Saturday, May 23, 2020

Women As Represented In Society By Anita Kay...

In Men and Women as Represented in Medieval Literature in Society by Anita Kay OPry-Reynolds-Renolds you can find a different way of how women men were supposed to act during the Medieval time period. She finds evidence from different Medieval works of literatures to help support her thesis. OPry-Reynolds uses some details from Beowulf, Lancelot, Knight of the Cart, and Sir Gawain and The Green Knight to show the different gender roles between men and women. The details OPry-Reynolds finds from the different Medieval literatures in her essay are not supported in The Prologue to The Canterbury Tales and The Wife of Bath. Anita Kay OPry-Renolds Men and Women as Represented in Medieval Literature in Society explains how men and†¦show more content†¦Chaucer writes about the Women from bath who had five husbands. It was very rare for women to have more than one husband because they didn’t believe in divorce. Men and women from the middle ages had different roles in society that they had to live up to. The gender rules they had to abide by was very strict. It was considered not normal to step outside of the bounds of the gender roles assigned to them. (OPry-Reynolds 41). It was not usual for women to do the roles of a man and vice versa. Just like in The Prologue to The Canterbury Tales the nun and the monk would never be caught doing each others job. The women in middle age were vessels of chastity, purity, and good ness. This meant that the ladies would not go lay in bed with any and every man they met. They would find the one and be loyal to him till death. The men during this time would go on quest to show off how strong they were. The supporting roles in Medieval literature for men and women had been very different. The men were always the ones looking for a battle to fight if not n their own village then in other lands. (OPry-Reynolds 38). Men could only be the heroes in Medieval Literature by who he is, his quest, and his victories (OPry-Reynolds 37). If this was not the case for some men they could not be heroes. In most Medieval Literature the women had roles that were just for support. They would be the characters

Monday, May 18, 2020

Abbreviations for Common Business Degrees

Business degree abbreviations can vary from school to school, but most educational institutions use a standard format. However, there are so many types of business degrees available—especially when it comes to graduate options—that it can be confusing what all the abbreviations stand for, especially when some are so similar (such as the EMS for Executive Master of Science and EMSM for Executive Master of Science in Management). Read on for a compilation of the most standard abbreviations and their meanings. Bachelors Degrees Bachelors degrees are undergraduate degrees. The Bachelor of Arts (BA) degree is more broadly focused on liberal arts, while the Bachelor of Science (BS) has a more targeted curriculum. The most common business-related bachelor degrees include: BA: Bachelor of ArtsBBA: Bachelor of Business Administration  BPA: Bachelor of Public AdministrationBS: Bachelor of ScienceBSB: Bachelor of Science in BusinessBSBA: Bachelor of Science in Business AdministrationBSc CIS: Bachelor of Computer Information Systems Executive  Degrees Executive degree programs are commonly designed for  working business professionals who want to advance their knowledge in general business (business administration) or in a particular area such as public administration, management, or taxation. Although many students in executive degree programs are already executives, not all work in a supervisory capacity—some students simply exhibit executive potential.  The most common executive degrees include: EMBA: Executive MBAEMIB: Executive Master if International BusinessEMPA: Executive Master of Public AdministrationEMS: Executive Master of ScienceEMSM: Executive Master of Science in ManagementEMSMOT: Executive Master of Science in Management of TechnologyEMST: Executive Master of Science in TaxationGEMBA: Global Executive Master of Business Administration Masters Degrees A masters degree is a graduate-level degree thats earned after completing undergraduate-level education. There are many specialized masters degrees in the business field. The most common include: IMBA: International MBAMAcc: Master of AccountancyMAIS: Master of Accounting and Information SystemsMBA: Master of Business Administration  MBE: Master of Business EducationMBI: Master of Business InformaticsMBS: Master of Business StudiesMFA: Master of Fine ArtsMHR: Master of Human ResourcesMHRM: Master of Human Resources ManagementMIA: Master of International AffairsMIAS: Master of International and Area StudiesMIB: Master of International BusinessMIM: Master of International ManagementMIS: Master of Information SystemsMISM: Master of Information Systems ManagementMMIS: Master of Management Information SystemsMMR: Master of Marketing ResearchMMS: Master of Management ScienceMNO: Master of Nonprofit OrganizationsMOD: Master of Science in Organizational DevelopmentMPA: Master of Public AdministrationMPAcc: Master of Professional AccountingMPIA: Master of Public and International AffairsMPL: Master of PlanningMPP: Master of Public PolicyMRED: Master of Real Estate DevelopmentMTAX: M aster of Taxation Master of Science Degrees Master of Science degrees, also known as MS degrees, are graduate-level degrees with a tightly focused track of study in a particular area such as accounting, finance, management, taxation, or real estate. The most common Master of Science degrees in the business field include: MSA: Master of Science in Accountancy (or Accounting)MSAIS: Master of Science in Accountancy Information SystemsMSAT: Master of Science in Accountancy, TaxationMSB: Master of Science in BusinessMSBA: Master of Science in Business AdministrationMSF: Master of Science in FinanceMSFA: Master of Science in Financial AnalysisMSFS: Master of Science in Foreign ServicesMSGFA: Master of Science in Global Financial AnalysisMSIB: Master of Science in International BusinessMSIM:  Master of Science in Industrial ManagementMSIS: Master of Science in Information SystemsMSITM: Master of Science in Information Technology ManagementMSM: Master of Science in ManagementMSMOT: Master of Science in Management of TechnologyMSOD: Master of Science in Organization DevelopmentMSRE: Master of Science in Real EstateMST: Master of Science in Taxation Exceptions to Standard Degree Abbreviations Although most business schools use the abbreviations above, there are some exceptions. For example, Harvard University follows the tradition of Latin degree names  for some of their undergraduate and graduate degrees, which means that the  degree abbreviations are reversed in comparison to what many of us are used to seeing in the United States. Here are a few examples: AB: This is the name for the Bachelor of Arts (BA) degree. AB stands for artium baccalaureus.SB:  This is the name for the Bachelor of Science (BS) degree.  SB stands for scientiae baccalaureus.AM: This is the equivalent of the Master of Arts (MA) degree. AM stands for artium magister.SM: This is the equivalent of the  Master of Science (MS) degree. SM stands for scientiae magister.

