Monday, December 30, 2019

Marketing Analysis Marketing Strategy - 1546 Words

For instance, deciding on a product line/range requires that the marketing strategist have a definite understanding of all relevant contender items (as well as the corresponding pricing structures) with a specific end goal to establish appropriate juxtaposition and comparison and decide on suitable business choices for diversifying. Competitor analysis is a crucial part of marketing strategy. It is sometimes said that some firms don t lead this sort of investigation deliberately enough. Rather, some ventures work on what is called casual impressions, guesses, and instinct accordingly, which can lead to what marketers refer to as blindspots that can derail an organisation. Stephen Philips from market research agency Tonic says: â€Å"Last†¦show more content†¦However, that information barely touches the surface, and it doesn t provide the necessary insight on competitors that can appropriately inform business strategy. If US B2B firms want to successfully counter the competition, a more in-depth analysis of the marketplace is required†. Whilst this may be true of a minority of incompetent marketing analysts and small time entrepreneurs who cannot afford a decent marketing professional the fact of the matter is that the majority of marketing professionals take competitor analysis extremely seriously and are very diligent in doing so. Philips neglected to give examples of the businesses he supposedly surveyed nor did he indicate how many businesses he surveyed. Considering he is a market research professional (probably looking to obtain more work) one must take his findings with a grain of salt. However he is correct in saying that businesses must do a competitor analysis if they are serious about succeeding. During the past two weeks I have surveyed 20 UK B2B companies (including Shopkit Ltd, Elesa, Industrial Cranes and Parts) and they all confirmed that they do detailed competitor analysis. Some of them have a dedicated marketing department and most of them have hired a marketing agency to do various marketing acti vities including a competitor analysis in the past two years. Shopkit’s managing director said that it is crucial to know the competitor’s strengths. He goes on to say that in terms of strategy he has

Sunday, December 22, 2019

The Unsinkable Titanic An Accident Or A Scam - 1571 Words

The Unsinkable Titanic: An Accident or a Scam? Everyone knows the story of the Titanic. How the largest moving object ever fashioned by man hit an iceberg on its maiden voyage and sank in the middle of the North Atlantic. To contextualize this piece of writing, discussing the aspects of rhetorical analysis is essential. â€Å"Conspiracies – Titanic: The Ship That Never Sank† documentary depicts a completely new level of the dreadful incident. The Titanic was switched with its sister ship, the Olympic and it was the Olympic that was sunk deliberately as part of the greatest insurance scam in history. The film is based upon and directed by Robin Gardiner, one of the few researchers of the incident of Titanic. His purpose was to shine light on the fact that Titanic was condemned just for White Star Liners to avoid bankruptcy. It includes evidences of British as well as American inquiries, eye witness reports of survivors, and newspapers of the day, photographs, videos, film and radio broadcasts. However, it is indeed a story that has left many questions unanswered. Was it nature’s doing or human’s? Gardiner efficiently uses pathos, logos, ethos and kairos in his documentary so as to create awareness among people today of such an enormous insurance scam. The documentary portrays pathos as a form of how this tragedy ended the lives of many. Before the start of the project, all respective members were asked to toss flowers into the ocean as a memorial for those who passed away. ThatShow MoreRelatedEveryone Knows The Infamous Story Of The Titanic And Her1649 Words   |  7 PagesEveryone knows the infamous story of the Titanic and her disastrous maiden voyage. As tragic as it was, it appeared as a relatively straightforward occurrence. An outrageously expensive luxury cruise liner which was deemed unsinkable by its crew and advertisers set out for the first time to conquer the seas, ultimately striking an iceberg and shortly after being completely consumed by the depths of the ocean in an appalling accident. Perhaps, however, there is more to this story than an ambitious

