Monday, December 30, 2019

Using Haber and Estar for Spanish Compound Past Tenses

The two simple past tenses of Spanish, the preterite and the imperfect, arent the only wants of referring to the past. Auxiliary verbs can also be used to form perfect and progressive, also known as continuous, tenses, some of which refer to the past. Present Perfect Despite its name, the present perfect tense refers to past actions. It is formed by using the present tense of haber followed by the past participle and is the rough equivalent of the same tense in English. Thus He estudiado—he is the first-person indicative singular form of haber, and estudiado is the past participle of estudiar—would usually be translated as I have studied. In general, the present perfect tense is used to discuss actions that took place in the past but still have relevance to the present or are continuing up to the present. Note, however, that the present perfect tense of Spanish doesnt always coincide exactly with that of English; in some cases, the tense in Spanish may be translated to the English using the simple past. And in Spain it is common to use the present perfect for very recent events. Nunca he conocido a nadie como tà º. (I have never met someone like you.) ¿Cuà ¡l es el mejor CD que has comprado? (What is the best CD you have purchased?)Hemos sufrido una pà ©rdida irreparable. (We have suffered an irreparable loss.)Hace una hora ha nacido mi sobrina. (An hour ago, my niece was born. In some regions, the preterite would be preferred: Hace una hora nacià ³ mi sobrina.) Past Perfect Also known as the pluperfect, the past perfect tense is formed by using the imperfect form of haber followed by the past participle. Its uses generally coincide with the past perfect of English, formed by using had and the past participle. The distinction in meaning with the present perfect is that in the pluperfect the verbs action is completed and clearly distinct from the present. Yo habà ­a entendido los conceptos del curso, pero no los habà ­a aplicado. (I had understood the concepts of the course, but I had not applied them.)A medio kilà ³metro de distancia se encontraron otros cuatro cuerpos masculinos, que hasta el momento no habà ­an sido identificados. (A half kilometer away four other male bodies were found, which until that moment had not been identified.)Mi padre habà ­a tenido una vida dura, pero llena de triunfos. (My father had had a hard life, but one full of triumphs.) Preterite Perfect The preterite perfect, sometimes known as the pretà ©rito anterior, is rarely used today except for literary effect; you are unlikely to hear it in everyday speech. It most often follows a time expression (such as cuando or despuà ©s que) and is formed by using the preterite of haber followed by past participle. It is usually translated to English the same way as the past perfect. Cuando el nià ±o se hubo dormido, el cura me pidià ³ permiso para dejarme. (When the boy had fallen asleep, the priest asked me for permission to leave me.)Tan pronto hubo escuchado aquellas palabras, salià ³ corriendo hacia la plaza. (As soon as he had heard those words, he left running toward the plaza.) Preterite Progressive The preterite progressive or preterite continuous is formed by using the preterite form of estar before the gerund. It is the equivalent of the was/were verb -ing construction in English but is used much less frequently. The Spanish preterite progressive often suggests that an action takes place or is repeated over an extended period of time. Este fin de semana pasado estuve andando por las calles de Oslo. (This past weekend I was walking through the streets of Oslo.)Estuve leyendo todos sus mensajes.  (I was reading all your messages.)Estuvimos muriendo de frà ­o. (We were dying of cold.) Imperfect Progressive The imperfect progressive (or imperfect continuous) is similar in meaning to the preterite progressive and is somewhat more common. The imperfect progressive often suggests the ongoing nature of an action, while the preterite subjunctive suggests that it had an end. Un dà ­a antes del examen estuve estudiando con mi amigo. (One day before the test I was studying with my friend.)El actor estaba comiendo saludable como siempre. (The actor was eating healthfully as always.) Past Perfect Progressive Tenses Combine the gerund with the present perfect or pluperfect tense of estar (or of to be in English), and you end up with the past perfect progressive tenses. Their usage in the two languages is similar. Present indicative of haber estado gerund is the equivalent of have/has been gerund, and imperfect of haber estado gerund is the equivalent of had been gerund. The present perfect progressive can refer to continuing actions that may be taking place up to the present:  ¿Cà ³mo se sabe si alguien ha estado usando marihuana? (How do you know if someone has been using marijuana?)He estado pensando en ti.  (I have been thinking about you.)Mamà ¡ y yo hemos estado hablando del futuro.  (Mom and I have been talking about the future.) The pluperfect progressive tense, in contrast, generally refers to continuing actions that are completed (or, if still occurring, are no longer relevant): Andrea habà ­a estado hablando con Pablo todo el dà ­a.  (Andrea had been talking with Pablo all day.)Habà ­amos estado buscando una casa en Madrid. (We had been looking for a house in Madrid.)Habà ­an estado viviendo allà ­ mucho antes de que los espaà ±oles llegaran.  (They had been living there long before the Spaniards arrived.) Key Takeaways The compound past tenses of Spanish provide nuances of meaning that arent available using the two simple past tenses.Present, past, and preterite perfect tenses are formed by using a conjugated form of haber with the past participle.Past progressive tenses are formed using a past form of estar with the present participle.