Monday, May 11, 2020

Who Invented the Street Sweeper Truck

We can thank Charles Brooks of Newark, New Jersey for the street sweeper trucks that he patented on March 17, 1896. He also patented a ticket punch design that would collect the chads rather than let them litter the ground. No biographical information can be found on him other than that he was a black man. Street sweeping was often a manual labor job in Brooks time. Keep in mind that horses and oxen were the main means of main transportation and where there is livestock, there is manure. So rather than stray litter as you might see today in the street, there were piles of manure that needed to be frequently removed regularly. In addition, garbage and the contents of chamber pots might end up in the gutter. The task of street sweeping was not carried out by mechanical equipment, but rather workers who roamed the street sweeping garbage up with a broom into a receptacle. It was the old fashioned way but it took a lot of labor, although it provided employment. The Self-Propelled Street Sweeper That changed some when mechanical street sweepers were invented by Joseph Whitworth in England C.S. Bishop in the United States. They were still drawn by horses as Bishops design was towed behind a horse. The improved design from Brooks was a truck with revolving brushes that swept the debris to a hopper. His truck had revolving brushes attached to the front fender and the brushes were interchangeable with scrapers that could be used in winter for snow removal. Brooks also designed an improved refuse receptacle for storing the collected garbage and litter as well as a wheel drive for the automatic turning of the brushes and for powering a lifting mechanism for the scrapers. Its not known whether his design was manufactured and marketed or whether he profited from it. The patent number 556,711 was issued on March 17, 1896. The motor driven pickup street sweeper was later developed by John M. Murphy for the Elgin Sweeper Company, which debuted in 1913. Ticket Punch Brooks also patented an early   version of the paper punch, also called a ticket punch. It was a ticket punch that had a built-in receptacle on one of the jaws to collect the round pieces of waste paper and prevent littering. The design will look very familiar to anyone who has used a scissors-like single hole punch. The patent Number 507,672 was issued on October 31, 1893. Ticket punches had existed before Brooks received his patent. As he says in the patent, The operation and construction of this form of punch are well known and require no detailed description. His improvement was the receptacle in the jaw that would collect the punched-out chads of paper. The removable receptacle had an aperture that was perfectly sized so the paper chad would enter the receptacle before being emptied into the trash when full. According to the patent says, The clippings from the tickets are prevented from flying over the floor and furniture of the car. If anything, it was one less annoying source of litter for the sweepers to deal with. There is no record of whether his invention was manufactured or marketed, but the chad-collecting receptacle is commonly seen on ticket punches today.

