Friday, December 27, 2019

Mexican Revolution Diaz´s Administration and Beyond Essay

Mexico had a long way to be stabilized from Diaz’s administration to the constitution of the 1917. The Porfiriato era was able to stabilize Mexico had problems despite of the growing economy led a major uprising. After factions argued what’s best for Mexico led a list of compromise constitution that is the constitution of 1917 which they have debated each other. Porfirio Diaz led a coup against President Manuel Gonzalez whom was to pick up and leave in 1876. The Diaz system allows him using the army and police powers to controlled elections, press and public speech, and popular government a farce . He managed to stay in power as he modernize Mexico was practical to it until 1910. Industrialization came to a high price when there had been†¦show more content†¦It seems for rich and the foreigners who controls the resources, â€Å"the ownership of these subsurface deposits was now given to those who owned the land .† Towns lost their lands and autonomy as to industrialize farming, mineral, oil, and transportation such as railroads. If a ranch and Indian villages didn’t produced much was seized by Diaz whom issued new land laws. He was so effective when came to land registration law which left 60% own no land while the rich classes and foreigners own the land. In 1910, the people were fed up to deal with Diaz to lead up t he Mexican Revolution in 1917. One of their reasons for the farmers to rebel against Diaz, that their land as they blame him for their bad conditions in this country. Diaz tries to drag modernize Mexico at a high price which he was able to succeed. The Mexican army shrunk, but it was equipped with modern weapons with help of the Germans . He has to rebuild the nation by reorganizing police force, state’s power, and reduce the power of the central government. Diaz had made Mexico into an oligarchy system which it had everyone in their place. The idea of the oligarchy didn’t last very long along with eliminate serious competition and close the door to all but a few . That seems the reason why conditions were bad in Mexico while the rich enjoy the wealth. While Diaz is still under power hold a tight grip over the government as hisShow MoreRelatedImperialism And War : American Foreign Affairs7199 Words   |  29 Pagestrade agreements and alignments and foster the spread of Christian and democratic ideals as they understood them. The isolationism that seemed to work for America began to change late in the century for a variety of reasons. First, the industrial revolution had created challenges that required a broad reassessment of economic policies and conduct. The production of greater quantities of goods, the need for additional sources of raw materials and greater markets—in general the expansive nature of capitalism—allRead MoreEssay about Argentina4537 Words   |  19 PagesArgentina Europeans arrived in the region with the 1502 voyage of Amerigo Vespucci. Spanish navigator Juan Diaz de Solias visited what is now Argentina in 1516. Spain established a permanent colony on the site of Buenos Aires in 1580. They further integrated Argentina into their empire following the establishment of the Vice-Royalty of Rio de la Plata in 1776, and Buenos Aires became a flourishing port. Buenos Aires formally declared independence from Spain on July 9, 1816. Argentines revereRead MoreSience23554 Words   |  95 Pageswarming planet thus leads to a change in climate which can affect weather in various ways, as discussed further below. What Are The Main Indicators Of Climate Change? As explained by the US agency, the National Oceanic and Atmospheric Administration (NOAA), there are 7 indicators that would be expected to increase in a warming world (and they are), and 3 indicators would be expected to decrease (and they are): [pic]Ten indicators for a warming world,  Past Decade Warmest on Record AccordingRead MoreInstitution as the Fundamental Cause of Long Tern Growth39832 Words   |  160 PagesHandbook of Economic Growth edited by Philippe Aghion and Steve Durlauf. We thank the editors for their patience and Leopoldo Fergusson, Pablo Querubà ­n and Barry Weingast for their helpful suggestions. The views expressed herein are those of the author(s) and not necessarily those of the National Bureau of Economic Research.  ©2004 by Daron Acemoglu, Simon Johnson, and James Robinson. All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission providedRead MoreRacism and Ethnic Discrimination44667 Words   |  179 PagesGuatemala Human Development Report (2005), analyses the concept of social stratification, which gives evidence of the asymmetries with respect to access to development for Indigenous and Afro-descendent Peoples, having to do with difference that go beyond socioeconomic factors, and that moreover, reinforce ethnic subordination. UNDP, Guatemala. 2005. 6 This is a doctrine based on the explicit recognition of cultural diversity is established in conformance with equality of citizenship. It recognizes

