Tuesday, December 31, 2019

Revenge Of Medea And Hamlet - 1436 Words

Medea and Hamlet: Revenge in Any Form Does Not Work â€Å"You’re wise by nature, you know evil acts†¦Ã¢â‚¬  were the words used by Creon to describe Medea (Puchner 535). â€Å"Madness in great ones must not unwatched go† was said of Hamlet by King Claudius (Puchner1849). How different yet similar are the two descriptions of literature’s most discussed figures when it comes to revenge. Medea’s wisdom was known throughout Corinth because of her efforts to save Jason after he captured the Golden Fleece. Her anger after Jason’s betrayal was also known. Hamlet was known as the Prince of Denmark. His anger against King Claudius was only known to his trusted friend Horatio. Anger and vengeance are very dangerous if not handled carefully. The vengeance of Medea and Hamlet were quite different in approach, but both ended with tragic and deadly consequences. Medea was a troubled soul once Jason left her for a younger princess. When the nurse says â€Å"Rulers are fierce in their temperament; somehow, they will not be governed;†, it rings very true of Medea (Puchner 531). Someone so accustomed to getting her way will by no means let anyone, including her beloved Jason, treat her with any disrespect. She not only felt dejected by Jason, but she felt she could do nothing to change her circumstance but take out deadly vengeance against those that committed such a hiatus act towards her. With all things considered, Medea felt Jason took everything from her when he left. Jason became her everything. When sheShow MoreRelatedThe Gendered Struggle: Comparing and Contrasting between Masculine and Feminine Perceptions of Honor in Two Cultures1597 Words   |  7 PagesThe comparisons between Medea and Hamlet are numerous. Both are stories about revenge that end in the controversial main character sacrificing everything in order to preserve one of the most important markers of identity of their time: honor. Medea was a controversial character in ancient times not only because of her filicide, but because she asserted that women have honor, an idea that was not the norm in Greece. In sharp contrast to her is Hamlet, the tragic hero that was honor-bound by his societyRead MoreRevenge By William Shakespeare s Hamlet1625 Words   |  7 PagesRevenge can be defined as â€Å"the act of retaliating for wrongs received†. William Shakespeare s â€Å"Hamlet† is considered one of his greatest plays and the plot is centered on revenge. Euripides Medea also shares a theme of revenge. While both central characters have been betrayed, resulting in their impending revenge, there is more than one theme of revenge in Hamlet, and there are differences in the ways all decide to handle their betrayals and the outcomes of their actions. In â€Å"Hamlet,† he isRead MoreThe Value and Consequences of Women as Property876 Words   |  4 Pagesever done to them, and for their aptitude for revenge. Most women today would disagree with this stereotype, and women have made great strides, but women’s roles in society have not come as far as we may think. The roles of women in Shakespeare’s Hamlet demonstrate that women are fickle, obedient, and passive, but in Euripides’ Medea women are exhibited as aggressive, prideful, and subject to extreme emotion. Ophelia, from William Shakespeare’s Hamlet, is an innocent young woman who lives a fairlyRead More Tragedy In Drama Essay1713 Words   |  7 Pages Tragedy and Drama In a range of dramatic works from Agamemnon to Hamlet, one sees the range of development of the tragic form, from the earliest Greek to the later Shakespearean tragedies. There are two basic concepts of tragedy: the concept introduced by Aristotle in his Poetics, and