Sunday, December 29, 2019

Essay on Walkers Message of Personal Heritage in...

Alice Walker’s â€Å"Everyday Use† is a short story about a mother and two very different daughters set in rural Georgia during the late 1960’s. The plot is centered around on the two daughters, Dee and Maggie, and focusing on the differences between the two and who will gain possession of two hand-made quilts that are seen as a coveted trophy by Dee and are viewed as everyday items Maggie. The final decision of which daughter ultimately receives the quilts will be made by Momma Johnson. Momma, who is never given a first name in the story, is a strong black woman with many man-like qualities. â€Å"In real life I am a large, big-boned woman with rough, man-working hands. In the winter I wear flannel nightgowns to bed and overalls during the†¦show more content†¦I will be focusing this paper on the reasons why Maggie should be given the quilts, reasons why Dee should not be allowed to take them, and what this tell us about Alice Walker’s sen se of what it means to be in touch with one’s heritage. Maggie deserves the quilts because she appreciates the practical value of the items and would naturally use them as they were intended. Like her grandmother, Maggie is a person who values the quilts more as a practical solution for staying warm at night than as folk art which should be displayed in a museum. Dee’s thoughts of her simple-minded sister come into full light during a conversation with Momma when her request for the quilts is denied. â€Å"Maggie can’t appreciate these quilts! She’d probably be backward enough to put them the everyday use. I reckon she would,† Momma replied, â€Å"God knows I been saving ‘em long enough with nobody using ‘em. I hope she will.† (DiYanni 748) With little or no money during tough times, poorer families have often had to be more self-reliant where learning to sew was a skill that was valued and passed down to the younger gen eration. Maggie embraced this skill while her more ambitious sister did not see the value in learning such an ordinary task. â€Å"She can always make more, â€Å"Momma said, â€Å"Maggie knows how toShow MoreRelatedEveryday Use By Alice Walker1725 Words   |  7 Pages Aalia Qazi Mrs. Smith English II Pre-AP Period 6 17 April 2017 Everything is Not What it Seems Sometimes people forget that heritage has to do with truly understanding their past. Many often misrepresent it, especially the younger generations who just accept its presence. Alice Walker’s short story, â€Å"Everyday Use,† revolves around an African American family that consists of three women, who are very different from each other. The story begins with Maggie and Mama waiting in the yardRead MoreAlice Walker s Everyday Use906 Words   |  4 PagesHidden Messages A Critique of Alice Walker’s â€Å"Everyday Use† Title Often authors use the titles of their writing to portray a part of the story that will eventually come up, or to give an underlying message about what’s going on in the story. In Alice Walker’s short story, Everyday Use, she uses a title that isn’t blatantly seen within the story, but is explained through different aspects of the dialogue and actions of the characters. Walker could’ve chosen to explain the title more obviously withinRead MoreComparisson of Mother Tounge and Everyday Use1417 Words   |  6 PagesEdgar Hernandez Professor Ali ENC 1102 March 20, 2014 Amy Tans, â€Å"Mother Tongue† and Alice Walkers â€Å"Everyday Use† both share similar traits in their writings of these two short stories. â€Å"Mother Tongue† revolves around the experiences Tan and her mother had due to her mothers English speaking limitations, she also revolves her story around the relationship of a mother and daughter. Alice walker on the other hand writes a story narrated by â€Å"Mama† the mother of two daughters Maggie and Dee andRead More Comparing Culture in Everyday Use, AP, and Blue Winds Dancing1567 Words   |  7 PagesCulture in Everyday Use, A P, and Blue Winds Dancing  Ã‚   Alice Walker, John Updike, and Tom Whitecloud write stories in which culture plays an important role in many aspects of the conflict. In each story, a particular ethnic, occupational, social, gender, or age groups culture may be observed through characters actions, thoughts, and speech. The decisions the characters make to resolve these conflicts in Everyday Use, A P, and Blue Winds Dancing are affected by the characters culturalRead MoreBlack Cultures And Subcultures Within The United States1091 Words   |  5 Pageswithin the United States. Cisneros and Walker make the same poignant statement about the strains of cultural assimilation, with reconciliation of split identities as the goal, in their respective works, 1991’s â€Å"Woman Hollering Creek,† and 1973’s â€Å"Everyday Use,† yet their unique ethnic perspectives allow them to make it in surprisingly different ways. Cisneros’ family bounced back and forth between Mexico and the United States for most of her youth, which led to firsthand experience in the difficultiesRead More Everyday use by Alice Walker Essay1150 Words   |  5 Pages Alice Walker’s short story â€Å"Everyday use† tells the story of a mother and her daughter’s conflicting ideas about their identities and heritage. Mrs. Johnson an uneducated woman narrates the story of the day one daughter, Dee, visits from college. Mrs. Johnson auto-describes herself as a â€Å"big-boned woman with rough, man-working hands.