Sunday, December 22, 2019

Effects Of Technology On Society - 792 Words

Alexis Shepard Professor Johnston English 1101 Date How Technology Affects Society Without technology, would the world people live in today be as successful? Bill Gates once stated, â€Å"’The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency.’ ‘The second is that automation is applied to an inefficient operation will magnify the inefficiency.’† Although some people feel that technology makes a negative impact on society, it does not. Technology has improved the world. There are many ways that technology has improved the world such as, improving education, healthcare, improvement on communication and etc. Technology†¦show more content†¦Technology today has actually saved a lot of lives. Without technology we wouldnt be able to use x-rays, MRIs, ultrasounds and etc. to test for certain conditions. People are able to detect early signs of cancer with MRI testing, without certain machines to help find these illness, a lot more people would die. It also allows doctors to Facetime other doctors outside of the country to talk about medical procedures or allows doctors to Facetime their patients to check on them while they are at home. In conclusion, technology has just made a huge impact on healthcare. Without it, where would society be right now with all of these people suffering with different conditions? Meanwhile, technology has improved our communication skills. Instead of writing letters to people want to associate with, we can just send a quick text or phone call. Today, people even have smartphones that literally do everything. People are able to search the internet on the go, take pictures from your phone instead of to having to use a camera, check the weather, stocks, and more. Imagine having a friend or family member that’s out of state and you wanted to visually talk to them. Technology allows us to video chat such as, Facetime, Skype and other video chatting apps. People are also able to pay their bills thro ugh phones or computers and can online shopShow MoreRelatedTechnology : The Effects Of Technology And Society1283 Words   |  6 Pages The effects of technology with society has beneficial impacted the way we live. With technology is providing many advantages, but also it has some disadvantages it has on children and adults. There is little room for people that wish to live without technology, moreover than living the way they did in the old days. Technology has its advantages, it’s has changed the way people have communicated by email, social media, the way traveling has improved. Have you ever heard the saying ‘Children are bornRead MoreTechnology And Its Effect On Society871 Words   |  4 PagesWhat is technology? Is it the tool that propels humanity forward or is technology the cuffs that hold the everyday man from leaving his own comfort. Or is technology more than a tool, more than a mechanical device? Ray Bradbury s Works are known 4 expanding technology and using speculative fiction to reveal the way technology is consuming the everyday person. but what if Ray Bradbury was never talking about technology and its effect on society with society s effect on technology? It is assumedRead MoreTechnology And Its Effect On Society1386 Words   |  6 PagesTechnology is the collection of techniques, skills, methods and processes used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation. Technology can be the knowledge of techniques, processes, etc. or it can be embedded in machines, computers , devices and factories, which can be operated by individuals without detailed knowledge of the workings of such things. Technology has produced many positive contributions to society and how it has grownRead MoreTechnology And Its Effect On Society Essay1239 Words   |  5 Pagesworld is increasing very rapidly, and new innovations are coming along each and everyday. Technology is the application of scientific knowledge for practical purposes, especially in industry (Oxford). There is no denying that the impact of technology in the world today is huge, now technology has made it to the palm of our hands with the iPhone and continuing to expand. My generation has grown up on technology so I can’t imagine how my life would be with out it, older people may say it has ruined theRead MoreTechnology And Its Effect On Society Essay1204 Words   |  5 Pagesthe world is increasing very rapidly, and new innovations are coming along each and everyday. Technology is the application o f scientific knowledge for practical purposes, especially in industry. There is no denying that the impact of technology in the world today is huge, now technology has made it to the palm of our hands with the iPhone and continuing to expand. My generation has grown up on technology so I can’t imagine how my life would be with out it, older people may say it has ruined the livesRead MoreTechnology And Its Effect On Society1473 Words   |  6 Pageswould surmise that technology has