Wednesday, May 6, 2020

The Treaty Of Waitangi A Feature Of The New Zealand History

Part 1: The Treaty as a Feature of the New Zealand History The Treaty of Waitangi has always been Aotearoa, New Zealand’s founding document, however it’s status continues to change over time. Signed over 175 years ago, February 6th 1840, the document continues to cause much controversary and debate in its meaning and interpretation (Orange, 2011). It is the history that keeps repeating itself. During pre-colonisation of New Zealand, Britain entered partnership with Maori as protection from other colonisers and as help with legal trading according to British Maritime law. The treaty entered the scenario to concrete British Colonisation and secure this partnership. At this time, the treaty had begun a movement in Britain to acknowledge and regret the harmful effects of colonization they had seen in previous encounters. These good intentions were considered in the making of the treaty , but unfortunatley were addressed in a way that favoured the Crowns plans for New Zealand. Since then, this feature of New Zealand history has played a huge part in both negative and positive Maori -Pakeha relationships. The main principles of the Treaty were that the Crown has leadership and the only right to buy Maori land. The second idea was that the Tangata Whenua and their leadership was upheld and respected. The last section emphasised that Maori would gain all the rights that the Pakeha had. The controversary that has stirred up the country is the translation in the document. TheShow MoreRelatedNew Zealand s Constitutional Rules And Arrangements Essay1517 Words   |  7 Pagesfundamentals of New Zealand’s constitutional rules and arrangements. A constitution describes and establishes the major institutions of the government and endeavors to regulate the power that they hold. The main constitutional institutions in New Zealand that are subject to the constitution are the executive, the legislature, the judiciary and the Sovereign. The main features of New Z ealand’s constitution is that it is a monarchy, it is a parliamentary system of government, and it is a democracy. New Zealand’sRead MoreThe Treaty Of Waitangi And New Zealand Essay1555 Words   |  7 PagesIntroduction The Treaty of Waitangi is one of the most important documents in relation to New Zealand’s political and social history. It set out an important agreement between the British Crown and the native inhabitants of New Zealand, the Maori (Waitangi Tribunal, n.d.). This agreement established Crown rights over the land of New Zealand and, for the Maori, the guarantee of the protection of their interests as well as giving them the same rights as the British settlers (Ministry for Culture andRead MoreThe Treaty of Waitangi1113 Words   |  5 PagesThe Treaty of Waitangi is a very important document to New Zealand. It is an agreement that was drawn up by representatives of the British Crown and Maori Hapu and Iwi. It was first signed at the Bay of Islands on February 6th, 1840. There has been a lot of debate over the years about the translation of words between the English and Te Reo Maori versions of the text and the differences in the word meaning over the who languages. In this as signment I am going to cover the rights and responsibilitiesRead MoreThe And Status Of Te Reo M Ā Ori Essay2423 Words   |  10 PagesEssay The decline in the use and status of te reo MÄ ori is a legitimate concern in Aotearoa / New Zealand, and this essay will describe the historical development of this issue, justify this by critically examining the origins and historical events / whakapapa related, and identify the underlying attitudes and beliefs regarding this issue by MÄ ori, PÄ kehÄ , government and other relevant groups about the events happened. The influence of this issue on the ongoing process and implementation of biculturalRead MoreThe Relationship Between The Treaty Of Waitangi Essay2028 Words   |  9 Pagesthe Treaty of Waitangi (ToW) and the inequities in type II diabetes between MÄ ori and non-MÄ ori. It is evident that disparities such as quality of care and access to care can be linked to the three breaches in articles under the MÄ ori version of the ToW. To demonstrate the inequities in diabetes the 1852 New Zealand Constitution Act, 1907 The Tohunga Suppression Act, Orewa Speech and . . will be used to create a causal link using the Williams model as a guide. The Nursing Council of New Zealand guideRead MoreA Maori World1803 Words   |  8 Pagesconcept of feminism. Key elements included in mana wahine are the concepts of whakapapa, wairua, and whanau (Hutchings 36). Many indigenous artists in Aotearoa New Zealand engage with mana wahine as inspiration, some with ties to decolonisation. These artists/designers use their work in reply to the dominant Pakeha culture and the history that is shared. Art/design that engages with mana wahine is often linked to decolonisation narratives – the process by which the changes brought about under colonialismRead MoreReasons for the Phenomenal Growth of the Informal Economy Essay1733 Words   |  7 Pagesalternatives available to individuals and corporations ensure the growth of the informal market. Finally, I will give an overview of New Zealand’s history, politics and economy from which I will submit possible New Zealand reasons for the growth of informal economies. Alternative income, created from the informal system such as the fleamarkets around New Zealand. Also I will discuss the cultural significance informal (traditional) economies have for the Maori people of Aotearoa. An informal economyRead MoreEnglish As A Global Language2096 Words   |  9 Pagescolonise the new world, however, this voyage was sadly unsuccessful (Crystal, 2003). After several attempts, the first successful permanent colony to be founded in America landed in 1607 at the Chesapeake Bay and by 1732 there were 13 British colonies (McIntyre, 2009). Throughout the rest of the 17th-century, immigrants were sent to the new world in shiploads moving English out of Europe and into the New World (Crystal, 2003). The English were not the only country to migrate to the New World, in theRead MoreIntegration Of Theory And Practice2675 Words   |  11 Pageshelp her and providing her with information packs that explains ways of self-care and ways to deal with stress and free helplines that is available 24/7 if she is in need of somebody to talk too. In this organization this principle was a central feature, there was constant educate happening with the clients we engaged with around the area s they need assistance in so they are aware of the facilities in the community and services they provide, also trainings upon areas that are relevant to our clientsRead MoreBayer Company : Bayer Group Of Companies2712 Words   |  11 Pagescompanies in India has a strong history of 112 years and established itself as a company manufacturing world class products and runs many social responsibility projects such as child labour campaign and well known for its earliest responses to the emergency situations occurs due to the natural disasters. Three years ago, while working as an Area sales manager for Bayer group of companies in India I got an opportunity to hire the sales manager for one of the branch in New Zealand, which for me was a big