the concept developed by Frederick Nietzsche in his quot;The Birth of Tragedy.quot; Many dramas can be reviewed to reveal the contrast between these two concepts of tragedy, and demonstrate the development of theRead MoreAristotle s The Tragic Hero1561 Words   |  7 Pagesknow one tragic hero who contradicts every detail of this statement. Medea is a female tragic hero, who is willing to kill her children for vengeance and kleos. She is also very clever, and with her cleverness she acts out her vengeance on Jason. When Creon attempts to banish her for her threats against Jason, Medea pleads â€Å"Just let me stay this single day to†¦ to arrange my exodus from here and make provision for my children.† (Medea , pg. 348) However her true intention was to by some time to carryRead MoreMan vs. Himself2078 Words   |  9 Pagesfulfillment is what people live for, without it how can a person live? A failed search for self-fulfillment often leads to death. Demonstrated in A Tale of Two Cites, Hamlet, and A Death of a Salesman, each novel includes one character that struggles to fulfill his life, which results in death. Self-fulfillment can include being loved, wealthy, happiness, remembered, respected, or even a being hero. Sadly if none of these objectives is met, the character seems to think death is the only way optionRead MoreThe Renaissance and It’s Affect on William Shakespeare’s Works2369 Words   |  10 PagesAntigone). While Shakespeare probably did not know Greek tragedy directly, he would have been familiar with the Latin adaptations of Greek drama by the Roman (i.e. Latin-language) playwright Seneca (ca. 3 B.C.-65 A.D.; his nine tragedies include a Medea and an Oe dipus) (Schwartz, 2005). Shakespeare never uses a mythological name or place name inaccurately, suggesting a genuine knowledge of the sources.† (Showerman, 2004). One of Shakespeare’s most famous plays, Julius Caesar, believed to be writtenRead MoreHumanities Test4641 Words   |  19 Pages 11.   Only the opening sentence survives of : Aristotles essay on comedy pg 236 12.   ( T or F ) Satire is always serious. It criticizes ideas and behaviors that are dangerous to society. False 13.   Shakespeares five great tragedies include: Hamlet, Othello, Macbeth, and: Romeo and Juliet. 14.   The plays of Chekhov feature: Naturalism pg 247-249 15.   Which of the following conventions is seldom found in Elizabethan theaters: Soliloquy or Elizabeth’s Sonnet 16. Know the plot summary ofRead MoreComedy and Tragedy According to Aristotle1912 Words   |  8 Pagestragic confrontation is one in which good is up against good and the contest is to the death.   Ã‚  Ã‚   Revenge Tragedy   Ã‚  Ã‚   There remains one further species of tragedy to define and analyze--namely, revenge tragedy, a type that originated in ancient Greece, reached its zenith of popularity in Renaissance London, and which continues to thrill audiences on the silver screen today.   Ã‚  Ã‚   In general, revenge tragedy dramatizes the predicament of a wronged hero.   A typical scenario is as follows: Your daughterRead MoreHow to Read Lit Like a Prof Notes3608 Words   |  15 Pagesbecomes to us. d. If you don’t recognize the correspondences, it’s ok. If a story is no good, being based on Hamlet won’t save it. 6. When in Doubt, It’s from Shakespeare†¦ a. Writers use what is common in a culture as a kind of shorthand. Shakespeare is pervasive, so he is frequently echoed. b. See plays as a pattern, either in plot or theme or both. Examples: i. Hamlet: heroic character, revenge, indecision, melancholy nature ii. Henry IV—a young man who must grow up to become king, take on his responsibilities

Monday, December 23, 2019

Alternative Hypothesis about Emergence of the Religions,...

