Americans are sufficiently physically active according to the guidelines set forth in 2008. Thus, living a sedentary lifestyle has become an epidemic, and one that is not without consequence. The CDC (2014) further states that oneââ¬â¢s risk for heart disease, type 2 diabetes mellitus, stroke, depression, some cancers, and early death is noticeably higher for those living a sedentary lifestyleRead MoreBeing A Transfer Student From The Uw Green Bay Essay1673 Words à |à 7 Pagesthe representatives were always willing to answer any questions I had and it was a great way to gauge if the company culture was a good fit for me. I made sure to grab as many business cards as possible so that I could send thank you emails to the individuals I talked to. The people were always extremely nice at every event, so I never had a bad experience with any of the firms. Before I Started looking at picking the firms I wanted to interview with, I decided that my resume could be spruced up aRead MoreJob Interview Questions and Sample Answers1444 Words à |à 6 PagesAds Strong Interview Answers www.InterviewSuccessFormula.com The 3 Things You Should Never Say in a Job Interview. Check Them Out! Best Interview Answers www.InterviewAdvisers.com Secrets to Help You to Get Hired in Your Next Job Interview. Start Now! The Best Interview Answer CareerConfidential.com/FreeEbook Answers Top 50 Interview Questions DownLoad Free Ebook Now. See More About job interview questions and answers job interviews interview questions job interview tips Ads How To Speak EnglishRead MoreThe PEACE and Cognitive Interviewing Models vs. the Reid Technique 1725 Words à |à 7 PagesCognitive Interviewing. These methods are not interrogation techniques like Reid but interview processes. The Reid Technique is an interrogation process that consists of two parts, the interview and a nine-step interrogation. The interview, which is non-accusatory in nature, gives the interviewer a chance to gather information related to the case. The interview also allows the interrogator to gather behavioral information by conducting what is known as a behavioral analysis interview (BAI) (InbauRead MoreHR CHAPTER 711245 Words à |à 56 Pages13e (Dessler) Chapter 7 Interviewing Candidates 1) Which of the following is the most commonly used selection tool? A) telephone reference B) reference letter C) interview D) personality test Answer: C Explanation: C) Interviews are the most widely used selection procedure. Not all managers use tests, reference checks, or situational tests, but most interview a person before hiring. Diff: 1 Chapter: 7 Objective: 1 Skill: Concept Learning Outcome: Describe effective interviewing techniques 2) Which ofRead MoreThorough Pre Employment Assessments1358 Words à |à 6 Pagesprovided by the applicant was being truthful and the information was accurate. Another method utilized by BSS is the process of interviewing with BSS managers and Stanley. Interviewing is one method of gathering information from the candidate about their work history, skills used in past positions, and even behaviors in certain situations. When done correctly, interviewing can flush out strengths and weakness of the candidate in relation to the position they are applying to fulfill. The third process
Tuesday, December 24, 2019
Dantes Voyage Through Hell - 1490 Words
The Inferno was written by Dante Alighieri around 1314 and depicts the poetââ¬â¢s imaginary journey through Hell. Dante spent his life traveling from court to court both lecturing and writing down his experiences. His Divine Comedy ââ¬â the three-part epic poem consisting of Inferno, Purgatorio, and Paradiso (Hell, Purgatory and Heaven)ââ¬â is generally regarded as one of the greatest poetic feats ever accomplished. All three parts are incredible literary feats with symbolism so complex and beautiful that scholars are still unraveling all the details today. However, this essay will focus on the first part of Danteââ¬â¢s work, Inferno, which consists of 34 cantos. Danteââ¬â¢s Inferno is a masterpiece of allegorical imagery where Virgil represents humanâ⬠¦show more contentâ⬠¦Dante derived much of his writing inspirations from the Roman poet, Virgil. Virgil wrote many poetics, but is probably most well known for writing the Aeneid, whose main character Dante pro bably used as the basis for Virgil in his Inferno. Aeneas is a strong, brave man who also serves as a source of comfort and familiarity to those around him. Virgil thus serves as both guide and the representation of human reason throughout Danteââ¬â¢s journey in Hell. His influence cannot be understated as he is a mentor not only to Danteââ¬â¢s character on his journey, but also to Dante the human being. Virgil is the embodiment of reason and logic in the Inferno. He achieves this quality through his meticulous and often graphic descriptions of the geography and meaning of each and every circle of Hell, and of the tortures that the sinners must endure. Although his descriptions contribute greatly to the allegorical meaning of the epic, Virgil himself is limited in his journey throughout the Inferno due to his lack of religious affiliation by age as he was born before Christ came to save the sins of man. In Canto IV Virgil says, ââ¬Å"I wish you to know before you travel on that these were sinless. And still their merits fail, for they lacked Baptismââ¬â¢s grace, which is the door of the true faith you were born toâ⬠(33-36). Virgil knows he isShow MoreRelatedDante And The Nature Of Sin967 Words à |à 4 Pagesthe start of The Inferno. Though he sees a safe path out of the wood towards an alluring light, he is forced to take an alternate route through an even darker place . As the ending of the pilgrim Danteââ¬â¢s voyage is bright and hopeful, Alighieri the poet aims to encourage even the most sinful Christians to hope for a successful end. Thus, Dante the pilgrim goes to hell in The Inferno to better understand the nature of sin and its consequences in order to move closer to salvation; his journey an allegoryRead MoreDante s Divine Comedy : An Allegory Representative Of The Christian Soul974 Words à |à 4 Pagespath to the light and out of the wood, he is forced to take an alternate route through an even darker place. The Divine Comedy is an allegory representative of the Christian soul. As the ending is bright and hopeful for Dante, Aghileri spreads that the ending for even the most sinful Christians can be as hopeful as danteââ¬â¢s, provided that they take the steps needed to achieve salvation. Thus, Dante the pilgrim goes to hell to better understand the nature of sin and its consequences in order to moveRead MoreOdysseus and Dante1517 W ords à |à 7 PagesBeatrice. Both men are very much love the woman in their lives, go to their own hell and back and can think of nothing other than finding their way back to them. Beatrice even after death has a spirit that is very much in love with Dante. She has faith in him, and asks Virgil to guide him through hell to bring him back to her. As written by a professor in psychoanalysis, Dante the voyager through this arduous voyage, a voyage that initially descends into ever deeper, ever more terrifying levels, isRead MoreComparing Dante s Inferno And Virgil s The Aeneid1016 Words à |à 5 PagesThere are many similarities between Danteââ¬â¢s The Inferno and Virgilââ¬â¢s The Aeneid, be it their characterizations or descriptive imagery, but foremost in their ideas of what the afterlife consisted of. Each each epic hero in the works here have descended in to the depths of hell, with The Inferno depicting Danteââ¬â¢s descent into the depths of hell and with Virgil in Book VI of The Aeneid depicting Aeneasââ¬â¢s decent into hell. It can be argued that although different, the knowledge acquired by each characterââ¬â¢sRead MoreThe Divine Comedy An d Dantes Inferno1079 Words à |à 5 Pagesancient Romans. In The Inferno, the main character Dante meets with the Roman poet Virgil who was one of Danteââ¬â¢s biggest influences. Virgil guides Dante deep into the circles of hell and throughout the journey, they encounter many Greek heroes that Dante had disdain for. There are a total of nine circles of hell and the deeper they journeyed, the worse the punishment the people staying in hell received. When Dante and Virgil reach the eighth ring that is reserved for frauds, false prophets, and thieves;Read MoreThe Inferno : Warning Or Threat?1385 Words à |à 6 PagesInferno incompasses the story of Danteââ¬â¢s journey through Hell to reach the path of righteousness going toward Heavenââ¬â¢s Gate. Across the immeasurable and extensive journey of Dante and Virgil, both together observe the punishments brought upon oneself, as a result of the sins committed by the hopeless residents of Hell. Within the novel, the severity of pu nishment and the discipline itself whilst in Hell, is a direct correlation to the sins that the souls of Hell are bound to from before their individualRead MoreThe Power Of Everyman s Journey Through Hell1249 Words à |à 5 PagesThe Power of Everymanââ¬â¢s Journey Through Hell In religious contexts, sin is the act of violating God s will. Sin can also be viewed as ââ¬Å"anything that violates the ideal relationship between an individual and God, leading to a period of estrangement between the twoâ⬠. This is not necessarily a permanent separation, but if one dies without correcting such problem, then the separation does become permanent. In order to atone for oneââ¬â¢s transgressions, salvation ââ¬âdeliverance by redemption from the powerRead MoreThe Structure and Content of Dantes Inferno Essay1096 Words à |à 5 PagesIn his first article of The Inferno, Dante Alighieri starts to present a vivid view of Hell by taking a journey through many levels of it with his master Virgil. This voyage constitutes the main plot of the poem. The opening Canto mainly shows that, on halfway through his life, the poet Dante finds himself lost in a dark forest by wandering into a tangled valley. Being totally scared and disoriented, Dante sees the sunshine co ming down from a hilltop, so he attempts to climb toward the light. HoweverRead MoreLewis And The Silent Planet1326 Words à |à 6 PagesOut of the Silent Planet and Danteââ¬â¢s Inferno. The literary tradition left behind by Dante is both one able to influence the thoughts of others and to teach the value of Christianity through within a fictional environment. This is similar to Lewisââ¬â¢ Space Trilogy in more ways than one, some of which include Ransom journey in place of the pilgrim as he travels through strange, new, territory in order to reach his goal, and the use of Malacandra to represent the levels of Hell. Each book in the Space TrilogyRead MoreEssay about Inferno882 Words à |à 4 Pagesstory of a mans voyages through the treacherous depths of hell. Dante is a man who has strayed from the path of a catholic way of life. Now he needs to travel through hell to reach the virtuous path that will take him to heaven. He is guided through hell by a man who is in limbo, the first circle of hell, named Virgil. Virgil takes him through hell and shows him people suffering for the sins that they have committed. Together they travel through the nine different stages of hell observing who is
