Wednesday, May 20, 2020

A Report On The Underground Railroad - 1259 Words

Tena Walker Mr. Steven McCall U.S. History I June 30, 2015 A Mysterious Train In The Night†¦The Underground Railroad One of the most talked about railroads in the history of the United States was never an actual railroad. â€Å"The Underground Railroad is every route that the enslaved took, or attempted to take to freedom. It is a vast network of paths and road, through swamps and over mountains, along and across rivers and by sea, that cannot be documented with precision [sic].† (Landau 71) The people helping lead the runaway slaves to freedom were called conductors and the houses where the runaway slaves stayed while on their journey to freedom were called stations. People who donated money to help the runaway slaves find freedom were called stockholders. The runaway slaves were the passengers. The success of the Underground Railroad depended on its ability to be an extremely secretive mission. As early as the 1500’s, slave hunters went to Africa, where they captured men and women, often branding them with hot irons befo re locking them in dungeons on ships and sailing them to the American colonies. Prisoners who managed to survive the 10 week trip were then sold as slaves to the American colonies. These slaves were first considered indentured servants destined to serve the people that purchased them for a certain amount of time, usually seven years. The state of Massachusetts passed a law in 1641 that allowed slavery of Africans. In 1639, Maryland passed a law that anyoneShow MoreRelatedBook Report for Underground Railroad1337 Words   |  6 PagesWilliam Wang Mrs. Smart Book Report Midterm Report Underground Railroad Dramatic First-Hand Accounts 1. Alabama a. Narrative of Peter Still i. This narrative appears in stills Underground Railroad Records ii. One of the greatest documents of the underground railroad iii. The life, struggles, and success of Peter and his Family were ably brought before the public in â€Å"The Kidnapped and the Ransoms† iv. His Parents Levin and Sidney were bothRead MoreThe Underground Railroad : The United States History1456 Words   |  6 PagesThe Underground Railroad is a popular topic in United States history, but many of the stories told about it are more myth than fact. Quilts have been often used as a symbol in children s picture books to further the understanding of one of the darkest periods of United States history: slavery. Parents and teachers have eagerly embraced these illustrated books as a way to understand and teach past turmoil. Many of these books suggest that people who participated in the Underground Railroad used quiltsRead MoreThe Life Of A Woman Harriet Tubman1404 Words   |  6 PagesHarriet Tubman suffered but also those who suffered and died in the quest from slavery to freedom. This small yet powerful book of 22 chapters, takes us as passengers on this fictitious railroad, that was truly a historical pathway. While the Underground Railroad must not be seen as an actual railroad underground, it was a secret organization that the slaves would use to escape and that it was a series of paths through land and sea routes so that runaway slaves could become free. If one were to visualizeRead MoreA Brief Look at the Underground Railroad1335 Words   |  5 Pages For 300 years captured slaves in the United States had no hope for freedom. In the 1800s everything changed when the Underground Railroad had gone into effect as the system kept on growing and there were more than 100,000 slaves escaped from the South and gained their freedom. The journey for a slave to gain freedom was difficult and dangerous under the circumstances in the nineteenth century. Not even slave owners were looking for fugitive slaves, governments also imposed laws to restricted theRead MoreUnderground Railroad State Marker At O Dell s Mill Essay1105 Words   |  5 PagesSite 1: Underground Railroad State Marker at O Dell s Mill. The mill was the site where local the di vided parties of Kentucky raiders re-assembled and were surrounded and confronted by abolitionists who convinced the raiders to go to plead their case before the court in Cassopolis. The marker summarizes local historical involvement in the Underground railroad leading up to the Civil War. Site 2: Site not yet researched. Site 3: Birch Lake Cemetery and Meeting House. This is the Quakers’Read MoreEssay on Slavery - Underground Rail Road630 Words   |  3 Pages The underground railroad was a network of northerners that helped slaves reached the north and Canada for safety from their plantation. It was secret and railway terms were used to describe system as a way to hide the real nature of the operation. The underground railroad extended from Maine to Nebraska but was most concentrated in Pennsylvania, Ohio, Indian, New York, and