Advantages and Disadvantages of Large Populations Free Essays

The meaning of CPI (Consumer Price Index) is a measure of how the price of goods and services changes over a period of time. Real GDP per capita means calculating the average income per person in a year. Cost of Living simply means the amount of money we use to live by everyday like, the money we paid for food, taxes, see doctor, and petrol for cars. We will write a custom essay sample on Advantages and Disadvantages of Large Populations or any similar topic only for you Order Now While Standard of Living means the quality and how people are able to afford of housing, luxurious or non-luxurious living. Different levels of wealth and comfort ability. The advantages of having a large population are an increase in a country’s wealth, more demands hence, causes a growth in economy as well as, rising of income per household. Benefiting larger families, with more money to spend for example, travelling and ability to purchase more stuff. If there are larger population in a country, it also means more money will go into the country’s capital for example, paying of taxes and household bills to the governments. Having a large population doesn’t mean it is an advantage too. There are definitely disadvantages of having a large population in a country, like a shortage in properties, demanding of a rise in salaries and also shortage of resources. The real GDP for China in year 2011 was $7. 318 trillion USD, while the real GDP for Singapore was $239. 7 billion USD. Real GDP per capita for China was 8,500 USD while Singapore was 60,500 USD. There will be pros and cons of Cost of Living in China as China is a big country and difficult to maintain. China has a total population of 1,344,130,000. As mentioned above, that the advantages of having a large population in a country may increase the wealth of the country as well as the economy. Demanding for Standard of Living for example, asking for bigger houses or space if there’s a big family. However, Singapore is a very small country with a population of only 5,184,000. Cost of Living is so much higher as Singapore is the smallest countries in the world and that makes it easier to maintain as compared to China. More will demand on Standard of Living because Singapore is small and if, there are going to be new members joining in the family they will probably need to have a much bigger space to live. Singapore is also known as one of the richest country in the world. Thus, Standard of Living is high. Consumers demanding for better clothing, food and living environment. It is because Singapore is a small country and the country does not have to spend more money on maintenance except for upgrading and that makes more Singaporeans to be rich hence, Standard of Living is high. How to cite Advantages and Disadvantages of Large Populations, Essay examples