Thursday, December 19, 2019

21st Century Essay - 822 Words

nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp; Alternatives to animal testing nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp;Imagine you are walking down the cosmetics isle at your grocery store. While picking up some deodorant or toothpaste, have you ever stopped to think if your favorite product has been tested on animals? You probably haven’t, but the chances are very high that it has been. Two of the main reasons why companies continue to use animals to test their products are to determine possible dangers to human health and to avoid product liability†¦show more content†¦This led to many tests on animals. Two of most common animal tests, according to the Physicians Committee for Responsible Medicine, are Draize Test (named after FDA scientist John Draize) and the LD50 (which stands for Lethal Dose 50). The Draize test involves dropping a substance directly into an animal’s eyes and watching the results. The other test, the LD50 involves force-feeding a substance to a group of animals until 50% of the group dies. So you are probably asking yourself, where are all of these animals coming from? Well, to this day, one of the largest suppliers of laboratory animals is the Charles River Laboratories. Tests are being performed on these animals daily at their laboratories. The most disturbing part is that thousands of companies test their products on animals. According to the People for the Ethical Treatment of Animals, also known as PETA. Lists some of those companies on the PETA.com website, they include: Arm amp; Hammer, Bausch amp; Lomb, Clairol, Clorox, Cover Girl, Dial, Johnson a mp; Johnson, Schick, S.C. Johnson Wax, Playtex and Max Factor, just to mention a few. The companies that do not however test their products on animals have found other alternatives to test their products. These are a few of the companies: Abercrombie amp; Fitch, Almay, Avon, Bath amp; BodyShow MoreRelatedThe 21st Century874 Words   |  4 PagesThe 21st has begun and with it will come many changes in today’s modern society. Changes occur daily; taken into view these changes become extremely noticeable. This century is going to change not just the way that we think, but also what we actually think with - our own individual minds. This paper will express personal beliefs on what will occur in the 21st century, such as, technology, medical sector, and living environments. Technology plays an important role in the 21st century. Modern advancementsRead MoreParenting in the 21st Century789 Words   |  3 PagesParent Involvement for the 21st Century Introduction The 21st century presents a mixture of challenges in all spheres of life. One undisputable thing is that this century has brought forth both good and bad things in one package. Globalization, which is perfectly facilitated by high speed internet and impeccable communication systems, makes children of the modern time to be exposed to millions of things which are either good or bad. This transcends across all the operations of the children includingRead MorePrivacy in the 21st Century1909 Words   |  8 PagesPrivacy in the 21st Century Eng 122 Mrs. Samaniego 10 June, 2013 In today’s society cameras are watching every step you take and every move you make. How do you feel about that? Someone is watching you, whether it is the surveillanceRead MoreLiterature : The 21st Century6619 Words   |  27 PagesConnections – 21st Literature The 21st Century, the time period that we all live in today, smothered in continuous social, economic and political issues. An interesting era for films of this genre is the late 1930’s to early 1940’s which we see reflections in the literature today. War World 2 was a turning point in history and was a time of sheer horror in many places such as Spain, Germany, Poland and Eastern Europe. In today’s age, contemporary literature writers often draw their inspiration andRead MoreWorking in 21st Century2947 Words   |  12 PagesWORKING IN THE 21st CENTURY SEMESTER 1 ACADEMIC YEAR 2012/2013 LECTURE 1 Overview of Course Description of Assignment  © KAMAL KANT, 2012 1 COURSE OBJECTIVES 1. 2. 3. 4. NEW PARADIGM OF WORK CAREER THEORIES ABOUT UNDERSTANDING YOU LEARN TO WORK IN 21st CENTURY ïÆ' ¨ MOTIVATION, LEADERSHIP, TEAMS, INTELLIGENCE STRESS 5. SUCEEDING IN CAREER 6. CAREER PLANNING AND JOB HUNTING  © KAMAL KANT, 2012 SEE COURSE OUTLINE CONTENTS OF TEXT FOR DETAILS 2 WORKING IN THE 21st CENTURY †¢ 13 lectures. †¢ PowerPointRead MoreReading Is A 21st Century727 Words   |  3 PagesReading Is a 21st Century Skill According to a study recorded in April by the U.S. Department of Education and the National Institute of Literacy, twenty-one percent of adults in the United States read below a fifth grade level. The reason for this is because in this century, technology has taken over a very large portion of the way society learns. This means that instead of reading an actual book, people swipe their fingers across a screen to turn a page. Reading is an important 21st century skill becauseRead MoreCharacter of the 21st Century1249 Words   |  5 PagesCharacter of the 21st Century Name: Institution: Date: Introduction The character of the 21st Century from a political, economic and social perspective would be chaotic. It should be appreciated that the world has gotten to a point of political, economic and social consciousness that puts pressure between the governed and the governors. From a social contract point of view, it is arguably correct to assert that the realisation of the social contract nobles would be effected. However, thisRead MoreThe Beginning Of The 21st Century1847 Words   |  8 PagesThe 21st Century, the time period that we all live in today, smothered in continuous social, economic and political issues. An interesting era for films of this genre is the late 1930’s to early 1940’s which we see reflections in the literature today. War World 2 was a turning point in history and was a time of sheer horror in many places such as Spain, Germany, Poland and Eastern Europe. In today’s age, contemporary literature writers often draw their inspiration and ideas from the writers thatRead MoreThe Education System Of The 21st Century1083 Words   |  5 PagesIn the 21st century, many American students are wondering why they are even going to college at all, which begs to question, what is the purpose of education in the 21st century. As with any big question, there are multiple takes on the higher education system in America. Walter Kirn, a Princeton Alumni, describes education as a â€Å"meritocracy,† where those with merit, or wealth in this case, can rise to the top, in a personal narrative – Lost in the Meritocracy - describing what education in the 21stRead MoreThe Importance Of Competencies For The 21st Century981 Words   |  4 Pages21st Century Skills The importance of competencies for the 21st century has led to fundamental questions about to what extent we provide the necessary knowledge base for children and youth to be competent in contemporary and future societies (Voogt et al., 2013). It is obvious that not only learners, but also teachers need to acquire 21st century competencies as well as become competent in supporting 21st century learning. Teachers need to be prepared for new pedagogical approaches that fit the