Saturday, December 14, 2019

Prelude to Foundation Chapter 10 Book Free Essays

string(88) " lives on it now\?† Raindrop Forty-Three hesitated, then shook her head fiercely\." HAND-ON-THIGH STORY-†¦ An occasion cited by Hari Seldon as the first turning point in his search for a method to develop psychohistory. Unfortunately, his published writings give no indication as to what that â€Å"story† was and speculations concerning it (there have been many) are futile. It remains one of the many intriguing mysteries concerning Seldon’s career. We will write a custom essay sample on Prelude to Foundation Chapter 10 Book or any similar topic only for you Order Now Encyclopedia Galactica 45. Raindrop Forty-Three stared at Seldon, wild-eyed and breathing heavily. â€Å"I can’t stay here,† she said. Seldon looked about. â€Å"No one is bothering us. Even the Brother from whom we got the dainties said nothing about us. He seemed to take us as a perfectly normal pair.† â€Å"That’s because there is nothing unusual about us-when the light is dim, when you keep your voice low so the tribesman accent is less noticeable, and when I seem calm. But now-† Her voice was growing hoarse. â€Å"What of now?† â€Å"I am nervous and tense. I am†¦ in a perspiration.† â€Å"Who is to notice? Relax. Calm down.† â€Å"I can’t relax here. I can’t calm down while I may be noticed.† â€Å"Where are we to go, then?† â€Å"There are little sheds for resting. I have worked here. I know about them.† She was walking rapidly now and Seldon followed. Up a small ramp, which he would not have noticed in the twilight without her, there was a line of doors, well spread apart. â€Å"The one at the end,† she muttered. â€Å"If it’s free.† It was unoccupied. A small glowing rectangle said NOT IN USE and the door was ajar. Raindrop Forty-Three looked about rapidly, motioned Seldon in, then stepped inside herself. She closed the door and, as she did so, a small ceiling light brightened the interior. Seldon said, â€Å"Is there any way the sign on the door can indicate this shed is in use?† â€Å"That happened automatically when the door closed and the light went on,† said the Sister. Seldon could feel air softly circulating with a small sighing sound, but where on Trantor was that ever-present sound and feel not apparent? The room was not large, but it had a cot with a firm, efficient mattress, and what were obviously clean sheets. There was a chair and table, a small refrigerator, and something that looked like an enclosed hot plate, probably a tiny food-heater. Raindrop Forty-Three sat down on the chair, sitting stiffly upright, visibly attempting to force herself into relaxation. Seldon, uncertain as to what he ought to do, remained standing till she gestured-a bit impatiently-for him to sit on the cot. He did so. Raindrop Forty-Three said softly, as though talking to herself, â€Å"If it is ever known that I have been here with a man-even if only a tribesman-I shall indeed be an outcast.† Seldon rose quickly. â€Å"Then let’s not stay here.† â€Å"Sit down. I can’t go out when I’m in this mood. You’ve been asking about religion. What are you after?† It seemed to Seldon that she had changed completely. Gone was the passivity, the subservience. There was none of the shyness, the backwardness in the presence of a male. She was glaring at him through narrowed eyes. â€Å"I told you. Knowledge. I’m a scholar. It is my profession and my desire to know, I want to understand people in particular, so I want to learn history. For many worlds, the ancient historical records-the truly ancient historical records-have decayed into myths and legends, often becoming part of a set of religious beliefs or of supernaturalism. But if Mycogen does not have a religion, then-â€Å" â€Å"I said we have history.† Seldon said, â€Å"Twice you’ve said you have history. How old?† â€Å"It goes back twenty thousand years.† â€Å"Truly? Let us speak frankly. Is it real history or is it something that has degenerated into legend?† â€Å"It is real history, of course.† Seldon was on the point of asking how she could tell, but thought better of it. Was there really a chance that history might reach back twenty thousand years and be authentic? He was not a historian himself, so he would have to check with Dors. But it seemed so likely to him that on every world the earliest histories were medleys of self-serving heroisms and minidramas that were meant as morality plays and were not to be taken literally. It was surely true of Helicon, yet you would find scarcely a Heliconian who would not swear by all the tales told and insist it was all true history. They would support, as such, even that perfectly ridiculous tale of the first exploration of Helicon and the encounters with large and dangerous flying reptiles-even though nothing like flying reptiles had been found to be native to any world explored and settled by human beings. He said instead, â€Å"How does this history begin?† There was a faraway look in the Sister’s eyes, a look that did not focus on Seldon or on anything in the room. She said, â€Å"It begins with a world-our world. One world.† â€Å"One world?† (Seldon remembered that Hummin had spoken of legends of a single, original world of humanity.) â€Å"One world. There were others later, but ours was the first. One world, with space, with open air, with room for everyone, with fertile fields, with friendly homes, with warm people. For thousands of years we lived there and then we had to leave and skulk in one place or another until some of us found a corner of Trantor where we learned to grow food that brought us a little freedom. And here in Mycogen, we now have our own ways-and our own dreams.† â€Å"And your histories give the full details concerning the original world? The one world?† â€Å"Oh yes, it is all in a book and we all have it. Every one of us. We carry it at all times so that there is never a moment when any one of us cannot open it and read it and remember who we are and who we were and resolve that someday we will have our world back.† â€Å"Do you know where this world is and who lives on it now?† Raindrop Forty-Three hesitated, then shook her head fiercely. â€Å"We do not, but someday we will find it.† â€Å"And you have this book in your possession now?† â€Å"Of course.† â€Å"May I see that book?† Now a slow smile crossed the face of the Sister. She said, â€Å"So that’s what you want. I knew you wanted something when you asked to be guided through the microfarms by me alone.† She seemed a little embarrassed. â€Å"I didn’t think it was the Book.† â€Å"It is all I want,† said Seldon earnestly. â€Å"I really did not have my mind on anything else. If you brought me here because you thought-â€Å" She did not allow him to finish. â€Å"But here we are. Do you or don’t you want the Book?† â€Å"Are you offering to let me see it?† â€Å"On one condition.† Seldon paused, weighing the possibility of serious trouble if he had overcome the Sister’s inhibitions to a greater extent than he had ever intended. â€Å"What condition?† he said. Raindrop Forty-Three’s tongue emerged lightly and licked quickly at her lips. Then she said with a distinct tremor in her voice, â€Å"That you remove your skincap.† 46. Hari Seldon stared blankly at Raindrop Forty-Three. There was a perceptible moment in which he did not know what she was talking about. He had forgotten he was wearing a skincap. Then he put his hand to his head and, for the first time, consciously felt the skincap he was wearing. It was smooth, but he felt the tiny resilience of the hair beneath. Not much. His hair, after all, was fine and without much body. He said, still feeling it, â€Å"Why?† She said, â€Å"Because I want you to. Because that’s the condition if you want to see the Book.† He said, â€Å"Well, if you really want me to.† His hand probed for the edge, so that he could peel it off. But she said, â€Å"No, let me do it. I’ll do it.† She was looking at him hungrily. Seldon dropped his hands to his lap. â€Å"Go ahead, then.† The Sister rose quickly and sat down next to him on the cot. Slowly, carefully, she detached the skincap from his head just in front of his ear. Again she licked her lips and she was panting as she loosened the skincap about his forehead and turned it up. Then it came away and was gone and Seldon’s hair, released, seemed to stir a bit in glad freedom. He said, troubled, â€Å"Keeping my hair under the skincap has probably made my scalp sweat. If so, my hair will be rather damp.† He raised his hand, as though to check the matter, but she caught it and held it back. â€Å"I want to do that,† she said. â€Å"Its part of the condition.† Her fingers, slowly and hesitantly, touched his hair and then withdrew. She touched it again and, very gently, stroked it. â€Å"It’s dry,† she said. â€Å"It feels†¦ good.† â€Å"Have you ever felt cephalic hair before?† â€Å"Only on children sometimes. This†¦ is different.† She was stroking again. â€Å"In what way?† Seldon, even amid his embarrassment, found it possible to be curious. â€Å"I can’t say. Its just†¦ different.† After a while he said, â€Å"Have you had enough?† â€Å"No. Don’t rush me. Can you make it lie anyway you want it to?† â€Å"Not really. It has a natural way of falling, but I need a comb for that and I don’t have one with me.† â€Å"A comb?† â€Å"An object with prongs†¦ uh, like a fork†¦ but the prongs are more numerous and somewhat softer.† â€Å"Can you use your fingers?† She was running hers through his hair. He said, â€Å"After a fashion. It doesn’t work very well.† â€Å"Its bristly behind.† â€Å"The hair is shorter there.† Raindrop Forty-Three seemed to recall something. â€Å"The eyebrows,† she said. â€Å"Isn’t that what they’re called?† She stripped off the shields, then ran her fingers through the gentle arc of hair, against the grain. â€Å"That’s nice,† she said, then laughed in a high-pitched way that was almost like her younger sister’s giggle. â€Å"They’re cute.† Seldon said a little impatiently, â€Å"Is there anything else that’s part of the condition?† In the rather dim light, Raindrop Forty-Three looked as though she might be considering an affirmative, but said nothing. Instead, she suddenly withdrew her hands and lifted them to her nose. Seldon wondered what she might be smelling. â€Å"How odd,† she said. â€Å"May I†¦ may I do it again another time?† Seldon said uneasily, â€Å"If you will let me have the Book long enough to study it, then perhaps.† Raindrop Forty-Three reached into her kirtle through a slit that Seldon had not noticed before and, from some hidden inner pocket, removed a book bound in some tough, flexible material. He took it, trying to control his excitement. While Seldon readjusted his skincap to cover his hair, Raindrop Forty-Three raised her hands to her nose again and then, gently and quickly, licked one finger. 47. â€Å"Felt your hair?† said Dors Venabili. She looked at Seldon’s hair as though she was of a mind to feel it herself. Seldon moved away slightly. â€Å"Please don’t. The woman made it seem like a perversion.† â€Å"I suppose it was-from her standpoint. Did you derive no pleasure from it yourself?† â€Å"Pleasure? It gave me gooseflesh. When she finally stopped, I was able to breathe again. I kept thinking: What other conditions will she make?† Dors laughed. â€Å"Were you afraid that she would force sex upon you? Or hopeful?† â€Å"I assure you I didn’t dare think. I just wanted the Book.† They were in their room now and Dors turned on her field distorter to make sure they would not be overheard. The Mycogenian night was about to begin. Seldon had removed his skincap and kirtle and had bathed, paying particular attention to his hair, which he had foamed and rinsed twice. He was now sitting on his cot, wearing a light nightgown that had been hanging in the closet. Dors said, eyes dancing, â€Å"Did she know you have hair on your chest?† â€Å"I was hoping earnestly she wouldn’t think of that.† â€Å"Poor Hari. It was all perfectly natural, you know. I would probably have had similar trouble if I was alone with a Brother. Worse, I’m sure, since he would believe-Mycogenian society being what it is-that as a woman I would be bound to obey his orders without delay or demur.† â€Å"No, Dors. You may think it was perfectly natural, but you didn’t experience it. The poor woman was in a high state of sexual excitement. She engaged all her senses†¦ smelled her fingers, licked them. If she could have heard hair grow, she would have listened avidly.† â€Å"But that’s what I mean by ‘natural.’ Anything you make forbidden gains sexual attractiveness. Would you be particularly interested in women’s breasts if you lived in a society in which they were displayed at all times?† â€Å"I think I might.† â€Å"Wouldn’t you be more interested if they were always hidden, as in most societies they are?- Listen, let me tell you something that happened to me. I was at a lake resort back home on Cinna†¦ I presume you have resorts on Helicon, beaches, that sort of thing?† â€Å"Of course,† said Seldon, slightly annoyed. â€Å"What do you think Helicon is, a world of rocks and mountains, with only well water to drink?† â€Å"No offense, Hari. I just want to make sure you’ll get the point of the story. On our beaches at Cinna, we’re pretty lighthearted about what we wear†¦ or don’t wear.† â€Å"Nude beaches?† â€Å"Not actually, though I suppose if someone removed all of his or her clothing it wouldn’t be much remarked on. The custom is to wear a decent minimum, but I must admit that what we consider decent leaves very little to the imagination.† Seldon said, â€Å"We have somewhat higher standards of decency on Helicon.† â€Å"Yes, I could tell that by your careful treatment of me, but to each its own. In any case, I was sitting at the small beach by the lake and a young man approached to whom I had spoken earlier in the day. He was a decent fellow I found nothing particularly wrong with. He sat on the arm of my chair and placed his right hand on my left thigh, which was bare, of course, in order to steady himself. â€Å"After we had spoken for a minute and a half or so, he said, impishly. ‘Here I am. You know me hardly at all and yet it seems perfectly natural to me that I place my hand on your thigh. What’s more, it seems perfectly natural to you, since you don’t seem to mind that it remains there.’ â€Å"It was only then that I actually noticed that his hand was on my thigh. Bare skin in public somehow loses some of its sexual quality. As I said, its the hiding from view that is crucial. â€Å"And the young man felt this too, for he went on to say, ‘Yet if I were to meet you under more formal conditions and you were wearing a gown, you wouldn’t dream of letting me lift your gown and place my hand on your thigh on the precise spot it now occupies.’ â€Å"I laughed and we continued to talk of this and that. Of course, the young man, now that my attention had been called to the position of his hand, felt it no longer appropriate to keep it there and removed it. â€Å"That night I dressed for dinner with more than usual care and appeared in clothing that was considerably more formal than was required or than other women in the dining room were wearing. I found the young man in question. He was sitting at one of the tables. I approached, greeted him, and said, ‘Here I am in a gown, but under it my left thigh is bare. I give you permission. Just lift the gown and place your hand on my left thigh where you had it earlier.’ â€Å"He tried. I’ll give him credit for that, but everyone was staring. I wouldn’t have stopped him and I’m sure no one else would have stopped him either, but he couldn’t bring himself to do it. It was no more public then than it had been earlier and the same people were present in both cases. It was clear that I had taken the initiative and that I had no objections, but he could not bring himself to violate the proprieties. The conditions, which had been hand-on-thigh in the afternoon, were not hand-on-thigh in the evening and that meant more than anything logic could say.† Seldon said, â€Å"I would have put my hand on your thigh.† â€Å"Are you sure?† â€Å"Positive.† â€Å"Even though your standards of decency on the beach are higher than ours are?† â€Å"Yes.† Dors sat down on her own cot, then lay down with her hands behind her head. â€Å"So that you’re not particularly disturbed that I’m wearing a nightgown with very little underneath it.† â€Å"I’m not particularly shocked. As for being disturbed, that depends on the definition of the word. I’m certainly aware of how you’re dressed.† â€Å"Well, if we’re going to be cooped up here for a period of time, we’ll have to learn to ignore such things.† â€Å"Or take advantage of them,† said Seldon, grinning. â€Å"And I like your hair. After seeing you bald all day, I like your hair.† â€Å"Well, don’t touch it. I haven’t washed it yet.† She half-closed her eyes. â€Å"It’s interesting. You’ve detached the informal and formal level of respectability. What you’re saying is that Helicon is more respectable at the informal level than Cinna is and less respectable at the formal level. Is that right?† â€Å"Actually, I’m just talking about the young man who placed his hand on your thigh and myself. How representative we are as Cinnians and Heliconians, respectively, I can’t say. I can easily imagine some perfectly proper individuals on both worlds-and some madcaps too.† â€Å"We’re talking about social pressures. I’m not exactly a Galactic traveler, but I’ve had to involve myself in a great deal of social history. On the planet of Derowd, there was a time when premarital sex was absolutely free. Multiple sex was allowed for the unmarried and public sex was frowned upon only when traffic was blocked: And yet, after marriage, monogamy was absolute and unbroken. The theory was that by working off all one’s fantasies first, one could settle down to the serious business of life.† â€Å"Did it work?† â€Å"About three hundred years ago that stopped, but some of my colleagues say it stopped through external pressure from other worlds who were losing too much tourist business to Derowd. There is such a thing as overall Galactic social pressure too.† â€Å"Or perhaps economic pressure, in this case.† â€Å"Perhaps. And being at the University, by the way, I get a chance to study social pressures, even without being a Galactic traveler. I meet people from scores of places inside and outside of Trantor and one of the pet amusements in the social science departments is the comparison of social pressures. â€Å"Here in Mycogen, for instance, I have the impression that sex is strictly controlled and is permitted under only the most stringent rules, all the more tightly enforced because it is never discussed. In the Streeling Sector, sex is never discussed either, but it isn’t condemned. In the Jennat Sector, where I spent a week once doing research, sex is discussed endlessly, but only for the purpose of condemning it. I don’t suppose there are any two sectors in Trantor-or any two worlds outside Trantor-in which attitudes toward sex are completely duplicated.