Protocols For Secure Information Management- Myassignmenthelp.Com

Question: Discuss About The Protocols For Secure Information Management? Answer Introducation In the current business scenario, trading in the stock market is growing in a rapid pace. In addition, in the developed countries such as United States, this trend is much more and involves various large institutions having expertise in trading of different stocks. Stock trading has emerged as one of the most potential and profitable venture for enhancing the wealth for the individuals as well as for the business organizations (Chen, Choi and Hong 2013). However, with the increase in the trend of stock trading, various cases related to fraud are being originating. Fraud and scam in the stock trading involves huge amount of money and thus, the effect is more than any other form of fraud . Due to this reason, the government and the trading firm are introducing different regulations and legislations in order to reduce the chance of being mislead (Kim and Sohn 2012). Various stringent laws and legislations are being initiated by the government of different countries to initiate harsh pun ishment if being accused and proved. However, in the last few years, few cases regarding to the fraud in the stock trading are being emerged. One of the prominent cases is the case of Raju Rajaratnam of Galleon group. This case involved fraud of multimillion dollar with some of the leading organizations. The case was being proved and Raju Rajaratnam is being given 11 years of imprisonment (Raghavan 2013). However, though he was imprisoned for his fraud case, there are still insider trading is happening in the stock market. Thus, the risk of being tricked by the investors is still there. This report will discuss about aftermath of the case of Raju Rajaratnam in the stock trading market. In addition, this report will also discuss the steps to be followed by the investors in order to prevent the fraud. Moreover, the implications of sharing the confidential data will be evaluated in this report. Trend of information gathering techniques in stock trading The case of Rajaratnam came as a huge shock for the entire stock market industry and the amount being involved in the fraud is huge which negatively affected the stock market. However, it should also be considered that the fraud being committed by Rajaratnam is not new and it will not end with him. This is due to the reason that, the stock market specialists operates in this market based on certain criterions. However, these criterions can only be accessed from having some sort of confidential data. In addition, with the increase in the trading firm in the stock market, the rate of the competition among the competing players is much more than ever (Bauwens and Giot 2013). Thus, having the access of some sort of confidential data helps them in gaining competitive advantages in the market. Therefore, though it is unethical to have the access of the confidential data, but the market scenario is influencing the trading organizations in having the access of these data. Measures to prevent the implication of inside trading One of the key measures should be taken by the investors is effectively and ethically dealing the trading officials. This due to the reason that, creating impression of being interested in accessing confidential data will motivate the trading officials to get in to insider trading. Thus, from the very first stage it is recommended for the investors that they should refrain from any such activities (Coffee 2013). Crosschecking of the gathered information is required for the investors. They should make sure that the information being provided by the trading firm to them is being available in the public forum. This will help them to identify any fraud or insider trading in their transaction. It is the responsibility of the investors to adhere with the security and other rules and regulations regarding the stock trading. This is due to the reason that, there are various legislations being in the stock market, which should be known to all the related stakeholders. Moreover, adhering with the relevant legislations will help the investors in identifying any fraud in the activities of the trading firm (Cox, Hillman and Langevoort 2016). It will also prevent them from being prosecuted by the government officials due to the reason that, in case of proven fraud, investors will also be held liable for the misdeeds of their trading firm. Investors should always be careful about making public the confidential data that they have with regarding their past or present employer (Ogiela and Ogiela 2012). This is due to the reason that, publicizing the confidential data about the employer will also be treated as the breach in security policy. By the regulators The government and other regulatory bodies also have the responsibilities in preventing the inside trading in the stock market. One of the key measures that being taken by the government is monitoring the trading activity in the market. Regular surveillance and effective determination of the trend analysis of the stock valuation of various companies will help to identify any huge differences in the market (Kim 2012). There are numerous complaints being made to the regulatory bodies by the investors having incurred huge loss in the market. These complaints can act as potential leads for the regulatory bodies to