Statement of Problem On Mobile Commerce
Statement of Problem On Mobile Commerce
Statement of Problem On Mobile Commerce
The recent years have seen an explosive growth in the mobile phone industry.
Research has shown that the number of mobile phone subscribers at the end of the
year 2004 has passed 1.6 billion. Mobile commerce more popularly known as m-
commerce has made the business mobility a reality. The concept of anytime and
anywhere internet facility with an inexpensive and comparatively smaller computing
infrastructure is the driving force towards mobile commerce. With the advancements
in the Wireless communication, mobile commerce has become a new paradigm for
personal communication without any constraints in location. There are no age
limitations in conducting mobile commerce. Starting from the teenagers to the
retirees, everyone is depending on mobile devices. Mobile Commerce is defined as
any direct or indirect transaction conducted through the handheld devices such as
PDAs and mobile phones facilitated through mobile or wireless telecommunication
networks. It is a subset of electronic commerce.
If you need assistance with writing your essay, our professional essay writing service
is here to help!
Mobile Commerce is creating new opportunities for the mobile service providers as
well as for mobile users. Experts have proposed that the next wave of computing
would be mobile commerce and the first decade of 21st century would be considered
as the decade of mobile computing and mobile commerce. The driving factors of
mobile commerce include various interrelated forces. The social trends where every
person is depending on his or her mobile for communication (mobile society),
technological advancements and economics are some of the driving forces of mobile
commerce. The success of the electronic commerce itself is another major driving
factor for mobile commerce. Consumers have embraced the web based e commerce in
their day to day life in such a way that they cannot think of doing their tasks without
any electronic channel and this has made businesses to extend their services beyond
electronic channel into mobile channel. In addition to the above factors, the lowered
provider costs, increased internet speed and reliability, availability of content and
information anytime through an instant access and reduced time to market have
contributed for the growth of mobile services.
Although the above mentioned factors indicate that mobile commerce is creating
various opportunities for businesses, users and service providers, a report from the
Business Studies 2009 shows that only 7% of the 90% of the Americans who own a
mobile phone have used their mobile phones to conduct mobile commerce
transaction. Electronic Commerce can be divided into four different categories such as
Business to Business (B2B), Business to Consumer (B2C), Consumer to Business
(C2B) and Consumer to Consumer (C2C). Mobile commerce is mainly concerned
with the B2B or B2C market. With the widespread adoption of mobile phones, mobile
commerce has a prosperous future in business to consumer (B2C) category.
While live internet on the mobile may sound intuitively appealing, it is very difficult
to estimate the utility and the extent of its usage. Businesses, governments, service
providers, mobile users and stakeholders still need to address many issues and
obstacles before mobile commerce pervades in to our daily lives. The next section of
the paper discusses the major issues in mobile commerce such as application issues,
network challenges, consumer privacy and trust, security concerns, infrastructure
problems and legal and regulatory issues.
* Wireless Infrastructure
* Usability
* Consumer Trust
Analysis
There are many aspects to consider in security which includes physical security, risk
assessment, secure wireless transmission, secured access and malware. The built in
security features such as passwords and locking keypads are not used by majority of
wireless users and the data stored on these handheld devices are often not encrypted
which makes it easy for anyone to access the information stored without any
authorized access. The article ‘Mobile Commerce: issues and obstacles’ mentions that
Motorola, Ericsson and Nokia did provide industry standard digital signature for
authentication but was discarded in 2006.
Data transmitted over the wireless medium is more vulnerable for attacks. Wireless
transmission can be intercepted and if is not encrypted or encrypted with a flawed
protocol, then the information can be made known. Unsecured data transmission may
be exploited by hackers for eavesdropping or ï’man- in-the-middle’ attacks. Tradeoff
between performance and security remains an issue of concern for low power mobile
devices.