† Seldon said, â€Å"You know what you make it sound like? It would appear-â€Å" Dors said, â€Å"I’ll tell you how it appears. All this talk of sex makes one thing clear to me. I’m simply not going to let you out of my sight anymore.† â€Å"What?† â€Å"Twice I let you go, the first time through my own misjudgment and the second because you bullied me into it. Both times it was clearly a mistake. You know what happened to you the first time.† Seldon said indignantly, â€Å"Yes, but nothing happened to me the second time.† â€Å"You nearly got into a lot of trouble. Suppose you had been caught indulging in sexual escapades with a Sister?† â€Å"It wasn’t a sexual-â€Å" â€Å"You yourself said she was in a high state of sexual excitement.† â€Å"But-â€Å" â€Å"It was wrong. Please get it through your head, Hari. From now on, you go nowhere without me.† â€Å"Look,† said Seldon freezingly, â€Å"my object was to find out about Mycogenian history and as a result of the so-called sexual escapade with a Sister, I have a book-the Book.† â€Å"The Book! True, there’s the Book. Let’s see it.† Seldon produced it and Dors thoughtfully hefted it. She said, â€Å"It might not do us any good, Hari. This doesn’t look as though it will fit any projector I’ve ever encountered. That means you’ll have to get a Mycogenian projector and they’ll want to know why you want it. They’ll then find out you have this Book and they’ll take it away from you.† Seldon smiled. â€Å"If your assumptions were correct, Dors, your conclusions would be inescapable, but it happens that this is not the kind of book you think it is. It’s not meant to be projected. The material is printed on various pages and the pages are turned. Raindrop Forty-Three explained that much to me.† â€Å"A print-book!† It was hard to tell whether Dors was shocked or amused. â€Å"That’s from the Stone Age.† â€Å"It’s certainly pre-Empire,† said Seldon, â€Å"but not entirely so. Have you ever seen a print-book?† â€Å"Considering that I’m a historian? Of course, Hari.† â€Å"Ah, but like this one?† He handed over the Book and Dors, smiling, opened it-then turned to another page-then flipped the pages. â€Å"Its blank,† she said. â€Å"It appears to be blank. The Mycogenians are stubbornly primitivistic, but not entirely so. They will keep to the essence of the primitive, but have no objection to using modern technology to modify it for convenience’s sake. Who knows?† â€Å"Maybe so, Hari, but I don’t understand what you’re saying.† â€Å"The pages aren’t blank, they’re covered with microprint. Here, give it back. If I press this little nubbin on the inner edge of the cover- Look!† The page to which the book lay open was suddenly covered with lines of print that rolled slowly upward. Seldon said, â€Å"You can adjust the rate of upward movement to match your reading speed by slightly twisting the nubbin one way or the other. When the lines of print reach their upward limit when you reach the bottom line, that is-they snap downward and turn off. You turn to the next page and continue.† â€Å"Where does the energy come from that does all this?† â€Å"It has an enclosed microfusion battery that lasts the life of the book.† â€Å"Then when it runs down-â€Å" â€Å"You discard the book, which you may be required to do even before it runs down, given wear and tear, and get another copy. You never replace the battery.† Dors took the Book a second time and looked at it from all sides. She said, â€Å"I must admit I never heard of a book like this.† â€Å"Nor I. The Galaxy, generally, has moved into visual technology so rapidly, it skipped over this possibility.† â€Å"This is visual.† â€Å"Yes, but not with the orthodox effects. This type of book has its advantages. It holds far more than an ordinary visual book does.† Dors said, â€Å"Where’s the turn-on?-Ah, let me see if I can work it.† She had opened to a page at random and set the lines of print marching upward. Then she said, â€Å"I’m afraid this won’t do you any good, Hari. It’s pre-Galactic. I don’t mean the book. I mean the print†¦ the language.† â€Å"Can you read it, Dors? As a historian-â€Å" â€Å"As a historian, I’m used to dealing with archaic language-but within limits. This is far too ancient for me. I can make out a few words here and there, but not enough to be useful.† â€Å"Good,† said Seldon. â€Å"If it’s really ancient, it will be useful.† â€Å"Not if you can’t read it.† â€Å"I can read it,† said Seldon. â€Å"It’s bilingual. You don’t suppose that Raindrop Forty-Three can read the ancient script, do you?† â€Å"If she’s educated properly, why not?† â€Å"Because I suspect that women in Mycogen are not educated past household duties. Some of the more learned men can read this, but everyone else would need a translation to Galactic.† He pushed another nubbin. â€Å"And this supplies it.† The lines of print changed to Galactic Standard. â€Å"Delightful,† said Dors in admiration. â€Å"We could learn from these Mycogenians, but we don’t.† â€Å"We haven’t known about it.† â€Å"I can’t believe that. I know about it now. And you know about it. There must be outsiders coming into Mycogen now and then, for commercial or political reasons, or there wouldn’t be skincaps so ready for use. So every once in a while someone must have caught a glimpse of this sort of print-book and seen how it works, but it’s probably dismissed as something curious but not worth further study, simply because it’s Mycogenian.† â€Å"But is it worth study?† â€Å"Of course. Everything is. Or should be. Hummin would probably point to this lack of concern about these books as a sign of degeneration in the Empire.† He lifted the Book and said with a gush of excitement, â€Å"But I am curious and I will read this and it may push me in the direction of psychohistory.† â€Å"I hope so,† said Dors, â€Å"but if you take my advice, you’ll sleep first and approach it fresh in the morning. You won’t learn much if you nod over it.† Seldon hesitated, then said, â€Å"How maternal you are!† â€Å"I’m watching over you.† â€Å"But I have a mother alive on Helicon. I would rather you were my friend.† â€Å"As for that, I have been your friend since first I met you.† She smiled at him and Seldon hesitated as though he were not certain as to the appropriate rejoinder. Finally he said, â€Å"Then I’ll take your advice-as a friend-and sleep before reading.† He made as though to put the Book on a small table between the two cots, hesitated, turned, and put it under his pillow. Dors Venabili laughed softly. â€Å"I think you’re afraid I will wake during the night and read parts of the Book before you have a chance to. Is that it?† â€Å"Well,† said Seldon, trying not to look ashamed, â€Å"that may be it. Even friendship only goes so far and this is my book and it’s my psychohistory.† â€Å"I agree,† said Dors, â€Å"and I promise you that we won’t quarrel over that. By the way, you were about to say something earlier when I interrupted you. Remember?† Seldon thought briefly. â€Å"No.† In the dark, he thought only of the Book. He gave no thought to the hand-on-thigh story. In fact, he had already quite forgotten it, consciously at least. 48. Venabili woke up and could tell by her timeband that the night period was only half over. Not hearing Hari’s snore, she could tell that his cot was empty. If he had not left the apartment, then he was in the bathroom. She tapped lightly on the door and said softly, â€Å"Hari?† He said, â€Å"Come in,† in an abstracted way and she did. The toilet lid was down and Seldon, seated upon it, held the Book open on his lap. He said, quite unnecessarily, â€Å"I’m reading.† â€Å"Yes, I see that. But why?† â€Å"I couldn’t sleep. I’m sorry.† â€Å"But why read in here?† â€Å"If I had turned on the room light, I would have woken you up.† â€Å"Are you sure the Book can’t be illuminated?† â€Å"Pretty sure. When Raindrop Forty-Three described its workings, she never mentioned illumination. Besides, I suppose that would use up so much energy that the battery wouldn’t last the life of the Book.† He sounded dissatisfied. Dors said, â€Å"You can step out, then. I want to use this place, as long as I’m here.† When she emerged, she found him sitting cross-legged on his cot, still reading, with the room well lighted. She said, â€Å"You don’t look happy. Does the Book disappoint you?† He looked up at her, blinking. â€Å"Yes, it does. I’ve sampled it here and there. It’s all I’ve had time to do. The thing is a virtual encyclopedia and the index is almost entirely a listing of people and places that are of little use for my purposes. It has nothing to do with the Galactic Empire or the pre-Imperial Kingdoms either. It deals almost entirely with a single world and, as nearly as I can make out from what I have read, it is an endless dissertation on internal politics.† â€Å"Perhaps you underestimate its age. It may deal with a period when there was indeed only one world†¦ one inhabited world.† â€Å"Yes, I know,† said Seldon a little impatiently. â€Å"That’s actually what I want-provided I can be sure its history, not legend. I wonder. I don’t want to believe it just because I want to believe it.† Dors said, â€Å"Well, this matter of a single-world origin is much in the air these days. Human beings are a single species spread all over the Galaxy, so they must have originated somewhere. At least that’s the popular view at present. You can’t have independent origins producing the same species on different worlds.† â€Å"But I’ve never seen the inevitability of that argument,† said Seldon. â€Å"If human beings arose on a number of worlds as a number of different species, why couldn’t they have interbred into some single intermediate species?† â€Å"Because species can’t interbreed. That’s what makes them species.† Seldon thought about it a moment, then dismissed it with a shrug. â€Å"Well, I’ll leave it to the biologists.† â€Å"They’re precisely the ones who are keenest on the Earth hypothesis.† â€Å"Earth? Is that what they call the supposed world of origin?† â€Å"That’s a popular name for it, though there’s no way of telling what it was called, assuming there was one. And no one has any clue to what its location might be.† â€Å"Earth!† said Seldon, curling his lips. â€Å"It sounds like a belch to me. In any case, if the book deals with the original world, I didn’t come across it. How do you spell the word?† She told him and he checked the Book quickly. â€Å"There you are. The name is not listed in the index, either by that spelling or any reasonable alternative.† â€Å"Really?† â€Å"And they do mention other worlds in passing. Names aren’t given and there seems no interest in those other worlds except insofar as they directly impinge on the local world they speak of†¦ at least as far as I can see from what I’ve read. In one place, they talked about ‘The Fifty.’ I don’t know what they meant. Fifty leaders? Fifty cities? It seemed to me to be fifty worlds.† â€Å"Did they give a name to their own world, this world that seems to preoccupy them entirely?† asked Dors. â€Å"If they don’t call it Earth, what do they call it?† â€Å"As you’d expect, they call it ‘the world’ or ‘the planet.’ Sometimes they call it ‘the Oldest’ or ‘the World of the Dawn,’ which has a poetic significance, I presume, that isn’t clear to me. I suppose one ought to read the Book entirely through and some matters will then grow to make more sense.† He looked down at the Book in his hand with some distaste. â€Å"It would take a very long time, though, and I’m not sure that I’d end up any the wiser.† Dors sighed. â€Å"I’m sorry, Hari. You sound so disappointed.† â€Å"That’s because I am disappointed. It’s my fault, though. I should not have allowed myself to expect too much.-At one point, come to think of it, they referred to their world as ‘Aurora.’ â€Å" â€Å"Aurora?† said Dors, lifting her eyebrows. â€Å"It sounds like a proper name. It doesn’t make any sense otherwise, as far as I can see. Does it mean anything to you, Dors?† â€Å"Aurora.† Dors thought about it with a slight frown on her face. â€Å"I can’t say I’ve ever heard of a planet with that name in the course of the history of the Galactic Empire or during the period of its growth, for that matter, but I won’t pretend to know the name of every one of the twenty-five million worlds. We could look it up in the University library-if we ever get back to Streeling. There’s no use trying to find a library here in Mycogen. Somehow I have a feeling that all their knowledge is in the Book. If anything isn’t there, they aren’t interested.† Seldon yawned and said, â€Å"I think you’re right. In any case, there’s no use reading any more and I doubt that I can keep my eyes open any longer. Is it all right if I put out the light?† â€Å"I would welcome it, Hari. And let’s sleep a little later in the morning.† Then, in the dark, Seldon said softly, â€Å"Of course, some of what they say is ridiculous. For instance, they refer to a life expectancy on their world of between three and four centuries.† â€Å"Centuries?† â€Å"Yes, they count their ages by decades rather than by years. It gives you a queer feeling, because so much of what they say is perfectly matter-of-fact that when they come out with something that odd, you almost find yourself trapped into believing it.† â€Å"If you feel yourself beginning to believe that, then you should realize that many legends of primitive origins assume extended life spans for early leaders. If they’re pictured as unbelievably heroic, you see, it seems natural that they have life spans to suit.† â€Å"Is that so?† said Seldon, yawning again. â€Å"It is. And the cure for advanced gullibility is to go to sleep and consider matters again the next day.† And Seldon, pausing only long enough to think that an extended life span might well be a simple necessity for anyone trying to understand a Galaxy of people, slept. 49. The next morning, feeling relaxed and refreshed and eager to begin his study of the Book again, Hari asked Dors, â€Å"How old would you say the Raindrop sisters are?† â€Å"I don’t know. Twenty†¦ twenty-two?† â€Å"Well, suppose they do live three or four centuries.† â€Å"Hari. That’s ridiculous.† â€Å"I’m saying suppose. In mathematics, we say ‘suppose’ all the time and see if we can end up with something patently untrue or self-contradictory. An extended life span would almost surely mean an extended period of development. They might seem in their early twenties and actually be in their sixties.† â€Å"You can try asking them how old they are.† â€Å"We can assume they’d lie.† â€Å"Look up their birth certificates.† Seldon smiled wryly. â€Å"I’ll bet you anything you like-a roll in the hay, if you’re willing-that they’ll claim they don’t keep records or that, if they do, they will insist those records are closed to tribespeople.† â€Å"No bet,† said Dors. â€Å"And if that’s true, then it’s useless trying to suppose anything about their age.† â€Å"Oh no. Think of it this way. If the Mycogenians are living extended life spans that are four or five times that of ordinary human beings, they can’t very well give birth to very many children without expanding their population tremendously. You remember that Sunmaster said something about not having the population expand and bit off his remarks angrily at that time.† Dors said, â€Å"What are you getting at?† â€Å"When I was with Raindrop Forty-Three, I saw no children.† â€Å"On the microfarms?† â€Å"Yes.† â€Å"Did you expect children there? I was with Raindrop Forty-Five in the shops and on the residential levels and I assure you I saw a number of children of all ages, including infants. Quite a few of them.† â€Å"Ah.† Seldon looked chagrined. â€Å"Then that would mean they can’t be enjoying extended life spans.† Dors said, â€Å"By your line of argument, I should say definitely not. Did you really think they did?† â€Å"No, not really. But then you can’t close your mind either and make assumptions without testing them one way or another.† â€Å"You can waste a lot of time that way too, if you stop to chew away at things that are ridiculous on the face of it.† â€Å"Some things that seem ridiculous on the face of it aren’t. That’s all. Which reminds me. You’re the historian. In your work, have you ever come across objects or phenomena called ‘robots’?† â€Å"Ah! Now you’re switching to another legend and a very popular one. There are any number of worlds that imagine the existence of machines in human form in prehistoric times. These are called ‘robots.’ â€Å"The tales of robots probably originate from one master legend, for the general theme is the same. Robots were devised, then grew in numbers and abilities to the status of the almost superhuman. They threatened humanity and were destroyed. In every case, the destruction took place before the actual reliable historic records available to us today existed. The usual feeling is that the story is a symbolic picture of the risks and dangers of exploring the Galaxy, when human beings expanded outward from the world or worlds that were their original homes. There must always have been the fear of encountering other-and superior-intelligences.† â€Å"Perhaps they did at least once and that gave rise to the legend.† â€Å"Except that on no human-occupied world has there been any record or trace of any prehuman or nonhuman intelligence.† â€Å"But why ‘robots’? Does the word have meaning?† â€Å"Not that I know of, but it’s the equivalent of the familiar ‘automata.’ â€Å" â€Å"Automata! Well, why don’t they say so?† â€Å"Because people do use archaic terms for flavor when they tell an ancient legend. Why do you ask all this, by the way?† â€Å"Because in this ancient Mycogenian book, they talk of robots. And very favorably, by the way.-Listen, Dors, aren’t you going out with Raindrop Forty-Five again this afternoon?† â€Å"Supposedly-if she shows up.† â€Å"Would you ask her some questions and try to get the answers out of her?† â€Å"I can try. What are the questions?† â€Å"I would like to find out, as tactfully as possible, if there is some structure in Mycogen that is particularly significant, that is tied in with the past, that has a sort of mythic value, that can-â€Å" Dors interrupted, trying not to smile. â€Å"I think that what you are trying to ask is whether Mycogen has a temple.† And, inevitably, Seldon looked blank and said, â€Å"What’s a temple?† â€Å"Another archaic term of uncertain origin. It means all the things you asked about-significance, past, myth. Very well, I’ll ask. It’s the sort of thing, however, that they might find difficult to speak of. To tribespeople, certainly.† â€Å"Nevertheless, do try.† How to cite Prelude to Foundation Chapter 10 Book, Essay examples