†(180,Walker). Contrasting her auto-description, she describes Dee as a young lady with light complexion, nice hair and full figure that â€Å"wanted nice things.†(181,Walker)Read MoreEveryday Use By Alice Walker Essay2069 Words   |  9 PagesAlthough Alice Walker’s short story â€Å"Everyday Use† is evidently different than Flannery O’Connor’s short sto ries, â€Å"A Good Man Is Hard To Find† and â€Å"Revelation,† there seems to be a striking similarity between the main characters O’Connor and Walker chose for their stories. Dee, one of the main characters from Walker’s â€Å"Everyday Use,† the Grandmother from O’Connor’s â€Å"A Good Man Is Hard To Find,† and Mrs. Turpin from O’Connor’s short story â€Å"Revelation,† all share one major flaw, that is, they feelRead MoreAlice Malsenior6001 Words   |  25 Pagesshort–story writer, essayist, poet, critic, and editor, Alice Walker’s plethora of literary works examines many aspects of African American life as well as historical issues that are further developed by Walker’s unique point of view. Writers like Alice Walker make it possible to bring words and emotions to voices and events that are often silenced. Far from the traditional image of the artist, she has sought what amounts to a personal relationship with her readers. She has also taken positions ofRead MoreAfrican Americans And African American History3444 Words   |  14 Pagesrecently has the use of relaxers dwindled and more African Americans are deciding to wear their hair natural. While the current natural hair movement may not be an act of rebellion, it does represent how African Americans ideas about black beauty have changed. Where at once point blacks chose to wear their hair in a certain manner for political reasons, or due to unconscious attempts to style themselves after white American beauty standards, modern day blacks are styling their hair for personal reasons.Read MoreThe Atomic Bomb Essay4475 Words   |  18 Pagesexcuse to impress the Soviets? ï‚ § There were even lots of evidence that were drawn from, memos, affidavits, letters, diaries, and discussions, at the White House, and later at the Potsdam conference that led up to President Truman deciding whether to use the atomic bomb. ï‚ § Some scholars today have even conferred on the facts that Truman and that the military feared that if a bomb of destruction got into the wrong hands, the answers would be devastating. Thus, in 1939 the Manhattan Project was created

Saturday, December 21, 2019

The Second Wave Of Feminism - 799 Words

This essay examines the question, â€Å"To what extent was the second wave of feminism (in the 1960’s and 1970’s) successful in achieving equality for women?† The essay is introduced by describing why the second wave of feminism developed and the aims of this second wave of feminist. The essay is broken into two parts. The first part of the essay discusses the impact of women s rights activist on legislation. It is argued that the second wave feminist were unsuccessful in gaining equality in terms of obtaining equal wages and opportunities for women in the workplace. They however were successful in obtaining equal rights laws and reproductive laws for women. The feminist of the 1960’s and 70’s were victorious in securing for many american women the right to have easy access to contraceptives and abortion. The second part of the essay focuses on the extent that the second wave feminist were successful in changing the mindset of Americans. These fem inist wanted the view of women to be one that portrayed women less as only a housewife and more as a women who can lead a life that could involve a career in any field. Success ranged in this area. On one side there was women becoming more independent and free as they embarked the sexual revolution while in other regards such as film and music women still held an inferior role to men. The second wave of feminism achieved great success in attaining equality for women however this success was not as far ranging as these mid 20th centuryShow MoreRelatedFeminism And The Second Wave Feminism1516 Words   |  7 PagesAmerica from 1960s into the 1980s which was later spread into Europe and parts of Asia. Compare to first-wave feminism in which advocates sought for women suffrage, this feminist movement, which had a broader and deeper influence, focused on dealing with issues which hindered legal sexual