an overwhelmingly negative effect on society. Although there might be consequences that stem from technology, these negative effects only bring about more good than they bring about evil. This good transforms the world in ways people may never be able to comprehend. Technology will always be the epitome of human intelligence and it is this fact that should allow us to not only understand that technology is not dangerous to us but that technology should enable theRead MoreTechnology And Its Effect O n Society1176 Words   |  5 PagesTechnology is the sum of the ways in which social groups provide themselves with the material objects of their civilization. (â€Å"Technology†) In addition, technology has become a basic necessity for people all around the world. Not only does technology have positive effects on how people function in the world, but it also has many negative effects. On a similar topic, technology has improved the way we live tremendously, but people have become extremely dependent on it, almost to the point to whereRead MoreTechnology And Its Effect On Society1396 Words   |  6 PagesTechnology on its own cannot be beneficial or detrimental to the cognitive ability and the human relationship. Its effect on society depends on how and when technology is used. Technology continues to interact with our human experience in some way or the other. It is profoundly reshaping how we live today and giving rise to new strand of lifestyle and custom. With the rise of technologies, we expect to gain from its advances in the field of communication, social interaction, research and developmentRead MoreTechnology And Its Effect On Society1694 Words   |  7 PagesTechnological advances have certainly entered this era to facilitate people’s lives. There is no doubt that some new technology has been created to help operate or effectively manage time in a way that would be beneficial to humans. Technology significantly helps a number of people. A group that greatly benefits with the advances of technology is teenagers. Teens constantly use computers for schoolwork, networking, or knowing anything they want to know with a simple use of their fingertips. FurthermoreRead MoreTechnology And Its Effects On Society1372 Words   |  6 PagesTechnology Abuse Technology has rapidly increased over the past few years and has had a great impact on everyone in several ways. The impact of this applied science on people’s lifestyles has made several too dependent on technology. There needs to be a specific limit to technology that is reasonable but considerable for everyone. This new addiction is truly significant because this modern world of ours can have dangerous consequences that we are not aware of. In the past, many of the machines and

Friday, December 13, 2019

Problems posed by ‘cybercrimes’ Free Essays

Cyber crime is defined as those crimes involving abuse of electronic media or the information contained in it by influencing the computers functioning or the functioning of its system to the detriment of other individuals/organizations. The emerging information technology trends have seen has seen increased use of computers across the globe. This rapid expansion in terms of information communication technology capability to transmit bulk of information has seen enormous transmission across the internet and computers daily. We will write a custom essay sample on Problems posed by ‘cybercrimes’ or any similar topic only for you Order Now With this increased transmission there has emerged a new twist in criminal activities. In addition it has created window for perpetration of harmful activities by criminal organization. Another fundamental twist arising from internet and computer usage is intellectual appropriation. The emergence of such crimes being committed against computers, and the corresponding information in computers is gradually shifting attention towards the threats posed by cyber crimes. This is coupled by the anonymity of such crimes as well as the less aware population being preyed upon. The camouflaging nature of such crimes thus presents new challenges to the law enforcement agency due to the inevitable need to transform in response to this changing criminal landscape. In addition lack of proper legal structures and legislations have condemned businesses and the respective governments to there own discretion in protecting themselves against cyber crime. Such measures employed include the technical measures aimed at securing their systems. However, this is not enough to secure the existing cyber space from criminals. There is an additional need for application of the law in fighting this emerging menace. This paper will analyze the various types of cybercrimes, the problems they pose to the law enforcement agencies and in conclusion analyze the sufficiency of the cyber crimes laws in Australia in dealing with the problems posed by cyber crimes. Understanding the problems that cyber crime pose to the modern nations requires a