Saturday, December 28, 2019

Sociology and Triple Bottom Line Essay - 659 Words

Augusta Kamara, ENTR/MNGT 321 Section 002 1. It is appropriate to consider Envirofit to be a social enterprise because their main focus is innovation, risk taking, and large-scale transformation to solve social problems. Envirofit is doing so by bringing sustainable clean energy solution to solve health and energy challenges on a global level at the lowest possible cost. They are combining resources while exploring and exploiting opportunities to create social value by stimulating social change or meeting social needs. They are meeting the needs of the present without compromising the ability of future generations to meet that need. In this case the need is clean air. Envirofit’s approach to shared value is to make a difference by†¦show more content†¦It would be challenging to come up with a business model that would meet their triple bottom line objectives, allow for scalability, and provide the ability to raise start-up capital. The factors that they need to take into consideration include: the market, the customer, and the competition. 3. One of the biggest obstacles to be overcome would be developing a business model that would enable them to sell to customers in base of the pyramid markets and meet their triple bottom line objectives. Finding a way that motorcycle drivers could afford the projected price of the kit ($220), which is a significant money to the drivers because they make less than five dollars a day, little money saved, and little access to commercial credit. They would also need to learn the market, manufacturing, finance, regulatory, and cultural issues that the venture would face. Another obstacle is to provide a kit that would be commercially available, durable, and reliable. It also needs to have less power draw on the motorcycle and easy and inexpensive to install. 4. If I was offered the opportunity to join the venture as one of its key members, I would evaluate the long term impact of the venture. If it’s something that has the potential to make significant changes in the environment especially in third-world countries, I would definitely accept the offer. From what I read, it all soundsShow MoreRelatedEthical Communication Citizenship1336 Words   |  6 Pagesbusiness decisions. There are three major requirements a community has of a corporation, these three ethical responsibilities (social, economic and environmental) have been categorised into something known as the triple bottom line (Demetrious 2004). Corporations who obey the triple bottom line tend to have a better public image, a more harmonious relationship with the consumer and a stronger return for their shareholders. The implications that can occur when large organisations do not practice a degreeRead MoreAn Introduction to Organizational Behavior1638 Words   |  7 P ages(network): outsourcing, organizational networks, strategic alliances and mergers - interdisciplinary roots ï  ® psychology: work teams, work motivation, training and development. Power and leadership, human resource planning, and workplace wellness ï  ® sociology: group and intergroup dynamics, roles, norms and standards of behavior that emerge within groups, compliant and deviant behavior, effects of codes of ethics in organizations ï  ® engineering: design of work, efficiency, performance standards, productivityRead MoreSocial Entrepreneurship And Social Innovation1502 Words   |  7 PagesSocial Entrepreneurship The term â€Å"social entrepreneurship† first appeared in the scholarly literature over 35 years ago in a publication titled The Sociology of Social Movements (Banks,1972). However, Social entrepreneurship has its origins in the eighteenth and nineteenth centuries when philanthropic business owners and industrialists like Robert Owen, demonstrated a concern for the welfare of employees by improving their working, schooling and cultural lives. Since then, social entrepreneurshipRead MoreSustainable Supply Chain13609 Words   |  55 Pagesframework’s propositions. Originality/value – This paper provides a comprehensive review of the sustainability literature, introduces sustainability to the ï ¬ eld of supply chain management, and expands the conceptualization of sustainability beyond the triple bottom line to consider key supporting facets which are posited to be requisites to implementing SSCM practices. The use of conceptual theory building to develop theoret ically based propositions moves the concept of sustainability from a relatively a-theoreticalRead MorePoverty in the United States Essay1684 Words   |  7 PagesNutrition Assistance Program (SNAP), housing assistance, and food stamps provided by the government are not enough to help the poor gain social mobility. In the 1960s, the government drew a poverty line which determined how the lower class may benefit from government aid. Since t â€Å"2008, the poverty line was set at $21,200 for a family of four† (NCCP, 2008) which remains as the federal definition of poverty. However, this system of measuring poverty is flawed because if a family makes a dollar moreRead MoreQuestions For A Total Possible Score Of 1002135 Words   |  9 PagesEllisa Gladney Sociology 192 Spring 2015 Final Exam 6 May 2015 You must answer 5 out of 7 essay questions for a total possible score of 100. For each essay question, you are expected to explain your answer in approximately two-three paragraphs (approximately 10-20 sentences). Each response should give a detailed answer explaining a nonprofit situation, variable, aspect, etc. The grade will be based on your ability to explain in detail IN YOUR OWN WORDS and grammatical errors will be taken intoRead MoreRoadmap to Csr Sustainability in Healthcare16191 Words   |  65 Pages  BUSINESS   IS   GOOD   BUSINESS:   WHAT   IS   THE   SIGNIFICANCE   OF   CSR   FOR   HOSPITALS?    SECTION   2:   CSR   ELEMENTS:   TERMINOLOGY      IMPLICATIONS    7.    SUSTAINABILITY    8.    TRIPLE   BOTTOM   LINE    9.    GOVERNANCE   SYSTEM    10.    CAUSE   MARKETING    11.    TRANSPARENCY    12.    CARBON   FOOTPRINT    13.    ENVIRONMENT,   HEALTH   AND   SAFETY   (EHS)    14.    CORRUPTION    15.   Read MoreCbre Analysis2493 Words   |  10 Pagesmarketing concept that focuses on social welfare by promoting energy efficient products and green housing. The philosophy behind the New-Era orientation is one that requires most attention – environmental issues. Also, the company also adopts a â€Å"triple bottom line† perspective; besides environmental value, energy efficient buildings also create economic value and social value for consumers and publics with energy efficiency products. With rising energy cost in the recent years, the impact of the company’sRead MoreHuman Resource Management Notes Essay example3968 Words   |  16 PagesResearchers have sought unsuccessfully to find direct links between HRM practices and organisational success IR regulation and unions have not disappeared Globalisation and offshoring Academic Disciplinary Contributors to HRM – management, sociology, psychology, social psychology, economics, employment relations and organisational behaviour HRM Functions Job Design Recruitment and selection Training (learning) and Development Performance management Career Development and successionRead MoreStrategy Management18281 Words   |  74 Pagesbook includes strategy material that has stood the test of time (such as, the resourcebased view and Porter’s five forces model) as well as up-to-date strategy material and current research (such as the dynamic capabilities perspective and the triple bottom line). The book also includes student-accessible coverage of strategic management research. It draws on articles published in the leading academic journals (for instance, Strategic Management Journal, Academy of Management Journal/Review, Organization