equality, rights to reproduce as well as family roles. This feminism movement is named the Second-wave feminism. It was politically powerful and influential that it obtained significant gains including the pass ofRead MoreFeminism : The Second Wave Of Feminism1222 Words   |  5 PagesWhat is feminism? Feminism is a definition to philosophy in which women and their contributions are valued. It is based on a social political and economical which is an equality for women. It’s a revolution that includes women and men who who wish the world to be equal without boundaries. The evolution of the rights of women in Australia owes much to successive waves of feminism, or the women s movement. The first of these took place in the late 19th century and was concerned largely with gainingRead MoreFeminism And The Second Wave Of Feminism1351 Words   |  6 PagesAny given person can define feminism in a different way. Some view it as a women’s movement for women, by women and against men. It can also be hard to distinguish the different types of feminism when the m ore radical, outspoken people or organizations can overshadow the rest. In general, feminism is another way in which to view things, another lens in which to see the world. It is another platform for people to express themselves as whole individuals and become a voice for others that may otherwiseRead MoreFeminism And The Second Wave Of Feminism1561 Words   |  7 Pagescries out.(Williams 3.165-8) To Stella, this is attractive. Williams A Streetcar Named Desire, published 1947 between the first wave of feminism and the second wave of feminism, portrays two polar opposite ideologies regarding feminism and masculinity. Stanley represents what a man was supposed to be prior to the re-evaluation of masculinity by the first wave of feminism; men were supposed to be assertive, aggressive, and the kings of their homes. Stella, his wife, is meant to serve as an exampleRead MoreThe Second Wave Of Feminism1594 Words   |  7 PagesSeneca Falls Convention, one of the very first advocacies for women’s rights, the Second-wave feminism in the 1960s saw itself as a movement that achieved great success in terms of women’s social, economic, and political rights. The Women’s Rights Movement that began in the sixties, in comparison to the first-wave feminism in the 19th century—whereas many activists focused on only women’s suffrage—the second-wave feminism dealt with a broader range of issues. From education, the patriarchal system, sexualRead MoreFeminism And The Second Wave921 Words   |  4 PagesUnlike the First and the Second waves the Third wave does not have a starting point or a particular moment. The period from early 1990’s to present is often defined as the Third wave. This wave is considered as the â€Å"backlash† of the movements and achievements made in the second wave. Many issues like Webster decision in 1989, that made a way to create abortion laws and Planned Parenthood Association of Southeastern Pennsylvania v. Casey made a law that women should get counseling before abortionRead MoreThe Second Wave Of Feminism2200 Words   |  9 PagesThe Second Wave of Feminism Betty Friedan, feminist author of The Feminine Mystique, wrote, The problem lay buried, unspoken for many years in the minds of†¦women. It was a strange stirring, a sense of dissatisfaction, a yearning that women suffered in the middle of the twentieth century†¦ Each suburban housewife struggled with it alone†¦ she was afraid to even ask of herself the silent question – ‘Is this all?’† Authors such as Betty Friedan wrote about their struggles in novels and articles in theRead MoreFeminism And The Second Wave1448 Words   |  6 PagesSherlock). From women’s suffrage to abortion laws feminism has evolved with contemporary battles and a variety of approaches. The â€Å"First wave† of feminism in 1920 advocated women’s suffrage, whereas the â€Å"Second wave† targets the societal issues that women in the 21st century are facing. Betty Friedan wrote The Feminists Mystique after World War II exposing female repression and later founded the National Organization for Women (NOW) which ignited the second wave of the feminist movement. Consequently, itRead MoreSecond Wave Feminism Essay895 Words   |  4 PagesSecond Wave Feminism’s Relation to Art 1. Second Wave Feminism has a direct relation to art, as the movement and its creations were directly connected to the social problems of the times. As with most modern art, artists usually turn to creating works to express their problems with society, and this is what feminists did. As the suffragist movements with First Wave Feminism were a great success, and women did have the same legal rights as men, they still interpreted society has seeing them as theRead MoreSecond- Wave Feminism Essay830 Words   |  4 PagesHistory 2112 Second-Wave Feminism Towards the end of the twentieth century, feminist women in America faced an underlying conflict to find their purpose and true meaning in life. â€Å"Is this all?† was often a question whose answer was sought after by numerous women reaching deeper into their minds and souls to find what was missing from their life. The ideal second-wave feminist was defined as a women who puts all of her time into cleaning her home, loving her husband, and caring for her children