concentrate their investigation process on a particular area. In addition, this will help them in determining the unusual trading practices being involved in the market. Whistleblowers are one of the key sources of gaining market fraud for the regulatory bodies. This is due to the reason that, whistleblowers are the past or present employees in any organizations and thus they may have the knowledge about the fraudulent activities being involved by their employers in the market (Miceli, Near and Dworkin 2013). To motivate the whistleblowers in coming forward to disclose the fraudulent activities, incentives of 10 to 30 percent are being provided to them. By the companies Companies also have the responsibility of preventing the fraudulent activities in the stock trading. Thus, they also initiate various policies in order to prevent these activities (Beneish, Press and Vargus 2012). Various organizations have the blackout period for their executives to refrain them from buying the share of the company due to their access with the confidential data of the particular organization. In some organizations, executives are being allowed to buy their shares of their own organization. However, they are barred from having transaction at the time of earnings announcements or any type of organizational activities, which may have impact on the trading of stock (Fisher 2015). Various organizations employ legal officials to look after the legal affairs regarding the stock trading. This is due to the reason that, company officials will not have the clear idea about the various regulations as well as they may indulge in conflicts of interest. Thus, employment of the legal officials will help to prevent these types of activities. Employees are being given training about the various rules and regulations in the trading of stocks. They are being trained about the access of the confidential data and the extent to which they are allowed to publicize the information regarding their organization (Jehanzeb and Bashir 2013). In addition, they are also being trained about the possible implications or consequences that they will face in case of any misrepresentation of the confidential data. Implications of sharing confidential data Sharing of confidential data will have implications or consequences for the employees as well for other associated stakeholders. However, for the different stakeholders, the effect of the implications will be different. The following sections will discuss about the potential implications of sharing confidential data on different stakeholders. For the employees The primary effect of sharing of confidential data will be on the employees. This is due to the reason that, employees ranging from the lower level to the upper level managers will have the access of various confidential data more effectively than any other outsiders (Hannah and Robertson 2015). Thus, the chance or probability of breaching the confidentiality will be more from the side of the employees. Thus, in that case, the key implication for them will be the termination. Majority of the employee contracts have the clause for breach of confidentiality. Thus, the employee will be terminated on an immediate basis upon proven. Employees may face legal notices from their employer and may have to incur huge penalties if proven guilty. This is due to the reason that, in case of the breach of confidential information, the employer will probably sue the accused with legal notices (Morrow 2012). Thus, if the lawsuit is being proven and if the justice goes against the employees, then he may have to incur a huge penalty. In the case of monetary damage being served by the employer due to the reason of the breach of confidential data by the employee, the employee has to pay the price of loss as penalty. Thus, he will also face monetary consequences. Other than the monetary implications, employees may have to face he criminal charges due to the reason that, breaching of confidential data is similar to the theft of the intellectual property of the organization (Acemoglu and Akcigit 2012). Thus, the employee can be accused in the charge of theft. The law regarding theft and breach of confidentiality of information is different in various countries. However, criminal proceedings will be there against the employee in the case of the charge of theft. It may lead to paying a good amount of penalty as well as having sentenced imprisonment for years. With having served the legal lawsuits, incurring a huge monetary loss and serving imprisonment. The social reputation and goodwill of the employee will get negatively affected. Moreover, the chance for him to get selected and appointed in other organizations is much lower. This is due to the reason that the tarnished social mage of the employee will be transmitted among the majority of the organization. Thus, no other organizations will show interest in hiring him due to his past background. Hence, the future of the employee will also get negatively affected. If the confidential data is being leaked by the employee in the organization and if it led to huge financial fraud in the market, like the one with the galleon in the stock market, then the consequences will be more stringent for the accused. This is due to the reason that, in the case of the occurrence of financial fraud in the market because of the leakage of the confidential data, then the accused will be