Communication between mobile devices is in the form of ad hoc networks where one
node communicates with another without a fixed infrastructure. Network decision
making in ad hoc networks is decentralized, as a result all the network protocols rely
on the cooperation between the nodes. An attacker can utilize this to compromise a
single node with false routing information or can instruct all the routing to go through
the compromised node. In addition to compromising the nodes, hackers may route the
mobile users to download malicious or miscellaneous information or may even launch
denial of service attacks. An attacker need not always target a mobile user but instead
if a mobile user roams in an attacker’s zone he or she is vulnerable to attacks.
Roaming in an attacker’s zone may lead to the alteration or stealing of data and
information without the end user’s knowledge. The difficulty in tracing the wireless
devices as they roam in different wireless zones, no fixed geographic points and the
ability to go online and offline easily gives the malicious users an excellent advantage
to launch the attacks.
A question of who would be responsible for the financial or data loss remains a
challenge in security. Is it the user or the wireless provider or the financial institution
or the software provider held responsible for the loss? Someone has to be responsible
for the loss and it is quite costly and becomes a risk for stakeholders. Hence there is a
need for wireless risk management.
There are some false impressions that only laptops or computers are exposed for
viruses and cell phones or handheld devices such as PDAs and smart phones are
immune to viruses. These viruses when downloaded by cell phones drain battery life
or can simply increase the load on the network.28 The compromised security function
may affect not only the network but also can lead to the loss of revenue in business.
There are a number of location intensive mobile commerce applications which require
location management support as their primary requirement in wireless network. The
article ‘Addressing Location Issues in Mobile Commerce’ identifies some of the
location intensive mobile commerce applications which include mobile advertising,
mobile financial applications, mobile inventory management and proactive service
management. One of the most important components of mobile commerce is financial
applications which include mobile banking, mobile money transfer, brokerage
services and mobile payments. If implemented properly, these applications may
eventually become a business tool. Mobile advertising is another category of
application where advertising is targeted to the users depending on the demographic
information collected by the wireless service providers and the location of the user.
Location sensitive advertisements such as shopping deals or on-going specials can be
accomplished depending on the surrounding area of the mobile users. Issues in mobile
advertising are: who owns the location information, how to share this information
between wireless providers, what are the storage requirements and how to satisfy the
need of real time processing in order to capture the user information.
Some of the must have features of smart phones are as follows: In order to satisfy
multi-tasking and multi-application nature in smart phones, multi-tasking operating
system is a necessary feature. Second feature for smart phones to conduct mobile
commerce is a real QWERTY keyboard. The third feature is the QVGA or a high
resolution display which is necessary for web browsing, gaming and MMS. Business
productivity tools and application software for smart phones is a necessary feature to
access business, sales, financial, inventory and real time information. Support of the
3rd generation technology for internet access is another important feature. Video and
audio streaming, GPS and navigation capability and digital camera are another set of
requirements which needs to be incorporated into the ideal client platform. Packing
the above mentioned functionalities into a small handheld device with the multi-
tasking operating system and a user friendly interface is a formidable task.
Figure 2 shows a graph of the global cell phone and the smart phone shipment. As
seen from the figure the percentage of the fully featured handsets are growing every
year. Although the growth of the smart phones makes smart phones an ideal client
platform for mobile commerce, the specifications of today’s smart phones are not
adequate for the transactions required for conducting mobile commerce. The success
of the mobile commerce lies in the user satisfaction and the user experience in the
new technology. Thus mobile device limitations have to be overcome for the
widespread adoption of mobile commerce.
In the recent years ethics and privacy have become a major and touchy issue where
consumers do not want to expose every aspect of their daily lives. Web applications
such as maps and financial applications require personal information from the users
which has created a negative impact with consumers. The risk of openness is
comparatively more in a mobile environment which has created higher demands of
privacy protection amongst the users. Being able to control information about oneself
is what has made privacy a major concern for the society.