Friday, December 13, 2019

Cyber Crime and Targets Free Essays

The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. We will write a custom essay sample on Cyber Crime and Targets or any similar topic only for you Order Now The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired. There is a line that often blurs between legitimate and illegal behavior, when does harsh criticism become bullying, when does an expression of affection become harassment and how do the authorities differentiate between someone looking up an old classmate for rekindle a friendship and stalking a former girlfriend that spurned their overtures. The constitutional protections of free speech and requirements of specificity of regulations make the criminalization of inappropriate behavior. CAUSES OF CYBER – CRIME There are many reasons why cyber-criminals commit cyber-crime, chief among them are these three listed below: Cyber-crimes can be committed for the sake of recognition. This is basically committed by youngsters who want to be noticed and feel among the group of the big and tough guys in the society. They do not mean to hurt anyone in particular; they fall into the category of the Idealists; who just want to be in spotlight. Another cause of cyber-crime is to make quick money. This group is greed motivated and is career criminals, who tamper with data on the net or system especially, e-commerce, e-banking data information with the sole aim of committing fraud and swindling money off unsuspecting customers. Thirdly, cyber-crime can be committed to fight a cause one thinks he believes in; to cause threat and most often damages that affect the recipients adversely. This is the most dangerous of all the causes of cyber-crime. Those involve believe that they are fighting a just cause and so do not mind who or what they destroy in their quest to get their goals achieved. These are the cyber-terrorists. HOW TO ERADICATE CYBER – CRIME Research has shown that no law can be put in place to effectively eradicate the scourge of cyber-crime. Attempts have been made locally and internationally, but these laws still have shot-comings. What constitutes a crime in a country may not in another, so this has always made it easy for cyber criminals to go free after being caught. These challenges notwithstanding, governments should in the case of the idealists, fight them through education not law. It has been proven that they help big companies and government see security holes which career criminals or even cyber-terrorist could use to attack them in future. Most often, companies engage them as consultants to help them build solid security for their systems and data. â€Å"The Idealists often help the society: through their highly mediatised and individually harmless actions, they help important organizations to discover their high-tech security holes†¦.†# The enforcement of law on them can only trigger trouble, because they would not stop but would want to defy the law. â€Å" Moreover, if the goal of the cyber-crime legislation is to eradicate cyber-crime, it mint well eradicate instead a whole new culture, in education is a much better way to prevent their actions. Another means of eradicating cyber-crime is to harmonize international cooperation and law, this goes for the greed motivated and cyber-terrorists. They can not be fought by education, because they are already established criminals, so they can not behave. The only appropriate way to fight them  is by enacting new laws, harmonize international legislations and encourage coordination and cooperation between national law enforcement agencies. WHO ARE INVOLVED: Those involved in committing cyber-crimes are in three categories and they are: THE IDEALISTS (Teenager). They are usually not highly trained or skilful, but youngsters between the ages of 13 – 26 who seek social recognition. They want to be in the spotlight of the media. Their actions are globally damageable but individually negligible. â€Å"Like denying a lot of important e-commerce servers in February, 2000 is said to have caused high damages to these companies.†# Most often they attack systems with viruses they created; their actual harm to each individual is relatively negligible. By the age of 26 to 26 when they have matured and understood the weight of their actions, they lose interest and stop. THE GREED – MOTIVATED (Career Criminals). This type of cyber-criminals is dangerous because they are usually unscrupulous and are ready to commit any type of crime, as long as it brings money to them. â€Å"They started the child pornography often called cyber-pornography which englobes legal and illegal pornography on the internet.