Friday, December 6, 2019

Global Increase in Number of Refugees Problem and Its Solutions

Question: Discuss about theGlobal Increase in Number of Refugees Problem and Its Solutions. Answer: Introduction Refugees are termed as people, who flee from their domestic country because of huge fear of remaining persecuted because of race, nationality, religion or for gaining membership of a specific social group (Choi Salehyan, 2013). The old problems related to increasing refugees remain unsolved, several new issues are taking place and considering this, the situation of the refugees has not improved at all. The objective of the essay is to describe the fact that despite of a constantly developing world, the problem of increased refugees needs to be addressed. Discussion Problem in Global Increase in Number of Refugees Poverty is considered as the major reason for the increasing refugee problem. It is noticed that the number of refugees in every continent indicates a considerable fraction of people, who suffer from starvation. Shortage of food and crops also contribute to the cause of this major concern (Knox Kushne, 2012). It was also demonstrated that due to the extreme food shortage and great food deficit all over the world, the lives of the domestic residents were threatened. Moreover, natural disasters such as sudden outbreak of flood resulted in causing drastic damage to crops. Such situation forced people to leave their nation and become refugees. Moreover, territorial disputes resulted in increase of the global refugee population (Kneebone, 2014). Fastest growth of global refugee population has resulted in depletion or shortage of the natural resources in certain parts of the world that has caused drastic climate change and disrupted the environment of their native place, which forced them to look for other places to live (Martin Yankay, 2014). Solutions to Such Problem and their Evaluation In response to the large refugee population all over the world, effective solutions to deal with such issue is formulated. The strategy of refugee aid and development focuses on the moving the refugees towards self-sufficiency. Such strategy is deemed effective as such solution has the capability to compensate for certain adverse social and economic effects on the refugees of the domestic nation (Style et al., 2013). Another solution is to offer humanitarian aid to the refugees at the time of natural disasters or poverty situation within a nation. Such solution is deemed highly effective, as it addresses the most vital requirements of the refugees. Along with that, such solution is observed to protect and support them at the time of their displacement and return to their own nation. Another solution that can help in decreasing the number of refuges is through strengthening the global disaster preparedness and its prevention. This intends to decrease the vulnerability of the society a nd avoid their displacement. Conclusion The objective of the essay was to describe the fact that despite of a constantly developing world, the problem of increasing refugees is also present that needs to be addressed. It was gathered from the essay that the solution, which can help in decreasing the number of refuges, is through strengthening the global disaster preparedness and its prevention. This can decrease the vulnerability of the society and avoid their displacement. References Choi, S. W. Salehyan, I. (2013). No good deed goes unpunished: refugees, humanitarian aid, and terrorism.Conflict Management and Peace Science,30(1), 53-75. Kneebone, S. (2014). The Bali Process and Global Refugee Policy in the AsiaPacific Region.Journal of Refugee Studies, feu015. Knox, K. Kushner, T. (2012).Refugees in an age of genocide: Global, national and local perspectives during the twentieth century. Routledge. Martin, D. C. Yankay, J. E. (2014). Refugees and asylees: 2013.East Asia,16(18,000), 19-000. Style, S., Tondeur, M., Wilkinson, C., Oman, A., Spiegel, P., Kassim, I. A. Seal, A. (2013). Operational Guidance on the use of special nutritional products in refugee populations.Food and nutrition bulletin,34(4), 420-428.

Monday, November 25, 2019

Free Essays on Hussein

Saddam Hussein took his position as the Head of State of Iraq on July 11th, 1979 after the people had voted to relieve his predecessor, Ahmad Hasan Bakr, due to health reasons. Before he became the Supreme Ruler of Iraq, he held many seats and offices to include Chairman of the Revolutionary Command Council, Secretary General of the Ba’th Party Regional Command, Prime Minister and Commander-in-Chief of the Armed Forces (Karsh 110). With all of these positions that he had held at some point in time, it was no wonder that his popularity was wide spread, but unfortunately, his views and beliefs in which he expected to make known were not. As stated earlier, Hussein’s involvement in the Ba’th Party is no mystery. However, contrary to popular belief, he did not in fact start it. Two Syrian schoolteachers from Damascus established the Ba’th Party in the early 1940’s. Its ideology and agenda is the rise and unification of the Arab world, and to elimi nate the traces of colonialism in the Middle East (Karsh 12). The Ba’th Party was secretly established in Iraq by 1950, but did not take control until 1963. This lasted only until a Prime Minister who was not involved in the Ba’th beliefs took office in 1963. Due to the part of high elected political officials and senior military officers, the Ba’th Party once again gained full control over Iraq in 1968 and remained that way until March-April of 2003 where the Ba’th Part and it’s political leadership was destroyed by U- led coalition forces (Orient).... Free Essays on Hussein Free Essays on Hussein Saddam Hussein took his position as the Head of State of Iraq on July 11th, 1979 after the people had voted to relieve his predecessor, Ahmad Hasan Bakr, due to health reasons. Before he became the Supreme Ruler of Iraq, he held many seats and offices to include Chairman of the Revolutionary Command Council, Secretary General of the Ba’th Party Regional Command, Prime Minister and Commander-in-Chief of the Armed Forces (Karsh 110). With all of these positions that he had held at some point in time, it was no wonder that his popularity was wide spread, but unfortunately, his views and beliefs in which he expected to make known were not. As stated earlier, Hussein’s involvement in the Ba’th Party is no mystery. However, contrary to popular belief, he did not in fact start it. Two Syrian schoolteachers from Damascus established the Ba’th Party in the early 1940’s. Its ideology and agenda is the rise and unification of the Arab world, and to elimi nate the traces of colonialism in the Middle East (Karsh 12). The Ba’th Party was secretly established in Iraq by 1950, but did not take control until 1963. This lasted only until a Prime Minister who was not involved in the Ba’th beliefs took office in 1963. Due to the part of high elected political officials and senior military officers, the Ba’th Party once again gained full control over Iraq in 1968 and remained that way until March-April of 2003 where the Ba’th Part and it’s political leadership was destroyed by U- led coalition forces (Orient)....

Thursday, November 21, 2019

Building a customer loyalty scheme via The Three Commitment Components Essay

Building a customer loyalty scheme via The Three Commitment Components model for family-run Thai restaurants in London - Essay Example The latter trend has borne business ventures’ interest in fostering consumer loyalty, which is synonymous with consumer adherence to an establishment’s products and services, as opposed to shifting to alternative suppliers. Further, adoption of consumer loyalty has seen firms shift from the traditional marketing model that primarily targeted broadening of their consumer bases and enhancing profitability through increased sales volumes, toward marketing for loyalty. The widespread inclination is evident from the increasing number of companies that are opting to formulate, implement, assess and improve loyalty strategies or programmes meant to develop stable relations with customers. This paper seeks to provide insight into how the three commitment component model can be used to formulate loyalty programmes and consequently foster consumers’ loyalty to a family-run Thai restaurant based in London. Customer loyalty will enable the Thai restaurant to attain higher ef ficiency by streamlining operation strategies, providing customers’ with favorite meals or services, and incurring lower expenditure, while using three commitment component model-based programmes. Conventionally, firms utilized a loyalty strategy that sought to attract numerous customers, but not to retain them in the long run. An excellent example of a traditional loyalty model is the behavioural approach, whereby firms take advantage of customers’ buying propensities to build a loyalty program. This translates to creation of slow point redemption of points or rewards by a customer after they use the establishment’s products or services for a while. Contrastingly, the three commitment component model encompasses three principal loyalty elements, that is, the affective, normative and continuance. The affective aspect represents elements that bind consumers willingly to a service provider. The

Wednesday, November 20, 2019

Critical Thinking and Decision Making Essay Example | Topics and Well Written Essays - 1250 words

Critical Thinking and Decision Making - Essay Example The initial stage is to perceive the problems associated with the company being in the state docket, low return is likely to be the major shortcoming. The main question in this stage is what to be done to reverse the situation. Human resource department, however, is the most critical since it deals with human, who have feelings and emotions among other traits. Formulating the problem may require special skills and understanding. A time a company may be compelled to hire or outsource skilled and experienced professionals to detect or ascertain some short comings. The basics behind problem detection are comparing the current situation with the company goals or target. Some economic yard sticks can be used to evaluate accompany and ascertain whether it is on a gaining or losing trend (Eric, 2003). Problems related to human resource can best be ascertained by involving every worker to give his/her opinion on the company’s management and operation. Workers from different department s and positions can be interviewed one at time, this is to ensure confidentiality. The second step is interpreting the problem. This requires some deep understanding of a particular company aspect. Scientific principles could be applied to analyze the problem, in other words, this steps transforms the problem understanding form layman’s perception to a more detailed one. It is in this stage that several professionals are consulted to give scientific causes and remedies of the problems. This step can also be accomplished by interviewing the top management team in a specific field or department, for instance, social counselors or therapists may engage dialogue by the top management team to analyze a specific social or management problem in the organization. The third step is arranging the problems in the order of their priority. The most important goal of any organization or business is to make profit. The state governor thought the company is not doing well, hence the option t o privatize it. This might see the company make $250,000 annual profit. This helps to deal with the most critical problems then handle the rest while the company operates. It requires skilled and experienced professionals to determine which problems are more critical than the rest. Research indicates that this step require workers who have been in a certain organization for quite a long time. This is because they have good experience on Company’s operations, hence it is always important to retain two to five old workers in every department. This step requires deep understanding of a company’s goals and objectives. This stage may also compel the management team to review company’s records to ascertain how previous similar problems were dealt with. The fourth step involves using proven scientific methods to solve the problem in question. The State will apply proven economic principles in the transition/ privatization. According to the governor, the best alternativ e is to privatize the DMV. The principles have to consider the current workers; hence the governor promised that they will be employed in other companies but same department and position. Furthermore, the state will continue to provide the company with software, hardware and other professionals. Some proven yard sticks or models could be used to pick the best alternative (Shapira, 2002). For instance, economic alternatives could be vetted using present and future value yard

Monday, November 18, 2019

Positive Impact of Banning Smoking in Public Places Essay - 1

Positive Impact of Banning Smoking in Public Places - Essay Example Basically, smokers have the right to continue smoking despite the adverse health consequences of smoking whereas non-smokers have the right for a clean air each time they go to public places like restaurants, malls, and offices. Given that the local government banned smoking in public places, a lot of businesses strictly prohibit the smoking of cigarettes within their working environment and offices. In line with the banning of smoking in public places, three major reasons will be presented in order to convince the readers why I strongly support the government’s legislation on making smoking illegal in public areas. My auntie who lives in another town died at a very young age due to second-hand smoking. She is one of the closest relatives I have considered since we shared a common interest in photography. I have never seen my auntie smoke. Since she has always been with friends who smoke at least two packs of cigarettes a day, her life became in danger. Because of the close re lationship I had with my auntie, I spent almost every single day with her while she was confined at the hospital. Personally, I have seen how she suffered physically from a lung cancer. Due to her bad faith, the researcher strongly supports the banning of smoking in public places. Similar incidence recently happened to my best friend’s father. My best friend’s father is currently undergoing chemotherapy due to second-hand smoking he gets each day from his workplace. Aside from the financial burden the chemotherapy brings to my best friend’s family, there is still a risk that they would lose the head of their family. Similar to all stories related to what happens to patients with smoking habits, my sister who is a nurse told me a lot of smokers are unable to quit smoking despite knowing the health consequences of smoking. She said that patients with lung cancer often experience difficulty in breathing. The fact that there is no way to replace the lungs increases the risk of patients with chronic lung cancer to die.