Federal Trade Commission has to increase its efforts in the inspection on mobile
marketing industry. It is the responsibility of the wireless providers to protect the
privacy of the consumers in the services they provide. A recent report shows that
Verizon Wireless (VZW) customers were billed for downloading the ringtones and
other mobile content which was advertised as free by the online marketers. Privacy
has to be protected by the mobile service providers in order to make consumers feel
comfortable doing business using mobile devices. It is very important for the wireless
operators to protect their customers to the fullest and to stand by their word on
treating every customer with respect.
Mobile devices provide convenience to the consumers with the slimmer and compact
style. In addition to that with the increase in the storage capability consumers are able
to store more and more data. Research shows that ninety four percent of the mobile
users stored phone numbers, eighty three percent stored digital photos, sixty five
percent stored contacts and addresses, fifty five percent stored videos and forty eight
percent stored their calendar appointments and music and other important
information. With the vast amount of private data stored on the mobile devices raises
a question of the protection of these mobile devices. If lost or stolen or damaged there
is no way to back up the data.
Wireless Infrastructure
As seen from table 1, bit rate and coverage are two important factors. In addition to
that the wireless quality of service which affects the performance in terms of delay
and loss, reliability and survivability of wireless networks where a user can access
mobile commerce application even during the network failures, roaming capabilities
where a user can have access to multiple heterogeneous networks other quality
attributes are some of the specific requirements of wireless infrastructure in order to
conduct mobile commerce.
Wireless Application Protocol or WAP is the protocol used as a standard for mobile
commerce in the United States. WAP uses a set of common protocols to facilitate the
interoperability among different wireless networks, applications and devices. But in
reality WAP has failed to fulfill the technological promises. WAP cannot handle
complex transactions such as sequencing of several services distributed over different
networks. WAP is not suitable for a distributed networking environment. Another
issue with WAP is it tends to be slower since it was not originally designed for
broadband communications. The last problem with WAP is its charges are minute
based; hence time consuming activities may become expensive. GPRS was designed
as an alternative to WAP which is faster than WAP but it has its own downside. Since
the charges are based on kilobyte download (kb) in GPRS, it may become expensive
if mobile commerce service download volume is considerable.
As there is an increase in the demand for bandwidth for new and existing applications,
a lot of problems arise on how to obtain the unused airspace. Although reuse of
frequency is increasing today the availability of frequency and bandwidth may
become more limited in future. Wired devices such as laptops and PC’s use a set of
established wireless standards such as IEEE 802.11 and IEEE 802.11b. Will the
mobile devices have the ability to interface with more than one communication
environment? Will the communication technologies itself have the ability to interfere
with one other? All these questions remain as a challenge. The table below
consolidates the wireless infrastructure and communication issues.
Usability
Usability and user experience issues are often neglected in most of the businesses. It
is necessary to understand and improve the usability of the web interfaces exposed
through the mobile devices. Users conduct communication such as information search
and transactions via user interface. Hence user interface is an important pre-requisite
for satisfying customer’s sensory and functional needs. While mobile devices today
can access a variety of applications, they enforce limitations in screen size resolution
and have cumbersome input mechanisms. A survey from an internet on mobile
internet users indicates usability as the biggest source of frustration. A complete
understanding of different aspects of usability and how it might differ in a wireless
context is necessary for all the designers and the organizations before leveraging the
commercial benefits of mobile commerce.
Device inefficiency may become a major issue for the adoption of mobile commerce.
User interfaces if not properly designed may lead to a fifty percent transaction
reduction via mobile devices. Addition of what is called ‘cool features’ may make
mobile devices less convenient for use. There are a number of guidelines available on
web site usability such as on how to improve the layout and design of a web page,
how to improve the components of a webpage. However these guidelines do not
specify which aspects are critical and also the criticality may differ for different
contexts and for different users. Furthermore there are limited guidelines on specific
situation implementations. Thus it is necessary to understand what is important to
users in order to create a more compelling mobile commerce and to drive revenues.
The following figure shows the linking of usability, context and value.