Monday, December 16, 2019
You Suck A Love Story Chapter 8 Free Essays
Chapter Eight She Walks in Beauty Jody moved down Columbus Avenue with long, runway-model strides, feeling the windblown fog brush by her like the chill ghosts of rejected suitors. What she could never teach Tommy, what she could never really share with him, was what it felt like to move from being a victim ââ¬â afraid of attack, the shadow around the corner, the footsteps behind ââ¬â to being the hunter. It wasnââ¬â¢t the stalking or the rush of taking down prey ââ¬â Tommy would understand that. We will write a custom essay sample on You Suck: A Love Story Chapter 8 or any similar topic only for you Order Now It was walking down a dark street, late at night, knowing that you were the most powerful creature there, that there was absolutely nothing, no one, that could fuck with you. Until she had been changed and had stalked the city as a vampire, she never realized that virtually every moment she had been there as a woman, she had been a little bit afraid. A man would never understand. That was the reason for the dress and the shoes ââ¬â not to attract a minion, but to throw her sexuality out there on display, dare some underevolved male to make the mistake of seeing her as a victim. Truth be told, although it had come down to confrontation only once, and then sheââ¬â¢d been wearing a baggy sweatshirt and jeans, Jody enjoyed kicking ass. She also enjoyed ââ¬â every bit as much ââ¬â just knowing that she could. It was her secret. Without fear, the City was a great sensual carnival. There was no danger in anything she experienced, no anxiety. Red was red, yellow didnââ¬â¢t mean caution, smoke didnââ¬â¢t mean fire, and the mumbling of the four Chinese guys standing by their car just around the corner was just the click and twang of empty swinging dick talk. She could hear their hearts speed up when they saw her, could smell sweat and garlic and gun oil coming off them. Sheââ¬â¢d learned the smell of fear and imminent violence, too, of sexual arousal and surrender, although sheââ¬â¢d have been hard-pressed to describe any of that. It was just there. Like color. You knowâ⬠¦ Try to describe blue. Without mentioning blue. See? There werenââ¬â¢t a lot of people out on the street at this time of night, but there were a few, spread up the length of Columbus: barhoppers, late diners just wrapping it up, college boys heading down to the strip clubs on Broadway, the exodus from Cobbââ¬â¢s Comedy Club up the street, people giddy and so into the rhythm of laughing that they found one another and everything they saw hilarious ââ¬â all of them vibrant, wearing auras of healthy pink life, trailing heat and perfume and cigarette smoke and gas held through long dinners. Witnesses. The Chinese guys werenââ¬â¢t harmless, by any means, but she didnââ¬â¢t think theyââ¬â¢d attack her, and she felt a twinge of regret. One of them, the one with the gun, yelled something at her in Cantonese ââ¬â something sleazy and insulting, she could tell by the tone. She spun as she walked, smiled her biggest red carpet smile, and without breaking stride, said, ââ¬Å"Hey, nano-dick, go fuck yourself!â⬠There was a lot of bluster and shuffle, the smart one, the one with fear coming off him, held his friend Nano-dick back, thus saving his life. She must be a cop, or just crazy. Somethingââ¬â¢s wrong. They clustered around their tricked-out Honda and huffed out great breaths of testosterone and frustration. Jody grinned, and detoured up a side street, away from traffic. ââ¬Å"My night,â⬠she said to herself. ââ¬Å"Mine.â⬠Now off the main drag, she saw only a single old man shuffling ahead of her. His life aura looked like a burned-out bulb, a spot of dark gray around him. He walked stooped over, with a dogged determination, as if he knew that if he stopped, he would never start again. From what she could tell, he never would. He wore baggy, wide-wale corduroys that made the sound of rodents nesting when he walked. A wisp of breeze off the Bay brought Jody the acrid smell of failing organs, of stale tobacco, of despair, of a deep, rotting sickness, and she felt the elation leave her. She slipped comfortably into the new slot the night had made for her, like tumblers of a lock slipping into place. She made sure that she made enough noise so that he could hear her approaching, and when she was beside him, he paused, his feet still moving in tiny steps that turned him to the side, as if his motor was idling. ââ¬Å"Hi,â⬠she said. He smiled. ââ¬Å"My, you are a lovely girl. Would you walk with me?â⬠ââ¬Å"Sure.â⬠They walked a few steps together before he said, ââ¬Å"Iââ¬â¢m dying, you know.â⬠ââ¬Å"Yeah, I kind of figured,â⬠Jody said. ââ¬Å"Iââ¬â¢m just walking. Thinking, and walking. Mostly walking.â⬠ââ¬Å"Nice night for it.â⬠ââ¬Å"A little cold, but I donââ¬â¢t feel it. I got a whole pocketful of painkillers. You want one?â⬠ââ¬Å"No, Iââ¬â¢m good. Thanks.â⬠ââ¬Å"I ran out of things to think about.â⬠ââ¬Å"Just in time.â⬠ââ¬Å"I wondered if Iââ¬â¢d get to kiss a pretty girl once before the end. I think that would be all Iââ¬â¢d want.â⬠ââ¬Å"Whatââ¬â¢s your name?â⬠ââ¬Å"James. James Oââ¬â¢Mally.â⬠ââ¬Å"James. My name is Jody. Iââ¬â¢m pleased to meet you.â⬠She stopped and offered her hand to shake. ââ¬Å"The pleasure is all mine, I assure you,â⬠said James, bowing as best he could. She took his face in her hands, and steadied him, then kissed him on the lips, softly and for a long time, and when she pulled away they were both smiling. ââ¬Å"That was lovely,â⬠James Oââ¬â¢Mally said. ââ¬Å"Yes it was,â⬠Jody said. ââ¬Å"I suppose Iââ¬â¢m finished now,â⬠James said. ââ¬Å"Thank you.â⬠ââ¬Å"The pleasure was all mine,â⬠Jody said. ââ¬Å"I assure you.â⬠Then she put her arms around his slight frame, and held him, one hand cradling the back of his head like an infant, and he only trembled a little when she drank. A little later, she bundled his clothes together under her arm, and hooked his old wing tips on two fingers. The dust that had been James Oââ¬â¢Mally was spread in a powdery-gray pile on the sidewalk, like a negative shadow, a bleached spot. She brushed it flat with her palm, and wrote, Nice kiss, James, with her fingernail. As she walked away, an hourglass trickle of James trailed out of his clothes behind her and was carried off on the chill bay breeze. The guy working the door of the Glas Kat looked like a raven had exploded on his head, his hair plastered out in a chaos of black spikes. The music coming from inside sounded like robots fucking. And complaining about it. In rhythmic monotone. European robots. Tommy was a little intimidated. ââ¬ËSploded raven-head guy had better fangs than he did, was paler, and had seventeen silver rings in his lips. (Tommy had counted.) ââ¬Å"Bet itââ¬â¢s hard to whistle with those in, huh?â⬠Tommy asked. ââ¬Å"Ten dollars,â⬠said ââ¬ËSploded. Tommy gave him the money. He checked Tommyââ¬â¢s ID and stamped his wrist with a red slash. Just then a group of Japanese girls dressed like tragic Victorian baby dolls breezed by behind Tommy, waving their wrist slashes like theyââ¬â¢d just returned from a joyful suicide party instead of smoking cloves on the street. They, too, looked more like vampires than Tommy did. He shrugged and entered the club. Everyone, it appeared, looked more like a vampire than he did. Heââ¬â¢d bought some black jeans and a black leather jacket at the Leviââ¬â¢s store while Jody was off finding something hideous for her mother for Christmas, but evidently he should have been looking for some black lipstick and something cobalt- or fuchsia-colored to weave into his hair. And in retrospect, the flannel shirt may have been a mistake. He looked like heââ¬â¢d shown up at the sacrificial mass of the damned ready to fix the dishwasher. The music changed to an ethereal female chorus of Celtic nonsense. With a techno beat. And robots complaining. Grumpy robots. He tried to listen around it, the way Jody had taught him. With all the black light, strobes, and black clothing, his newly heightened senses were overloading. He tried to focus on peopleââ¬â¢s faces, their life auras, look through the haze of heat, hairspray, and patchouli for the girl heââ¬â¢d met at Walgreens. Tommy had felt alone in a crowd before, even inferior to everyone in a crowd, but now he felt, well, different. It wasnââ¬â¢t just the clothes and the makeup, it was the humanity. He wasnââ¬â¢t part of it. Heightened senses or not, he felt like he had his nose pressed against the window, looking in. The problem was, it was the window of a donut shop. ââ¬Å"Hey!â⬠Someone grabbed his arm and he wheeled around so quickly that the girl nearly tumbled over backwards, startled. ââ¬Å"Fuck! Dude.â⬠ââ¬Å"Hi,â⬠Tommy said. ââ¬Å"Wow.