†# They are usually very smart and organized and they know how to escape the law enforcement agencies. These cyber-criminals are committing grievous crimes and damages and their unscrupulousness, particularly in child-pornography and cyber-gambling is a serious threat to the society. Example to show how serious a threat they pose to the society is â€Å"the victim of the European bank of Antigua are said to have lost more than $10million†# â€Å"†¦theft of valuable trade secrets: the source code of the popular micro-soft windows exploration system by a Russian based hacker could be extremely dangerous†¦ the hackers could use the code to break all firewalls and penetrated remotely every computer equipped with windows were confirmed. Another usage could be the selling of the code to competitors.†# THE CYBER – TERRORISTS. They are the newest and most dangerous group. Their primary motive is not just money but also a specific cause they defend. They usually engage in sending threat mails, destroying data stored in mainly government information systems just to score their point. The threat of cyber-terrorism can be compared to those of nuclear,  bacteriological or chemical weapon threats. This disheartening issue is that they have no state frontiers; can operate from any where in the world, and this makes it difficult for them to get caught. The most wanted cyber-terrorist is Osama Bin Laden who is said to â€Å"use steganography to hide secret messages within pictures, example, a picture of Aishwarya Rai hosted on the website could contain a hidden message to blow up a building.†# A surprising fact is that these hidden messages do not alter the shape, size or look of the original pictures in any way. HOW TO DETECT A CRIMINAL MAIL A criminal mail is usually sent to networks with the aim of either corrupting the system or committing fraud. The way to detect such mails is by putting security measures in place which would detect criminal patterns in the network. News Story by Paul Roberts, of IDG News Service says that Unisys Suite has a system called the â€Å"Unisys Active Risk Monitoring System (ARMS) which helps banks and other organizations spot patterns of seemingly unrelated events that add up to criminal activity.†# Actimize Technology Ltd based in New York has developed technology that enables organizations to do complex data mining and analysis on stored information and transaction data without needing to copy it to a separate data warehouse. â€Å"The actimize software runs on the Microsoft Corp. Windows NT or Windows 2002 platform and can be developed on standard server hardware with either four to eight processors, Katz said.†# Eric J. Sinrod in his article ‘What’s Up With Government Data Mining’ states that the United States â€Å"Federal Government has been using data mining techniques for various purposes, from attempting to improve service to trying to detect terrorists patterns and activities.†# The most effective way to detect criminal mails is to provide security gadgets, educate employees on how to use them, and to be at alert for such mails, above all, making sure no security holes is left unattended to. CONCLUSION It has been deduced from this study that reliance on terrestrial laws is still an untested approach despite progress being made in many countries, they still rely on standard terrestrial laws to prosecute cyber-crimes and these laws are archaic statutes that have been in existence before the coming of the cyberspace. Also weak penalties limit deterrence: countries with updated criminal statutes still have weak penalties on the criminal statutes; this cannot deter criminals from committing crimes that have large-scale economic and social effect on the society. Also a global patchwork of laws creates little certainty; little consensus exist among countries regarding which crimes need to be legislated against. Self-protection remains the first line of defense and a model approach is needed by most countries; especially those in the developing world looking for a model to follow. They recognize the importance of outlawing malicious computer-related acts in a timely manner or in order to promote a secure environment for e-commerce. Cyber-crime with its complexities has proven difficult to combat due to its nature. Extending the rule of law into the cyberspace is a critical step towards creating a trustworthy environment for people and businesses. Since the provision of such laws to effectively deter cyber-crime is still a work in progress, it becomes necessary for individuals and corporate bodies to fashion out ways of providing security for their systems and data. To provide this self-protection, organizations should focus on implementing cyber-security plans addressing