Relevance, Structure and Personalization are the important factors for a successful
wireless interface experience. In addition to that it is necessary for the designers to
understand the value the consumers derive from these three relevance, structure and
personalization aspects in order to provide that value. Web presence is not equal to
wireless web presence i.e. ‘e’ # ‘m’. Mobile experience differs from web experience
in both designs as well as in usage.
Mobile commerce raises various legal and regulatory issues and challenges which is
very broad as it includes safety along with many others. The difficulty in the
application of the traditional laws and principles in the usage of wireless technologies
is an issue facing mobile commerce. One particular case is when a seller tries to sell
goods or services through a portal which is allocated to receive requests from wireless
devices through specific network providers or when a person uses his or her mobile
device (cell phone or a PDA) to purchase something poses many legal challenges
between various parties as to who is responsible for regulating them and how should
they be regulated. There are various legal issues need to be considered in mobile
commerce, among them are the m-commerce contracts and identification of
contracting parties and their legal capacities.
Another legal issue in mobile commerce is determining the ideal method for payment.
What methods need to be devised for the payment of a purchase from one’s mobile?
Another important question is what is the applicable law and jurisdiction if mobile
devices are used for business transactions? The article on mobile commerce legal
issues gives an example for the above question. What law would apply if a person
residing in Lebanon who is a customer of Emarati uses his or her mobile to purchase
software from a German firm whose server is located in the USA? Is it the law of the
server location or the law of the country of citizenship of the customer or the law
where the customer resides or the law of jurisdiction where the customer purchased
software? If there is any dispute between the buyer and the seller, which court is
responsible for the jurisdiction? Is it the court of the buyer’s country or the seller’s
country or the court agreed by both the parties?
Digital cameras in mobile devices can be used for taking the photos and exchanging
or sharing them over the internet instantly. The sharing or exchanging of the photos
done without the proper authorization may result in the violation of the intellectual
property rights including the copyright law. In that case who is liable for the
infringement? The person who exchanged the photos on the internet or the network
providers or the operators who facilitated the exchange? Is it possible to identify the
person sharing the photo?
Another aspect of mobile commerce issue is the safety and health risks. Safety
includes many regulatory concerns such as terrorism and exposure to wireless
devices. Today cell phones and other handheld devices are used in airplanes,
automobiles, boats and more. This convenience has made the transactions on the go,
but is this safe? Cell phones or other mobile devices installed in an automobile or a
motor vehicle can distract the user from driving. Mobile commerce in the context of
driving may pose serious safety concerns. Health risks of using mobile devices for
conducting m-commerce include cancer. A research from the Foster and Moulder
from the medical college of Wisconsin indicated that the radiations produced by the
wireless devices may cause brain cancer.
Cell phones are being used to set off the bombs remotely. A report from a Cellular
news showed that terrorists used a cell phone to detonate the bomb in a min bus in
Indonesia. Another recent bombing in London England was attempted by cell phones.
A slight different issue in legal and regulatory is privacy. Today’s wireless
technologies provide a lot of information about the users to the network operators
which include tracking of the users’ location. Competitive companies can purchase
such information from the network operators which may lead to a privacy breach. The
last but not the least issue in mobile commerce is the risk of crime. Hackers can steal
the data and information from the mobile devices or simply overload the wireless
network traffic to deteriorate the service. Is there any criminal law to incorporate
these new types of crime and how will these penalties be enforced?
Consumer Trust
Trust plays an important role in mobile commerce. Trust is part of security issue but it
is more of a business and psychological issue than a technical issue. This does not
mean that trust has nothing to do with the technology, however it is necessary for the
potential mobile commerce users to perceive wireless environment as a secure
environment in order for the mobile commerce to reach its potential. Business
relationships would not exist today without the trust which exists in many forms in
business context such as laws and regulations, contracts, company policies and
personal reputations.