The New England States. More of the more specific spots were Detroit, Michigan, Erie, Pennsylvania, Buffalo and New York. Read MoreHarriet Tubman Essay586 Words   |  3 Pagesfirst stop. Then she was taken to Pennsylvania. She settled down in Philadelphia. In Philadelphia, she met William Still, The Philadelphia stationmaster of the Underground Railroad. Still and other members of the Philadelphia Anti-Slavery society, taught Harriet of the Underground Railroad. In 1851, Harriet, started relocating members of her family to her new home, at St. Catherines, Ontario, Canada West. In all she is beleived to have conductedRead MoreEssay African Americans in the Civil War 504 Words   |  3 Pagesthe Union. At the battle of Port Hudson they fought over open ground. They didnt win but they proved that they could fight. Many slaves escaped from the South on the Underground Railroad. Estimated at about 100,000 had escaped using the Railroad. Harriet Tubman was one of many who helped free slaves on the Underground Railroad. She made 13 trips, freeing about 70 slaves. Canada was popular for slaves to go to because once they got out of the country they couldnt be brought back. Many wouldRead MoreDoes Black Architecture Exist?1653 Words   |  7 Pagesinformation with others. I am doing a study on black architecture because many people believe that there is no such thing because no one hardly ever acknowledge them. I am including one reports/essays and two articles to show my research on the existence of African-American architects and their architecture. The report/essay â€Å"Hampton University Brings Color to Architecture† was written by Shannon Chance and published on the 8th of August in 2007. The article â€Å"Tuskegee University Robert R. Taylor SchoolRead MoreSigns, Symbols and Signals of the Underground Railroad Essay3216 Words   |  13 PagesSigns, Symbols and Signals of the Underground Railroad A journey of hundreds of miles lies before you, through swamp, forest and mountain pass. Your supplies are meager, only what can be comfortably carried so as not to slow your progress to the Promised Land – Canada. The stars and coded messages for guidance, you set out through the night, the path illuminated by the intermittent flash of lightning. Without a map and no real knowledge of the surrounding area, your mind races before you

Wednesday, May 6, 2020

The Criminal Justice System Is Viewed As A Black Problem

The current crime and incarceration trends have declined since early 1990s, which in part is due to the current reforms that takes place within the criminal justice system, such as early release dates for drug charges and non-violent crimes (Mauer, 2011). The incarceration rates in the United States are â€Å"three to four times that of other industrialized nations,† and the punishment scale is viewed as â€Å"out of proportion to that of other industrialized nation† (Mauer, 2011). Mauer (2011) reported â€Å"in many respects the driving force of mass incarceration is the racial dynamic of criminal justice policy.† He points out that due to extreme incarceration rates among the African American community, the criminal justice system is viewed as a â€Å"black problem† (Mauer, 2011). At a national level, 80 percent of the populations incarcerated were of African American decent, which provides evidence that laws can be discriminatory (Mauer, 2011). The current crime and incarceration trend makes sense to me somewhat, and it also makes me uneasy. In my opinion, it makes no sense to keep individuals with drug related charges incarcerated for 24 years, which was the sentence Kemba Smith initially received (Mauer, 2011). I agree with the early release of drug and non-violent offenders, if they have been rehabilitated through education. I believe some crimes are committed based on the social learning theory. If someone has been taught to make a quick hustle versus gaining employment thatShow MoreRelatedRacial Discrimination And The Criminal Justice System1512 Words   |  7 PagesAlthough saying the criminal justice system is racist is a controversial statement, there is evidence and statistics that prove it to be true. Research and evidence validate the issue of racism to be undeniable. Equality and justice are out of reach with the racism that takes place in our criminal justice system and our country. Racial discrimination i s prevalent amongst the African American culture in issues regarding drug use, and incarceration which creates unfair inequality for this race. I willRead MoreRace and Crime1088 Words   |  5 PagesThe Uniform Crime Report statistics state that blacks are more frequently arrested than whites. While this may mean that blacks actually commit more crime, what are some other factors that may be driving the statistics? If black neighborhoods are under more police surveillance