prosecuted by the regulatory bodies also (Abbasi et al. 2012). In that case, he will be charged with more cases against him, which may lead him to having more term of imprisonment as well as penalty. For the investors Investors whether intentionally or unintentionally indulged in the fraudulent activities will have to face the consequences. This is due to the reason that, it is the responsibility of the investors also to check and adhere with all the relevant legislations before being operated in the stock market (Beatty, Liao and Yu 2013). It is also being assumed that, the fraudulent activities by the trading firm are known to the investors due to the reason that it is the responsibility of the investors to check and monitor the activities of their trading firm. Thus, they also have to face the legal and criminal consequences (Pillai, Kar and Shah 2014). Apart from the negative implications, investors will also some sort of positive and favorable impact in the initial stage due to the sharing of the confidential data. This is due to the reason that, sharing of the confidential information will help the investors in having the knowledge of the probable change in the business scenario prior to their investment (Bhattacharya 2014). Thus, they will invest their capital accordingly. Though it is of having undue advantage but still it will give profit for the investors. Social risk is also applicable for the investors also in the case of revelation of the confidential data. This is due to the reason that, in the case of sharing of the confidential data and if being accused, the social risk will also be implied for the investors (Johnson and Covello 2012). In the case of the accusation, the regulatory authorities will also prosecute the investors. Thus, the social goodwill and reputation of the investor will be at stake. In the case of the insider trading, the investors will also find it difficult in have their trading partner in the future. This is due to the reason that, if the name of the investors gets revealed in any fraudulent activities, then no other trading partner will show interest in trading with them in fear of loss of goodwill in the market. Thus, the investors will face economical loss also in the case of sharing of confidential data. The regulatory authorities in the case of the accusations will take back the profit made by investors with the help of the confidential data back (Bewaji 2012). In addition, the investors will have to pay a hefty amount as penalty. Thus, it will cause a huge economical loss for them. For the trading firms In the case of using any confidential data for insider trading, the trading will be adversely affected upon revealed. Their trading license may be taken back and may be made black listed and thus, the business potential of them will come to a hold. Similar case had been happened with the Galleon. In this case, with the arrest and accusation of Rajaratnam, the trading firm of him got dissolved. Thus, the trading firm indulged in sharing of confidential information will face survival issue in the case of revelation. If the business of the trading firm is not being closed even after the sharing of confidential data, then also they will face survival issues in operating in the existing market (Ahmad, Bosua and Scheepers 2014). This is due to the reason that, no investors will be interested in collaborating with a trading firm, which is having background of sharing confidential data. In the case of sharing of confidential data, the trading firm will gain huge profits in the short term. However, in the long run, they will lose their competitive advantages in the market (Wagner III and Hollenbeck 2014). This is due to the reason that, the information that they will share with their investors will be treated or assumed as confidential data, even though it is authentic. Thus, the competitiveness and trustworthiness of the trading organization will get affected. Influence in decision-making process Sharing of confidential data will obviously effect my decision making process in trading with a particular stock. This is due to the reason that, if it is being known to me that the access of information that i have with me is private and confidential, then it will negatively motivate me in trading with the particular stock. However, it is true that in most of the cases, investors having confidential data with them will most likely to trade with that stock for gaining advantages. However, for me, the long-term situation will be more influencing factor. Thus, I have to determine the implications of insider trading in future and accordingly indulge in trading. Aftermath of the case of Rajaratnam As discussed earlier, the investigation and conviction of Rajaratnam had given a huge blow to the existing scenario in the trading market. The rate at which the trading firms were garnered confidential data will be reduced due to this case. However, the growing competitiveness in the trading market will also reduce the influence of the rajaratnams case gradually. This is due to the reason that, trading firms will have to garner some sort of information that will be accessible to any other to have the competitive advantages over their competitors (Tavakoli, McMillan and McKnight 2012). In addition, the investors prior to their investment in a particular stock will obviously seek to have some sort of information, which will help them