Building consumer trust in mobile commerce is a daunting task for the organizations,
network providers and mobile vendors. E commerce is also facing the same issue
because even today users do not trust technology. They are afraid to do any kind of
financial transaction or any purchases using mobile handhelds. Trust plays an
important role in business transaction too as trust lays the foundation between the
businesses and the customers. The key characteristics in forming the trust include
convenience, cost-efficiency, motivation, capacity and integrity. They all play an
important role in gaining the consumer trust.
An example for the lack of the interoperability is when a network provider offers a
text message acknowledgement within their own network and not on other network
carriers. Mobile commerce is impeded by the existence of a variety of network
communication standards. Applications are developed around the network standards
and device characteristics which is the main cause for the interoperability issues.
Efforts are being made to overcome
2
E-commerce is widely considered the buying and selling of products
over the internet, but any transaction that is completed solely
through electronic measures can be considered e-commerce. E-commerce
is subdivided into three categories: business to business or B2B,
business to consumer or B2C and consumer to consumer or C2C also
called electronic commerce. M-commerce is a term that is used to
refer to the growing practice of conducting financial and promotional
activities with the use of a wireless handheld device. The term m-
commerce is short for mobile commerce, and recognizes that the
transactions may be conducted using cell phones, personal digital
assistants and other hand held devices that have operate with
Internet access. E-commerce Security is a part of the Information
Security framework and is specifically applied to the components that
affect e-commerce that include Computer Security, Data security and
other wider realms of the Information Security framework. E-commerce
security has its own particular nuances and is one of the highest
visible security components that affect the end user through their
daily payment interaction with business. The purpose of this research
paper is to identify factors affecting the adoption of M-commerce.
The significant growth of M-commerce application is remarkable in
India. More and more consumer is transferring to M- commerce to
achieve better and fast transaction into market. M-commerce is
emerging level in India. The astounding rate growth in mobile
penetration in India, higher mobile technology and networking is
coming day by day. Now a mobile phone is not only use for text SMS or
phone call but also be used for many other activities like browsing
of net chatting or other virtual activities. This paper’s
theoretical contribution is to explain how’s M-commerce is
developing in India and to identify clear contexts and assistant
mechanism.
3
The purpose of any e-commerce website is to help customers narrow down their
broad ideas and enable them to finalize the products they want to purchase. For
example, suppose a customer is interested in purchasing a mobile. His or her search
for a mobile should list mobile brands, operating systems on mobiles, screen size of
mobiles, and all other features as facets. As the customer selects more and more
features or options from the facets provided, the search narrows down to a small list
of mobiles that suit his or her choice. If the list is small enough and the customer likes
one of the mobiles listed, he or she will make the purchase.
The challenge is also that each category will have a different set of facets to be
displayed. For example, searching for books should display their format, as in
paperpack or hardcover, author name, book series, language, and other facets related
to books. These facets were different for mobiles that we discussed earlier. Similarly,
each category will have different facets and it needs to be designed properly so that
customers can narrow down to their preferred products, irrespective of the category
they are looking into.
The takeaway from this is that categorization and feature listing of products should be
taken care of. Misrepresentation of features can lead to incorrect search results.
Another takeaway is that we need to provide multiple facets in the search results. For
example, while displaying the list of all mobiles, we need to provide facets for a
brand. Once a brand is selected, another set of facets for operating systems, network,
and mobile phone features has to be provided. As more and more facets are selected,
we still need to show facets within the remaining products.
1. Ideal situation
2. Reality
3. Consequences
4. Proposal
1. Ideal situation
The first thing your problem statement should describe is what the ideal situation
would be if there wasn't a problem you needed to address. This section identifies the
goals and scope of the project are. This section should create a clear understanding of
what the ideal environment will be once the issue has been resolved.
2. Reality
The next section of your problem statement should describe what the current reality is
for your company or organization. This section will identify what the problem is, state
why it is a problem and identify who the problem is impacting. It will also describe
when and where the problem was identified.