Tuesday, December 10, 2019

Emerging Technologies and Innovation

Question: Write an essay on the Cyber Crimes. Answer: 1. Introduction A Cybercrime can be defined as any crime that involves any digital equipment, a computing device to be very specific, irrespective of the fact that whether a computer system has been utilized for conducting the crime or a computer device (or a network) itself has become the victim of any criminal activity (Broadhurst et al. 2014). The principle objective of this paper is to provide in depth information about a proposed research work aimed at finding efficient methods for preventing cybercrimes. The report provides insight into the problem domain, along with the purpose and justification of conducting the research work. The research questions have also been defied in this paper, along with the research methods to be utilized in conducting the research work. Last but not least the estimated duration of the project along, with the work breakdown structure and the risk matrix of the project would also be mentioned in the report. 2. Rationale of the research 2.1 Problem domain Authors Broadhurst and Chang (2013) are opined that the number of cyber crimes reported in the last few years has forced information security experts to conduct serious research woks in the said domain: however, the authors firmly believe that the over dependency of the Government agencies and the business organizations on information technology tools is the primary reason behind the sudden rise in the number of cyber crimes. Researchers Gordon et al. (2014) are of the opinion that business organizations should consider and develop strategies so as avoid be being the victims of cyber crimes: hence they have emphasized on the strategies for the prevention of cybercrime, along with the use of digital forensic technologies for the identification of the sources of such crimes and the collection of evidences. Thus it can be said that the fact that several research works are currently being conducted in the field of cyber crime and prevention indicates the significance of the domain: hence conducting a research project on the said topic is justified. 2.2 Purpose and justification The aim of the proposed research work would be to unveil the reason behind the sudden rise in cyber crime activities in the last couple of years, such that efforts can be made towards the prevention of such incidents. The researchers would emphasize on the motivation with which the cyber criminals launch such attacks and the sophisticated tools and techniques which aid them in the successful conduction of cyber crime. Needless to say, the efforts made by the researchers would be directed towards finding efficient methods for reducing (or completely avoiding) cybercrime activities. 2.2.2 Objective of the research The objectives of the research project in consideration are being enlisted below: To conduct in depth survey of existing literary and scholarly articles so as pinpoint the motivation with which cyber crimes are being committed. To identify the reason behind the success of the intrusions that have been reported in the recent past, along with thousands of others that have not been detected. To identify the methods which can be utilized for avoiding cyber crimes in an efficient manner. 2.3 Sponsor/ Supervisor Recommendation The supervisor or the sponsor associated with the project need not recommend the project, as the project has already been approved by the University and is being conducted in accordance to the norms and regulations of the said authority. 2. 4 Justification of research work: It is expected that proposed research would be successful at revealing the factors that have influenced the sudden rise in the number of cyber crimes reported in the last few years, along with the identification of the strategies that would be helpful in changing the trend. The results of the research work would indeed help those business organizations and government offices that have experienced breaches in their secured computer networks. On the other hand, the finding of this project is expected to encourage further research work in the very same domain. Thus, the selection of the research domain is justified. 3. Research Question The proposed research work would be aimed at finding the solutions of the following research questions: What are the primary motivations of the cybercriminals behind intruding secured computer networks? Why is the success rate of cyber criminals so high and why do cyber crimes get undetected for long periods of time? What methods can be used for avoiding cyber crimes in an efficient manner? 