Friday, November 15, 2019

Communication Media for Banking Industry

Communication Media for Banking Industry Chapter 1: Introduction Introduction Todays world is world of technology. Everyday a new technology is introduced that can assist people in order to do their daily works easily and finally increase the quality of their life. These new technologies help their users in different aspects of their life, by saving time, doing works faster and better with lower level of error. The rapid development of information technology has brought unprecedented influence on the life of millions of people around the globe. Various activities were handled electronically through the adoption of IT in the workplace or at home, for example, e-mail, e-commerce and e-government (Guriting and Ndubisi, 2006). One of these technologies that effects most people around the world is Internet, which was born in the last years of 20 century and rapidly broke boundaries, time and place. It brought more easily communication ways from usual daily activities to high level official activities. Online shopping and paying is a symbol of developing internet te chnology. People can stay at home, be at their work place, or their car or any other place, and order their food, clothes , shoes and pay online and receive their orders without spending time for going to the shopping center or finding parking .so online paying helped its users saved their time and their money. Next generation of online paying is internet banking, which means doing transactions online without going to the bank, staying in long queues, and without direct face-to-face interacting. The terms of PC banking, online banking, Internet banking, and mobile banking refer to a number of ways in which customers can access their banks without having to be physically present at a bank branch. PC Banking relates to every banking business transacted from a customers PC. This can be done through online banking, in which bank transactions are conducted within a closed network, or via Internet banking, which permits the customer to perform transactions from any terminal with access to the Internet. Mobile banking is the implementation of banking and trading transactions using an Internet-enabled wireless device. (Mobile phones, PDAs, handheld computers, etc.). Thus mobile banking (m-banking) is a subset of Internet banking, I banking, (Hazell and Raphael, 2001) The banking industry is using the new communication media to offer its services to the customers with convenience. Using Internet banking and its nearest technology, mobile banking, is increased during these years around the world. Malaysian penetration of Internet banking and mobile banking, as the base infrastructure for this paper, is mentioned as below: In all five continents, penetration of internet and mobile banking are rapidly increasing. Especially in most developed countries, trend of internet banking is increasing, also using mobile banking, is increasing. Most of Europe has embraced GSM (Global System for Mobile Communications) as a format for wireless technology. This more standardized wireless telecommunications infrastructure has yielded a higher level of acceptance and penetration, which has led to speculation that Europe will drive innovations in wireless communications, this technology can use to do both internet banking and mobile banking. Although still need time to adapt the mobile banking. In most countries this service is available but Because of its price and some uncertainty about its security, mobile banking is not popular yet. North America represents the flip side of the European situation. Wireless communications, though far from rare, lag behind Europes penetration levels, while participation in the wired I nternet is the highest in the world. The North American wireless infrastructure is not as widespread as standardized as its European counterpart. In the Middle East, has secured 15 wireless infrastructure contracts in regional markets over the last 12 months, most recently in Kuwait. Motorolas work in Kuwait involves a $14 million contract with wireless GSM operator MTC to implement a countrywide capacity enhancement. The dual-band network implementation will enable cell phones to utilize the most efficient network route and frequency, thus optimizing network performance. In spite of the fact that internet and mobile banking has rapidly growth in all countries, but still there are people from developing countries that do not interest in use this facility. People of these countries are concerning about their personal information, privacy and security, and these are factors that will increase their uncertainty level of using internet banking(East African and West African countries in Malaysia interviewing). This anxiety can refer to their cultural background. culture can refer to the customs and beliefs of a nation that stay with people for years, and changing of fundamental of this culture is not possible easily. So culture of a country can affect the culture of sub-societies in that country, such as organizational culture, educational culture and etc. So each nation and country has especial fundamental in order to go to the technology world and use technology as an assistant in their life. Statement of the Problem According to the previous discussion, although there is rapidly increasing in internet banking penetration but still there is some unsafe feeling towards it. That means there are factors that can affect acceptance and adaption of a technology, beside existing factors such as usefulness, ease of use, subjective norm and etc. While essential research has been directed toward understanding the adoption and diffusion of IT (Prescott and Conger, 1995), there have been a few studies that specifically examine possible cultural effects on the adoption and dispersion of new information technologies (Raman and Wei, 1992). Research on the impact of corporate culture on IT acceptance provides a useful viewpoint (Cooper, 1994; Kydd and Jones, 1989) but ethnic or national culture research undoubtedly has a special character. The problem to be investigated is that there is no enough research that works on the effect of national culture on acceptance a technology. Thereafter This study examines the role of culture on technology acceptance model (TAM) adaption and tries to give an in depth view of Hofstede Cultural Dimensions towards acceptance of a technology (Power distance index:PID, Individualism/collectivism, Uncertainty avoidance). It is hoped that conclusions can be drawn and opened a window for managers and all who want to bring world of technology to their life and work. Research Objective The main aim of this paper is finding the role of culture in acceptance a new technology. That can be interpreted to culture role on the Technology Acceptance Model. Beside the main objective this study pursues following objectives: Giving the overall view of Hofstede Cultural Dimensions in different countries base on their Power Distance Index, Individualism/Collectivism and Uncertainty avoidance Opening a new window for all who work in IT and IS implementing, to bring technology in multinational and international organizations. Handling the problem that faced in multi-cultural society according to each person cultural background. Research Questions Main question can be draw as below: Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on TAM This main question can be expended as below: Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Usefulness (PU)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Ease of Use (PEOU)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Subjective Norm (SN)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Behavioral Control (PBC)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Behavioral Intention(BI) to use internet banking? Scope of the Study In order to achieve the best results in finding different attitude towards technology acceptance (Internet banking) among different people from different nations, student of four universities in Malaysia have been selected to administer the questionnaire in order to examine attitude towards internet and mobile banking. Because of large scope of this study and necessity of collaboration of more than 30 countries from the five continents in Malaysia, embassy of ten countries and their referees took part in this research by filling up questionnaires that was distributed by hand and by e-mail, also staffs of some international organizations in Malaysia cooperate in this research, and the last one, social networks such as facebook came to assist this paper by finding the different others countries communities in Malaysia. Significance of the Study As firms internationalize, there is a growing need to understand how cultural factors might affect a multinational organizations ability to adopt and utilize IT. Further studies may lead to knowledge that will help IT researchers and practitioners in improving the technology transfer process. Such knowledge will be worth to practitioners, because it could spell the difference between achievement and collapse in implementing IT. In the movement toward globalization of markets and corporate multinationalism, the value of more cross-cultural research is clear (Cash, McFarlan, McKenney and Applegate, 1992). In a large survey of information systems more than half of the respondents felt that global IT issues were keys to their firms future success (Ives and Jarvenpaa, 1991). As firms grow their operations in the international arena, there is a need to exploit the power of IT to communicate among these widespread locations and to coordinate activities both within and across countries. Henc e, it is important for the managers of these firms to learn, as much as they can, about the cross-cultural adoption and use of IT (Couger,1986; Kumar and Andersen,1990) Such understanding can make the distinction between success and failure in executing information technology and system. The study will be clear the differences and similarities between countries cultures, and will give nations attitude towards technology acceptance. This study will be the first one that combines culture and TAM across the five continents. The result can assists managers and technology developers around the world in order to apply IT through international organization. The unique results of this study can be a base for future research and open a window to work on TAM as viewpoint of culture. Summary and Organization of the Remaining Chapters The main part of the dissertation is divided into five Chapters, which will be briefly introduced: Chapter1: Introduction The introduction section a projects a brief overview of the study is provided. Chapter 2: Literature Review In this section, selected academic literature related to Technology acceptance model, related theory and Hofstede cultural dimension and its related academic literatures. Then conceptual framework and steps to developing the hypothesis are discussed. Chapter 3: Methodology The methodology section critically examines a range of research approaches and techniques. Sample and the size of samples, also one of the most important for this study, finding the sample from different countries who stay in Malaysia for study or work. The research technique that is selected for this study is Design of Experiment. Chapter 4: Analysis and Results In the analytical section, the research findings are explained briefly according to the data collection and analysis. Chapter 5: Discussion In discussion section the further interpretation and explanation the findings is provided and comparisons is made between the findings with other literature in the area of the study. Then the findings are summarized; recommendations for future research and the practicing manager are made. Chapter 2: Literature Review Introduction This chapter is included of backgrounds and literatures in Technology acceptance Model, Hofstede cultural Dimensions and previous researchs including of cultural role on TAM. This chapter will prove the unique work of this paper. Framework, definitions and hypothesis development for this study, will mention and discuss in this chapter. Technology Acceptance Model Technology Acceptance Model (TAM) is one of the most influential extensions of Ajzen and Fishbeins theory of reasoned action (TRA) that has been widely used to predict user acceptance and use based on perceived usefulness and ease of use. According to TRA, an individuals behavioural intention, which results in actual behaviour, is influenced by person subject norm and attitude, and the attitude is influenced by individual beliefs (Ajzen Fishbein, 1980). According to the Davis (1989), TAM hypothesizes that behavioural intention is a significant determinant of actual system use, and that behavioural intention is determined by two relevant beliefs, perceived usefulness and perceived ease of use. In TAM, an individuals principle determines the attitude toward using the system. The attitude develops the intention to use. Perceived usefulness is related to productivity but perceived ease-of-use is related to effort (Venkatesh, 1999). This intention influences the decision of actual technology usage. These causalities were largely studied and accepted (Suh and Han, 2002; Morris and Dillon, 1997; Teo, Lim, Lai, 1999). The most significant results of Davis study was the strong relation between Usefulness and Usage. Users of a technology try to cope with difficulties of a system, although difficulty of use can discourage adoption of a useful system, no amount of ease of use can give back for a system that does not perform a useful function.TAM used in several IS studies and proved useful determining technology acceptance, especially to explain computer usage behaviour. This justifies why TAM is suitable for studies in computer acceptance. Given the rising popularity of Electronic_ Commerce technology such as Internet banking and Mobile Banking and the dynamic user behaviors identified above, the TAM is a suitable framework for this study. There are other widely used and well known frameworks, such as uses and gratification or diffusion of innovation, but the TAM is considered the best fit for this study because other frameworks focus on different levels of analysis (macro, mezzo, or micro) or differ ent topics of emphasis (diffusion mechanisms, etc.). If modified appropriately, the TAM is the most effective tool for a study like this one, which investigates factors relating to usage and adoption, such as cultural dimensions. (Suh et al., 2002; Morris et al., 1997; Teo et al., 1999). The TAM was stimulated by the theory of reasoned action(1980), which argues that both the attitude toward an action and subjective norms have an impact on behavioral intention, which in turn affects how people perform an action. The TAM was an early attempt to apply psychological factors to information systems and computer adoption. It assumed that perceived usefulness and perceived ease of use were major influences on an individuals attitude toward using technology and, thus, ultimately, were related to actual use (Davis, 1989). Technology Acceptance Model (TAM) has been widely used to predict user acceptance and use based on perceived usefulness and ease of use (Davis, 1989). TAM conceives that behavioural intention is a significant determinant of actual system use, and that behavioural intention is determined by two main beliefs, perceived usefulness and perceived ease of use. The perceived usefulness refers to the degree to which an individual believes that using a particular system would enhance his/her job