than white neighborhoods, what does this mean for crime statistics? Can you give examples of how blacks receive differential treatment in the criminal justice system? What are your thoughts? Remember to back your commentsRead MoreThe Effects Of Race On America Today1429 Words   |  6 Pagescontroversies surrounding the United states Justice System have been making the news headlines. What Americas are seeing is institutional inequalities that are creating racial conflict. Institutional inequalities have lead to racial oppression do to the power structure in the United States. Critical Race Theory provides an explanation showing that race is imbedded in American society today; can the theory explain why racial inequalities between the United States Justice System and citizens of different colorsRead MoreBlack And Minority Ethnic Offenders1373 Words   |  6 PagesClinks and The Black Training and Enterprise Group to discuss how the changing landscape of the Criminal Justice System could improve the outcomes for Black, And Minority Ethnic offenders (BAME). Following the meeting Baroness Young met the Secretary of State for Justice to seek his sup port to establish a task group. The Justice Secretary requested that the review included Muslim Offenders. The investigation and subsequent Young Review led by Baroness Lola Young, examined why young black and MuslimRead MoreThere Are No Children Here By Kotlowitz Essay1236 Words   |  5 PagesThere Are No Children Here, Kotlowitz describes the experiences of Pharoah and Lafayette to highlight the racist and classist undertones existing within the criminal justice system of Chicago in the late 1980s. This essay will utilize the theory of critical criminology to illustrate the structures of inequality within the criminal justice system and the subsequent marginalization of youth that exists within the Henry Horner community, leading to youth deviance and violent crime. Beginning with a briefRead MoreRacial Profiling in Canada1166 Words   |  5 PagesRacial profiling is the act of selecting targets for criminal investigation not on behavioural merit, but exclusively on markers of personal identity such as race, ethnicity, and religious orientation (Perry, 2011, p.9). In other words, rac ial profiling is the by-product of subjecting individuals who are from a particular racial community to a higher degree of scrutiny and surveillance by criminal justice system agents when compared to other racial communities (Wortley and Owusu-Bempah, 2011, p.135)Read MoreHow unfair the justice system is in regards to race and the results of it.1743 Words   |  7 Pageshave higher arrest and conviction rates, face higher bail amounts, and are more often the victims of police use of deadly force than white citizens. When it comes to criminals, many people have a preconception of what a criminal is. Usually when people think of a criminal they picture a Black or Latino face. The thought of an Asian criminal is often related to Asian gangs. Interestingly enough, White people as a group are rarely associated with the thought of crime, even though they account for 70% ofRead MoreAfrican Americans And The Justice System1090 Words   |  5 Pagesor last person of the black minority to b e cheated by the justice system. Today it is perfectly legal to discriminate against criminals in nearly all the ways that it was once legal to discriminate against African Americans(Alexander). The justice system in America was set up to protect citizens while upholding social control and deterring crime. But the poor guidance within the system has caused racial disparities to persist at every level of the U.S. criminal justice system. All across the countryRead MoreEssay about The Criminal Justice System in USA1657 Words   |  7 PagesThe Criminal Justice System in the United States of America was established with noble intentions. The basis of the system can be traced back from the first book of the Bible Genesis, and the story of Cain and Able. The criminal justice system was established to be morally suitable for a growing diverse society. Moral dilemmas within the system arise from concerns related to principles of officials’ right and wrong behavior. These princ iples are often embedded into a culture of the human characterRead MoreRacial Disparity in Sentencing1728 Words   |  7 PagesUniversity of Phoenix Cultural Diversity in Criminal Justice CJA/423 Ron McGee September 06, 2010 Abstract In this paper I will illustrate racial disparity in sentencing in the criminal justice system. The causes of racial disparity and the reasons it is on the rise, the research statistics, and the proposed solutions are discussed. Racial Disparity in Sentencing The intersection of racial dynamics with the criminal justice system is one of longstanding duration. In earlier times