4. Conceptual or theoretical frame work Figure: Conceptual Framework 5. Research Methodology 5.1 Research methods The researchers have decided to conduct an exploratory research work, using the post-positivism philosophy. Since the primary objective of the research work is to identify the methods that can be utilized in reducing the number of cyber crimes, the selection of the research methodology is justified (Robson McCartan, 2016). 5.2 Data collection Researchers Taylor, Bogdan and DeVault (2015) are of the opinion that the process of data collection facilitates the process of penetrating into the topic being researched on. Author Panneerselvam (2014) has seconded the opinion, besides differentiating all data sources into the following two classes: Primary sources of data: Raw data collected from individuals who are associated with the research domain are considered to be primary data (Blumberg, Cooper Schindler, 2014). The researchers would conduct interviews with IT security personnel and authorities of organizations that have experienced cyber crimes in the past so as collect data regarding such attacks. The researchers would also create questionnaires and post them in public forums so to collect data from other IT professionals willing to participate in the survey. Secondary sources of data: Information collected from the existing literary articles would be utilized in the research work. 5.3 Ethical issues The names and other personal identities of the IT professionals being interviewed would not be released in public. The information collected from the said professional would be utilized for research purpose only (Billig Waterman, 2014). The researchers would not influence the IT professionals in any manner whatsoever. 5.4 Compliance of requirements The research work has to abide by the following rules set up by the University: The researchers would not be able to publish any sensitive information collected during the research work in any public forum (Pickard, 2012). The researchers would not be able to interview any person having past records of conducting cyber crimes. 5.5 Analysis of data he information collected from the primary sources of data would be analyzed using the under-mentioned techniques: Quantitative analysis: The data collected from the secondary sources of data would be interpreted and analyzed using the following tools (Tuohy et al. 2013): descriptive statistics regression analysis Qualitative analysis: Qualitative analysis techniques would be utilize to collect the information available from the research papers and other existing literary articles (Salaberry Comajoan, 2013). 6. Project Plan 6.1 Deliverables The deliverables of the project under consideration are being mentioned in the following list: The project proposal document depicting the aims and objectives of the research study to be conducted, the rationale for selecting the said domain and the information collected during the background study. The estimated time, budget and other resources required to conduct the project successfully. The progress report of the project, submitted in regular intervals. Presentations documenting the significant findings of the research work. A well documented final project report describing the aims and objectives of the project work, the methods and techniques used in conducting the research work, the data collected during the process and information gained from the process of data analysis, along with the all findings of the research work. 6.2 Work Breakdown Structure The activities associated with the project have been identified in the following Work Breakdown Structure: Figure: Work Breakdown Structure of the project 6.3 Risk Analysis The risks associated with the project have been discussed in the table below: Table: Risks associated with the project Risk Domain Risk description Probability Severity Risk Score (P * S) Action for managing or avoiding risk Prior Commitments The group members might not be able to participate in the research activities due to any prior work commitment (Matthews Ross, 2014). 4 2 8 Minor changes might be included in the project schedule such that the project is completed within the time committed to the supervisor and/ or the sponsor Risk associated with the materials to be used in research The research materials required for conducting the project might not be available at the institute library (Anfara Jr Mertz, 2014). 4 3 12 The members of the project team should consult with the librarian regarding the research materials that would be required for conducting the research work, even before commencing the research wok, to check the availability of the said materials. Risk associated with the project group The members of the project group might not be comfortable working with each other. 3 5 15 The project team lead requires to conduct meetings with the other members so as to resolve such issues (Clark Creswell 2014). Risk associated with research methodology The selected methodology might not be appropriate for the research work being conducted (Lushey Munro 2014). 