â⬠Thinking, Ah, jelly donut. It was the girl from Walgreens. She was nearly a foot shorter than he, and a little skinny. Tonight sheââ¬â¢d gone with the waifish look, wearing striped stockings with holes ripped in them and a shiny red PVC miniskirt. Sheââ¬â¢d traded in her Lord Byron shirt for a tank top, black, of course, with dripping red letters that read got blood? and fishnet gloves that went halfway up her biceps. Her makeup was sad-clown marionette: black tears drawn streaming down either side of her face. She crooked her finger to get him to bend down so she could shout into his ear over the music. ââ¬Å"My nameââ¬â¢s Abby Normal.â⬠Tommy spoke into her ear; she smelled of hairspray and what was that? Raspberry? ââ¬Å"My name is Flood,â⬠he said. ââ¬Å"C. Thomas Flood.â⬠It was his pen name. The C didnââ¬â¢t really stand for anything, he just liked the sound of it. ââ¬Å"Call me Flood,â⬠he added. Tommy was a stupid name for a vampire, but Flood ââ¬â ah, Flood ââ¬â there was disaster and power there, and a hint of mystery, he thought. Abby smiled like a cat in a tuna cannery. ââ¬Å"Flood,â⬠she said. ââ¬Å"Flood.â⬠She was trying it on, it seemed to Tommy. He imagined that sheââ¬â¢d have a black vinyl binder at school and sheââ¬â¢d soon be writing Mrs. Flood surrounded by a heart with an arrow through it on the cover in her own blood. Heââ¬â¢d never seen a girl so obviously attracted to him, and he realized that he had no experience in dealing with it. For a moment he flashed on the three vampire brides of Dracula who try to seduce Jonathan Harker in Stokerââ¬â¢s classic novel. (Heââ¬â¢d been studying all the vampire fiction he could get his hands on since meeting Jody, since it didnââ¬â¢t appear that anyone had written a good how-to book on vampirism.) Could he really deal with three luscious vampire brides? Would he have to bring them a kid in a sack the way Dracula does in the book? How many kids a week would it take to keep them happy? And where did you get kid sacks? And although he hadnââ¬â¢t discussed it with Jody, he was pretty sure she was not going to be happy sha ring him with two other luscious vampire brides, even if he brought her sacks and sacks full of kids. Theyââ¬â¢d need a bigger apartment. One with a washer and dryer in the building, because thereââ¬â¢d be a lot of bloodstained lingerie to be washed. Vampire logistics were a nightmare. You should get a castle and a staff when you got your fangs. How was he going to do all of this? ââ¬Å"This sucks,â⬠Tommy finally said, overwhelmed by the enormity of his responsibilities. Abby looked startled, then a little hurt. ââ¬Å"Sorry,â⬠she said. ââ¬Å"You want to get out of here?â⬠ââ¬Å"Oh, no, I didnââ¬â¢t mean ââ¬â I mean, uh, yes. Let us go.â⬠ââ¬Å"Do you still need to get your heroin?â⬠ââ¬Å"What? No, that matter is taken care of.â⬠ââ¬Å"You know, Byron and Shelley did opiates,â⬠Abby said. ââ¬Å"Laudanum. It was like cough syrup.â⬠Then, for no reason that he could think of, Tommy said, ââ¬Å"Those scamps, they loved to get wrecked and read ghost stories from the German.â⬠ââ¬Å"That is so fucking cool,â⬠Abby said, grabbing his arm and hugging his biceps like it was her newest, bestest friend. She started pulling him toward the door. ââ¬Å"What about your friend?â⬠Tommy said. ââ¬Å"Oh, someone made a comment about his cape being gray when we first got here, so he went home to redye all of his blacks.â⬠ââ¬Å"Of course,â⬠Tommy said, thinking, What the fuck? Out on the sidewalk, Abby said, ââ¬Å"I suppose we need to find somewhere private.â⬠ââ¬Å"We do?â⬠ââ¬Å"So you can take me,â⬠Abby said, stretching her neck to the side, looking more like a stringless marionette than ever. Tommy had no idea what to do. How did she know? Everyone in that club would have scored higher on the ââ¬Å"are you a vampire?â⬠test than he would. There needed to be a book, and this sort of thing needed to be in it. Should he deny it? Should he just get on with it? What was he going to tell Jody when she woke up next to the skinny marionette girl? He hadnââ¬â¢t really understood women when he was a normal, human guy, when it seemed that all you had to do was pretend that you didnââ¬â¢t want to have sex with them until they would have sex with you, but being a vampire added a whole new aspect to things. Was he supposed to conceal that he was a vampire and a dork! He used to read the articles in Cosmo to get some clue to the female psyche, and so he deferred to advice heââ¬â¢d read in an article entitled ââ¬Å"Think Heââ¬â¢s Just Pretending to Like You So Youââ¬â¢ll Have Sex with Him? Try a Coffee Date.â⬠ââ¬Å"How ââ¬â¢bout I buy you a cup of coffee instead,â⬠he said. ââ¬Å"We can talk.â⬠ââ¬Å"Itââ¬â¢s because I have small boobs, isnââ¬â¢t it?â⬠Abby said, going into a very practiced pout. ââ¬Å"Of course not.â⬠Tommy smiled in a way he thought would be charming, mature, and reassuring. ââ¬Å"Coffee wonââ¬â¢t help that.â⬠As Jody pushed the bundle of clothes into the storm sewer, a silver cigarette case slid out of the jacket pocket onto the pavement. She reached for it and felt a light shock ââ¬â no, that wasnââ¬â¢t it. It was a warmth that moved up her arm. She kicked the clothes into the opening and stood under the streetlight, turning the silver case in her hands. It had his name engraved on it. She couldnââ¬â¢t keep it, like she had the folding money from his pockets, but she couldnââ¬â¢t throw it away either. Something wouldnââ¬â¢t let her. She heard a buzz, like an angry insect, and looked up to see a neon à «Openà » sign flickering above a shop called Asherââ¬â¢s Secondhand. That was it. Thatââ¬â¢s where the cigarette case had to go. She owed it to James. After all, heââ¬â¢d given her everything, or at least everything heââ¬â¢d had left. She quick-stepped across the street and into the shop. The owner was working the counter at the back by himself. A thin guy in his early thirties, with a look of pleasant confusion not unlike the one sheââ¬â¢d first noticed on Tommyââ¬â¢s face. Normally, this guy would be prime minion material, or at least based on her minion recruitment of the past he would, except apparently, he was dead. Or at least not alive like most people. He had no life aura around him. No healthy pink glow, no crusty brown or gray corona of illness. Nothing. The only time sheââ¬â¢d ever seen this before was with Elijah, the old vampire. The shopkeeper looked up and she smiled. He smiled back. She moved to the counter. While he tried not to stare at her cleavage, she looked more closely for some life aura. There was heat, or at least there appeared to be some heat coming off him. ââ¬Å"Hi,â⬠said the shopkeeper. ââ¬Å"Can I help you?â⬠ââ¬Å"I found this,â⬠she said, holding up the cigarette case. ââ¬Å"I was in the neighborhood and something made me think that this belonged here.â⬠She set the case down on the counter. How could he have no life aura? What the hell was he? ââ¬Å"Touch me,â⬠she said. She held out her hand to him. ââ¬Å"Huh?â⬠He seemed a little frightened at first, but he took her hand, then quickly let go. He was warm. ââ¬Å"Then youââ¬â¢re not one of us?â⬠But he wasnââ¬â¢t one of them either. ââ¬Å"Us? What do you mean us?â⬠He touched the cigarette case and she could tell that this was exactly why she had brought it here. It was supposed to be here. Whatever part of James Oââ¬â¢Mally had been left in that cigarette case had led her here. And this thin, confused-looking guy was supposed to have it. He took what was left of people all the time. Itââ¬â¢s what he did. Jody felt some of the confidence sheââ¬â¢d felt earlier draining away. Maybe the night wasnââ¬â¢t hers after all. Jody backed away a step. ââ¬Å"No. You donââ¬â¢t just take the weak and the sick, do you? You take anyone.â⬠ââ¬Å"Take? What do you mean, take?â⬠He was furiously trying to push the cigarette case back to her across the counter. He didnââ¬â¢t know. He was like she was when sheââ¬â¢d awakened that first night as a vampire and had no idea what she had become. ââ¬Å"You donââ¬â¢t even know, do you?â⬠ââ¬Å"Know what?â⬠He picked up the cigarette case again. ââ¬Å"Wait a second, can you see this thing glowing?â⬠ââ¬Å"No glow. It just felt like it belonged here.â⬠This poor guy, he didnââ¬â¢t even know. ââ¬Å"Whatââ¬â¢s your name?â⬠She asked. ââ¬Å"Charlie Asher. This is Asherââ¬â¢s.â⬠ââ¬Å"Well Charlie, you seem like a nice guy, and I donââ¬â¢t know exactly what you are, and it doesnââ¬â¢t seem like you know. You donââ¬â¢t, do you?â⬠He blushed. Jody could see his face flush with heat. ââ¬Å"Iââ¬â¢ve been going through some changes lately.â⬠Jody nodded. He really would have been perfect as a minion ââ¬â if he hadnââ¬â¢t been some bizarre supernatural creature. Sheââ¬â¢d just gotten used to the idea of vampires being real, and it took some serious blood drinking to drive that reality home, and now there were other ââ¬â other ââ¬â things? Still, Jody felt bad for him, ââ¬Å"Okay,â⬠she said. ââ¬Å"I know what itââ¬â¢s like, uh, to find yourself thrown into a situation where forces beyond your control are changing you into someone, something you donââ¬â¢t have an ownerââ¬â¢s manual for. I understand what it is to not know. But someone, somewhere, does know. Someone can tell you whatââ¬â¢s going on.â⬠And hopefully they arenââ¬â¢t just fucking with you, she wanted to add, but thought better of it. ââ¬Å"What are you talking about?â⬠he asked. ââ¬Å"You make people die, donââ¬â¢t you Charlie?â⬠She didnââ¬â¢t know why she said it, but as soon as she said it, she knew it was true. Like when all her other senses had been dialed to eleven, she could sense something new, like noise on the line, and it was telling her this. ââ¬Å"But how do you ââ¬â ?â⬠ââ¬Å"Because itââ¬â¢s what I do,â⬠Jody said. ââ¬Å"Not like you, but itââ¬â¢s what I do. Find them, Charlie. Backtrack and find whoever was there when your world changed.â⬠She shouldnââ¬â¢t have said that, she knew it as she was saying it. Sheââ¬â¢d just handed him an item that had been owned by someone sheââ¬â¢d taken not twenty minutes ago. But even as regret for passing out incriminating evidence hit her, she also realized that she had left Tommy out there to wave in the wind just like this guy. Even if it was only for a few hours, Tommy had no idea how to go about being a vampire ââ¬â truth be told, he hadnââ¬â¢t really been that good at being a human. He was just a doofy guy from Indiana and sheââ¬â¢d abandoned him to the merciless city. She turned and ran out of the shop. ââ¬Å"Cocoa?