3. Consequences
The next section of your problem statement should identify what the consequences of
the problem are. This section describes the effects of the problem by describing how
the people affected by the problem are being impacted and quantifying how much the
problem is impacting them. Common consequences can include the loss of time,
money, resources, competitive advantage, productivity and more.
4. Proposal
The proposal section of a problem statement may contain several possible solutions to
the problem, but it is important to remember that it does not need to identify a specific
solution. The purpose of the proposal section should be to guide the project team on
how they can research, investigate and resolve the problem.
Before you can begin writing your problem statement, you first need to identify what
the problem is.
Next, you can begin writing your problem statement by describing what the ideal
environment would look like if your problem didn't exist. This section should try to
describe what your company hopes to accomplish as a result of the process
improvement project.
3. Describe current gaps
Next, write the reality section of your problem statement. Your goal in this section
should be to clearly identify what the current environment looks like. In this section,
you should identify what the problem is, what is causing the problem and why it is an
issue. You should also describe when, where and how you were able to identify the
problem.
Next, write the consequences section of your problem statement. This section is used
to quantify and support the claim of what the problem is. You can use this section to
identify specific numbers such as the amount of time or revenue being lost or the
number of resources being wasted. It is important to include concrete numbers that
support your claims in this section.
Finally, end your statement with a proposal section. In this section, you should try to
identify how your company will make progress toward reaching your goals and
accomplishing your ideal environment. While you may choose to identify several
possible solutions in this section, it is more important to focus on identifying how
your company will find those solutions than it is to identify the specific solution that
will be used.
Ideal situation:
Ideally, our sales associates would be able to maximize their production by being
able to make more contacts with leads each day.
Reality:
Currently, our sales associates are unable to maximize the number of leads they are
contacting each day because they are spending too much time finding qualified leads
to call and inserting lead information into the system before making calls. This is a
problem because the time our sales associates are spending finding leads and
entering lead information into our system could be used to contact more qualified
leads and generate more sales. We identified this problem in our sales call center
while surveying to gather feedback from our sales associates about what limits their
ability to maximize their sales numbers.
Consequences:
Our sales associates currently spend about two hours per day finding qualified leads
and another two hours per day entering lead information into our system before they
begin making calls. This means our sales associates are only spending half of their
workday actually making calls to qualified leads. Because our sales associates are
not able to use their entire shift to make contact with leads, their overall sales
numbers are being impacted. Our company estimates that our sales associates would
be able to make at least double the number of sales if they were able to spend their
entire shift contacting qualified leads.
Proposal:
Our company seeks to resolve this issue by creating a process improvement team to
identify several potential solutions for how we can reduce the time our sales
associates spend not making contact with qualified leads.
Part A (The ideal): Describes a desired goal or ideal situation; explains how things
should be.
Part B (The reality): Describes a condition that prevents the goal, state, or value in
Part A from being achieved or realized at this time; explains how the current situation
falls short of the goal or ideal.
Part C (The consequences): Identifies the way you propose to improve the current
situation and move it closer to the goal or ideal.
Here is an example:
Statement 1
The Ministry of Youth is dedicated to allocating enterprise development funds
to both the youth and women. These funds are made available in order to start
entrepreneurial ventures that create and expand employment. (Provide relevant
statistics and quote)
Statement 2
Statement 3
This proposed research aspires to explore options for a new funds disbursement
system that would focus on consistency. To do this, the researcher will carry
out a full stakeholder analysis and use it to propose appropriate policy
interventions.
A study by the Institute of Development Studies (RoK, 2004) revealed that only 38%
of the businesses are expanding while 58% have not added workers. According to the
survey, more enterprises are likely to close in their first three years of operation. Four
years later the same institute conducted another study in Central Kenya. This study
revealed that 57% of small businesses are in stagnation with only 33% of them
showing some level of growth.
In our current project, we propose to examine factors that have an impact on small
business sustainability. We will employ both qualitative and quantitative approaches
to gather both primary and secondary data and information with the objective of
determining success factors for the growth of small business in Kenya.