2 2 4 Consultation with the supervisor is necessary before finalizing the methods to be used. Technological risks The computing devices being used for the research work might malfunction (Miller et al. 2012). 5 4 20 Backups of research data need to be maintained. 6.4 Duration The estimated time duration required for the project has been provided in the table below: Table: Estimated duration of the project. Task Mode Outline Number Task Name Duration Start Finish Predecessors Auto Scheduled 0 Project on Cyber Crimes 120 days Mon 01-08-16 Fri 13-01-17 Auto Scheduled 1 Project starts 0 days Mon 01-08-16 Mon 01-08-16 Auto Scheduled 2 Selecting the project topic 13 days Mon 01-08-16 Wed 17-08-16 Auto Scheduled 2.1 Consideration of all the available project topics 2 days Mon 01-08-16 Tue 02-08-16 1 Auto Scheduled 2.2 Selecting two or more from the available topics 0.5 days Wed 03-08-16 Wed 03-08-16 3 Auto Scheduled 2.3 Conducting a brief background study of the topics 10 days Wed 03-08-16 Wed 17-08-16 4 Auto Scheduled 2.4 Selecting the topic of the project based on the information available from the background study 0.5 days Wed 17-08-16 Wed 17-08-16 5 Auto Scheduled 2.5 Topic of the project work finalized 0 days Wed 17-08-16 Wed 17-08-16 6 Auto Scheduled 3 Designing the project proposal 29 days Thu 18-08-16 Tue 27-09-16 Auto Scheduled 3.1 Considering the aims and objectives of the research work to be conducted 4 days Thu 18-08-16 Tue 23-08-16 7 Auto Scheduled 3.2 Conducting a brief survey of the existing literary works 5 days Wed 24-08-16 Tue 30-08-16 9 Auto Scheduled 3.3 Finalizing the research methods to be used in the project 7 days Wed 31-08-16 Thu 08-09-16 10 Auto Scheduled 3.4 Estimating the time, budget and other resources required for conducting the project 5 days Fri 09-09-16 Thu 15-09-16 11 Auto Scheduled 3.5 Documenting the project proposal 7 days Fri 16-09-16 Mon 26-09-16 12 Auto Scheduled 3.6 Submitting the project proposal 0.5 days Tue 27-09-16 Tue 27-09-16 13 Auto Scheduled 3.7 Approval of project 0.5 days Tue 27-09-16 Tue 27-09-16 14 Auto Scheduled 3.8 Project Approved 0 days Tue 27-09-16 Tue 27-09-16 15 Auto Scheduled 4 Conducting the research work 52 days Wed 28-09-16 Thu 08-12-16 Auto Scheduled 4.1 Conducting an in depth literature review 15 days Wed 28-09-16 Tue 18-10-16 16 Auto Scheduled 4.2 Data collection 15 days Wed 19-10-16 Tue 08-11-16 Auto Scheduled 4.2.1 Conducting the primary data collection process 10 days Wed 19-10-16 Tue 01-11-16 18 Auto Scheduled 4.2.2 Conducting the secondary data collection process 15 days Wed 19-10-16 Tue 08-11-16 18 Auto Scheduled 4.3 Analyzing and Interpreting the data collected 15 days Wed 09-11-16 Tue 29-11-16 Auto Scheduled 4.3.1 Conducting the qualitative data analysis process 10 days Wed 09-11-16 Tue 22-11-16 21,20 Auto Scheduled 4.3.2 Conducting the quantitative data analysis process 15 days Wed 09-11-16 Tue 29-11-16 20,21 Auto Scheduled 4.4 Arriving at a conclusion 7 days Wed 30-11-16 Thu 08-12-16 24,23 Auto Scheduled 5 Documenting the findings of the research work 26 days Fri 09-12-16 Fri 13-01-17 Auto Scheduled 5.1 Presenting the significant findings of the research work to the Sponsor/ Supervisor 3 days Fri 09-12-16 Tue 13-12-16 25 Auto Scheduled 5.2 Project results approved 1 day Wed 14-12-16 Wed 14-12-16 27 Auto Scheduled 5.3 Documenting the final project report 20 days Thu 15-12-16 Wed 11-01-17 28 Auto Scheduled 5.4 Submitting the project report 2 days Thu 12-01-17 Fri 13-01-17 29 Auto Scheduled 6 Project ends 0 days Fri 13-01-17 Fri 13-01-17 30 7. Bibliography Anfara Jr, V. A., Mertz, N. T. (Eds.). (2014).Theoretical frameworks in qualitative research. Sage Publications. Billig, S. H., Waterman, A. S. (Eds.). (2014).Studying service-learning: Innovations in education research methodology. Routledge. Blumberg, B. F., Cooper, D. R., Schindler, P. S. (2014).Business research methods. McGraw-hill education. Broadhurst, R., Chang, L. Y. (2013). Cybercrime in Asia: trends and challenges. InHandbook of Asian criminology(pp. 49-63). Springer New York. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S. (2014). An Analysis of the Nature of Groups Engaged in Cyber Crime.An Analysis of the Nature of Groups engaged in Cyber Crime, International Journal of Cyber Criminology,8(1), 1-20. Clark, V. L. P., Creswell, J. W. (2014).Understanding research: A consumer's guide. Pearson Higher Ed. Gordon, G. R., Hosmer, C. D., Siedsma, C., Rebovich, D. (2014). Assessing technology, methods, and information for committing and combating cyber crime. Lushey, C. J., Munro, E. R. (2014). Participatory peer research methodology: An effective method for obtaining young peoples perspectives on transitions from care to adulthood?.Qualitative Social Work, 1473325014559282. 2.2 Purpose and justification