â⬠Tommy said. ââ¬Å"You look cold.â⬠Heââ¬â¢d given her his jacket out on the street. Heââ¬â¢s so gallant, Abby thought. He probably wants me to drink cocoa to get my blood sugar up before he sucks the life from my veins. Abby had lived much of her life waiting for something extraordinary to happen. No matter where she had been, there was a world somewhere that was more interesting. Sheââ¬â¢d progressed from wanting to live in a fantastic, kawaii-cute plastic world of Hello Kitty, to being a Day-Glo, Manga lollipop space girl in platform sneakers, and then just a couple of years ago she had moved into the dark gothic world of pseudo vampires, suicidal poets, and romantic disappointment. It was a dark, seductive world where you got to sleep really late on the weekends. Sheââ¬â¢d been true to her dark nature, too, trying to maintain an aspect of exhausted mopeyness while channeling any enthusiasm she felt into a vehicle for imminent disappointment, and above all, suppressing the deep-seated perkiness that her friend Lily said sheââ¬â¢d never shed when sheââ¬â¢d refused to throw away her Hello Kitty backpack or let go of her Nintendog virtual beagle puppy. ââ¬Å"He has virtual parvo,â⬠Lily had said. ââ¬Å"You have to put him down.â⬠ââ¬Å"He doesnââ¬â¢t have parvo,â⬠Abby had insisted. ââ¬Å"Heââ¬â¢s just tired.â⬠ââ¬Å"Heââ¬â¢s doomed, and youââ¬â¢re cute, and hopelessly perky,â⬠Lily taunted. ââ¬Å"I am not. Iââ¬â¢m complex and Iââ¬â¢m dark.â⬠ââ¬Å"Youââ¬â¢re perky and your e-dog has i-parvo.â⬠ââ¬Å"As Azrael is my witness, I will never be perky again,â⬠said Abby, her wrist set tragically to her forehead. Lily stood with her as she threw her Nintendog cartridge under the tire of the 91 midnight express bus. And now she had been chosen by a real creature of the night, and she would be true to her word: she had shed her perkiness. She sipped her hot chocolate, and studied the vampire Flood across the table. How clever, that he could appear as just a simple, clueless guy ââ¬â but then, he could probably take many shapes. ââ¬Å"I could be a slave to your darkest desires,â⬠Abby said. ââ¬Å"I can do things. Anything you want.â⬠The vampire Flood commenced a coughing fit. When he had control again, he said, ââ¬Å"Well, thatââ¬â¢s terrific, because we have a lot of laundry piled up and the apartment is a wreck.â⬠He was testing her. Seeing if she was worthy before bringing her into his world. ââ¬Å"Anything you desire, my lord. I can do laundry, clean, bring you small creatures to quench your thirst until I am worthy.â⬠The vampire Flood snickered. ââ¬Å"This is so cool,â⬠he said. ââ¬Å"Youââ¬â¢ll do my laundry, just like that?â⬠Abby knew she had to tread carefully here, not fall for his trap. ââ¬Å"Anything,â⬠she said. ââ¬Å"Have you ever gone apartment hunting?â⬠ââ¬Å"Sure,â⬠she lied. ââ¬Å"Okay, you can start tomorrow first thing. You need to find us an apartment.â⬠Abby was horrified. She hadnââ¬â¢t really tried on the idea of leaving her old life so quickly. But all that would mean nothing when she became immortal, and ran with the children of the night. But her mom was going to be pissed. ââ¬Å"I canââ¬â¢t move in right away, my lord. I have affairs to put in order before I make the change.â⬠The vampire Flood smiled, his fangs barely visible now. ââ¬Å"Oh, itââ¬â¢s not for you. Thereââ¬â¢s another.â⬠He paused and leaned across the table. ââ¬Å"An elder,â⬠he whispered. There was another? Was she to become the sacrifice to a whole coven of the undead? Well, whatever. Lily would be so jealous. ââ¬Å"As you please, my lord,â⬠she said. ââ¬Å"You might want to chill with the ââ¬Ëmy lordââ¬â¢ stuff,â⬠Flood said. ââ¬Å"Sorry.â⬠ââ¬Å"Itââ¬â¢s okay. You know this all has to be completely secret, right?â⬠ââ¬Å"Right. Secret.â⬠ââ¬Å"I mean, Iââ¬â¢m okay with it, but the other, the elder, she has a terrible temper.â⬠ââ¬Å"She?â⬠ââ¬Å"Yeah, you know, an Irish redhead.â⬠ââ¬Å"A Celtic countess, then? The one who was with you at Walgreens?â⬠ââ¬Å"Exactly.â⬠ââ¬Å"Sweet!â⬠Abby blurted out. She couldnââ¬â¢t help it. She immediately tried to hide her latent perkiness by biting the edge of her cocoa cup. ââ¬Å"Youââ¬â¢ve got chocolate, here.â⬠The vampire Flood gestured to her lip. ââ¬Å"Kind of a marshmallow mustache.â⬠ââ¬Å"Sorry,â⬠Abby said, wiping her mouth furiously with the back of her fishnet glove, smearing her black lipstick across the side of her face. ââ¬Å"Itââ¬â¢s okay,â⬠said the vampire Flood. ââ¬Å"Itââ¬â¢s cute.â⬠ââ¬Å"Fuck!â⬠Abby said. How to cite You Suck: A Love Story Chapter 8, Essay examples
Sunday, December 8, 2019
Social Media and Business free essay sample
At the same time, every minute, 10 hours of content were uploaded to the video sharing platform YouTube. And, the image hosting site Flickr provided access to over 3 billion photographs, making the world-famous Louvre * Corresponding author. E-mail addresses: [emailprotected] eu (A. M. Kaplan), [emailprotected] eu (M. Haenlein). Museumââ¬â¢s collection of 300,000 objects seem tiny in comparison. According to Forrester Research, 75% of Internet surfers used ââ¬Ëââ¬ËSocial Mediaââ¬â¢Ã¢â¬â¢ in the second quarter of 2008 by joining social networks, reading blogs, or contributing reviews to shopping sites; this represents a signi? ant rise from 56% in 2007. The growth is not limited to teenagers, either; members of Generation X, now 35ââ¬â44 years old, increasingly populate the ranks of joiners, spectators, and critics. It is therefore reasonable to say that Social Media represent a revolutionary new trend that should be of interest to companies operating in online space ââ¬âââ¬âor any space, for that matter. Yet, not overly many ? rms seem to act comfortably in a world where consumers can speak so freely 0007-6813/$ ââ¬â see front matter # 2009 Kelley School of Business, Indiana University. All rights reserved. doi:10. 1016/j. bushor. 2009. 09. 003 60 with each other and businesses have increasingly less control over the information available about them in cyberspace. Today, if an Internet user types the name of any leading brand into the Google search, what comes up among the top ? ve results typically includes not only the corporate webpage, but also the corresponding entry in the online encyclopedia Wikipedia. Here, for example, customers can read that the 2007 model of Hasbroââ¬â¢s Easy-Bake Oven may lead to serious burns on childrenââ¬â¢s hands and ? gers due to a poorly-designed oven door, and that the Firestone Tire and Rubber Company has been accused of using child labor in its Liberian rubber factory. Historically, companies were able to control the information available about them through strategically placed press announcements and good public relations managers. Today, however, ? rms have been increasingly relegated to the sidelines as mere observers, having neither the knowledge nor the chanceââ¬âââ¬âor, sometimes, even the rightââ¬âââ¬âto alter publicly posted comments provided by their customers. Wikipedia, for example, expressly forbids the participation of ? ms in its online community. Such an evolution may not be surprising. After all, the Internet started out as nothing more than a giant Bulletin Board System (BBS) that allowed users to exchange software, data, messages, and news with each other. The late 1990s saw a popularity surge in homepages, whereby the Average Joe could share information about his private life; todayââ¬â¢s equivalent would be the weblog, or blog. The era of corporate web pages and e-commerce started relatively recently with the launch of Amazon and eBay in 1995, and got a right ticking-off only 6 years later when the dot-com bubble burst in 2001. The current trend toward Social Media can therefore be seen as an evolution back to the Internetââ¬â¢s roots, since it retransforms the World Wide Web to what it was initially created for: a platform to facilitate information exchange between users. But does that mean that Social Media is just old wine in new bottles? Probably not! As we will delve into further, the technical advances that have been made over the past 20 years now enable a form of virtual content sharing that is fundamentally different from, and more powerful than, the BBS of the late 1970s. This article discusses the challenges and opportunities that emerge from this evolution for ? rms, and provides structure to better understand the rapidly evolving ? eld of Social Media. We begin by providing a de? nition and classi? cation of Social Media by looking at their historical roots, technical speci? cities, and differences from other entities such as Web 2. 0 and User Generated Content. We then focus on six types of Social Mediaââ¬âââ¬âcollaborative projects, blogs, A. M. Kaplan, M. Haenlein content communities, social networking sites, virtual game worlds, and virtual social worldsââ¬âââ¬âand present ways in which companies can ef? iently make use of these applications. Based on this analysis, we then derive a set of 10 recommendations companies should follow when thinking about developing their own Social Media strategy, be it with respect to these aforementioned types or other applications which might emerge in the future. 