people, process and technology issues, more resources should be put in to educate employees of organizations on security practices, â€Å"develop thorough plans for handling sensitive data, records and transactions and incorporate robust security technology- -such as firewalls, anti-virus software, intrusion detection tools and authentication services. By way recommendations, these kinds of actions are suggested following the weak nature of global legal protection against cyber-crime: †¢Firms should secure their network information. When organization provides security for their networks, it becomes possible to enforce property rights laws and punishment for whoever interferes with their property. †¢Laws should apply to cyber-crime—National governments still are the major authority who can regulate criminal behavior in most places in the world. So a conscious effort by government to put laws in place to tackle cyber-crimes would be  quite necessary. †¢There should be a symbiotic relationship between the firms, government and civil society to strengthen legal frameworks for cyber-security. An act has to be crime in each jurisdiction before it can be prosecuted across a border. Nation must define cyber-crimes in similar manner, to enable them pass legislation that would fight cyber-crimes locally and internationally. How to cite Cyber Crime and Targets, Papers

Thursday, December 5, 2019

Apples Software Quality Logical Observations

Question: Describe about the Apples Software Quality for Logical Observations. Answer: It has been said that perception is reality since what we perceive is what we then accept as reality and as fact. Do you think that this is the case with Great Wall Motors? Is the perception that some consumers have that the vehicles are of relatively low- quality accurate? Is it worsened by the asbestos situation? Explain your answer. Perception is what each of us have, in order to understand our environment. Our brain perceives things in a certain way and we tend to make logical observations to support our perception. When we are faced with a perception our brain then starts to infer information from our environment to support or distort our perception. We try to observe things in order to build our perception or debunk it. The perception that Great Wall Motors was indeed a good deal was wrong. The Great Wall Motors made headlines about its new offers with their introduction of Chery and the Great Wall series into the Australian market through Ateco. They were enjoying a high amount of recognition for its technology, safety and reliability of their new cars. The cars were sold on a period of 3 year and 100000 kilometre warranty. To get such an offer at an inexpensive price was indeed a Great option for the consumers. The Great Wall was among the 17 biggest sellers that sold over 6000 cars sold in the first eight months. No, Perception was not the reality in the case of Great Wall Motors who offered an attractive price at a low quality. People perceived the Great Wall Motors to be a good deal considering its high sales figures in the initial three quarter of the year. Yes, the cars indeed proved to be of low quality, as some consumers said, after the review posted by a man who reviewed motor vehicles. Goods made in China are generally believed to be of low quality. This perception that the cars were a great deal finally got destroyed when Toby Hagon published a review on the vehicle after he bought a Great Wall X240 and test drove the car off road, which it was mainly advertised for, and realised that the mechanical factors of the car were absolutely dangerous and unreliable. After their desert trip the dealer had to make a number of fixes which was fortunately under warranty. The engine which Hagon called anaemic was of extremely low quality which made going uphill very tedious and the engines low power required constant changing of gears. Hagons description about the failure of the car to meet basic requirements as an SUV came as a shock to most Australians who had invested into this low quality wheezy companion. The review takes us through Hagons tour through the desert ranges and the creek crossings and the difficulties he endured in making his way through the off roads of Australia. His review The situation was further worsened by the disc overy of the presence of asbestos in the engine and the exhaust system by Australias safety authorities who ordered a recall of 25000 vehicles from the Great Wall series (Hagon, 2012). Yes, the asbestos problem definitely further worsened the situation for Great Wall Motors. The history of the lethal impact of asbestos on human health was enough for Australians to completely stop the purchase of cars with asbestos components, since they were very sensitive to the topic. There was a general panic around the asbestos topic among Australians. James Hardie was the largest user of asbestos who