deeper understanding of the various faces that such crimes take. Cyber crimes in different forms which include; denial of service (DoS), identity theft, stalking, piracy, pornography, hacking, unauthorized modification, viruses, unauthorized copying, credit card crime, extortion, phishing, spoofing, cyber defamation and salami attack among others. Denial of service involves such acts by criminals aimed at flooding of victim’s network bandwidth of overloading of a victims mailbox with spam thus denying the victim access to his entitled services accessibility/provision. Unlike the early days DoS where simple tools generated and sent attack packets fro one source to another external source, such attacks have transformed to incorporate use of attacks from single source to multiple destinations as well as multiple sources to single destinations. However, the most recent development which involves use of self propagating worms has increasingly created a new twist to reaction to such attacks. Hacking on the other hand has emerged as a regular crime as technology continues to advance. Hacking basically involves illegal computer systems intrusion as no permission is sought from the users/owner of the intruded system. Most of hacking is often attributed to teenagers as well as young adults. Hacking is often considered an art of exploration by computer technology buffs who engage in computer exploration rather than being intent on committing crime. The hackers often use hacking as a venue to displaying their skills and not as a tool of harming others. Virus dissemination on the other hand involves release of malicious software’s that often attach themselves to the existing software application resulting into a range of system detriments including system retardation and information sending among others. Such include; worms and Trojan horse among others. Pornography on the other hand has emerged as a successful product in e-commerce that often applies deceptive techniques in its marketing most common being the mouse trapping technology. However, the ease of accessing such cites even to children is increasingly raising concern. Internet relays chat servers have likewise emerged as suitable avenues for criminal meetings from anywhere in the world. Hackers too are known to use such sites in discussing of their various exploits and sharing of information on the same. In addition Pedophiles have been known to use such sites in luring of children to their activities. Such avenues have thus presented avenues for increased criminal activities and planning. Credit card fraud has also increasingly grown more especially when the card’s numbers are used in unsecured electronic transaction resulting into the credit card numbers being stolen by hackers who end up misusing the cards through owner impersonation. Such fraudsters have also been known to use advanced techniques in duplication of credit cards. An emerging trend has also emerged where the confidential data of companies is illegally copied with the aim of extorting huge sums of money from the company. Phishing has also emerged with the rising of technology where information confidential to account holders in financial institutions is pulled out through deceptive ways. Spoofing on the other hand involves use of one computer in assuming another computer’s identity. Another form of cyber crime involves circumstances where defamatory messages are posted on the internet regarding an individual. Likewise stalking has emerged as a form of crime where the criminals trace individuals using the messages they use within the chat rooms. Salami attacks have on the other hand used to perform crime acts that involve insignificant amounts deduction from customer’s bank accounts and depositing it into their accounts. Such varied nature of cyber crimes presents with it varied challenges to the law enforcement agencies. Latest significant form of cyber crime is the Nigerian 4-19 scheme where letters supposing presence of large amount of money in which the victim is required to help are distributed to prominent business, and professional personalities with the aim of hoodwinking them. Law enforcement agencies have had to reckon with the emergence of this new form of crime that comes with a variety of challenges in addition to its shifting landscape. Often such challenges may be classified as technical, judicial or ethical. Technical problems pose the greatest challenge to law enforcement agencies more so, on the issue of traceability more so considering the anonymous nature with which such crimes are perpetrated. It is always extremely cumbersome to locate the IP address from which such crime occur. Under such cases the criminals at times use other persons IP address to connect to a third party who then is unable to identify the actual source of the crime. Such connections are done using proxies with socks4 and socks5 proxies often used by criminals. Often criminals are known to resource proxies through