Friday, December 20, 2019

Big Bad Bully By Hara Estroff Marano - 1764 Words

In the article Big Bad Bully, the author, Hara Estroff Marano describes that â€Å"the one most hurt by bullying is the bully himself† even if at first it is not obvious. Marano claims that the aggression of a bully starts at an early age. The aggression can be physical such as hitting, kicking, and punching or the aggression can be verbal such as name calling, threats, and insults. As Marano writes, â€Å"Bullying causes a great deal of misery to others, and its effect on victims last for decades, perhaps even a lifetime.† Some people don t believe that bullying is such a big issue in the world, they think it s just ‘boys acting like boys’ or ‘girls being girls’. However, when a bully is around they are the ones that draw the line and decide what is fun and what is a gesture that is â€Å"intentionally hostile.† A bully is a bully because they get what they want which gives them power; power which enables them to only see the good it br ings them and not others. The ways in which a child bullies someone else greatly depends on their gender. When boys bully it’s more of a physical aggression which includes pushing, shoving, hitting and kicking. However, when girls bully others, they hurt others through damaging their relationships and self worth with words. Girls who are bullies tend to spread rumors about other people so that people will reject that person and view them as strange. Girls who are bullies also control a person by social exclusions, for example, one can say, â€Å"you cant

Thursday, December 12, 2019

The Neandertals Essay Example For Students

The Neandertals Essay Staring into the gloom, I imagine the caves ancient inhabitants, wrapped in bear skins, huddled near a fire. The haunches of a reindeer roast in the fire. A mother nurses her infant. Children playfully throw pieces of bone into the flames. An old woman tends the wounds of a hunter with an herbal ointment. The strong smells of smoke, unwashed bodies, and rotting carcasses thicken the air. Until recently, nobody would have assumed that the above passage (RickGore, pp.6) was about how the Neandertals lived. However, recent studies haveshown that Neandertals are smarter than we first thought. The geography of the Neandertals domain was quite odd. 230,000 yearsago Europe was filled with caves, marshes, and grasslands. It was a very harshand cold wilderness. The Neandertals were in existence right in the middle ofthe Ice Age, and although occasional warm periods would create subtropicalconditions as far north as England for thousands of years, the glaciers wouldalways return and the Neandertals would always be forced south again. TheNeandertals could be found as far north as England and as far south as Spain,from Gibralter to Uzbekistan. Neandertal bones have been found in the Neander Valley and DusseldorfGermany, in Altamura, Italy and Vindija, Croatia. These are major sites for theEuropean caves the Neandertals lived in. Although the Neandertals went to thesouthern tip of Italy, they never crossed the Mediterranean Sea to Africa. Theymigrated from central Europe to central Asia to the Middle East and always cameback. Their main mode of moving around was on their feet, and they usuallytravelled in bands of no more than 30 people. The Neandertals had broad noses, and scientists think this was to warmthe cold air. They also had thick browridges, receding chins, high foreheads,and their skulls sloped back over their brains. They learned to hunt in groupsin order to kill the bigger game. The Neandertals lived with modern humans for10,000 years, but they didnt change, and eventually it is believed the modernhumans conquered them with their more advanced technology. Although not much is known about the Neandertals culture,anthropologists have some ideas of how they lived their life. It is believed by many that the Neandertals practiced cannibalism for adeath ritual. There is evidence of this on the skulls and big bones ofNeandertals. There are cut marks and some bones have been broken open and arewithout marrow. Why would they do this? Maybe they liked the way theirneighbors tasted, or maybe it was a ritual for a religion of theirs. There isother evidence they have a religion. One archaeologist found a carved andpolished ivory tooth, and since it looked to have no purpose as a tool, it ismost probably a spiritual object. The bodies of people were found in a cavewith flowers around them. This also suggests some sort of religion. Scientists had always thought that the technology of the Neandertals wasprimitive. However, they have changed their minds. You need a lot of brainsfor flint knapping, Jacques Pelegrin of the French Center for ArchaeologicalResearch. Recent