What is the role of the religion in the journey of human evolution? Millions and millions years ago our first early-ape ancestor Lucy has to walk African savanna and she did not know her uniqueness, unfortunately. Walking is the interpretation of the environment and its adaptive solution for surviving problem. Interpretation of the environment is the most crucial component of adaptive solutions (Buss, 2004). Encephalization of early-human and its physical consequences directly observed by chipped stones. These stones shaped geometrically accurate and interpreted by paleontologists and anthropologists than they inferred that these stones indicate non-natural inclination for perfection (Klein, 2000). I think, crucial point is that â€Å"non-natural inclination for perfection† part. These kinds of inclinations indicate that human more specifically homo habilis observes and infers beyond nature and its appearance. They found themselves in something like figurative philosophy of nature in other words the Art. Somehow they interpret nature as a notion and express themselves with hunting or any other stones. This is fundamental base for primitive perception of divinity. Emergence and Functions of the Religion Religion or more specifically worshiping is the result of these kinds of interpretations.My hypothesis is the first fire tamer in other words homo erectus inventor of the primitive religion. Hawthrone (2010) also concluded the similar claim but he did not consider

Sunday, December 15, 2019

Ibn Battuta Free Essays

Mackenzie Schultz Mrs. Linn AP World History 1 September 2012 Ibn Battuta and the Five Pillars In Ross E. Dunn’s novel, The Adventures of Ibn Battuta, Ibn, a 14th century Muslim traveler, is influenced by The Five Pillars of Islam in different ways (Dunn 1). We will write a custom essay sample on Ibn Battuta or any similar topic only for you Order Now The Five Pillars of Islam are Faith (shahada), Prayer (salat), Charity (zakat), Fast, and Pilgrimage (hajj). Shahada is the declaration of faith, i. e. the professing that there is only one God (Allah) and that Muhammad is God’s messenger. Salat is the Islamic prayer. It consists of five daily prayers that are recited while facing the Ka’bah in Mecca. Zakat or alms-giving is the practice of charitable giving by Muslims based on accumulated wealth, and is obligatory for all who are able to do so. Fasting is a mandatory act during the month of Ramadan unless you are sick, pregnant, young child, or on a difficult journey. Muslims must abstain from food and drink from dawn to dusk during this month. The hajj is a pilgrimage that occurs during the Islamic month of Dhu al-Hijjah to the holy city of Mecca. Every able-bodied Muslim is obliged to make the pilgrimage to Mecca at least once in their lifetime. He sees that the pillars are the most important cultural value. First, Ibn Battuta is influenced by Faith because he appears to have been one of those rare individuals who live their faith, mainly by relegating their own personal needs to a secondary level of importance while the needs of their faith, remain primary in significance. Ibn Battuta needed to travel his path as a solitary traveler, one who remained convinced that his faith would see him through whatever adventures he encountered in his journey of discovery and exploration. Faith was the reason for his travels. Ibn is also influenced by prayer because in some ways it saved him. In Calicut, a storm came up that evening. Ibn was suppose to be on one of the boats caught in the storm if he wasn’t at prayer in an offshore mosque. The boat he was suppose to be on, ended up sinking resulting in zero survivors (Dunn 224. ) When the Black Death had broken out in the mid-14th century, thousands upon thousands of people were dying. Ibn Battuta escaped the Black Death by living in fresh air, eating pickled onions and fruit, and above all, prayer. These are just two instances where prayer had saved Ibn Battuta’s life (Dunn 273). Alms-giving also had a great deal of affect on him and his travels. The obligation included voluntary giving (sadaqa) to specific classes of people; the poor, orphans, prisoners, slaves, (for ransoming), fighters in holy war, and wayfarers. Falling eminently into this last category Ibn Battuta would during the next several year see his welfare assured, to one degree or another, by an array of pious individuals who were moved to per form acts of kindness, the more readily so since the recipient was himself an educated gentlemen well worthy of such tokens of God’s beneficence† (Dunn 35). . Ibn Battuta was given alms when he was offered constant hospitality. Between, giving alms and receiving it, it was always evident throughout his lifetime. Fasting during Ramadan did not directly affect Ibn Battuta, because he was a traveler, which meant he was not required to fast. It did however bring chaos and celebration around him. â€Å"Ibn Battuta was on hand to witness the sultan fulfill his customary duty of leading â€Å"a magnificent procession† of officials, courtiers, and soldiers from the citadel to a special outdoor praying ground (musalla) that accommodated the crowds gathered for the prayers marking the Breaking of the Fast† (Dunn 37). Just a year