Specifically, we shall employ the product life cycle (PLC) model to identify the needs
of a small business at the various stages of the PLC.
Now that you’ve learnt the basics, hone your skills and write an ideal statement of the
problem with this advanced course by our expert Prof. Henry Bwisa.
personal.psu.edu
A persuasive problem statement consists of three parts: 1) the ideal, 2) the reality, and
3) the consequences for the reader of the feasibility report. Well constructed problem
statements will convince your audience that the problem is real and worth having you
investigate. Your strategy is one of contrast: by situating the the ideal scenario next to
the situation as it exists, you can not only persuade the reader that a problem exists,
but then go on to emphasize the consequences of ignoring or addressing the problem.
Remember, your problem statement is the backbone of the proposal and the feasibility
report. By giving careful consideration to how you construct it now (for the
proposal), you can use it when doing your research and writing for the proposal as
well as the progress and the feasibility report.
Describe the goals, desired state, or the values that your audience considers
important and that are relevant to the problem.
(BUT)
Describe a condition that prevents the goal, state, or value discussed in statement
1 from being achieved or realized at the present time.
Using specific details, show how the situation in statement 2 contains little promise of
improvement unless something is done. Then emphasize the benefits of research by
projecting the consequences of possible solutions as well.
Describe the areas of inquiry you will use that could lead to solutions to the
problem--- how will you research the problem? What sources of information, types of
research (primary or secondary),or tools will you use to help you find solutions and
make recommendations to resolve the clash?
STATEMENT 2
Right now, Middletown Hospital's main diagnostic tools are CAT scans and
myelograms (spinal taps). The CAT scan fails to make clear diagnoses 60% of the
time. When the CAT scan fails, doctors must resort to the myelogram. While the
myelograms are accurate, this procedure is very painful and sometimes dangerous for
the patient.
STATEMENT 3
If Middletown Hospital continues to do the two procedures, they will not only be
wasting time and money, which jeopardizes their overall efficiency and earning
potential. Also, undue suffering could lead patients to choose another hospital with
more advanced facilities.
RESEARCH
A new diagnostic technique, nuclear magnetic resonance (NMR) may surpass the
CAT scan in accuracy and reduce the need to resort to the myelogram. I propose to
research the feasibility of establishing an NMR lab at Middletown hospital. I will
investigate the accuracy, efficiency, and safety of NMR as well as implementation
issues.
Example #2
Audience:
This proposal is directed to Alfred Academy’s headmaster, Dr. Smith Nyman. Alfred
Academy is a private high school with approximately 200 students in attendance. Dr.
Nyman is the primary liaison between the administration, the students and their
parents. Nyman works with private educational funds and the alumni in order to raise
money for student programs, e.g., a lecture series. Nyman then creates a task force of
parents and students who execute the program for him.
STATEMENT 1
STATEMENT 2
Currently, Alfred has three mediation, i.e., problem solving, resources: (1) an
unofficial peer mediation group, (2) an unofficial student court, and (3) a lecture
program entitled Peaces. Unfortunately, at the present time, only one of those three
methods are being utilized: lectures. These lectures are not mandatory as a result, the
majority of students do not attend. Furthermore, neither the peer mediation group nor
the student court are legally certified and are, therefore, not credible resources and
remain unused.
STATEMENT 3
RESEARCH
Example #3
AUDIENCE:
I am writing to Mrs. Kelly. She is the RAINBOWS director at Hills High School, in
P****, New Jersey. RAINBOWS is an international organization that is run through
schools, churches, and other organizations. It helps youth deal with a significant loss
in their life, mainly death or divorce. The program in PHHS is a pilot program that
has been in effect for about 4 years.