excavations show that Neandertal tools required a high levelof craftsmanship and mental ability. During most of their existence,Neandertals have what is called Mousterian technology- flaked tools (i.e. scrapers and points) and this remained unchanged for 100,000 years. During thelast few thousand years of their lives, they developed what is calledChatelperronian technology- hafted points and more complex. It was also thought that the Neandertals couldnt speak. One theory isthat they communicated through mental telepathy, due to the large brains. Nowthough, anthropologists believe that the Neandertals spoke at least arudimentary language. A hyoid bone(the voice box hangs from it in the back ofthe throat) was found in a body recently. They may not have had a language ascomplex as ours. but at least they could talk to each other, saidChristopher Stringer, a paleoanthropologist at the Natural History Museum inLondon. .u676b902f99e3ad1d8fffb55cf577fe20 , .u676b902f99e3ad1d8fffb55cf577fe20 .postImageUrl , .u676b902f99e3ad1d8fffb55cf577fe20 .centered-text-area { min-height: 80px; position: relative; } .u676b902f99e3ad1d8fffb55cf577fe20 , .u676b902f99e3ad1d8fffb55cf577fe20:hover , .u676b902f99e3ad1d8fffb55cf577fe20:visited , .u676b902f99e3ad1d8fffb55cf577fe20:active { border:0!important; } .u676b902f99e3ad1d8fffb55cf577fe20 .clearfix:after { content: ""; display: table; clear: both; } .u676b902f99e3ad1d8fffb55cf577fe20 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u676b902f99e3ad1d8fffb55cf577fe20:active , .u676b902f99e3ad1d8fffb55cf577fe20:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u676b902f99e3ad1d8fffb55cf577fe20 .centered-text-area { width: 100%; position: relative ; } .u676b902f99e3ad1d8fffb55cf577fe20 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u676b902f99e3ad1d8fffb55cf577fe20 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u676b902f99e3ad1d8fffb55cf577fe20 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u676b902f99e3ad1d8fffb55cf577fe20:hover .ctaButton { background-color: #34495E!important; } .u676b902f99e3ad1d8fffb55cf577fe20 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u676b902f99e3ad1d8fffb55cf577fe20 .u676b902f99e3ad1d8fffb55cf577fe20-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u676b902f99e3ad1d8fffb55cf577fe20:after { content: ""; display: block; clear: both; } READ: Entrepreneurship Process and Principles EssayThe Neandertals were plagued by injuries and disease, but there isevidence that they were cared for by the group. They ate cave bears and aurochsand other big game, slicing off the skin with sharp flints. The skins theycured and wore draped over their bodies, and they made buildings resemblingteepees out of wood or mammoth bones and the hides of some animals. The Neandertals had a compassionate side, something not expected fromtheir big and squat appearance. They cared for their sick and injured, and theyhad families, as a man, two women, and an infant were found buried together withpersonal decorations on them and pollen from wildflowers. Some think thatbodies were also disposed of in large caves for housecleaning. Still, one of the biggest questions of Neandertals today is whathappened to them? Nobody really knows. There are many theories, however. The Neandertals inhabited Europe from about 230,000 to 30,000 years ago. About 40,000 years ago the modern humans arrived. They lived peacefully side byside for 10,000 years and then all record of Neandertal life ends. It isthought that the modern humans conquered and destroyed the Neandertals withtheir advanced technology. Or maybe the Neandertals interbred with the modernhumans and got slowly replaced, unable to compete. It is also possible that anatural disaster(like the Ice Age) caught them in the north and they were unableto leave, as they were surrounded by modern humans. It is very surprising that there is no record of violence between theNeandertals and the modern humans. I see confrontation. People who grow up inthe Middle East understand that. We dont like each other. We rarelyintermarry, and we kill each other whenever we can. I dont think you canprevent competition among societies, said Ofer Bar-Yosef. If that is so, thenmaybe the modern humans DID overthrow the Neandertals. All anthropologist know is that 35,000 years ago the Neandertalsmigrated one last time to the caves on the southern tip of Spain, and yet theynever once tried to get over to Africa. Why not? I see them again, chipping at flints and gazing down at herds of elk and aurochs that grazed the rich grasslands below. Now, where their prey once wandered, the ships of many nations anchor. Beyond them, Africa looms through the haze, filling me with wanderlust and questions.(Rick Grey, pp. 35) Category: Social Issues