was aware of its harmful impact as early as 1960, however did not stop the usage of it in his building materials until 1987. Finally, following a lot of proceedings against his company Jamss set up a trust called Medical Research and Compensation Foundation and funded it with $300 million for compensation claims that came from the workers. James initiative was a result of Bernie Bantons persistent campaign against his former employer, for the use of asbestos in their production. Importing goods that contained asbestos was against the Custom rules and regulations of Australia. Paul Bastian, a member of Australian Manufacturing Workers Union stated that if any officer of Ateco was caught in the breach of Australias regulations knowingly, they would face criminal prosecution. (King, 2015) Do you think the Ateco handled the asbestos problem appropriately? Provide support for your answers. No, Ateco did not respond to the asbestos problem appropriately. A higher standard was definitely expected of Ateco, who were the dealers of highly reputed brands such as Maserati and Lamborghini. Upon discovering the presence of asbestos in the engine components of Great Wall Motor cars, they did the right thing by contacting the supplier of China to change those parts on new productions before importing. Even though there were several meetings with their authorities to decide on the way forward with this new problem what they failed to do was to inform the public about this discovery, neither did they go for a swift recall. When Hagon asked Ateco a test car for the purpose of generating a review of their cars they declined as they were worried about unfavourable comparisons that would be made with more reputed cars that could affect the sale of the Great Wall vehicles which Ateco had already imported. Additionally, knowing how strict Australian laws were about asbestos use in the imports Ateco should have been more careful on the quality concerns. Furthermore, there was no mention of this issue on Atecos website or Great Wall Motors. However once there were critical investigations on the case, and when Bastian asked Ateco to recall 25000 Great Wall vehicles to repair and change the parts containing asbestos at the companys cost, Danielle Cotterill from Ateco Automotive did assure that the owners of the vehicles could return their cars to the dealers. They also said that the asbestos was bound to the gaskets in the engine and exhaust system and would not pose any risk to individuals health. They also said that they were not aware of the use of asbestos in the manufacturing of these cars and they could give that in writing. (Furgason, 2015) What other options could organisations take when faced with a major public relation problem such as the one which currently confronts Ateco and their Great Wall and Chery brands? When an organisation such as ATECO Automotive is faced with a problem like this, how they go about their process of resolution is extremely important which is a major criteria in maintaining their reputation. In order to maintain your brand image as well as assure the people that you are taking responsibility of the problem, it is important to first acknowledge that there has been negligence on the part of the organisation in maintaining quality standards. Observing certain options about how an organisation can handle such PR problems can serve as a precedent for future failures. The first thing that ATECO did was to address the issue with the manufacturer's. This step was in fact an integral part of the crisis management process. In their defence, ATECO knew that they had to give an explanation about their negligence about asbestos components in the car which sources stated that they were not aware of. The next step is to accept that there is a problem and that ATECO intends to deal with it and buy time from the people and Media, which ATECO failed to do. They waited till it was very late, to react. The news started to affect the Great Wall shares in the markets, they did not take any initiatives until the Australian Manufacturing Workers Union intervened. On completion of a thorough observation of the situation and its impact on the business, the company must then consider its further course of action. In Atecos case when they realised the damage they came out with an apology and ordered a thorough examination report on the car, its health hazards and safety aspects. It is then important that the Company accepts their failure and expresses their intention to correct the mistake to the people through their website, or blogs or through their public interactions. Ateco failed to do so in the course of the asbestos problem. It is also important to analyse the situation by studying the reaction of the people after their public declaration of the failure. It can take time before the situation can cool down and how the company acts during this time