2. What is Social Mediaââ¬â ââ¬âAnd what is it not? As highlighted, the idea behind Social Media is far from groundbreaking. Nevertheless, there seems to be confusion among managers and academic researchers alike as to what exactly should be included under this term, and how Social Media differ from the seemingly-interchangeable related concepts of Web 2. and User Generated Content. It therefore makes sense to take a step back and provide insight regarding where Social Media come from and what they include. By 1979, Tom Truscott and Jim Ellis from Duke University had created the Usenet, a worldwide discussion system that allowed Internet users to post public messages. Yet, the era of Social Media as we understand it today probably started about 20 years earlier, when Bruce and Susan Abelson founded ââ¬Ëââ¬ËOpen Diary,ââ¬â¢Ã¢â¬â¢ an early social networking site that brought together online diary writers into one community. The term ââ¬Ëââ¬Ëweblogââ¬â¢Ã¢â¬â¢ was ? st used at the same ti me, and truncated as ââ¬Ëââ¬Ëblogââ¬â¢Ã¢â¬â¢ a year later when one blogger jokingly transformed the noun ââ¬Ëââ¬Ëweblogââ¬â¢Ã¢â¬â¢ into the sentence ââ¬Ëââ¬Ëwe blog. ââ¬â¢Ã¢â¬â¢ The growing availability of high-speed Internet access further added to the popularity of the concept, leading to the creation of social networking sites such as MySpace (in 2003) and Facebook (in 2004). This, in turn, coined the term ââ¬Ëââ¬ËSocial Media,ââ¬â¢Ã¢â¬â¢ and contributed to the prominence it has today. The most recent addition to this glamorous grouping has been so-called ââ¬Ëââ¬Ëvirtual worldsââ¬â¢Ã¢â¬â¢: computerbased simulated environments inhabited by threedimensional avatars. Perhaps the best known virtual world is that of Linden Labââ¬â¢s Second Life (Kaplan Haenlein, 2009c). Although the list of the aforementioned applications may give some idea about what is meant by Social Media, a formal de? nition of the term ? rst requires drawing a line to two related concepts that are frequently named in conjunction with it: Web 2. 0 and User Generated Content. Web 2. 0 is a term that was ? rst used in 2004 to describe a new way in which software developers and end-users started to Users of the world, unite! The challenges and opportunities of Social Media utilize the World Wide Web; that is, as a platform whereby content and applications are no longer created and published by individuals, but instead are continuously modi? ed by all users in a participatory and collaborative fashion. While applications such as personal web pages, Encyclopedia Britannica Online, and the idea of content publishing belong to the era of Web 1. 0, they are replaced by blogs, wikis, and collaborative projects in Web 2. 0. Although Web 2. 0 does not refer to any speci? technical update of the World Wide Web, there is a set of basic functionalities that are necessary for its functioning. Among them are Adobe Flash (a popular method for adding animation, interactivity, and audio/video streams to web pages), RSS (Really Simple Syndication, a family of web feed formats used to publish frequently updated content, such as blog entries or news headlines, in a standardized format), and AJAX (Asynchronous Java Script, a technique to retrieve data from web servers asynchronously, allowing the update of web content without interfering with the display and behavior of the whole page). For the purpose of our article, we consider Web 2. 0 as the platform for the evolution of Social Media. When Web 2. 0 represents the ideological and technological foundation, User Generated Content (UGC) can be seen as the sum of all ways in which people make use of Social Media. The term, which achieved broad popularity in 2005, is usually applied to describe the various forms of media content that are publicly available and created by end-users. According to the Organisation for Economic Cooperation and Development (OECD, 2007), UGC needs to ful? l three basic requirements in order to be considered as such: ? rst, it needs to be published either on a publicly accessible website or on a social networking site accessible to a selected group of people; second, it needs to show a certain amount of creative effort; and ? nally, it needs to have been created outside of professional routines and practices. The ? rst condition excludes content exchanged in e-mails or instant messages; the second, mere replications of already existing content (e. g. , posting a copy of an existing newspaper article on a personal blog without any modi? ations or commenting); and the third, all content that has been created with a commercial market context in mind. While UGC has already been available prior to Web 2. 0, as discussed above, the combination of technological drivers (e. g. , increased broadband availability and hardware capacity), economic drivers (e. g. , increased availability of tools for the creation of UGC), and social drivers (e. g. , rise of a generation of ââ¬Ëââ¬Ëdigital nativesââ¬â¢Ã¢â¬â¢ and ââ¬Ëââ¬Ëscreenagersââ¬â¢Ã¢â¬â¢: younger age groups with substantial technical knowledge and 1 willingness to engage online) make UGC nowadays fundamentally different from what was observed in the early 1980s. Based on these clari? cations of Web 2. 0 and UGC, it is now straightforward to give a more detailed de? nition of what we mean by Social Media. I n our viewââ¬âââ¬âand as used hereinââ¬âââ¬âSocial Media is a group of Internet-based applications that build on the ideological and technological foundations of Web 2. 0, and that allow the creation and exchange of User Generated Content. Within this general de? ition, there are various types of Social Media that need to be distinguished further. However, although most people would probably agree that Wikipedia, YouTube, Facebook, and Second Life are all part of this large group, there is no systematic way in which different Social Media applications can be categorized. Also, new sites appear in cyberspace every day, so it is important that any classi? cation scheme takes into account applications which may be forthcoming. To create such a classi? cation scheme, and to do so in a systematic manner, we rely on a set of theories in the ? ld of media research (social presence, media richness) and social processes (self-presentation, self-disclosure), the two key elemen ts of Social Media. Regarding the media-related component of Social Media, social presence theory (Short, Williams, Christie, 1976) states that media differ in the degree of ââ¬Ëââ¬Ësocial presenceââ¬â¢Ã¢â¬â¢Ã¢â¬âââ¬âde? ned as the acoustic, visual, and physical contact that can be achievedââ¬âââ¬âthey allow to emerge between two communication partners. Social presence is in? uenced by the intimacy (interpersonal vs. mediated) and immediacy (asynchronous vs. ynchronous) of the medium, and can be expected to be lower for mediated (e. g. , telephone conversation) than interpersonal (e. g. , face-to-face discussion) and for asynchronous (e. g. , e-mail) than synchronous (e. g. , live chat) communications. The higher the social presence, the larger the social in? uence that the communication partners have on each otherââ¬â¢s behavior. Closely related to the idea of social presence is the concept of media richness. Media richness theory (Daft Lengel, 1986) is based on the assumption that the goal of any communication is the resolution of ambiguity and the reduction of uncertainty. It states that media differ in the degree of richness they possessââ¬âââ¬âthat is, the amount of information they allow to be transmitted in a given time intervalââ¬âââ¬âand that therefore some media are more effective than others in resolving ambiguity and uncertainty. Applied to the context of Social Media, we assume that a ? rst classi? cation can be made based on the richness of the medium and the degree of social presence it allows. With respect to the social dimension of Social Media, the concept of self-presentation states that 2 in any type of social interaction people have the desire to control the impressions other people form of them (Goffman, 1959). On the one hand, this is done with the objective of in? uencing others to gain rewards (e. g. , make a positive impression on your future in-laws); on the other hand, it is driven by a wish to create an image that is consistent with oneââ¬â¢s personal identity (e. g. , wearing a fashionable out? t in order t o be perceived as young and trendy). The key reason why people decide to create a personal webpage is, for example, the wish to present themselves in cyberspace (Schau Gilly, 2003). Usually, such a presentation is done through self-disclosure; that is, the conscious or unconscious revelation of personal information (e. g. , thoughts, feelings, likes, dislikes) that is consistent with the image one would like to give. Self-disclosure is a critical step in the development of close relationships (e. g. , during dating) but can also occur between complete strangers; for example, when speaking about personal problems with the person seated next to you on an airplane. Applied to the context of Social Media, we assume that a second classi? ation can be made based on the degree of self-disclosure it requires and the type of self-presentation it allows. Combining both dimensions leads to a classi? cation of Social Media which we have visualized in Table 1. With respect to social presence and media richness, applications such as collaborative projects (e. g. , Wikipedia) and blogs score lowest, as they are often text-based and hence only allow for a relatively simple exch ange. On the next level are content communities (e. g. , YouTube) and social networking sites (e. g. Facebook) which, in addition to text-based communication, enable the sharing of pictures, videos, and other forms of media. On the highest level are virtual game and social worlds (e. g. , World of Warcraft, Second Life), which try to replicate all dimensions of face-to-face interactions in a virtual environment. Regarding self-presentation and self-disclosure, blogs usually score higher than collaborative projects, as the latter tend to be focused on speci? c content domains. Table 1. A. M. Kaplan, M. Haenlein In a similar spirit, social networking sites allow for more self-disclosure than content communities. Finally, virtual social worlds require a higher level of self-disclosure than virtual game worlds, as the latter are ruled by strict guidelines that force users to behave in a certain way (e. g. , as warriors in an imaginary fantasy land). We will now provide more detail on each of these six different types of Social Media, and discuss the challenges and opportunities they offer companies. 3. The challenges and opportunities of Social Media 3. 