Thursday, December 5, 2019

Internet Of Things Information And Communication Technology

Question: Discuss about the case study Internet of Things for Information and Communication Technology. Answer: Introduction Internet of Things (IoT) is a system where a connection is made between physical world and the internet using specialized sensors. The IoT has the potential to revolutionise peoples living. Smart refrigerators could sense when one runs out of groceries such as milk and cheese and create a shopping list for anyone. Sensors in the home could detect changes in the temperature and then turn on or turn off heaters and or air-conditioners to maintain a constant temperature (Xia et al., 2012, pp.45). People with chronic illnesses could have sensors implanted that send data to a doctor who could then send back data to change the dose of medication being administered automatically by a medical device (Drucker 2015, pp. 105-110). There are also applications in business, in particular, manufacturing and production industries where sensors could detect low stock levels and reorder supplies or indicate when machines need to be repaired. The IoT has the potential to revolutionise peoples living. S mart refrigerators could sense when one runs out of groceries such as milk and cheese and create a shopping list for anyone. Sensors in the home could detect changes in the temperature and then turn on or turn off heaters and or air-conditioners to maintain a constant temperature (Madisetti Bahga 2014, pp. 343). People with chronic illnesses could have sensors implanted that send data to a doctor who could then send back data to change the dose of medication being administered automatically by a medical device. There are also applications in business, in particular, manufacturing and production industries where sensors could detect low stock levels and reorder supplies or indicate when machines need to be repaired. In this report, a study on IoT and its possible applications in the company has been conducted in order to gain more knowledge on the systems and understand the associated risks with the projects. In this report structure, first, the basic concept of internet of things (IoT) and its applications are discussed. After that, the advantages and disadvantages of IoT have been discussed and its possible applications in the specific company have been analysed. Again, for the project, a company is selected, whose business is mainly spread over a small region of the country and is trying to spread over a larger region by implementing new and positive changes. As the chosen company is still limited to a particular region and hence needs small but high potential ventures in order to grow and spread over a large region. Internet of Things, Its Applications, Choice of Applications Internet of Things Kevin Ashton invented and coined the term Internet of Things (IoT) in 1999 to describe a system where there is connection between physical world and internet with the use of sensors. In the last decade the concept of IoT has expanded to refer to situations where physical devices, vehicles, buildings and machines are embedded with electronic sensors and software that support network connectivity (Skarmeta Moreno 2013). The IoT has been made possible by the use of cloud computing and networks of data-collecting sensors. Examples of the IoT include the recent trend of smartphones and wearable data collection devices being connected to each other and to the Internet. People wear devices, which track physical activity and sleep patterns. Using Bluetooth this data is then synced to an application on a smartphone (Gubbi et al., 2013). The application on the smartphone then sends the data to a central database stored in the Cloud. This database could contain data collected from thousands of individuals. The IoT has the potential to revolutionise peoples living. Smart refrigerators could sense when one runs out of groceries such as milk and cheese and create a shopping list for anyone. Sensors in the home could detect changes in the temperature and then turn on or turn off heaters and or air-conditioners to maintain a constant temperature (Chandrakanth et al., 2014). People with chronic illnesses could have sensors implanted that send data to a doctor who could then send back data to change the dose of medication being administered automatically by a medical device (Perera et al., 2014). There are also applications in business, in particular, manufacturing and production industries where sensors could detect low stock levels and reorder supplies or indicate when machines need to be repaired. Applications of IoT Internet of Things (IoT) have a wide range of applications in different fields. These are as follows: 1. Application In Connected/Smart Home - A smart home is the one in which the gadgets have the ability to speak with each different and additionally to their elusive surroundings (Akash et al. 2014). 2. Applications For Wearables - Wearable IoT tech is a vast space and comprises of a variety of gadgets. These gadgets extensively cover the fitness, wellbeing and amusement necessities (Bonomi et al., 2012). The essential from internet of things innovation for wearable applications is to be exceedingly vitality effective or ultra-low power and little estimated. 