Lunch Box Restaurant Case Study Free Sample Solution

Questions: ScenarioCase Study: Lunch Box RestaurantLunch Box is a small restaurant located in a busy area of Canary Wharf right in the middle of busy offices and providing different types of food items including packed (ready to go) and prepared on order. The restaurant serves Mediterranean, Italian and Indian food. Since the restaurant is located in a busy area where people from different cultures visit to buy food. The restaurant has no seating area therefore it operates only on take away basis. Though restaurant holds a good reputation however new entrants, presence of large number of other restaurants and no seating area are some of the key limitation which is effecting on the business profitability. In order to grow profitability the restaurant has conducted a survey which revealed that most of the customer would like to have food delivered in their offices so they dont need to leave their workplace. On the basis of survey results the Lunch Box Restaurant management is interested in E-Comm erce system which would enable their customers to select/choose food for their lunch and to be delivered to their offices. 1. Critically discuss the expectations of internet customers who are interested to place their lunch orders online for Lunch Box Restaurant.2. Determine the relevant e-Commerce application for the Lunch Box Restaurant and critically assess the potential impact of common e-Commerce applications on Lunch Box Restaurant. 3. Plan an E-Commerce implementation strategy for the Lunch Box Restaurant. 4. Critically assess the risks of linking business systems to the internet. 5. Explain the importance of protecting the intellectual property of an organisation.6. Critically discuss what security measures Lunch Box Restaurant need to take in order to protect its e- Commerce system. 7. Critically evaluate latest e-Commerce developments and assess how these developments can be incorporated into an e-Commerce strategy for the Lunch Box Restaurant. Answers: Introduction: Current business trends are showing that use of E-commerce activities is increasing in every sector and even the small and medium organizations are showing preference towards these applications (Cordella et al., 2015). Franklin (2015) opined that, tendency of giving preference to online trading is not limited among business management units; buyers are also interested to get such facilities. However, importance of E-commerce is increasing rapidly and more organizations are shifting to online trading from conventional business activities. The current report deals with discussion on need for implementing E-commerce activities in Lunch Box, a small restaurant at Canary Wharf. Strategies for implementation of E-commerce in the restaurant are also discussed in this report. 1. Expectations of internet customers for Lunch Box restaurant: Lunch box is situated in a busy office area. Every day the restaurant requires serving large number o customers. However, the restaurant has no place where its customers can seat. It indicates that customers of this organization need to spend significant time for buying food. On other hand, as most of its customers work in office, it is not possible for them to wait for long time. There are other restaurants present in that area and the number of new restaurants is increasing continuously. Current analysis shows that the market is highly competitive in nature and competition will increase in future also. Kwok et al. (2015) opined that organizations operating in competitive market face more difficulty for retaining its clients. According to Kim (2013) business growth and presence of infrastructure are directly related. Lack of infrastructure is also affecting business growth for Lunch Box. However survey among customers is showing that the organization will be able to increase revenue if it can deliver foods to customers at their offices. As most of the customers work in office, making an order using internet will be easy for them. If they do not need to go outside for taking lunch, they will be able to save valuable time during office hours. The current analysis reflects that customers of Lunch Box need an online platform where they will be able to order foods. The platform will also be able to accept payments made by customers. Moreover, it will provide customers with updated information regarding menus and will collect their feedback on products. In case of any internet application, security is the most important factor (Franklin and Spinler, 2011).Lunch Box management needs to ensure that their online s ystem is secured to attract its clients. 