use of machines belonging to innocent and unaware users. Such present a challenge to law enforcement agencies in their quest to track down cyber criminals. Criminals are also known to use fast-flux networks in making of website resistant to firewall website filters and any attempts at law agencies to track them down. Such criminal activities always direct attempts to access the IP address to some arbitrary Zombie machine. Convicting of cyber criminals upon arrest may also prove cumbersome due to lack of evidence in such instances that the criminal has encrypted his/her computers data. This thus presents the challenge of obtaining evidence even in such circumstances where the criminal has been positively identified. In addition tracking down such crimes in order to gain crucial evidence is difficult considering that the criminal activity’s traces disappear as soon as the connection is broken such a challenge may also be attributed to the over-reliance exhibited by law enforcement agencies on ISP’s rather engaging in a day to day co-ordination with the providers as this would enhance quick tracking responses. Ignorance also plays a major role in inhibiting the attempts by law enforcement agencies to fight cyber crime. Most of such crime often goes unreported as ether the victims are unaware that the activity may be classified as criminal or by mere lack of information. Large institutions like banks are also known for failing to report such incidence with the aim of protecting their public image from getting distorted. Other cases are only brought to light after a considerable period of time has elapsed and any evidence that would have aided prosecution has been lost. The digital technology as well as computing convergence has changed the ways of life. Unprecedented criminal opportunities have emerged with some unforeseeable criminal activities becoming a reality. This comes with the need for prosecutors to possess effective knowledge to deal with these emerging crimes. Appropriate training of the relevant law enforcement agencies to meet the competencies exhibited by such criminals is also a fundamental issue. Most countries, more so the underdeveloped countries lack effectively trained personnel to counter the activities of the criminals. The moral underpinning of cyber crime is also bound to pose a challenge to the law enforcement agencies as their action aimed at reacting to the same may be interpreted as a human right violations. Such may include arbitrary searches in quick response to an ongoing connection which may be interpreted as a search without warrant. On the other seeking a search warrant may provide adequate time for the perpetrator to break connection before identification. Jurisdiction problems likewise remain a major challenge to the law enforcement agencies in fighting of cyber crime. Cyber crime is known to take a transnational perspective across various countries borders. The fundamental issue then arising is the issue of sovereign jurisdiction. In USA V Griffiths, the question of dual criminality was raised and the consequent requirement for existence of the same to allows criminal extradition. While one country may have already recognized a respective cyber offense as constituting a criminal offense, the other may have not. The resultant effect then would allow a criminal to operate from one given country without fear of facing legal action and harming victims of another country. The cases clearly illustrated the extent to which judicial barriers may hinder law enforcement agencies from effectively performing their duty and apprehend such criminals. In R v BODEN the existing legal provisions proved insufficient to sustain prosecution of Mr. Boden resulting to his release. In addition the question as to who holds jurisdiction likewise presents an obstacle to law enforcement agencies in fighting cyber crime. When a criminal commits the crime in one country but it affects an individual in another country, there exist no clear legislations that prescribe the country on whose laws such an individual should face prosecution. The major jurisdictional problems facing law enforcement agencies in fighting cybercrime can be summarized as being the lack of harmonized rules in qualifying offences as cyber crimes within various states legal structures, lack of laws empowering investigative agencies in various states capabilities to trail crime across the borders and lastly inadequacy of laws allowing international cooperation to allow cross border prosecution. In the book â€Å"Underground† by Dreyfus a true story about an underground computer group threat predated the internet for more than ten years is narrated. The group was accused of having hacked into secure systems including; the Citibank, the pentagon NASA, NATO among others. It took several raids by both the federal police and the police agencies to bring down the group. The group was subsequently brought to trial under the telecommunications act of 