3. Applications In Retail - The capability of IoT in the retail area is gigantic. Envision the situation when your home apparatuses will have the capacity to inform you about deficiency of supplies or even request all of them all alone. This closeness based publicizing model of brilliant retailing has begun to wind up a reality (Miorandi 2012). 4. Applications For Smart Cities - Brilliant surveillance, more secure and computerized transportation, more quick-witted vitality administration frameworks and ecological observing all are case of internet of things applications for well-informed urban areas (Turner et al., 2014). 5. Applications In Healthcare Another sector is healthcare, in which internet of things is expected to have a wide range of applications. 6. Applications In Agriculture Agriculture and related sectors needs extremely institutive and exceptionally versatile innovation arrangements. Internet of things applications can convey precisely the same to ranchers. 7. Applications in Automotive/Transportation - Google's self-driving motors are well known all over the world. IoT is making associated cars and motors a probability yet gradually. Any innovation takes no less than a few years to proliferate in standard car industry (Zanella et al., 2014, pp.232). This is the reason there is not such buildup around associated internet of things cases. Organizations and new businesses all are declaring imaginative advancements to bolster associated auto stages. 8. Applications For Industrial Automation - Industrial mechanization is a standout amongst the most significant uses of IoT. With help of internet of things base sponsored with cutting edge sensor systems, remote availability, creative equipment and machine-to-machine correspondence, routine mechanization procedure of commercial ventures will change totally (Da Xu et al., 2014). IoT computerization answers for commercial enterprises from every single huge name like NEC, Siemens, Emerson and Honeywell are as of now in the business sector. 9. Applications In Energy Management - Power grids without any particular future will not just be efficient and effective enough additionally exceptionally solid. The idea of smart grid is turning out to be exceptionally well known (Mulani Pingle, 2015, pp. 55). The essential thought behind the smart grids is to gather information in mechanized design and break down the conduct or power shoppers and suppliers for enhancing effectiveness and additionally financial aspects of power use. Advantages and Disadvantages of IoT Advantages Information: According to general opinion, unmistakably having more information helps settling on better options. Whether it is normal decisions as hoping to acknowledge what to buy at the business sector or if your association has enough devices and supplies, learning is power and more data is better. Monitor: Another apparent great advantage of IoT is monitoring service. Knowing the exact measure of supplies or the air quality in a home, can propel to give more information that couldn't have already been assembled viably. Time: As showed in the past cases, the measure of time saved as an aftereffect of IoT could be extremely immense. Likewise, in todays present life, people in general could use extra time (Suryadevara et al., 2014). Money: In general supposition, the best favored outlook of IoT is saving money. In case the expense of the marking and checking equipment is not precisely the measure of money saved, then the Internet of Things will be by and large gotten. Disadvantages Compatibility: At present, there is no overall standard of compatibility for the marking gears. Specialists trust this obstacle is the most simple to beat (Stankovic, 2014). The gathering relationship of these gear simply need to consent to a standard, for occurrence, Bluetooth, USB, and so on. This is just old news new or innovative required. Complexity: As with each and every mind-boggling structure, there are more odds of complexity of the devices. With the Internet of Things, more complexities arise from the devices. Insurance/Security: With each one of this IoT data being transmitted, the peril of losing assurance increases. For instance, how all around mixed will the data be kept and transmitted with? Does one require his neighbors or organizations to know what meds that he is taking or his cash related situation? Safety: If an acclaimed developer changes ones cure and then again if a store thus sends him a proportionate thing that he is overly sensitive to, or a flavor that he couldn't care less for, or a thing that is currently ended. Subsequently, prosperity is finally in the hands of the client to check any robotization. Two Potential Implementations of IoT in the Company For the company, two potential implementations of IoT can be Smart Home Systems and Wearables. Smart Home System Albeit the concept of home automation has been known to all since the 1970's, it didn't accomplish high market infiltration because of high costs, exclusive correspondence benchmarks, and dependence on installers/clients with innovative insights (Stankovic, 2014). With the utilization of scaled down modules that influence 802.11bgn