later, his entire stay in Damascus took place during the month of Ramadan, resulting in a strenuous obligation that upset the normal routines of people around him and even himself (Dunn 61). Lastly, the hajj, is what I believe, had the biggest impact on Ibn Battuta and his travels. His first hajj began in 1325 and ended the year after (Dunn 1). It was the starting point and the foundation throughout his travels as a whole. Without out the hajj being one of the Five Pillars, we don’t know if Ibn Battuta would of traveled anywhere at anytime. Ibn traveled from the Tangier to the Nile Delta in 1325 (Dunn 28). From there he went to Egypt, Syria, and Arabia, finally reaching Mecca (Dunn 42). From Mecca, he went to Persia and Iraq (Dunn 82). Then back off to Arabia again and East Africa (Dunn 107). After that, he traveled to Antalonia and the Black Sea region (Dunn 138). From the Black Sea region, he went to India, Ceylon, and the Maldive Islands (Dunn 184). Then he visited Southeast Asia and China (Dunn 256) Lastly, he returned back home (Dunn 267). Without his obligation to fulfill the requirement of the hajj, he would of never visited any of these places and receive the reputation he got. In conclusion, Ibn Battuta probably would not have traveled so far without his obligation to The Five Pillars of Islam. Each and everyone one of them had some affect towards him, his travels, and his life as a whole. â€Å"The Marco Polo of the Muslim World† gave historians the key of knowledge to the fourteenth century societies, trade, travel, religions and customs. He is considered a hero in many eyes, and always will be considered a hero. Schultz How to cite Ibn Battuta, Essay examples Ibn Battuta Free Essays Ibn Battuta Muhammad ibn Battuta (1304-ca. 1368) was a Moorish traveler whose extensive voyages as far as Sumatra and China, southern Russia, the Maldives, the East African coast, and Timbuktu made him one of the greatest medieval travelers. Muhammad ibn Battuta was born in Tangier. We will write a custom essay sample on Ibn Battuta or any similar topic only for you Order Now His family was of Berber origin and had a tradition of service as judges. After receiving an education in Islamic law, Ibn Battuta set out in 1325, at the age of 21, to perform the obligatory pilgrimage to Mecca and to continue his studies in the East. He reached Mecca in 1326 by way of Egypt and Syria. This journey aroused in him the passion to see the world. From Mecca he made a trip to Iraq and western Persia as far as Tabriz and in 1327 returned via Baghdad to Mecca, where he spent the next 3 years. Ibn Battuta then traveled by ship along the Red Sea shores to Yemen and from Aden to Mogadishu and the East African trading ports. He returned by way of Oman and the Persian Gulf to Mecca in 1332. Next he passed through Egypt and Syria and by ship reached Anatolia, where he visited local Turkish rulers and religious brotherhoods. He crossed the Black Sea to the Crimea in the territories of the Golden Horde and visited its khan in the Caucasus. He then journeyed to Sarai, the capital of the Golden Horde east of the lower Volga, and then through Khwarizm, Transoxiana, and Afghanistan to the Indus valley. From 1333 to 1342 Ibn Battuta stayed at Delhi, where Sultan Muhammad ibn Tughluq gave him a position as judge, and then he traveled through central India and along the Malabar coast to the Maldives. His next trip took him to Ceylon, back to the Maldives, Bengal, Assam, and Sumatra. He landed in China at the port of Zayton and probably reached Peking. Returning via Sumatra to Malabar in 1347, he took a ship to the Persian Gulf. He revisited Baghdad, Syria, Egypt, Mecca, and Alexandria, traveled by ship to Tunis, Sardinia, and Algeria, and reached Fez by an overland route in 1349. After a visit to the Moslem kingdom of Granada, he made a final trip through the Sahara to the black Moslem empire on the Niger, returning to Fez in 1354. During his travels Ibn Battuta sometimes lost his diaries and had to rewrite them from memory. His travel book was written from his reports by Ibn Juzayy, a man of letters commissioned by the ruler of Fez. These circumstances may account for some inaccuracies in chronology and itineraries and other shortcomings of the work which affect some parts in particular. However, the book contains invaluable and sometimes unique information on the countries Ibn Battuta visited. How to cite Ibn Battuta, Papers

Saturday, December 7, 2019

E-Technology in Business for Implementation- myassignmenthelp