2. E-Commerce applications for Lunch box: Lunch Box management is implementing e-business infrastructure to serve its customers more efficiently. Most of the customers of this restaurant are office- worker and they want foods to be served in less time. Analyzing requirements of customers, Lunch box management can include features of online shopping, communication interface, e-payment facilities and newsgroups. Online shopping and payment: Online platform of Lunch Box restaurant should include the features of online ordering and online payments. Laudon and Traver (2012) stated that organizations which conduct trading activities on internet has excellent opportunity for informing buyers regarding their new product. Online ordering and payment making facility can provide Lunch Box competitive advantages as it results time-efficient trading. The organization can use online shopping software to make the process simple. Newsgroup and communication interface: Online applications of Lunch Box should include features for informing customers about the items available in their restaurant. It is important to predict future market trend for attaining sustainable growth rate (Wipo.int, 2015). However, the online portal needs to possess the feature of collecting customer feedbacks. As the restaurant operates in highly competitive environment, it needs to modify existing business strategies to acquire more shares in market. Collection and analysis of customer feedbacks is beneficial for any organization as it provides hints regarding future consumer requirements (Xu, 2012).Collection of customer feedbacks can be useful for the restaurant to make efficient strategies in future. On other hand, communicating with buyers on regular basis also helps companies to develop their future business strategies ().Lunch Box management may include the facility of communicating with its customers through email in their online business platform. Regular communication with customers will not only benefit Lunch Box in strategy development, but it will also increase loyalty of customers to the restaurant. New product development and implementing innovation is existing product also play important roles in business growth (Wang and Chang, 2013). If Lunch Box keeps regular contact wit h its customers, it can collect their suggestion on menu. It will also benefit the organization in product development and innovation implementation. Lunch box portal will contain feature of collecting customer feedback. Although customer feedback is valuable for a business, purposely made wrong feedbacks can affect reputation of an organization (Douligeris, 2013).Lunchbox management can face such problems also. Loss of security during online payments is one of the major threats for internet trading (Clarke, 2013). If the system made by Lunch Box fails to provide secured transaction, people will not be interested to use it. It can reduce number of online customers and thus can affect overall business growth. 3. E-commerce strategy for Lunch Box: Before implementing E-commerce site, Lunch Box management requires developing proper strategies for increasing effectiveness of the whole process. Areas which require intense focus while developing strategies are-online shopping and payment, access to data, data storage and data analysis. Online ordering and making payments strategy: Controlled access and use of software: E-commerce site developed by Lunch Box need to include interface for making orders through internet. This interface will also be used for making payments. Management requires ensuring that only authorized persons are able to use it. However, the process of accessing this interface will be simple and user friendly. Task of collecting payments will be conducted by proper software. User-account creation using simple form: Although it is important to make the user interface secured, customers always prefer simple system for online business (Clarke, 2015). Lunch box management can enable customers to create their own accounts. The site may contain a form for account creation. After creating an account successfully, it will be accessed by using user Id and password. Guide lines, terms and conditions will also be in the site for increasing simplicity. Feedback collection and communication strategy: Use of e-mail and newsgroup: As the new online platform is being implemented to meet customers requirement, their feedbacks will be given maximum importance in this site. Lunch Box management can create newsgroup for communicating with customers. Use of newsgroup will allow the customers to communicate among them. It will be beneficial for the organization to attract new customers. The organization also requires maintaining a database to store collected data. The database will be linked with logistics system to improve quality of service. Data analysis by experts: To maximize the usefulness of e-commerce system, Lunch Box management requires analyzing collected data through the system. The management can execute this task by experts to get accurate information. Proper data analysis will be helpful for business strategy development. 