1. Collaborative projects Collaborative projects enable the joint and simultaneous creation of content by many end-users and are, in this sense, probably the most democratic manifestation of UGC. Within collaborative projects, one differentiates between wikisââ¬âââ¬âthat is, websites which allow users to add, remove, and change text-based contentââ¬âââ¬âand social bookmarking applicationsââ¬âââ¬âwhich enable the group-based collection and rating of Internet links or media content. Exemplary applications within this category include the online encyclopedia Wikipedia, a wiki currently available in more than 230 different languages, and the social bookmarking web service Delicious, which allows the storage and sharing of web bookmarks. The main idea underlying collaborative projects is that the joint effort of many actors leads to a better outcome than any actor could achieve individually; this is similar to the ef? cient-market hypothesis in behavioral ? nance (Fama, 1970). From a corporate perspective, ? rms must be aware that collaborative projects are trending toward becoming the main source of information for many consumers. As such, although not everything written on Wikipedia may actually be true, it is believed to be true by more and more Internet users. This may be particularly crucial as regards corporate crises. For example, Classi? ation of Social Media by social presence/media richness and self-presentation/self-disclosure Users of the world, unite! The challenges and opportunities of Social Media when online book retailer Amazon started to test the idea of dynamic pricing, comments declaring such a practice as unfair showed up instantaneously under the Wikipedia entry on ââ¬Ëââ¬Ëtime-based prici ng. ââ¬â¢Ã¢â¬â¢ Yet, collaborative projects also provide some unique opportunities for ? rms. Finnish handset manufacturer Nokia, for instance, uses internal wikis to update employees on project status and to trade ideas, which are used by about 20% of its 68,000 staff members. Likewise, American computer software company Adobe Systems maintains a list of bookmarks to company-related websites and conversations on Delicious. 63 3. 3. Content communities The main objective of content communities is the sharing of media content between users. Content communities exist for a wide range of different media types, including text (e. g. , BookCrossing, via which 750,000+ people from over 130 countries share books), photos (e. g. , Flickr), videos (e. g. , YouTube), and PowerPoint presentations (e. g. , Slideshare). Users on content communities are not required to create a personal pro? e page; if they do, these pages usually only contain basic information, such as the date they joined the community and the number of videos shared. From a corporate viewpoint, content communities carry the risk of being used as platforms for the sharing of copyright-protected materials. While major content communities have rules in place to ban and remove such illegal content, it is dif? cult to avoid popular videosââ¬âââ¬âsuch as recent episodes of comedy dramasââ¬âââ¬âbeing uploaded to YouTube only hours after they have been aired on television. On the positive side, the high popularity of content communities makes them a very attractive contact channel for many ? rms; this is easy to believe when one considers that YouTube serves over 100 million videos per day. In 2007, Procter Gamble organized a contest for its over-the-counter drug Pepto-Bismol, whereby users were encouraged to upload to YouTube 1-minute videos of themselves singing about the ailments Pepto-Bismol counteracts, including heartburn and nausea. In a similar spirit, kitchen appliances manufacturer Blendtec became popular for its bevy of inexpensive ââ¬Ëââ¬ËWill it blend? ââ¬â¢ videos, which have been watched by millions of people. Other ? rms, such as Cisco and Google, rely on content communities to share recruiting videos, as well as keynote speeches and press announcements, with their employees and investors. 3. 2. Blogs Blogs, which represent the earliest form of Social Media, are special types of websites that usually display date-stamped entri es in reverse chronological order (OECD, 2007). They are the Social Media equivalent of personal web pages and can come in a multitude of different variations, from personal diaries describing the authorââ¬â¢s life to summaries of all relevant information in one speci? content area. Blogs are usually managed by one person only, but provide the possibility of interaction with others through the addition of comments. Due to their historical roots, text-based blogs are still by far the most common. Nevertheless, blogs have also begun to take different media formats. For example, San Francisco-based Justin. tv allows users to create personalized television channels via which they can broadcast images from their webcam in real time to other users. Many companies are already using blogs to update employees, customers, and shareholders on developments they consider to be important. Jonathan Schwartz, CEO of Sun Microsystems, maintains a personal blog to improve the transparency of his company; so does automotive giant General Motors. Yet, as is the case with collaborative projects, blogs do not come without risks. These generally present in two fashions. First, customers whoââ¬âââ¬âfor one reason or anotherââ¬âââ¬âturn out to be dissatis? ed with or disappointed by the companyââ¬â¢s offerings may decide to engage in virtual complaints in the form of protest websites or blogs (Ward Ostrom, 2006), which results in the availability of potentially damaging information in online space. Second, once ? rms encourage employees to be active on blogs, they may need to live with the consequences of staff members writing negatively about the ? rm. Microsoftââ¬â¢s former ââ¬Ëââ¬Ëtechnical evangelistââ¬â¢Ã¢â¬â¢ Robert Scoble, for example, had a tendency to ? ercely criticize the products of his employerââ¬âââ¬â before he decided to leave the Redmond-based software company in 2006. 3. 4. Social networking sites Social networking sites are applications that enable users to connect by creating personal information pro? les, inviting friends and colleagues to have access to those pro? es, and sending e-mails and instant messages between each other. These personal pro? les can include any type of information, including photos, video, audio ? les, and blogs. According to Wikipedia, the largest social networking sites are U. S. -based Facebook (initially founded by Mark Zuckerberg to stay in touch with his fellow students from Harvard University) and MySpace (with 1,500 employees and more than 250 million registered users). Social networking sites are of such high popularity, speci? cally among younger Internet 4 users, that the term ââ¬Ëââ¬ËFacebook addictââ¬â¢Ã¢â¬â¢ has been included in the Urban Dictionary, a collaborative project focused on developing a slang dictionary for the English language. Several companies are already using social networking sites to support the creation of brand communities (Muniz Oââ¬â¢Guinn, 2001) or for marketing research in the context of netnography (Kozinets, 2002). To promote the movie ââ¬Ëââ¬ËFred Claus,ââ¬â¢Ã¢â¬â¢ a 2007 Christmas comedy ? lm, Warner Brothers created a Facebook pro? le via which visitors could watch trailers, download graphics, and play games. Likewise, the Adidas custom soccer community on MySpace allows visitors to associate themselves with one of two brands of elite soccer cleats produced by the German sports apparel manufacturer, and to access product reviews and information on professional soccer players who play using ââ¬Ëââ¬Ëtheirââ¬â¢Ã¢â¬â¢ shoes. Some ? rms even go one step further and use Facebook as a distribution channel. Consider U. S. -based ? orist 1-800-Flowers. com, which offers a widget on Facebook called ââ¬Ëââ¬ËGimme Loveââ¬â¢Ã¢â¬â¢ whereby users can send ââ¬Ëââ¬Ëvirtual bouquetsââ¬â¢Ã¢â¬â¢ to friends or, with a click of the mouse, be directly transferred to the companyââ¬â¢s website to send real ? wers. A. M. Kaplan, M. Haenlein hunterââ¬âââ¬âstarts to more and more closely resemble their real life personality. Besides their use for ingame advertising (similar in idea to product placement in blockbuster movies), the high popularity of virtual game worlds can also be leveraged in more traditional communication campaigns. Japanese automotive giant Toyota, for example, used pictures and mechanics from the World of Warcraft application in its latest Tundra commercial to reach the 2. 5 million players in the U. S. lone. 3. 6. Virtual social worlds The second group of virtual worlds, often referred to as virtual social worlds, allows inhabitants to choose their behavior more freely and essentially live a virtual life similar to their real life. As in virtual game worlds, virtual social world users appear in the form of avatars and interact in a three-dimensional virtual environment; however, in this realm, there are no rules restricting the range of possible interactions, except for basic physical laws such as gravity. This allows for an unlimited range of self presentation strategies, and it has been shown that with increasing usage intensity and consumption experience, users of virtual social worldsââ¬âââ¬âor ââ¬Ëââ¬Ëresidents,ââ¬â¢Ã¢â¬â¢ as they prefer to be calledââ¬âââ¬âshow behavior that more and more closely mirrors the one observed in real life settings (Haenlein Kaplan, 2009; Kaplan Haenlein, 2009a, 2009b). Arguably, the most prominent example of virtual social worlds is the Second Life application, founded and managed by the San Francisco-based company Linden Research Inc. Besides doing everything that is possible in real life (e. g. , speaking to other avatars, taking a walk, enjoying the virtual sunshine), Second Life also allows users to create content (e. g. , to design virtual clothing or furniture items) and to sell this content to others in exchange for Linden Dollars, a virtual currency traded against the U. S. Dollar on the Second Life Exchange. Some residents are so successful in this task that the virtual money earned that way complements their real life income. Virtual social worlds offer a multitude of opportunities for companies in marketing (advertising/communication, virtual product sales/v-Commerce, marketing research), and human resource and internal process management; for a more detailed discussion, see Kaplan and Haenlein (2009c). 