performance. The perceived ease of use refers to the degree to which an individual believes that using a particular system would be free of physical and mental efforts. In TAM, an individuals belief settles on the attitude toward using the system and, in turn, the attitude develops the intention to use. This intention influences the decision of actual technology usage. With the bang of the Internet and convergence technologies, researchers have modified TAM to demonstrate the empirical evidences of it in the convergence context. In fact, many researchers have proposed various extended TAM. For instance, Moon and Kim (2001) suggest a model where perceived playfulness was described as one of the antecedents of attitude toward Web surfing. They noted that most prior TAM research had focused only on extrinsic motivation, not on intrinsic motivation. Morris and Dillon (1997) found that TAM contributes to the prediction of individual usage of software. The motivational model that was adapted by Davis, Bagozzi, Warshaw (1992) employs two key constructs: extrinsic and intrinsic motivation. According to Venkatesh and Speier (1999), extrinsic motivation refers to the performance of an activity. Extrinsic motivation is perceived to help achieve valued outcomes that are distinct from the activity itself, such as improving job performance, pay, etc. Intrinsic motivation refers to the performance of an activity for no reason other than the process of performing it. In the case of technology a cceptance studies, perceived usefulness is an example of extrinsic motivation. Davis et al. (1992) found that perceived enjoyment was significantly related to the perceived ease of use. In the research on the usage intentions for information systems, Heijden (2004) adds perceived an enjoyment to TAM model. Cheong and Park (2005) also develop a more comprehensive version of TAM to better reflect mobile Internet context. Their model employs perceived playfulness, contents quality, system quality, Internet experience and perceived price level, in addition to perceived usefulness and ease of use. For the mobile services, Nysveen et al. (2005) investigate the consumers intention to use mobile services, which shows the four overall influences on usage intention: motivational influences, attitudinal influences, normative pressure, and perceived control. Similarly, Fogelgren-Pedersen (2005) found that connection stability and geographic coverage are one of the significant variables of perceived relative advantage in mobile Internet. Also, in the worldwide mobile Internet user survey, Fife (2005) found that perceived enhanced utility of mobile services are the strong value motivating use of mobile technology. While these studies found the significant perceived variables, they still do not find variables specific to mobile Internet. Viswanath Venkatesh, Morris, B.Davis, D.Davis (2003) worked on this issue an d eight prominent models are discussed, the eight models and their extensions are empirically compared, a unified model is formulated that integrates elements across the eight models, and the unified model is empirically validated. Using data from four organizations over a six-month period with three points of measurement, the eight models explained between 17% and 53% of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Technology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT provides a useful tool for managers needing to assess the likelihood of success for new technology introductions and helps them understand the drivers of acceptance in order to proactively design interventions targeted at populations of users that may be less inclined to adopt and use new systems. Theory of reason Action(TRA) Drawn from social Psychology.TRA is one of the most fundamental and inflectional theories of human behaviour. It has been used to predict a wide range of behaviours .Davis et al.(1989) applied TRA to individual acceptance of technology and found that the variance explained was largely consistent with studies that employed TRA in context of other behaviours Technology Acceptance Model(TAM) TAM is tailored to IS contexts, and was designed to predict information technology acceptance and usage on the job. Unlike TRA, the final conceptualization of TAM excludes the attitude construct in order to better explain intention parsimoniously. TAM2 extended TAM by including subjective norm as an additional predictor of intention in the case of mandatory settings (Venkatesh and Davis 2000). TAM has been widely applied to a diverse set of technologies and users. Theory of Planned Behaviour TPB extended TRA by adding the construct of perceived behavioural control is theorized to be an additional determinant of intention and behavioural .Ajzan(1991) presented a review of several studies they successfully used TPB to predict intention and behaviour in a wide variety of settings. TPB has been successfully applied to the understanding of individual acceptance and usage of many different technologies (Tailor and Todd, 1995). A related model is the Decomposed Theory of Planned Behaviour (DTPB). In terms of predicting intention, DTPB is identical to TPB. In contrast to TPB but similar to TAM, DTPB decomposes attitude, subjective norm, and perceived behavioural control into its the underlying belief structure within technology adaption contexts. Combined TAM and TPB It is a combination of TPB TAM to provide a hybrid model (Taylor and Todd,1995) Innovation Diffusion Theory (IDT) Grounded in sociology, IDT (Rogers 1964) has been used since the 1960s to study a variety of innovations, ranging from agricultural tools to organizational innovation (Tornatzky and Klein 1982). Within information systems, Moore and Benbasat (1991) adapted the characteristics of innovations presented in Rogers and refined a set of constructs that could be used to study individual technology acceptance. Moore and Benbasat (1996) found support for the predictive validity of these innovation Social Cognitive Theory (SCT) One of the most powerful theories of human behavior is social cognitive theory (Bandura 1986). Compeau and Higgins (1995) applied and extended SCT to the context of computer; while Compeau and Higgins (1995) also employed SCT, it was to study performance and thus is outside the goal of the current research. Compeau and Higgins'(1995) model studied computer use but the nature of the model and the underlying theory allow it to be extended to acceptance and use of information technology in general. The original model of Compeau and Higgins (1995) used usage as a dependent variable but in keeping with the spirit of predicting individual acceptance, In 2008, Ima, I., Kim, Y., Han, H. did a revising research on Venkatesh work. They claimed that in previous study there seem to be two critical factors that are overlooked or have received inadequate attention—perceived risk (PR) and technology type. PR has been recognized as an important factor and was modelled as a precursor of perceived usefulness (PU), and a sub construct of others, such as trust (or as its precursor). In their study PR and technology type, consider as additional to the moderating variables in UTAUT and was tested how they moderate the effects of PU and PEU on users intention to use a technology. It was shown the PR and technology type were moderating variables. Kim (2006) added two new constructs, Perceived Cost Savings and Companys Willingness to Fund, and two causal relationships, Job Relevance and Experience, as moderating effects to previous existing model and proved that there is a strong significant relationships between PCS and CWTF and behaviral i ntention to use a technology. also moderating effects of job relevance was proved , also found that an individuals intention to use mobile wireless technology was significantly affected by CWF. Kim claimed that a company must provide technology to their employees to help them perform their jobs. Finally, the individuals adopt a technology if it is within their prior experience, which was found to be significant moderator between CWF and BI. Prior studies based on TAM did not examine the direct link from self-efficacy to behavioral intention assuming the full mediation of perceived ease of use but Khalifa (2008) integrated the theory of planned behavior (Fishbein and Ajzen, 1975; Ajzen and Madden, 1986) and the technology acceptance model (TAM) (Davis, 1989) to explain the adoption of m-commerce as a new technology. He added subjective norm to the main block of TAM as an factors that have positive direct effect on the individuals intention and Self-efficacy as a positive direct effec t on the individuals intention to adopt m-commerce. During the years researchers examined different items and their relations with TAM models, they have used original framework of TAM and found relation between them. In paper by June Lu at el.(2008) was worked on different aspects of new technology in china, such as WMDS, these items are type of technology ,functionality of that technology, interface design, Personal innovativeness in information technology (PIIT), Facilitating conditions, Social influences ,security, trust , privacy and reliability of that technology. The result of this paper showed that intention to use WMDS via mobile phones in China was dependent on an individuals perceptual beliefs about the target services in terms of their usefulness and eases of use, and also relied on PIIT and mobile trust belief. According to Dong-Hee Shin(2007) , who work on Wi-Bro acceptance in Korea, users perceptions are significantly associated with their motivation to use Wi-Bro. Specifically, perceived quality and perceived availability are found to have significant effect on users extrinsic and intrinsic motivation. These factors play as enhancing factors to attitudes and intention. In 2005, Kim et al. Work on a Value-based Adoption of a technology such as mobile banking. A Value-based Adoption Model (VAM) would be able to capture the monetary sacrifice element and present adoption as a comparison of benefits and costs. By combination of Value-based Adoption Model (VAM) of M-Internet and by integrating the most relevant findings of the technology adoption and value literature, Kim(2005) designed its framework by dividing it to benefits and sacrifices. He suggested that customers evaluation of a product includes both cognitive and affective elements, and that products are purchased for their utilitarian and hedonic benefits, so it can be proved that usefulness and enjoyment as the benefit components of perceived value. Perceived sacrifices are both monetary and non-monetary. Monetary spending includes the actual price of the product, and it is generally measured based on customers perceptions of the actual price paid. Non-monetary costs usually include time, effo rt and other unsatisfactory spending for the purchase and consumption of the product. Yang (2004) did a research that examines different items that could affect technology acceptance. Innovation, past adaption behaviour, knowledge, technology cluster, age, gender and specialization were items that were tested in relation with technology acceptance in Yang study. He provided insights into the relationships between PU, PEOU, AT, consumer innovation adoption behaviour, and demographic variables and also offers empirical data to support the suitability of the TAM through examining the emerging M-commerce technology and application. PU is found to predict consumer adoption of M-commerce. Consumer innovativeness introduced into the TAM research to expand the scope of TAM applicability to M-commerce that is yet to accumulate a critical mass in the diffusion process. According to the Lo ´ pez-Nicola ´ s, Molina-Castillo, Harry Bouwman (2008), social factors are the important factors that influence on peoples decision to adopt a new technology such as mobile services. They try to evaluate the impact of different determinants on Behavioural Intention in the adoption of advanced mobile services, by combining acceptance models with diffusion theory models theory. In particular, we assumed that social influence may be a key element in peoples intention to use the services and applications. Social influence was defined as the degree to which individuals believed that others thought they should use advanced mobile services. The views of friends and relatives have a significant impact on using mobile services, Lo ´ pez-Nicola ´ s et al. proved that as a manager, that PEOU and behavioural intention depended significantly on social influences, so for bringing new services and technologies for organisations, notice to the employees cultural backgrou nd is important. In a study by Amin (2008) who used original TAM model to finding factors affecting the intentions of customers in Malaysia to use mobile banking, proved that bank managers should create favourable perceptions concerning the usefulness and ease of use among mobile phone credit card customers. Creating these positive perceptions might be achieved by offering free seminars to customers about the ease of use of the system Malaysian consumers often take up marketing initiatives of this type. Additionally, the banks should provide a mini-guide at all branches that provides succinct and cogent information concerning the efficiency, effectiveness and risk-free attributes of the mobile phone credit card system. In 2009 GU, Lee, Suh, integrated the fragmented models such as the extended TAM and the trust-based TAM into a unified model of mobile banking. They found that self-efficiency is the strongest antecedent of perceived ease-of-use, which directly and indirectly affected behavioural intention through perceived usefulness, also was found the structural assurances are the strongest antecedent of trust, which could increase behavioural intention of mobile banking. Gu et al. research was listed most important work on technology acceptance that used TAM as base. For example Taylor and Todd (1995) selected computing resource center and worked on usefulness, ease of use, attitude and behavioural intention, they worked on Subjective norm and Perceived behavioural control as their study antecedence (complete list of work on TAM was brought in Appendix A) Hofstede Cultural dimensions: Culture has been defined according to several perspectives. Definitions go from the most complex and the most comprehensive (e.g. Kluckhohn, 1962) to the most simple (e.g. Triandis, 1972, Hofstede, 1997). According to Kluckhohn (1962), Culture consists of patterns, explicit and implicit, of and for behavior acquired and transmitted by symbols, constituting the distinctive achievement of human groups, including their embodiments in artifacts (p.73). Hofstede cultural dimensions served as the most influential culture theory among social science research (Nokata and Sivakumar, 2001). In addition, Hofstede cultural framework has also received strong empirical support by Sondergaard work (1994).Geert Hofstede research gives insights into other cultures so that it will be more effective when interacting with people in other countries. If understood and applied properly, this information should reduce level of nuisance, concern, and distress. But most important, Geert Hofstede will give the edge of understanding which translates to more successful results. In 1980 Hofstede offered his famous description of cultural dimensions. Geert Hofstede collected and analyzed a large data base of employee values scores of IBM between 1967 and 1973 .it was included more than 70 countries. He first used the 40 largest countries and then extended the analysis to 50 countries and 3 regions. From t