will majorly decide whether they will lose or win (Brown, 2015). Finally it is important for the Company to learn the lesson from a crisis and exercise caution in their future dealings. According to sources, Ateco has stopped importing vehicles from Great Wall Motors post the asbestos problem. However, they are still in negotiation with the Great Wall Motors for some kind of consensus. There are great ways and poor ways to handle PR crisis. Pepsis Syringe Cans Rumours in 1993 was aggressively countered by Pepsi team who created four videos of the canning process and CEO Craig Weatherup appeared across media channels to rubbish the news. Even though the news was a hoax, Pepsi built a strong defence against the rumour in order to assure the people of its safety aspects and to maintain brand image. These initiatives would ensure a smooth exit from the problems as well as maintain customer loyalty and company reputation. (Meltwater, 2013) Toyotas stereotype of providing a high quality vehicle was only slightly tarnished by a safety recall for their Hilux Ute in 2010. Are stereotypes always true? How can we manage in ways that lessen the negative impacts of the stereotypes that we hold of other individuals, groups, organisations or brands, especially if the stereotype has no real basis in reality? Toyota Motor Corporation had introduced four wheel drive petrol and turbo-diesel Hilux vehicles between January 2005 and February 2010. The vehicles faced some safety issues where the vehicle would rapidly accelerate or decelerate on rough roads of rural areas and the tailshaft support bracket was also flawed which could cause the tailshaft to fall off causing serious damage to passerby on the road. More than 100,000 UTES were recalled in Australia. Toyota which is worlds largest car manufacturer was faced with its first major recall (Hughes, 2015). No, in my opinion, stereotypes are not always true. Just because a company has a big name does not mean they cannot create poor quality goods or services. A marketing tactic is never good enough for one to believe in its veracity. Companies like Apple who is reportedly facing a software issue with the iOS and OS X series have proved that even the best companies can fail. A recent report on GM Motors also was an eye opener. The National Highway Traffic Safety Administrations company database was flooded with complaints pouring in about General Motors SUVs, Chevy, Tahoe, Suburban, GMC Yukon and Cadillac Escalade stating that it exhibited some unexplained buffeting and vibration. The GMC Yukon XL Denali seemed to be making a crackling sound even at the speed of 35 kmph. The car was constantly vibrating and the sensations got worse when the vehicle was changed to V4 mode (Elmer, 2015). General Motors has to its credit years of accolades and operates in over 37 countries under 12 brands, yet, such a huge company can fail stereotypes. It can disappoint people. In order to ensure that we dont get negatively influenced by these stereotypes it is important that we research and analyse the products in question before we make any purchases. We are blessed with the advantage of social media. Its influence is massive. One can find ample research report on various products, reviews and not to forget the power of Social media networking sites such as facebook where we have a huge friend circle who can help us in our dilemma to choose. Though there are paid reviews but it would be wise for a person looking to make a purchase to make an extensive research. The internet either has mixed reviews on products which may not have a drastic financial repercussion however if it is something like a car or an expensive phones, one would definitely find reviews if the product has safety concerns (Gover, 2010). References Hughes. A. K. 2015. Apple Has a Serious Problem with software Quality. [Available https://www.zdnet.com/article/apple-has-a-serious-problem-with-software-quality/] [Accessed 26th September, 2016] Gover. P. 2010. Toyota HiLux Recall. [Available https://www.carsguide.com.au/car-news/toyota-hilux-recall-17746] [Accessed 26th September, 2016] Elmer. S. 2015. Theres a Big Issue with GMs SUVs and No One seems to Have a Solution. {Available https://www.autoguide.com/auto-news/2015/12/there-s-a-big-issue-with-gm-s-suvs-and-no-one-seems-to-have-a-solution.html] [Accessed 26th September, 2016] Brown. G. 2015. Crisis PR- Top 10 Best and Worst. {Available https://blog.rdpr.co.uk/the-best-and-worst-crisis-communications-case-studies] [Accessed 26th September, 2016] King. P. 2015. Is Perception, Reality? [Available https://www.quora.com/Is-perception-reality] [Accessed 26th September, 2016] Beissmann. T. 2015. Great Walls Australian future still up in the air as dispute continues. [Available https://www.caradvice.com.au/349441/great-walls-australian-future-still-up-in-the-air-as-dispute-continues/] [Accessed 26th September, 2016]