Tuesday, December 3, 2019

Social Media Marketing Plan

Monitoring In social media, monitoring refers to the method of tracking, measuring and evaluating the marketing activities of a company’s on the social platform. From the definition, monitoring has various components as discussed under tracking, measuring, evaluating and tools used for monitoring on the social media (Barker, Barker, Bormann, Neher, 2013).Advertising We will write a custom research paper sample on Social Media Marketing Plan specifically for you for only $16.05 $11/page Learn More Tracking Tracking refers to the method of finding and following details on the social media. The key to proper tracking plan is to acquire the relevant watchwords and phrases to get relevant information (Barker, Barker, Bormann, Neher, 2013). As such, a tracking plan ought to bring to mind the best watchwords, the greatest social media and catch words that easily connect with the target group. If the plan does not yield the desired goals, it should be e asy to manipulate searches (Barker, Barker, Bormann, Neher, 2013). Measuring The methods applied in measuring the impact of social media marketing remain debatable but various stakeholders agree that the field is quickly growing (Barker, Barker, Bormann, Neher, 2013). Consequently, various measuring methodologies, tools and metrics are in place. However, much of the debate and innovations build on qualitative techniques at the expense of the quantitative techniques, as qualitative analysis seems easier to interpret (Barker, Barker, Bormann, Neher, 2013). The results of social media marketing regarding qualitative goals like increasing brand knowledge and loyalty are long-term by default (Barker, Barker, Bormann, Neher, 2013). It takes time to get loyal customers on the social platform but these efforts eventually bear fruits. However, such fruits must be measurable both qualitatively and quantitatively through Key Performance Indicators (KPIs) as discussed below. Key Performance Indicators (KIPs) These refer to a combination of determinable standards used by a firm to measure or collate performance aimed at meeting the firm’s objectives. Qualitative KPIs are descriptive, include such indicators like customer satisfaction while quantitative KPIs are measureable, and include such indicators like percentage increase in profits, customers among other indicators (Smart KPIs.com, 2013).Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Evaluation Evaluation derives from key performance indicators since it is the method of construing gathered and gauged information to acquire insights from the information (Barker, Barker, Bormann, Neher, 2013). Evaluation serves to generate a deep description on whether the social media marketing activities succeed or fail to achieve the desired goals. Several free monitoring tools are available on the internet and they in clude Google Trends, Google Reader among others (Barker, Barker, Bormann, Neher, 2013). Budget Social media marketing is a new concept and there is no standard budget set for media marketing. However, a survey carried out by Altimeter Group revealed that companies spent between 66,000 US dollars and 1,364,000 US dollars depending on the age and size of the company (Barker, Barker, Bormann, Neher, 2013). Return on Investment The company should be in a position to determine if the ratios regarding return on investment are positive or negative. A positive ratio depicts a return while a negative ratio shows a loss. Return on investment results from deducting costs from sales and breaking down the result by the expenses (Barker, Barker, Bormann, Neher, 2013). It is hard to measure return on investment in the social media since most goals are qualitative by nature. Experts have come up with proxy ROI that measure the long-term results of media marketing (Barker, Barker, Bormann, Neher , 2013). References Barker, M. S., Barker, D. I., Bormann, N. F., Neher, K. E. (2013). Social Media  Marketing: A Strategic Approach (1st Edition). New York: Cengage Learning. Mashable. (2013). Social Media Marketing. Web.Advertising We will write a custom research paper sample on Social Media Marketing Plan specifically for you for only $16.05 $11/page Learn More Smart KPIs.com. (2013). On Key Performance Indicators (KPIs). Web. This research paper on Social Media Marketing Plan was written and submitted by user Hezekiah Burt to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.