Communication Media for Banking Industry Communication Media for Banking Industry Chapter 1: Introduction Introduction Todays world is world of technology. Everyday a new technology is introduced that can assist people in order to do their daily works easily and finally increase the quality of their life. These new technologies help their users in different aspects of their life, by saving time, doing works faster and better with lower level of error. The rapid development of information technology has brought unprecedented influence on the life of millions of people around the globe. Various activities were handled electronically through the adoption of IT in the workplace or at home, for example, e-mail, e-commerce and e-government (Guriting and Ndubisi, 2006). One of these technologies that effects most people around the world is Internet, which was born in the last years of 20 century and rapidly broke boundaries, time and place. It brought more easily communication ways from usual daily activities to high level official activities. Online shopping and paying is a symbol of developing internet te chnology. People can stay at home, be at their work place, or their car or any other place, and order their food, clothes , shoes and pay online and receive their orders without spending time for going to the shopping center or finding parking .so online paying helped its users saved their time and their money. Next generation of online paying is internet banking, which means doing transactions online without going to the bank, staying in long queues, and without direct face-to-face interacting. The terms of PC banking, online banking, Internet banking, and mobile banking refer to a number of ways in which customers can access their banks without having to be physically present at a bank branch. PC Banking relates to every banking business transacted from a customers PC. This can be done through online banking, in which bank transactions are conducted within a closed network, or via Internet banking, which permits the customer to perform transactions from any terminal with access to the Internet. Mobile banking is the implementation of banking and trading transactions using an Internet-enabled wireless device. (Mobile phones, PDAs, handheld computers, etc.). Thus mobile banking (m-banking) is a subset of Internet banking, I banking, (Hazell and Raphael, 2001) The banking industry is using the new communication media to offer its services to the customers with convenience. Using Internet banking and its nearest technology, mobile banking, is increased during these years around the world. Malaysian penetration of Internet banking and mobile banking, as the base infrastructure for this paper, is mentioned as below: In all five continents, penetration of internet and mobile banking are rapidly increasing. Especially in most developed countries, trend of internet banking is increasing, also using mobile banking, is increasing. Most of Europe has embraced GSM (Global System for Mobile Communications) as a format for wireless technology. This more standardized wireless telecommunications infrastructure has yielded a higher level of acceptance and penetration, which has led to speculation that Europe will drive innovations in wireless communications, this technology can use to do both internet banking and mobile banking. Although still need time to adapt the mobile banking. In most countries this service is available but Because of its price and some uncertainty about its security, mobile banking is not popular yet. North America represents the flip side of the European situation. Wireless communications, though far from rare, lag behind Europes penetration levels, while participation in the wired I nternet is the highest in the world. The North American wireless infrastructure is not as widespread as standardized as its European counterpart. In the Middle East, has secured 15 wireless infrastructure contracts in regional markets over the last 12 months, most recently in Kuwait. Motorolas work in Kuwait involves a $14 million contract with wireless GSM operator MTC to implement a countrywide capacity enhancement. The dual-band network implementation will enable cell phones to utilize the most efficient network route and frequency, thus optimizing network performance. In spite of the fact that internet and mobile banking has rapidly growth in all countries, but still there are people from developing countries that do not interest in use this facility. People of these countries are concerning about their personal information, privacy and security, and these are factors that will increase their uncertainty level of using internet banking(East African and West African countries in Malaysia interviewing). This anxiety can refer to their cultural background. culture can refer to the customs and beliefs of a nation that stay with people for years, and changing of fundamental of this culture is not possible easily. So culture of a country can affect the culture of sub-societies in that country, such as organizational culture, educational culture and etc. So each nation and country has especial fundamental in order to go to the technology world and use technology as an assistant in their life. Statement of the Problem According to the previous discussion, although there is rapidly increasing in internet banking penetration but still there is some unsafe feeling towards it. That means there are factors that can affect acceptance and adaption of a technology, beside existing factors such as usefulness, ease of use, subjective norm and etc. While essential research has been directed toward understanding the adoption and diffusion of IT (Prescott and Conger, 1995), there have been a few studies that specifically examine possible cultural effects on the adoption and dispersion of new information technologies (Raman and Wei, 1992). Research on the impact of corporate culture on IT acceptance provides a useful viewpoint (Cooper, 1994; Kydd and Jones, 1989) but ethnic or national culture research undoubtedly has a special character. The problem to be investigated is that there is no enough research that works on the effect of national culture on acceptance a technology. Thereafter This study examines the role of culture on technology acceptance model (TAM) adaption and tries to give an in depth view of Hofstede Cultural Dimensions towards acceptance of a technology (Power distance index:PID, Individualism/collectivism, Uncertainty avoidance). It is hoped that conclusions can be drawn and opened a window for managers and all who want to bring world of technology to their life and work. Research Objective The main aim of this paper is finding the role of culture in acceptance a new technology. That can be interpreted to culture role on the Technology Acceptance Model. Beside the main objective this study pursues following objectives: Giving the overall view of Hofstede Cultural Dimensions in different countries base on their Power Distance Index, Individualism/Collectivism and Uncertainty avoidance Opening a new window for all who work in IT and IS implementing, to bring technology in multinational and international organizations. Handling the problem that faced in multi-cultural society according to each person cultural background. Research Questions Main question can be draw as below: Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on TAM This main question can be expended as below: Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Usefulness (PU)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Ease of Use (PEOU)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Subjective Norm (SN)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Perceived Behavioral Control (PBC)? Is there any effect by Hofstede cultural dimensions (PDI, IND/CLV, UAI) on Behavioral Intention(BI) to use internet banking? Scope of the Study In order to achieve the best results in finding different attitude towards technology acceptance (Internet banking) among different people from different nations, student of four universities in Malaysia have been selected to administer the questionnaire in order to examine attitude towards internet and mobile banking. Because of large scope of this study and necessity of collaboration of more than 30 countries from the five continents in Malaysia, embassy of ten countries and their referees took part in this research by filling up questionnaires that was distributed by hand and by e-mail, also staffs of some international organizations in Malaysia cooperate in this research, and the last one, social networks such as facebook came to assist this paper by finding the different others countries communities in Malaysia. Significance of the Study As firms internationalize, there is a growing need to understand how cultural factors might affect a multinational organizations ability to adopt and utilize IT. Further studies may lead to knowledge that will help IT researchers and practitioners in improving the technology transfer process. Such knowledge will be worth to practitioners, because it could spell the difference between achievement and collapse in implementing IT. In the movement toward globalization of markets and corporate multinationalism, the value of more cross-cultural research is clear (Cash, McFarlan, McKenney and Applegate, 1992). In a large survey of information systems more than half of the respondents felt that global IT issues were keys to their firms future success (Ives and Jarvenpaa, 1991). As firms grow their operations in the international arena, there is a need to exploit the power of IT to communicate among these widespread locations and to coordinate activities both within and across countries. Henc e, it is important for the managers of these firms to learn, as much as they can, about the cross-cultural adoption and use of IT (Couger,1986; Kumar and Andersen,1990) Such understanding can make the distinction between success and failure in executing information technology and system. The study will be clear the differences and similarities between countries cultures, and will give nations attitude towards technology acceptance. This study will be the first one that combines culture and TAM across the five continents. The result can assists managers and technology developers around the world in order to apply IT through international organization. The unique results of this study can be a base for future research and open a window to work on TAM as viewpoint of culture. Summary and Organization of the Remaining Chapters The main part of the dissertation is divided into five Chapters, which will be briefly introduced: Chapter1: Introduction The introduction section a projects a brief overview of the study is provided. Chapter 2: Literature Review In this section, selected academic literature related to Technology acceptance model, related theory and Hofstede cultural dimension and its related academic literatures. Then conceptual framework and steps to developing the hypothesis are discussed. Chapter 3: Methodology The methodology section critically examines a range of research approaches and techniques. Sample and the size of samples, also one of the most important for this study, finding the sample from different countries who stay in Malaysia for study or work. The research technique that is selected for this study is Design of Experiment. Chapter 4: Analysis and Results In the analytical section, the research findings are explained briefly according to the data collection and analysis. Chapter 5: Discussion In discussion section the further interpretation and explanation the findings is provided and comparisons is made between the findings with other literature in the area of the study. Then the findings are summarized; recommendations for future research and the practicing manager are made. Chapter 2: Literature Review Introduction This chapter is included of backgrounds and literatures in Technology acceptance Model, Hofstede cultural Dimensions and previous researchs including of cultural role on TAM. This chapter will prove the unique work of this paper. Framework, definitions and hypothesis development for this study, will mention and discuss in this chapter. Technology Acceptance Model Technology Acceptance Model (TAM) is one of the most influential extensions of Ajzen and Fishbeins theory of reasoned action (TRA) that has been widely used to predict user acceptance and use based on perceived usefulness and ease of use. According to TRA, an individuals behavioural intention, which results in actual behaviour, is influenced by person subject norm and attitude, and the attitude is influenced by individual beliefs (Ajzen Fishbein, 1980). According to the Davis (1989), TAM hypothesizes that behavioural intention is a significant determinant of actual system use, and that behavioural intention is determined by two relevant beliefs, perceived usefulness and perceived ease of use. In TAM, an individuals principle determines the attitude toward using the system. The attitude develops the intention to use. Perceived usefulness is related to productivity but perceived ease-of-use is related to effort (Venkatesh, 1999). This intention influences the decision of actual technology usage. These causalities were largely studied and accepted (Suh and Han, 2002; Morris and Dillon, 1997; Teo, Lim, Lai, 1999). The most significant results of Davis study was the strong relation between Usefulness and Usage. Users of a technology try to cope with difficulties of a system, although difficulty of use can discourage adoption of a useful system, no amount of ease of use can give back for a system that does not perform a useful function.TAM used in several IS studies and proved useful determining technology acceptance, especially to explain computer usage behaviour. This justifies why TAM is suitable for studies in computer acceptance. Given the rising popularity of Electronic_ Commerce technology such as Internet banking and Mobile Banking and the dynamic user behaviors identified above, the TAM is a suitable framework for this study. There are other widely used and well known frameworks, such as uses and gratification or diffusion of innovation, but the TAM is considered the best fit for this study because other frameworks focus on different levels of analysis (macro, mezzo, or micro) or differ ent topics of emphasis (diffusion mechanisms, etc.). If modified appropriately, the TAM is the most effective tool for a study like this one, which investigates factors relating to usage and adoption, such as cultural dimensions. (Suh et al., 2002; Morris et al., 1997; Teo et al., 1999). The TAM was stimulated by the theory of reasoned action(1980), which argues that both the attitude toward an action and subjective norms have an impact on behavioral intention, which in turn affects how people perform an action. The TAM was an early attempt to apply psychological factors to information systems and computer adoption. It assumed that perceived usefulness and perceived ease of use were major influences on an individuals attitude toward using technology and, thus, ultimately, were related to actual use (Davis, 1989). Technology Acceptance Model (TAM) has been widely used to predict user acceptance and use based on perceived usefulness and ease of use (Davis, 1989). TAM conceives that behavioural intention is a significant determinant of actual system use, and that behavioural intention is determined by two main beliefs, perceived usefulness and perceived ease of use. The perceived usefulness refers to the degree to which an individual believes that using a particular system would enhance his/her