1991which was cited as outlining the legal proceedings surrounding cyber crimes. The penalty levied on the four who hacked major secured websites has been subject to criticism more so regarding the weight of the sentence in relation of the magnitude of the crime committed. The crimes if physical would have otherwise been considered dangerous and would have attracted sever sentence. This once again puts into spotlight the effectiveness of the Australian laws in dealing with such crimes. The question arising then was whether or not these regulations are sufficient enough to curb the cyber crimes menace. The latest bill on anti money laundering offers stiffer penalties accompanied with possibility of long term imprisonment thus meting out proportional penalties which could have a deterrent effect on such crimes. The 1991 telecommunication act incorporated section 74 and 76 criminal code of Australia in illustrating the issue of carrier and data. The legislation describes carrier and data considered property of the Australian commonwealth. The law includes data originating from commonwealth computers as well as data into the commonwealth computers as constituting carrier and data within the section definition. Unauthorized access to commonwealth computers is classified as criminal under section 76(b)-1 with section 76(b)-2 describing what qualifies as unauthorized access. Section 76(b)-3 expounds further to deal with acts that impeded, destroy or after data. Section 76(D) on the other hand emphasizes the on the mode of entry while section 76(e) specifies the prescribed punishment for individuals who contravene the provisions of the aforementioned sections. Unlike the previous cases where creative adaptation was applied in trying to deal with new crimes, the act currently addresses specific cases of computer crimes. For instance in the 1980’s the reported cases faced difficulties regarding whether or not legislation on theft could be applied to computer hackers. In the rulings the court held that information was not property and thus incapable of being stolen. Based on this, Gordon Hughes at one point suggested that hacking of computers could not be considered to constitute an act of theft. However, the telecommunication act, 1991 prescribes specific clauses that handle such cases. Section 76 of the act not only addresses the issue of unauthorized access and illegal copying, but goes further to include resulting damages of such access as constituting a criminal offense. Another milestone made by the Australian laws in fighting cyber crime is evidenced by the Victorian state parliament’s amendment of the 1958 Crimes Act top cater for cyber stalking crimes. The act caters addressing cyber stalking eliminating the cumbersome need for proof of a offenders conduct is such circumstance where the offered meant harm. The legislation goes along way in solving the burden of proof shouldered on law enforcement agencies in addition to the fact that unlike its predecessors it offers provisions for extraterritorial jurisdictions. It is important to note the burden of proving evidence that an offender was stalking was quite cumbersome given the fact that the evidence would disappear as soon as the communication was broken. However, with this new law an offender is considered to have engaged in a criminal by virtue of having meant harm in his/her activity. The cyber crime act has in addition addresses damages and computer related offenses offering more extensive approaches. It was formulated in line with THE recommendations of the Model Criminal Code officer’s committee. E-commerce has also been on the rise to more so in Australian and USA. The number of internet banking service being offered is constantly on the rise. The Australian government to deal with fraud related issues in this area has a series of legislations that control such operations. Such include; the proceeds of crime act 1987 which has the effect of obligating financial institutions to maintain all transactions records for future references, the payment systems regulation, 1998 within borrows a lot from the Wallis report. The Wallis legislation establishes three key regulators of e-commerce namely; The Reserve Bank of Australia, The Australian Prudential Regulation Authority and the Australian Securities and Investments Commissions. Such emerging legislations in Australia have had the effect of sealing some of the loopholes that would have let such crime activities go unpunished like the DPP v SUTCLIFFE, the magistrate’s court considering the trans-boundary nature of the crime in question, considered it as not being in apposition to effectively handle the matter. The Victorian Supreme Court’s decision however in effect came in to redeem the situation to an extent by establishing jurisdiction of the court. Nonetheless the applicability of the crimes act 1958 still posed a challenge to the court in its examination of the reasons that made stalking a criminal offense. This