Question: Discuss about theE-Technology in BusinessOperations for Implementation. Answer: Introduction: Electronic technology has changed the business operations of the modern business organizations in several ways. Today electronic technology has touched and transformed all spheres of business organizations like their production, sourcing of raw materials, selling of their finished products and even capital generation. Technology has enabled business organizations not only conduct operations and profit in the future but also acquire and maintain data which they can use for future business generation. However, this electronic technology comes at huge prices both for the suppliers of e-technology and the companies using the technology. The paper would divided into two broad divisions, first the changes which e-technology has ushered into business organizations and second, the steps which supplying companies and using companies take to tackle e-technological threats. Analysis: Electronic technology refers to the technology which is driven by use of electronic instruments to conduct various operations. The modern business organizations use electronic technology in several forms to operate in the market. Companies use e-technology in devices as small as a smart phone to hold conferences as well as in sophisticated manufacturing plants weighing several tons. This use has changed the business operations in several ways (Vahlne and Johanson 2017). The first change which business organizations experienced due to use of technology is streamlining of their manufacturing activities which enable them to mass produce goods at affordable prices. The multinational today stream information regarding customer expectations from their products using online survey and social networking sites. This information is then passed on to the apex management and all the departments. The apex management then use this information in the new product development procedure of the company. The production department can use this information to place orders for raw materials to ensure smooth and timely production of finished goods (Bocken et al. 2014). Companies today install plants which can be receive and process instructions given through computers. This shows that e-technology has made the manufacturing has made the manufacturing process more dynamic and simultaneously control them more accurately. Multinational companies can align their manufacturing process with related activities like inventory control and sourcing of raw materials, thus reducing wastage, which would not have been possible without e-technology (Hair et al. 2015). The next change which use of e-technology has brought about in the organizations is the ways they maintain their suppliers and source raw materials from them. Today, companies, especially the multinational companies need to acquire diverse raw materials for their finished products to cater to their immense customer bases. For example, the companies producing consumer goods like skin care products have to source diverse raw materials like coconut from Asia, cocoa from Africa and olive from Europe. This means that the companies today require to communicate with suppliers based in different to source the diverse categories of raw materials. Electronic technology driven inventory control systems have allowed the companies to maintain their stocks of raw materials and also place orders accurately (Yan et al. 2016). The production managers using e-procurement technology can communicate with suppliers spread in different countries and view their raw materials, their rates and quality agains t their own parameters. They can then forward the information to the other related departments and then place orders after getting approval. One can point out that the power of multinational companies to hold a formidable product line containing diverse products is empirical to their brand value and revenue generation. It is this need to hold high market position that drives them to hold a long product line and consequently acquire raw materials from the world to meet their production needs. Electronic technology has made it possible for companies to communicate with suppliers from different parts of the world and view their products. It has enabled them to gain participation and support of the related departments and then place the orders. Thus e-technology has helped companies to ensure that they order appropriate raw materials of high quality at economic rates. Thus, e-technology has changed the ways companies source their raw materials and align it with their quality parameters (Picin and Carbonell 2016). The third area which e-technology has changed is the ways companies, especially the multinational companies source their capital. Multinational companies in order to carry on their global business operations require immense capital base. The capital base is also required to support the e-technology based manufacturing and sourcing of raw materials. Electronic have changed the ways multinational companies source their capital. It must be note that the largest companies in the world are public limited companies which have to get listed on stock exchanges to source capital. For example, Unilever is primarily listed on London Stock Exchange and also on New York Stock Exchange (Appendix 1). This means that the company can generate capital from both markets. Electronic technology has revolutionized the capital sourcing of multinational companies, thus allowing them to generate immense capital from the market (Salem, et al., 2017). Advancement of informational technology has made it possibl e for both individual investors and institutional investors view the details about the companies like share prices and their dividend paying capacity on variety of platforms like computers, tablets and smart phones irrespective of locations. This availability of share trading portals across