4. Risks of E-commerce: Although use of E-commerce facilities is increasing rapidly, its effectiveness is still limited by security issues (Ancona, 2015). Risk factors which may affect efficiency of internet trading system of Lunch Box can broadly be classified in two categories- data security risks and technological risks. Data security risks: Information security threats for a business include hacking into companys system and stealing important information on customers or products (Deng and Zhang, 2014).However, these threats also include violation of intellectual property and copyright rules. As organizations invest large amount of their capital on product development violation of intellectual property rights can cause huge loss for it (Douligeris, 2013).Clarke (2015) opined that in case of restaurants, product innovation can be considered as the most important part of strategy. It also indicates that Violation of intellectual property can affect profit earned by Lunch Box. Apart from security threats, efficiency of online activities can be reduced by technological risks (Wilson, 2015).Incidents of server crashing not only restricts an organization from conducting business activities; it also reduces reliability of system to users. If Lunch Box links its business activities to internet, incidents of server crashing can reduce effectiveness of online platform. However, the organization requires ensuring that bandwidth used by this system is sufficient so that large number of customers can use it. Internet connections with narrow bandwidth often face problems caused by huge traffic in system (Zou and Seo, 2015). As Lunch Box management is focusing on increasing online interaction with customers, it is expected that the system will include various features. Lunch Box management need to focus on maintaining quality of software as presence of errors in software can restrict users from using every feature.Management of the restaurant is planning for making business strategies according to buyers feedback. Lunch Box management will maintain databases for this purpose. However, number of transactions per day through this system will be very high. As a result, database of this company needs to be updated regularly to avoid erroneous results. However the organization also needs to integrate its operational and supply chain activities with the system through database. If the database is not updated regularly, products can become out of stock and it will reduce customer satisfaction. Lunch Box management can collect personal information regarding customers including name, address, and contact number a s a part of their business communication. Security loss of such sensitive data can reduce buyers trust on the organization severely and occurrence of such cases impacts on long term business growth (Zhong, 2013). Although data collection about customers is important for business growth, Lunch Box management requires emphasizing to protecting sensitive data for avoiding long term business issues. Technological risks: Yang and Ma (2013) stated that utilization of any software can be optimized by using advanced hardware systems. Use of roper hardware is necessary for E-commerce sites as software used by such system are highly advanced and complex (www.ids.ac.uk, 2015). It indicates that the E-commerce system used by Lunch Box can face threats due to poor hardware system and it will make the whole system inefficient. Lunch Box is a small restaurant and it is expected that initially the organization will depend on its ISP (Internet Service Provider) for managing online activities. According to Zhang (2012) excessive dependence on external agencies can make organizational processes slow. If the restaurant implements E-commerce infrastructure, scope of business will become wide. Lunch Box management needs to give importance on developing their own team to support IT operations in future. 5. Importance of protecting Intellectual property: Although intellectual property (IP) is important for all businesses, it is more important in e-commerce activities (Wilson, 2015). Implementation of online business infrastructure requires use of several hardware and software components-business software, user interfacing system, networking system etc. If organizations do not restrict other companies from using these components, profitability will reduce (Wang and Chang, 2013). It will also lead to loss of security and unauthorized access of secret information. As Lunch Box has large number of competitors, it will focus on securing IP rights while developing e-business infrastructure. Organizations operating in e-business environment use trademark and logos. Use of logo is not only useful for distinguishing an organization from its competitors; often it represents goodwill of a company in market. Lunch Box management needs restricting unauthorized use of its logo for developing their brand identity in market. However, the organizatio n also requires registering the domain name used by their system to restrict misuse of their goodwill in market. 