3. 5. Virtual game worlds Virtual worlds are platforms that replicate a threedimensional environment in which users can appear in the form of personalized avatars and interact with each other as they would in real life. In this sense, virtual worlds are probably the ultimate manifestation of Social Media, as they provide the highest level of social presence and media richness of all applications discussed thus far. Virtual worlds come in two forms. The ? rst, virtual game worlds, require their users to behave according to strict rules in the context of a massively multiplayer online role-playing game (MMORPG). These applications have gained popularity in recent years, as standard game consolesââ¬âââ¬âsuch as Microsoftââ¬â¢s X-Box and Sonyââ¬â¢s PlayStationââ¬âââ¬ânow allow simultaneous play among a multitude of users around the globe. Examples of virtual game worlds include the cod-medieval ââ¬Ëââ¬ËWorld of Warcraft,ââ¬â¢Ã¢â¬â¢ which counts around 8. 5 million subscribers who explore the virtual planet of Azeroth in the form of humans, dwarves, orcs, or night elves, to ? ght monsters or to search for treasure; and Sonyââ¬â¢s EverQuest, in which 16 different races of players (e. g. , wizards, clerics) travel the fantasy world of Norrath. The rules of such games usually limit the degree of self-presentation and self-disclosure possible, although some users spend so much time with these applications that their characterââ¬âââ¬âbe it a warrior, a wizard, or a dragon . Ten pieces of advice for companies deciding to use Social Media Social Media is a very active and fast-moving domain. What may be up-to-date today could have Users of the world, unite! The challenges and opportunities of Social Media disappeared from the virtual landscape tomorrow. It is therefore crucial for ? rms to have a set of guidelines that can be applied to any form of Social Media, whether they are part of the aforementioned list or not. Next, we provide such a set of recommendations. Given that Social Media have both a social- and a media-component, we split our advice into two sections: ? e points about using media and ? ve points about being social. 65 4. 1. Five points about using media 4. 1. 1. Choose carefully There are dozensââ¬âââ¬âif not hundredsââ¬âââ¬âof Social Media applications, and new ones are appearing on the horizon every day. If you still need time to run your core business, you simply cannot participate in them all, especially since ââ¬Ëââ¬Ëbeing activeââ¬â¢Ã¢â¬â¢ is one key requirement of success (see below). Choosing the right medium for any given purpose depends on the target group to be reached and the message to be communicated. On the one hand, each Social Media application usually attracts a certain group of people and ? rms should be active wherever their customers are present. For example, if your main target audience is book lovers, a content community via which users share self-written novels or poems is likely better suited to your purpose than a virtual world which centers on ? ghting dragons and ? nding treasures. On the other hand, there may be situations whereby certain features are necessary to ensure effective communication, and these features are only offered by one speci? c application. For example, when the U. S. Army undertook an initiative in 2007 to reach the Hispanic community, it decided to utilize the social networking site Univision rather than the more popular Facebook. This choice was driven in part by the fact that Univisionââ¬âââ¬âa Spanish-language television network in the U. S. and Puerto Ricoââ¬âââ¬âis the social networking application with the largest Latin American audience, due to an extensive range of telenovelas and Mexican programs produced by Grupo Televisa. However, another reason Univision was chosen is because it offers a moderating service which checks comments from users for appropriateness before posting them on the site. In contrast, other applications, including Facebook, allow users to post messages without supervision. 4. 1. 2. Pick the application, or make your own Once you know which game youââ¬â¢re playing, the next decision involves whether to make or buy. In some cases, it might just be best to join an existing Social Media application and bene? t from its popularity and user base. After all, there is no need to reinvent the wheel if somebody has already done it, especially given that Social Media show positive network externalities in the sense that they get more attractive to join the more participants they already have. But in some cases, the right application might just not be available yet. Japanââ¬â¢s Fuji? lm, for example, recently launched its own social network to build a community of photo enthusiasts. In a similar spirit, U. S. -based department store ? rm Sears collaborated with MTV music television to create a social network around back-to-school shopping. Yet, whatever the ultimate decisionââ¬âââ¬âto buy, make, or bothââ¬âââ¬â it is vital that there is an understanding of the basic idea behind Social Media. Itââ¬â¢s all about participation, sharing, and collaboration, rather than straightforward advertising and selling. 4. 1. 3. Ensure activity alignment Sometimes you may decide to rely on various Social Media, or a set of different applications within the same group, in order to have the largest possible reach. In this case, it is crucial to ensure that your Social Media activities are all aligned with each other. A prime example in this context is computer manufacturer Dell and its ââ¬Ëââ¬ËDigital Nomadsââ¬â¢Ã¢â¬â¢ campaign. Dell uses a combination of social networking sites (Facebook, LinkedIn), blogs, and content communities (YouTube videos) to show how its range of laptop computers enable individuals to become a nomadic mobile workforce. In a similar spirit, Chryslerââ¬â¢s Jeep brand connects with its customers by combining photos shared on the content community Flickr, with groups on social networking sites such as MySpace and Facebook. Using different contact channels can be a worthwhile and pro? table strategy. But remember: one goal of communication is the resolution of ambiguity and reduction of uncertainty, and nothing is more confusing than contradicting messages across different channels. 4. 1. 4. Media plan integration What is true for different types of Social Media also holds for the relationship between Social Media and traditional media: Integration is key! While you may consider these two arenas to be completely different, in customersââ¬â¢ eyes they are both part of the same: your corporate image. Consider the actions of soft drink giant Coca-Cola. In June 2006, a pair of performance artists shot a video featuring a series of geysers they created by dropping Mentos brand mints into 2-liter bottles of Coke; the clip became a major hit on YouTube. Realizing customersââ¬â¢ enthusiasm for this performance, Coca-Cola fostered the sensation by airing the video on late-night television and ensuring broad digital distribution across different content communities. Besides the advantage of 66 high impact/low cost media coverage, the campaign also resulted in a measurable sales uplift. 4. 1. 5. Access for all Although this might sound elementary, once the ? rm has decided to utilize Social Media applications, it is worth checking that all employees may actually access them. Commonly, ? rms block Facebook, YouTube, and Second Life on corporate PCs for fear that staff might spend too much time networking instead of working. While this is certainly a consideration, it cannot imply that employees must have special permission to be able to access the company blog. At the same time, there is a need to curtail the possibility of the entire organization spending all its time producing funny videos and uploading them to YouTube. One possible approach involves de? ning groups of employees whose primary objective is the management of corporate Social Media; all other staff members are treated as occasional participants. Under this scenario, the ? rst group is given administrator rightsââ¬âââ¬âwhich allows the opening of new discussion threads and deletion of inappropriate postsââ¬âââ¬âwhile the second group is not. Also, at some point, it will be necessary to develop certain guidelines for Social Media usage; as done, for instance, by ââ¬Ëââ¬ËBig Blueââ¬â¢Ã¢â¬â¢ IBM, which has a corporate charta for appropriate behavior within Second Life. For example, it is important to highlight that every employee needs to identify himself or herself as such when posting a comment on the corporate blog. Otherwise, end-consumers could get the impression that anonymous accounts are used to enable employees to post fake messages and overly-positive feedback, which could severely damage the credibility of your whole Social Media campaign. A. M. Kaplan, M. Haenlein elseââ¬â¢s than it is about engaging others in open and active conversation. Participants on Social Media applications have the desire to actively engage and to become both producers and consumers of information, so-called ââ¬Ëââ¬Ëprosumersââ¬â¢Ã¢â¬â¢ (Tof? er, 1980). Be considerate of this need and act accordingly. 4. 2. 2. Be interesting Letââ¬â¢s face it: nobody is interested in speaking to a boring person. As such, if you would like your customers to engage with you, you need to give them a reason for doing soââ¬âââ¬âone which extends beyond saying you are the best airline in town, or manufacture the most robust kitchen blender. The ? st step is to listen to your customers. Find out what they would like to hear; what they would like to talk about; what they might ? nd interesting, enjoyable, and valuable. Then, develop and post content that ? ts those expectations. Coffee powerhouse Starbucks, for example, created the ââ¬Ëââ¬ËMy Starbucks I deaââ¬â¢Ã¢â¬â¢ platform, via which customers can submit new ideas for the company. These ideas are subsequently voted on by other users, with the winners being considered for implementation by Starbucks top management. As stated by Oscar Wilde in his novel, The Picture of Dorian Grey: The one sin for which there is no forgiveness is ennui. . 