to have positive return from the market. Thus, on one hand, the trading firm will reduce their confidential data accumulation due to the secret investigation by the regulatory authorities. However, on the other hand, the expectation of the customers will a ct as driving force in generating and sharing confidential data. Thus, it will be difficult to conclude that with the conviction of rajaratnam, the trend of collecting confidential information will come to end. This is due to the reason that, the more confidential data will be provided by the trading firms to their customers, the more will be their market attractiveness and competitive advantages in the market. Thus, in view of the basic marketing principles, it can be said that the case of rajaratnam will have some impact on the exiting trend of collecting confidential data, but it will not completely deter the fund managers from sharing confidential data. In the case of investors also, there will be very less impact of the case of rajaratnam on them due to the reason that, they also tries to gain more profit from trading. Majority of the investors in the trade market invest huge amount for stock trading and thus they are more aggressive in enhancing their profit margin. This factor acts as driving force for them to indulge in insider trading. Thus, it is impossible to stoop the trend of collecting confidential data by investors in the stock market. Conclusion Thus, it can be concluded that, rajaratnam had indulged in huge fraudulent activities by having collected the access of various confidential information. This report discussed about the potential implications of sharing confidential data for the employees, investors and trading firms. In addition, the driving forces for all the stakeholders in indulging in the insider trading have also been discussed. This report concludes that the conviction of rajaratnam will not have huge impact on the trading practices being followed by the investors and trading firms. Thus, the existing trading practices in the trading market will continue to prevail, until another fraud case will come to light. Reference Abbasi, A., Albrecht, C., Vance, A. and Hansen, J., 2012. Metafraud: a meta-learning framework for detecting financial fraud.Mis Quarterly,36(4). Acemoglu, D. and Akcigit, U., 2012. Intellectual property rights policy, competition and innovation.Journal of the European Economic Association,10(1), pp.1-42. Ahmad, A., Bosua, R. and Scheepers, R., 2014. Protecting organizational competitive advantage: A knowledge leakage perspective.Computers Security,42, pp.27-39. Bauwens, L. and Giot, P., 2013.Econometric modelling of stock market intraday activity(Vol. 38). Springer Science Business Media. Beatty, A., Liao, S. and Yu, J.J., 2013. The spillover effect of fraudulent financial reporting on peer firms' investments.Journal of Accounting and Economics,55(2), pp.183-205. Beneish, M.D., Press, E. and Vargus, M.E., 2012. Insider trading and earnings management in distressed firms.Contemporary Accounting Research,29(1), pp.191-220. Bewaji, W., 2012.Insider Trading in Developing Jurisdictions: Achieving an Effective Regulatory Regime. Bhattacharya, U., 2014. Insider trading controversies: A literature review.Annu. Rev. Financ. Econ.,6(1), pp.385-403. Chen, H., Choi, P.M.S. and Hong, Y., 2013. How smooth is price discovery? Evidence from cross-listed stock trading.Journal of International Money and Finance,32, pp.668-699. Coffee, J.C., 2013. Mapping the Future of Insider Trading Law: Of Boundaries, Gaps, and Strategies. Cox, J.D., Hillman, R.W. and Langevoort, D.C., 2016.Securities regulation: cases and materials. Wolters Kluwer Law Business. Fisher, P.A., 2015.Common stocks and uncommon profits and other writings(Vol. 44). John Wiley Sons. Hannah, D.R. and Robertson, K., 2015. Why and how do employees break and bend confidential information protection rules?.Journal of Management Studies,52(3), pp.381-413. Jehanzeb, K. and Bashir, N.A., 2013. Training and development program and its benefits to employee and organization: A conceptual study.European Journal of business and management,5(2). Johnson, B.B. and Covello, V.T. eds., 2012.The social and cultural construction of risk: Essays on risk selection and perception(Vol. 3). Springer Science Business Media. Kim, S.H., 2012. The Last Temptation of Congress: Legislator Insider Trading and the Fiduciary Norm Against Corruption.Cornell L. Rev.,98, p.845. Kim, Y. and Sohn, S.Y., 2012. Stock fraud detection using peer group analysis.Expert Systems with Applications,39(10), pp.8986-8992. Miceli, M.P., Near, J.P. and Dworkin, T.M., 2013.Whistle-blowing in organizations. Psychology Press. Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), pp.5-8. Ogiela, M.R. and Ogiela, U., 2012. Linguistic protocols for secure information management and sharing.Computers Mathematics with Applications,63(2), pp.564-572. Pillai, D., Kar, S. and Shah, R., 2014. Impact of Insider Trading on Investment Decision by Investors.International Journal,2(4). Raghavan, A., 2013.The billionaires apprentice: The rise of the Indian-American elite and the fall of the Galleon hedge fund. Hachette UK. Tavakoli, M., McMillan, D. and McKnight, P.J., 2012. Insider trading and stock prices.International Review of Economics Finance,22(1), pp.254-266. Wagner III, J.A. and Hollenbeck, J.R., 2014.Organizational behavior: Securing competitive advantage.