diverse devices allow the investors to invest at their convenience. They are not dependent on the physical opening of stock exchange offices unlike before the advent of electronic share trading platforms. This allows the companies to generate immense capital from all over the world which they can allocate towards installation of advanced technology to manage crucial business areas like manufacturing (Kwan, Masulis and McInish 2015). The fourth area of business which electronic technology has changed or rather revolutionized is sell of finished products. Advanced electronic technology has enabled multinational companies to promote their products more aggressively which has enabled them to generate huge revenue and also have deeper long term business implications. The multinational companies, before the development of advanced electronic technology were mostly dependent on advertisement of their products on the conventional media like newspaper, television and radio. There was no scope of gaining customer feedback. Today the multinational companies can advertise their products on the television, newspapers and magazines. The advancement of digital media like internet has provided the multinational companies global platforms to advertise their products before a global base of customers. Electronic technology has allowed companies to communicate with their customers on social networking websites like Facebook and ga in their feedback and suggestions (OHara 2015). These feedbacks can be used while bringing about future innovation in the product and while developing new products. The companies can even gauge the demand for different products and forecast future demand based on the number of customers following their products (forbes.com 2018). This shows that electronic technology has revolutionized selling process of the companies and has enabled them to sell their products all over the world, thus generating immense revenue. This analysis also shows that modern technology has enabled to gain feedback which they can use in future product development. Electronic technology has helped the companies breakaway from their brock-and-mortar stores to sell their products. Companies can sell their products on the ecommerce portals using services of information technology companies like Amazon. The multinational corporations are also able to showcase their products on their official websites along with de tails like features and usage which would not have been possible without IT support. Thus, they are able to receive orders round the clock which paves way for immense generation of profits. The customers while placing orders on the ecommerce portals put in details like name, income and age. Thus electronic technology does not only pave way for selling of products but also allows companies to create customer database, thus paving ways for future business generation (Coronel and Morris 2016). This revolution in overall business operations which electronic technology also poses threats and risks which has necessitated the technology supplier companies like Google to take steps to deal with them. The biggest risk which the companies and their suppliers of technology face is the risk of data thefts. Modern digital platforms like Facebook have enable companies to share information about their products with their customers and gain their feedback. The data often contain sensitive information like income of the customers and their bank details which is captured while they make online payments. The companies acquire, store, manage and use this information while conducting business. Illegal groups have started targeting data bases of companies to gain access to the sensitive information about their customers. Companies like Apple and their customers are under continuous threat of losing their data due to hacking (dailymail.co.uk 2018). The information technology companies have ta ken several steps to prevent or at least minimize data theft. The first step which these companies have taken is mandate their user companies to use login and password while entering their portals for actions like purchasing of products. For example, in order to place or view, Amazon mandates users to put in valid email ids and passwords. The ecommerce websites which enable selling of products keep branded products so that illicit producers engaged in black marketing cannot use their platforms to earn money (OHara 2015). The second step which information technology companies take to curb data hacking is to strengthen the security of their portals from their end. They tighten parameters like directing users to set a certain type of passwords to sign up with their portals. They encourage users to add their original photograph and mobile numbers for verification and future investigation purpose, if required (Raghavan, Desai and Rajkumar 2017). The next step which IT companies take to prevent hacking is to warn the users of any attempt to intrude into their mail. The IT companies like Google have started giving information to their users if they detect any sort of intrusion or attempt to do so. They even track the location and time of the data theft attempt so that holder of the account, both individual and company can