job performance. The perceived ease of use refers to the degree to which an individual believes that using a particular system would be free of physical and mental efforts. In TAM, an individuals belief settles on the attitude toward using the system and, in turn, the attitude develops the intention to use. This intention influences the decision of actual technology usage. With the bang of the Internet and convergence technologies, researchers have modified TAM to demonstrate the empirical evidences of it in the convergence context. In fact, many researchers have proposed various extended TAM. For instance, Moon and Kim (2001) suggest a model where perceived playfulness was described as one of the antecedents of attitude toward Web surfing. They noted that most prior TAM research had focused only on extrinsic motivation, not on intrinsic motivation. Morris and Dillon (1997) found that TAM contributes to the prediction of individual usage of software. The motivational model that was adapted by Davis, Bagozzi, Warshaw (1992) employs two key constructs: extrinsic and intrinsic motivation. According to Venkatesh and Speier (1999), extrinsic motivation refers to the performance of an activity. Extrinsic motivation is perceived to help achieve valued outcomes that are distinct from the activity itself, such as improving job performance, pay, etc. Intrinsic motivation refers to the performance of an activity for no reason other than the process of performing it. In the case of technology a cceptance studies, perceived usefulness is an example of extrinsic motivation. Davis et al. (1992) found that perceived enjoyment was significantly related to the perceived ease of use. In the research on the usage intentions for information systems, Heijden (2004) adds perceived an enjoyment to TAM model. Cheong and Park (2005) also develop a more comprehensive version of TAM to better reflect mobile Internet context. Their model employs perceived playfulness, contents quality, system quality, Internet experience and perceived price level, in addition to perceived usefulness and ease of use. For the mobile services, Nysveen et al. (2005) investigate the consumers intention to use mobile services, which shows the four overall influences on usage intention: motivational influences, attitudinal influences, normative pressure, and perceived control. Similarly, Fogelgren-Pedersen (2005) found that connection stability and geographic coverage are one of the significant variables of perceived relative advantage in mobile Internet. Also, in the worldwide mobile Internet user survey, Fife (2005) found that perceived enhanced utility of mobile services are the strong value motivating use of mobile technology. While these studies found the significant perceived variables, they still do not find variables specific to mobile Internet. Viswanath Venkatesh, Morris, B.Davis, D.Davis (2003) worked on this issue an d eight prominent models are discussed, the eight models and their extensions are empirically compared, a unified model is formulated that integrates elements across the eight models, and the unified model is empirically validated. Using data from four organizations over a six-month period with three points of measurement, the eight models explained between 17% and 53% of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Technology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT provides a useful tool for managers needing to assess the likelihood of success for new technology introductions and helps them understand the drivers of acceptance in order to proactively design interventions targeted at populations of users that may be less inclined to adopt and use new systems. Theory of reason Action(TRA) Drawn from social Psychology.TRA is one of the most fundamental and inflectional theories of human behaviour. It has been used to predict a wide range of behaviours .Davis et al.(1989) applied TRA to individual acceptance of technology and found that the variance explained was largely consistent with studies that employed TRA in context of other behaviours Technology Acceptance Model(TAM) TAM is tailored to IS contexts, and was designed to predict information technology acceptance and usage on the job. Unlike TRA, the final conceptualization of TAM excludes the attitude construct in order to better explain intention parsimoniously. TAM2 extended TAM by including subjective norm as an additional predictor of intention in the case of mandatory settings (Venkatesh and Davis 2000). TAM has been widely applied to a diverse set of technologies and users. Theory of Planned Behaviour TPB extended TRA by adding the construct of perceived behavioural control is theorized to be an additional determinant of intention and behavioural .Ajzan(1991) presented a review of several studies they successfully used TPB to predict intention and behaviour in a wide variety of settings. TPB has been successfully applied to the understanding of individual acceptance and usage of many different technologies (Tailor and Todd, 1995). A related model is the Decomposed Theory of Planned Behaviour (DTPB). In terms of predicting intention, DTPB is identical to TPB. In contrast to TPB but similar to TAM, DTPB decomposes attitude, subjective norm, and perceived behavioural control into its the underlying belief structure within technology adaption contexts. Combined TAM and TPB It is a combination of TPB TAM to provide a hybrid model (Taylor and Todd,1995) Innovation Diffusion Theory (IDT) Grounded in sociology, IDT (Rogers 1964) has been used since the 1960s to study a variety of innovations, ranging from agricultural tools to organizational innovation (Tornatzky and Klein 1982). Within information systems, Moore and Benbasat (1991) adapted the characteristics of innovations presented in Rogers and refined a set of constructs that could be used to study individual technology acceptance. Moore and Benbasat (1996) found support for the predictive validity of these innovation Social Cognitive Theory (SCT) One of the most powerful theories of human behavior is social cognitive theory (Bandura 1986). Compeau and Higgins (1995) applied and extended SCT to the context of computer; while Compeau and Higgins (1995) also employed SCT, it was to study performance and thus is outside the goal of the current research. Compeau and Higgins'(1995) model studied computer use but the nature of the model and the underlying theory allow it to be extended to acceptance and use of information technology in general. The original model of Compeau and Higgins (1995) used usage as a dependent variable but in keeping with the spirit of predicting individual acceptance, In 2008, Ima, I., Kim, Y., Han, H. did a revising research on Venkatesh work. They claimed that in previous study there seem to be two critical factors that are overlooked or have received inadequate attention—perceived risk (PR) and technology type. PR has been recognized as an important factor and was modelled as a precursor of perceived usefulness (PU), and a sub construct of others, such as trust (or as its precursor). In their study PR and technology type, consider as additional to the moderating variables in UTAUT and was tested how they moderate the effects of PU and PEU on users intention to use a technology. It was shown the PR and technology type were moderating variables. Kim (2006) added two new constructs, Perceived Cost Savings and Companys Willingness to Fund, and two causal relationships, Job Relevance and Experience, as moderating effects to previous existing model and proved that there is a strong significant relationships between PCS and CWTF and behaviral i ntention to use a technology. also moderating effects of job relevance was proved , also found that an individuals intention to use mobile wireless technology was significantly affected by CWF. Kim claimed that a company must provide technology to their employees to help them perform their jobs. Finally, the individuals adopt a technology if it is within their prior experience, which was found to be significant moderator between CWF and BI. Prior studies based on TAM did not examine the direct link from self-efficacy to behavioral intention assuming the full mediation of perceived ease of use but Khalifa (2008) integrated the theory of planned behavior (Fishbein and Ajzen, 1975; Ajzen and Madden, 1986) and the technology acceptance model (TAM) (Davis, 1989) to explain the adoption of m-commerce as a new technology. He added subjective norm to the main block of TAM as an factors that have positive direct effect on the individuals intention and Self-efficacy as a positive direct effec t on the individuals intention to adopt m-commerce. During the years researchers examined different items and their relations with TAM models, they have used original framework of TAM and found relation between them. In paper by June Lu at el.(2008) was worked on different aspects of new technology in china, such as WMDS, these items are type of technology ,functionality of that technology, interface design, Personal innovativeness in information technology (PIIT), Facilitating conditions, Social influences ,security, trust , privacy and reliability of that technology. The result of this paper showed that intention to use WMDS via mobile phones in China was dependent on an individuals perceptual beliefs about the target services in terms of their usefulness and eases of use, and also relied on PIIT and mobile trust belief. According to Dong-Hee Shin(2007) , who work on Wi-Bro acceptance in Korea, users perceptions are significantly associated with their motivation to use Wi-Bro. Specifically, perceived quality and perceived availability are found to have significant effect on users extrinsic and intrinsic motivation. These factors play as enhancing factors to attitudes and intention. In 2005, Kim et al. Work on a Value-based Adoption of a technology such as mobile banking. A Value-based Adoption Model (VAM) would be able to capture the monetary sacrifice element and present adoption as a comparison of benefits and costs. By combination of Value-based Adoption Model (VAM) of M-Internet and by integrating the most relevant findings of the technology adoption and value literature, Kim(2005) designed its framework by dividing it to benefits and sacrifices. He suggested that customers evaluation of a product includes both cognitive and affective elements, and that products are purchased for their utilitarian and hedonic benefits, so it can be proved that usefulness and enjoyment as the benefit components of perceived value. Perceived sacrifices are both monetary and non-monetary. Monetary spending includes the actual price of the product, and it is generally measured based on customers perceptions of the actual price paid. Non-monetary costs usually include time, effo rt and other unsatisfactory spending for the purchase and consumption of the product. Yang (2004) did a research that examines different items that could affect technology acceptance. Innovation, past adaption behaviour, knowledge, technology cluster, age, gender and specialization were items that were tested in relation with technology acceptance in Yang study. He provided insights into the relationships between PU, PEOU, AT, consumer innovation adoption behaviour, and demographic variables and also offers empirical data to support the suitability of the TAM through examining the emerging M-commerce technology and application. PU is found to predict consumer adoption of M-commerce. Consumer innovativeness introduced into the TAM research to expand the scope of TAM applicability to M-commerce that is yet to accumulate a critical mass in the diffusion process. According to the Lo ´ pez-Nicola ´ s, Molina-Castillo, Harry Bouwman (2008), social factors are the important factors that influence on peoples decision to adopt a new technology such as mobile services. They try to evaluate the impact of different determinants on Behavioural Intention in the adoption of advanced mobile services, by combining acceptance models with diffusion theory models theory. In particular, we assumed that social influence may be a key element in peoples intention to use the services and applications. Social influence was defined as the degree to which individuals believed that others thought they should use advanced mobile services. The views of friends and relatives have a significant impact on using mobile services, Lo ´ pez-Nicola ´ s et al. proved that as a manager, that PEOU and behavioural intention depended significantly on social influences, so for bringing new services and technologies for organisations, notice to the employees cultural backgrou nd is important. In a study by Amin (2008) who used original TAM model to finding factors affecting the intentions of customers in Malaysia to use mobile banking, proved that bank managers should create favourable perceptions concerning the usefulness and ease of use among mobile phone credit card customers. Creating these positive perceptions might be achieved by offering free seminars to customers about the ease of use of the system Malaysian consumers often take up marketing initiatives of this type. Additionally, the banks should provide a mini-guide at all branches that provides succinct and cogent information concerning the efficiency, effectiveness and risk-free attributes of the mobile phone credit card system. In 2009 GU, Lee, Suh, integrated the fragmented models such as the extended TAM and the trust-based TAM into a unified model of mobile banking. They found that self-efficiency is the strongest antecedent of perceived ease-of-use, which directly and indirectly affected behavioural intention through perceived usefulness, also was found the structural assurances are the strongest antecedent of trust, which could increase behavioural intention of mobile banking. Gu et al. research was listed most important work on technology acceptance that used TAM as base. For example Taylor and Todd (1995) selected computing resource center and worked on usefulness, ease of use, attitude and behavioural intention, they worked on Subjective norm and Perceived behavioural control as their study antecedence (complete list of work on TAM was brought in Appendix A) Hofstede Cultural dimensions: Culture has been defined according to several perspectives. Definitions go from the most complex and the most comprehensive (e.g. Kluckhohn, 1962) to the most simple (e.g. Triandis, 1972, Hofstede, 1997). According to Kluckhohn (1962), Culture consists of patterns, explicit and implicit, of and for behavior acquired and transmitted by symbols, constituting the distinctive achievement of human groups, including their embodiments in artifacts (p.73). Hofstede cultural dimensions served as the most influential culture theory among social science research (Nokata and Sivakumar, 2001). In addition, Hofstede cultural framework has also received strong empirical support by Sondergaard work (1994).Geert Hofstede research gives insights into other cultures so that it will be more effective when interacting with people in other countries. If understood and applied properly, this information should reduce level of nuisance, concern, and distress. But most important, Geert Hofstede will give the edge of understanding which translates to more successful results. In 1980 Hofstede offered his famous description of cultural dimensions. Geert Hofstede collected and analyzed a large data base of employee values scores of IBM between 1967 and 1973 .it was included more than 70 countries. He first used the 40 largest countries and then extended the analysis to 50 countries and 3 regions. From t