6. Security measures for Lunch Box: Analysis on possible threats for upcoming e-commerce site of Lunch Box indicates that the organization requires adopting several security measures as a part of their business transformation process. Although implementing proper security is crucial for smooth execution of online transactions, these measures can be implemented by using simple guidelines (Qi et al., 2013). However, Lunch Box management can develop their own policies for securing online activities. The basic policies for secured e-commerce site development include creating separate accounts for each customer and developing password policies, using encrypted data, increasing awareness among customers, using wallet software for payment. Access to customer account and password policies: Each customer of Lunch Box needs to be able to make an account using site for accessing e-business facilities. These accounts can be accessed only using right User ID and password. Management can develop own rules for creating passwords. Use of specific rules regarding password development ensures generation of complex passwords and it reduces chances of account hacking (Millman, 2011).Management of Lunch Box may require creation of employee accounts also. It is important to change password when an employee leaves the restaurant to prevent loss of secured data. Data encryption: E-commerce site of Lunch Box needs storing large amount of data. However, the management can store data in encrypted form. If the data is stored in encrypted form, use of private information can be prevented even the data is accessed by unauthorized person (Johannesson, 2011). However, management must ensure that the encryption key is secured to maximize the efficiency of data storage. Increasing awareness among customers: Apart from developing organizational policies, making customers aware about safe payment policies is equally important for maintaining security of system (Humphrey et al. 2015).Lunch Box management can add a FAQ (Frequently Asked Questions) page in site for guiding customers regarding safe payment practices. This page can also contain information to guide customers while retrieving User ID or password. Use of Online wallets: Use of online wallets for making payment not only makes the process simpler, but it also makes it secured (Heeks, 2015).Lunch Box management can also use online wallet software to make the payment system more efficient. However, the organization can also communicate with customer before making any payment for increasing security. 7. Evaluation and implementation of E-commerce strategies for Lunch Box: Analysis on current e-commerce developments indicates that use of mobile friendly site is increasing rapidly. Organizations are also using SEO (Search Engine Optimization) techniques along with conventional marketing strategies to attract traffic. However, the trend of providing free delivery of services is also escalating. Lunch Box management can use these trends in their strategies. Use of mobile-friendly site: As the number of hand-held devices increasing, development of mobile friendly site increases its accessibility (Fredriksson, 2015). As customers of Lunch Box need fast process, making mobile friendly e-commerce site will lead to increase in number of users. However, it may increase the cost of site development also. Using SEO techniques: According to Bertarelli, (2014) organizations require seeking new opportunities for business expansion. Although Lunch Box is currently a small organization, it has enough opportunities to grow. Use of SEO techniques in site will allow the company to attract customers of different localities also. Free shipping facility: In case of E-commerce, use of free shipping process increases the number of customers (Boyd and Simpson, 2013). Lunch Box management can easily implement this trend into their strategy for increasing sale of products. As the organization is currently operating in a small locality, strategy of providing free delivery will be feasible also. Conclusion: Discussion made in the current report indicates that Lunch Box managemet needs using e-commerce site immediately to attain better position in market. Although it operates in a small market, use of e-commerce can develop opportunities for entering into new markets. However, at initial phase, Lunch Box management can face some difficulties make the system secured. References Ancona, A. (2015). Intellectual