take appropriate steps in the direction, like approaching the police and lodging. These actions have to a certain extent enabled companies to minimize hacking (Peters et al. 2017). The fourth step which the IT companies have taken to minimize the threat of hacking is by creating user awareness. They advise users to use passwords which are difficult to crack to protect their accounts. They educate their users not to share their passwords with anyone or write them down anywhere. These initiatives to a certain extent have helped in creating customer awareness and minimize hacking (dailymail.co.uk 2018). The fifth step is the most drastic of all the steps which IT companies use to track data thefts and hacking activities-collaborating with the intelligence departments. One would notice that this step is actually based on the previous steps. The IT companies like Google mandate their users to put in their user ids and passwords. The email id of the user is connected to the verification mobile number. Whenever hacking is detected and reported, the IT companies collaborate with the police forces to tack the hacking groups. The IT companies like Google use the email of the hackers to gain access to their mobile numbers. The police can then approach the mobile service for providing the details of the users like their address, citizenships and other family members names which help the police to track the hackers (bbc.com 2018). Conclusion: One can conclude that electronic technology has revolutionized business operations, especially for the multinational companies. IT developments have made strategic planning of important operations like production and inventory management more accurate. Today IT has enabled multinational companies to control colossal manufacturing processes accurately using software. The companies can get view, acquire and manage global supply using ecommerce supply portals. One can also point out that these two activities would require immense investment which point that the capital generation process of these companies have to be expanded to meet their growing needs. IT development enables investors to invest in the shares online which enable these companies to generate huge capital to support their operations. These companies today enlist themselves on several stock exchanges in several countries which enable them to multiply their capital generation. However, these advantages of IT has exposed use r companies before data theft risks. The IT companies have taken strict steps to curb this data theft and enable their client companies benefit by IT advancements in the long run. References: BBC News. 2018.Viewpoint: How to catch a hacker. [online] Available at: https://www.bbc.com/news/technology-17302656 [Accessed 31 Mar. 2018]. Bocken, N.M., Short, S.W., Rana, P. and Evans, S., 2014. A literature and practice review to develop sustainable business model archetypes.Journal of cleaner production,65, pp.42-56. Coronel, C. and Morris, S., 2016.Database systems: design, implementation, management. Cengage Learning. Forbes.com. 2018.Forbes Welcome. [online] Available at: https://www.forbes.com/sites/ilyapozin/2014/03/06/20-companies-you-should-be-following-on-social-media/#751fbfa964f2 [Accessed 31 Mar. 2018]. Hair Jr, J.F., Celsi, M., Money, A., Samouel, P. and Page, M.J., 2015.The essentials of business research methods. Routledge. Kwan, A., Masulis, R. and McInish, T.H., 2015. Trading rules, competition for order flow and market fragmentation.Journal of Financial Economics,115(2), pp.330-348. Londonstockexchange.com. 2018.UNILEVER share price (ULVR) - London Stock Exchange. [online] Available at: https://www.londonstockexchange.com/exchange/prices-and-markets/stocks/summary/company-summary/GB00B10RZP78GBGBXSET1.html [Accessed 31 Mar. 2018]. Mail Online. 2018.Apple to issue fix for iPhones, Macs at risk from 'Spectre' chip flaw. [online] Available at: https://www.dailymail.co.uk/news/article-5237371/Apple-issue-fix-iPhones-Macs-risk-Spectre-chip-flaw.html [Accessed 31 Mar. 2018]. Nyse.com. 2018.NYSE. [online] Available at: https://www.nyse.com/quote/XNYS:UN [Accessed 31 Mar. 2018]. OHara, M., 2015. High frequency market microstructure.Journal of Financial Economics,116(2), pp.257-270. Peters, G., Shevchenko, P., Cohen, R. and Maurice, D., 2017. Understanding Cyber Risk and Cyber Insurance. Picin, A. and Carbonell, E., 2016. Neanderthal mobility and technological change in the northeastern of the Iberian Peninsula: the patterns of chert exploitation at the Abric Roman rock-shelter.Comptes Rendus Palevol,15(5), pp.581-594. Raghavan, K., Desai, M.S. and Rajkumar, P.V., 2017. Managing Cybersecurity and e-Commerce Risks in Small Busi-nesses. Salem, M., Mayar, N., Saeed, M., Mostafa, A. and Tawfik, T., 2017. N M: Dynamic Online Website. Vahlne, J.E. and Johanson, J., 2017. The internationalization process of the firma model of knowledge development and increasing foreign market commitments. InInternational Business(pp. 145-154). Routledge. Yan, M.R., Chien, K.M. and Yang, T.N., 2016. Green component procurement collaboration for improving supply chain management in the high technology industries: A case study from the systems perspective.Sustainability,8(2), p.105.