still remains a challenge as even the 2003 amendment in its section 6(3) still makes specific to such cases with regard to limitations of the courts in the light of the individuals rights. The cases essentially reflected some of the hurdles provided for by the law in the fight against cyber crimes. While the Australian law has made major milestone in dealing with cybercrime within its territory, trans-national cyber crime still remains a challenge. In US v Griffiths, for instance the Australian legislations allowed for extradition of a suspect to face charges in the USA, however, the same cannot be said of other countries whose citizens commit crimes against Australian systems. Most countries still lack legislations that would provide grounds for such extraditions. This step was inline with both the international and the European conventions on cyber crimes which stressed the need for nation’s cooperation and unity in the fight against this vice. The convention just like the Australian laws undertook an extensive elaboration of the various forms of cyber crimes emphasizing the need for the member states and other signatories to develop legislation on the same. Unlike the early 1980’s where the legislation focused on criminalizing unauthorized access to computer systems without considerations of the inadequate investigative authority and penalties, recent reforms in Australia have taken a more realistic approach to safeguard computer systems integrity having acknowledged their centrality and commercial value. The cyber crimes act offers the much needed national model for legal response to cyber related offenses. The act possesses transnational aspects as constituted in the European Council Cyber Crime Convention. This allows expanded jurisdictional scope. The Australian cyber laws adequately prepares it to respond to the emerging cyber crimes more so considering the larger extra-territorial jurisdiction which recognizes both multijurisdictional dimension presented in Australia and overseas jurisdiction. Laws expanding on search warrant and conduction of covert surveillance have additionally had the impact on facilitating gathering of evidence. In general the Australian legislations provide adequate tools in dealing with the cyber crime menace. How to cite Problems posed by ‘cybercrimes’, Papers

Thursday, December 5, 2019

Marketing and Strategy Ansoff Matrix

Question: Describe about the Marketing and Strategy for Ansoff Matrix. Answer: Ansoff Matrix has four dimensions- market development, diversification, market penetration and product development. As this prime objective for this assessment is to sell current product of Brayer's ice cream into the new market of Thailand thus, only the strategy of the market development will be taken into consideration. Reason for choosing Thailand One of the prime reasons is that Asia is a developing continent and targeting a developing market will be beneficial for the organization. Dufrnot and Keddad (2014) depicts in the context of the Bayer's products; they have a strong brand name and excellent advertising and visibility. People across the world are aware of this brand and thus in spite of the presence of other local ice-cream parlors in Thailand, people will opt for a brand compared to existing ice-cream brands. Moreover, people of Thailand are more conscious of their health and thus, there existing products like Lactose-free ice cream," " the Fat and Fat-Free ice-creams will be a great success in Thailand (breyers.com, 2016). Moreover, they also have ice-creams for No Sugar Added ranges. As mentioned by Dufrnot and Keddad (2014), Brayers Ice-cream can also sell their products ate low price to attract more customers in Thailand. In addition to that, Ng et al. (2016) states in the year 2015 the ASEAN Economic Community (AEC) is formulated, doing business in Thailand attracts the foreign business. Thailand has become one of the worlds largest foodprocessing industries and provides an excellent opportunity to the business like Brayer's ice cream and expands their connection with western countries like the United States. The concerned country also adopts the Electronic Product Code Information Service (EPCIS)standards to ensure the validity of the food business and their products (Zheng Yu, 2013). Reference List Breyers Ice Cream and Frozen Dairy Desserts. (2016). Breyers. Retrieved 3 December 2016, from https://www.breyers.com/ Dufrnot, G., Keddad, B. (2014). Business cycles synchronization in East Asia: A Markov-switching approach. Economic Modelling, 42, 186-197. Ng, T. H., Low, C. C., Chan, K. H. (2016). The Role of Economic and Financial Developments for Environmental Quality in the ASEAN Economic Community (AEC). International Business Management, 10(17), 3878-3883. Zheng, S., Yu, G. (2013). The information discovery service of electronic product code network. In Emerging technologies for information systems, computing, and management (pp. 107-114). Springer New York.