STATEMENT 1
In order to help individuals learn to deal with grief after a major loss has occurred in
their life, the Spectrum division of the RAINBOWS program in Hills High School
aims to provide each student in the program an environment in which they feel safe,
comfortable, and normal. The goal of RAINBOWS is to help students learn,
understand, deal with, and move on from their loss.
STATEMENT 2
However, often, students don't know other students in the optional weekly group
meeting very well, which causes them to be uncomfortable and hesitant about
speaking. In the presence of their peers, a student does not feel safe about speaking or
expressing their feelings in fear that they may be judged. Also, optional weekly
meetings send the message that it is optional to deal with the loss, when in fact the
students must learn about their loss and how to live with it.
STATEMENT 3
By not feeling comfortable or safe in the program, students are not able to fully learn,
understand, deal with, or move on from their loss.
RESEARCH
Example #4
STATEMENT 1
STATEMENT 2
STATEMENT 3
Continuing with this current rotation system prevents consistency and causes
decisions to become grossly political, which in turn inhibits the committee of fully
enhancing the out-of-class experience of the students at University Park. Developing a
more informed rotation system could allow the committee to still fulfill the mission
statement of the committee.
RESEARCH
I would like to explore options for a new internal rotation system that would focus on
consistency. To do this, I will consult with representatives from two other big-ten
universities to look at how students are involved in the allocations decisions. I will
also survey existing members of PSU’s committee to find out preferences as well as
how long it would take for each member to familiarize themselves with student
organizations.
Yenyewe
Over the past 10-15 years, electronic trading platforms have emerged in the depths of
large enterprises as a system of resource allocation between departments. Shoes,
furniture, consumer electronics – there is almost nothing that cannot be ordered on the
Internet. But the consumption in the net has also dark sides. Bogus orders, fake
websites, illegal purchases, etc. are also more frequent. In such a case, the protection
of user data has also become a major challenge in the online world. With the growing
financial services, the type of payment your business accepts also effects the e-
commerce today. Payment solution like My Payment Savvy provides a custom
payment solution for your business which can maximize your conversion. We have
listed some of the major challenges facing e-commerce today, and their solutions.
Google is the world leader in search engines, and by extension, responsible for the
visibility of websites. More than 50% of online shops are dependent on Google for
traffic. Despite plans for new search engines that are competing with Google, the
supremacy of Google seems destined to last a few more years. And this can impact e-
merchants when Google changes the rules of the game. Recently, there was the
requirement to switch to HTTPS to make Google Shopping campaigns, in addition to
displaying the non-security of data in the Chrome and Firefox browsers. Unencrypted
web pages that query passwords, bank details or credit card information was marked
as “unsafe” by major browsers such as Google Chrome, Mozilla Firefox, Microsoft
Edge and others. Therefore, it is recommended changing the traffic acquisition
channels of websites, so as not to depend solely on Google for visibility and
transactions.
4. Customer Service
In a general store, the customer leaves the store with his product. However, this
situation is not the same as e-commerce. In e-shopping, the user sends you money for
a product he does not have yet. He waits impatiently for the arrival of his order.
Problems can still arise if the delivery service provider has lost a package, or the
product has been damaged during transport, or you have simply fallen behind before
shipping. This can cause customer dissatisfaction, which will then need to be
managed. The idea is to be transparent and responsive and to keep customers abreast
of the situation as soon as possible. If you are in a discussion with the delivery
provider to find a lost package, keep the user informed of your steps, do not wait for
him to come to the news. Similarly, if you are late in your parcel preparations, inform
him of the expected date of shipment. If the product has been damaged during
transport, quickly propose a solution according to your legal notice, whether a total or
partial refund or a replacement. Internet users who have received good
communication in the case of litigation generally keep good relations with the e-
commerce site, 95% of the negative opinions turn into loyal customers if a solution
has been made. The responsiveness of the after-sales service greatly affects the image
of a company.
The everyday life of the e-shopkeeper is filled with things to manage, to plan, and lots
of small tasks to do. As such, it requires outstanding strategies to survive in the e-
commerce competition.