Property And E-Commerce. [online] Available at: https://www.wipo.int/edocs/mdocs/sme/en/wipo_wasme_ipr_ge_03/wipo_wasme_ipr_ge_03_13-main1.pdf [Accessed 27 Feb. 2015]. Bertarelli, S. (2014). On the efficacy of imperfect public-monitoring of seller reputation in e-commerce. Electronic Commerce Research and Applications. Boyd, C. and Simpson, L. (2013). Information security and privacy. Berlin: Springer. Clarke, C. (2015). Intellectual Property, E-Commerce, Competition Policy, And Internet Governance. [online] Available at: https://www.wgig.org/docs/book/C_Trevor_Clarke%20.pdf [Accessed 27 Feb. 2015]. Clarke, R. (2013). Data Risks in the Cloud. Journal of theoretical and applied electronic commerce research, 8(3), pp.9-10. Cordella, A., Martin, A., Shaikh, M. and Smithson, S. (2015). Management and innovation of e-business. [online] Available at: https://www.londoninternational.ac.uk/sites/default/files/programme_resources/lse/lse_pdf/subject_guides/is3167_ch1-4.pdf [Accessed 27 Feb. 2015]. Deng, X. and Zhang, J. (2014). Differentiating the Effects of Internet Usage and Wireless Usage on Business-to-Business and Business-to-Consumer E-commerce. Journal of Internet Commerce, 13(2), pp.138-157. Douligeris, C. (2013). Collaborative, trusted and privacy-Aware e/m-Services. Berlin: Springer. Franklin, J. (2015). International Intellectual Property Law. [online] Available at: https://www.asil.org/sites/default/files/ERG_IP.pdf [Accessed 27 Feb. 2015]. Franklin, R. and Spinler, S. (2011). Shared Warehouses Sharing Risks and Increasing Eco-efficiency. International Commerce Review, 10(1), pp.22-31. Fredriksson, T. (2015). E-commerce and Development Key Trends and Issues. [online] Available at:https://www.wto.org/english/tratop_e/devel_e/wkshop_apr13_e/fredriksson_ecommerce_e.pdf [Accessed 27 Feb. 2015]. Heeks, R. (2015). Analysing E-Commerce for Development. [online] Available at: https://www.seed.manchester.ac.uk/medialibrary/IDPM/working_papers/di/di_sp04.pdf [Accessed 27 Feb. 2015]. Humphrey, J., Mansell, R., Par, D. and Schmitz, H. (2015). The Reality of E-commerce with Developing Countries. [online] Available at: https://eprints.lse.ac.uk/3710/1/The_reality_of_e-commerce_with_developing_countries.pdf [Accessed 27 Feb. 2015]. Johannesson, J. (2011). Business growth in a tough economy. International Journal of Business Competition and Growth, 1(3), p.231. Kim, D. (2013). Under what conditions will social commerce business models survive?. Electronic Commerce Research and Applications, 12(2), pp.69-77. Kwok, S., Yang, C. and Tam, K. (2015). Intellectual property protection for electronic commerce applications. [online] Available at: https://web.csulb.edu/journals/jecr/issues/20041/Paper1.pdf [Accessed 27 Feb. 2015]. Laudon, K. and Traver, C. (2012). E-Commerce 2013. Upper Saddle River, N.J.: Prentice Hall. Millman, C. (2011). E-Commerce Adoption by Micro Firms. International Journal of Online Marketing, 1(2), pp.1-23. Qi, E., Shen, J. and Dou, R. (2013). Proceedings of 20th International Conference on Industrial Engineering and Engineering Management. Heidelberg: Springer. Uesugi, S. (2013). IT enabled services. Vienna: Springer. Wang, J. and Chang, C. (2013). How online social ties and product-related risks influence purchase intentions: A Facebook experiment. Electronic Commerce Research and Applications, 12(5), pp.337-346. Wang, J. and Chang, C. (2013). How online social ties and product-related risks influence purchase intentions: A Facebook experiment. Electronic Commerce Research and Applications, 12(5), pp.337-346. Wilson, P. (2015). An overview of developments and prospects of e-commerce in the agricultural sector. [online] Available at: https://ec.europa.eu/agriculture/markets/e-commerce/report.pdf [Accessed 27 Feb. 2015]. Wipo.int, (2015). Understanding How Intellectual Property (IP) Relates to E-Commerce. [online] Available at: https://www.wipo.int/sme/en/e_commerce/ip_ecommerce.htm [Accessed 27 Feb. 2015]. www.ids.ac.uk, (2015). E-Commerce: Accelerator Of Development?. [online] Available at: https://www.ids.ac.uk/files/dmfile/PB14.pdf [Accessed 27 Feb. 2015]. Xu, P. (2012). Information on Risks and Prevention of the Supply Chain in E-Commerce Environment. AMR, 605-607, pp.493-496. Yang, Y. and Ma, M. (2013). Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012). Berlin: Springer. Zhang, W. (2012). Software engineering and knowledge engineering: Theory and Practice. Berlin: Springer. Zhong, S. (2013). Proceedings of the 2012 International Conference on Cybernetics and Informatics. New York, NY: Springer. Zou, P. and Seo,, Y. (2015). Effective applications of e-commerce technologies in construction supply chain: current practice and future improvement. [online] Available at: https://www.itcon.org/data/works/att/2006_10.content.07939.pdf [Accessed 27 Feb. 2015].