2. 3. Be humble Never forget that Social Media existed before you decided to engage in them; indeed, in many cases, even before you knew about their existence. In this light, do not expect that you know better how to use them than others who have spent countless hours on Facebook or Second Life, for example. Before you enter any application, ? rst take some time to discover it and to learn about its history and basic rules. Only once you have gained the necessary understanding, start to participate. When aerospace and defense ? rm Boeing decided to launch its ? st corporate blog, the site was designed such that users were not allowed to com ment on what they saw. Yet, interaction and feedback are critical elements of all Social Media, blogs included. Hence, many readers perceived the Boeing blog as a fake, and simply corporate advertising in disguise. If there is one certain path to failure, it involves thinking that Social Media is just about posting existing TV spots on YouTube or putting prefabricated press announcements on corporate blogs. 4. 2. 4. Be unprofessional Have you ever noticed that in Hollywood blockbuster ? ms, itââ¬â¢s not usually the handsome guy who ends up with the girl, but rather the clumsy, charming one? The same goes for Social Media, and ? rms 4. 2. Five points about being social 4. 2. 1. Be active If you want to develop a relationship with someone, it is always advisable to take the lead and to be active. Social Media are all about sharing and interaction, so ensure that your content is always fresh and that you engage in discussions with your customers. Consider the aforementioned blog kep t by Sun Microsystems CEO Jonathan Schwartz. Via this outlet, the ? urehead discussesââ¬âââ¬âon an ongoing basisââ¬âââ¬âhis corporate strategy, new product development projects, and company values, and replies directly to correspondence received. In considering your Social Media efforts, be aware that ? rm involvement must extend beyond responding to negative comments and defending product offerings. Social Media is less about explaining why your baking mix, detergent, or shampoo is better than anyone Users of the world, unite! The challenges and opportunities of Social Media would be wise to avoid overly-professional content offerings. Thereââ¬â¢s no need to spend $100,000 to design the perfect MySpace presence, or hire a professional writer to manage your corporate blog. Instead, try to blend in with other users and donââ¬â¢t be afraid to make mistakes! Bill Marriott, Chairman and CEO of the Marriott International Hotel chain, uses his blog, for example, to post regular updates and stories from his travels to Marriott properties around the worldââ¬âââ¬âvery much in the same way as would a work colleague when describing her last vacation. Social Media users are people like you, who understand that things do not always go smoothly. And, if youââ¬â¢re nice to them, they may even give you free advice on how to do it better the next time. 4. 2. 5. Be honest Last but not least, be honest and respect the rules of the game. Some Social Mediaââ¬âââ¬âsuch as Wikipediaââ¬âââ¬â may not allow companies to be involved, so do not try to force your way in. Consider Anheuser-Busch, owner of SeaWorld marine mammal parks. Anheuser-Busch tried to ââ¬Ëââ¬Ërectifyââ¬â¢Ã¢â¬â¢ misleading information on Wikipedia through the use of PR ? rms, and failed miserably at it. Never expect that other participants may not ? d out who stands behind some anonymous user account; after all, youââ¬â¢re dealing with some of the most technologically sophisticated people on the planet. 67 5. Nothing to lose but their chains Today, everything is about Social Media. Some industry gurus claim that if you do not participate in Facebook, YouTube, and Second Life, you are not part of cyberspace anymore. Social Media allow ? rms to engage in timely and direct end-consumer contact at relatively low cost and higher levels of ef? ciency than can be achieved with more traditional communication tools. This makes Social Media not only relevant for large multinational ? rms, but also for small and medium sized companies, and even nonpro? t and governmental agencies. Using Social Media is not an easy task and may require new ways of thinking, but the potential gains are far from being negligible. Dell, for example, states that its use of Twitterââ¬âââ¬âa micro blogging application that allows sending out short, text-based posts of 140 characters or lessââ¬âââ¬âhas generated $1 million in incremental revenue due to sales alerts. Some ? ms may even be too successful for their own good, as illustrated by Burger Kingââ¬â¢s ââ¬Ëââ¬ËWhopper Sacri? ceââ¬â¢Ã¢â¬â¢ campaign: In December 2008, the fast food giant developed a Facebook application which gave users a free Whopper sandwich for every 10 friends they deleted from their Facebook network. The campaign was adopted by over 20,000 users, resulting in the sacri? cing of 233,906 friends in exchange for free bur gers. Only one month later, in January 2009, Facebook shut down Whopper Sacri? ce, citing privacy concerns. Who would have thought that the price of a friendship is less than $2 a dozen? A new trend is on the horizon, though; Watch out for Mobile Social Media! Mobile Web 2. 0 is very similar to Web 2. 0, as discussed earlier. In contrast to its predecessor Mobile Web 1. 0, which relied on proprietary protocols (e. g. , WAP) and use-based pricing, Mobile Web 2. 0 is characterized by open standards (e. g. , a transition to the TCP/IP protocol, the technical foundation of the World Wide Web) and ? at-rate systems. Even the manual entry of web addresses using small and dif? cult-to-handle keyboards is becoming history. Soon, all items around you will be equipped with Radio Frequency Identi? cation (RFID) tags that will be able to automatically connect to your mobile phone and send URLs to them, similar to todayââ¬â¢s text messages. This technical evolution is laying the groundwork for moving Social Media applications away from desktop PCs and laptops, toward mobile devices. Why log into Facebook if you can easily update all your friends using Twitter? Why wait until you return home to watch the new YouTube video if you can do so conveniently on your iPhone? According to Jupiter Research, the market for Mobile Web 2. evolutions will grow from a mere $5. 5 billion today to an impressive $22. 4 billion by 2013. Mobile Social Media applications are expected to be the main driver of this evolution, soon accounting for over 50% of the market. In one way, this surge toward Mobile Social Media can even be seen as another step toward Internet democratization and closing the digital divide between develop ed and emerging countries. In India, for example, mobile phones outnumber PCs by 10 to 1. In Thailand, only 13% of the population owns a computer, versus 82% who have access to a mobile phone. It is therefore not surprising that the Pew Research Centerââ¬âââ¬âa Washington-based think tankââ¬âââ¬âestimates that by 2020, a mobile device will be the primary Internet connection tool for most people in the world. Making Social Media applications mobile is likely to tap a currently unexploited base of new users. Even if percapita spending in these countries may still be low, vast population numbers make them relevant for virtually any ? rm. Obviously, Mobile Social Media does not come without a price. Some would argue that while it enables the detailed following of friends half-way across the world, it can foster a society where we donââ¬â¢t now the names of our own next-door neighbors. Be that as it may, and independent of 68 whether or not one approves of such an evolution, it seems undisputable that (Mobile) Social Media will be the locomotive via which the World Wide Web evolves. Businesses, take noteââ¬âââ¬âand donââ¬â¢t miss this train! A. M. Kaplan, M. Haenlein Kaplan, A. M. , Haenlein, M. (2009b). Consumers, companies, and virtual social worlds: A qualitative analysis of Second Life. Advances in Consumer Research, 36(1), 873ââ¬â874. Kaplan, A. M. , Haenlein, M. (2009c). The fairyland of Second Life: About virtual social worlds and how to use them. Business Horizons, 52(6), 563ââ¬â572. Kozinets, R. V. (2002). The ? eld behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61ââ¬â72. Muniz, A. M. , Oââ¬â¢Guinn, T. C. (2001). Brand community. Journal of Consumer Research, 27(4), 412ââ¬â432. OECD. (2007). Participative web and user-created content: Web 2. 0, wikis, and social networking. Paris: Organisation for Economic Co-operation and Development. Schau, H. J. , Gilly, M. C. (2003). We are what we post? Selfpresentation in personal web space. Journal of Consumer Research, 30(3), 385ââ¬â404. Short, J. , Williams, E. , Christie, B. (1976). The social psychology of telecommunications. Hoboken, NJ: John Wiley Sons, Ltd. Tof? er, A. (1980). The third wave: The classic study of tomorrow. New York: Bantam Books. Ward, J. C. , Ostrom, A. L. (2006). Complaining to the masses: The role of protest framing in customer-created complaint web sites. Journal of Consumer Research, 33(2), 220ââ¬â230. References Daft, R. L. , Lengel, R. H. (1986). Organizational information requirements, media richness, and structural design. Management Science, 32(5), 554ââ¬â571. Fama, E. F. (1970). Ef? cient capital markets: A review of theory and empirical work. Journal of Finance, 25(2), 383ââ¬â417. Goffman, E. (1959). The presentation of self in everyday life. New York: Doubleday Anchor Books. Haenlein, M. , Kaplan, A. M. (2009). Flagship brand stores within virtual worlds: The impact of virtual store exposure on real life brand attitudes and purchase intent. Recherche et Applications en Marketing 24(3). Kaplan, A. M. , Haenlein, M. (2009a). Consumer use and business potential of virtual worlds: The case of Second Life. The International Journal on Media Management 11(3).
Subscribe to:
Comments (Atom)