Wi-Fi home systems, and keep running at ultra low powers, soon every gadget in the house is associated with the home system and available specifically, over the home system, and even remotely from over the world. These associated home gadgets will have the capacity to organize vitality utilization, shopper accommodation, and perhaps precisely and reliably foresee the necessities of the general population who stay in the homes (Suryadevara et al., 2014). Numerous experts trust that the purpose of intonation has been achieved where the expense of empowering items for the home with Wi-Fi is exceeded by the propelled highlights, overhauls, c lient accommodation, and information gathering and investigation (and conceivable membership income) that could originate from gadgets associated with the web and at last to cloud administrations. It is no more a matter of if, however of how soon (Mulani Pingle, 2015, pp. 65). Wearables Wearable gadgets, for example, the Apple Watch, and a large group of other brilliant gadgets by different organizations, for example, Google, Samsung, Fitbit, Pebble, Jawbone, Adidas, Johnson and Johnson, and so forth., will help the business sector for the IoT. Nearly 500 million units of shipments of wearable gadgets are expected to be delivered by 2018 (Stankovic, 2014). Reasons for the Selections The company is still limited to a particular region and hence needs small but high potential ventures in order to grow and spread over a large region. As the company wants to implement IoT in the business, these two options are the best as they are easy to implement, low cost but cost-efficient and have a lot of potential in the future. These two technologies will also attract more customers that will eventually help in the growth of the company. Moreover, the company will not require any high investments for these two implementations. Also, these two projects can easily be implemented with the last few years. Hence, these two options are most feasible for the company. Security and Privacy Issues Issues with Smart Home System Hacking Connected Thermostats Connected thermostats can be hacked and misused by some people to control the temperature of the room at will that may lead to major accidents. Issues with Smart TV Smart TV hackers can use the attached webcam to spy on the users of the Smart TV. Compromised Security Systems Security systems might be compromised causing serious security troubles to the user. Eavesdropping on Communication Systems Unethical hackers can eavesdrop on communication systems in order to extract personal and confidential information from the user. Changing Lighting Systems - Programmers that access a keen home's lighting frameworks cannot just control whether a house's lights are on and off, they can likewise have admittance to a home's power (Hamraz et al. 2013). From that point, programmers can disturb the power measure in a house is devouring, prompting a galactic power bill for the property holder. Issues with Wearables Security issues with wearables mainly come from the fact that the modern day wearables come with the feature of computing and hence, hackers can use the feature to capture personal information of the user. Conclusion From the study, it can be concluded that the company can look to implement Smart Home and Wearables project in their business systems. A smart home is the one in which the gadgets have the ability to speak with each different and additionally to their elusive surroundings. A smart home gives proprietor the capacity to alter and control home environment for expanded security and productive vitality administration. There are several IoT innovations accessible for checking and building smart homes. Customers are starting to search for remote ability on their gadgets they purchase for their home, and new home development is progressively introducing remote empowered gadgets as the default establishment decision. Hence, smart home is definitely a feasible business for the company that is seeking to gain more control over the market and possibly expand over other regions of the country. Again, Wearable IoT tech is a vast space and comprises of a variety of gadgets. These gadgets extensivel y cover the fitness, wellbeing and amusement necessities. The essential from internet of things innovation for wearable applications is to be exceedingly vitality effective or ultra-low power and little estimated. The company is still limited to a particular region and hence needs small but high potential ventures in order to grow and spread over a large region. As the company wants to implement IoT in the business, these two options are the best as they are easy to implement, low cost but cost-efficient and have a lot of potential in the future. These two technologies will also attract more customers that will eventually help in the growth of the company. Moreover, the company will not require any high investments for these two implementations. Also, these two projects can easily be implemented with the last few years. Hence, these two options are most feasible for the company. Recommendations The following recommendations are suggested to the company. Guarantee that any web interface in the thing rejects feeble passwords Ensure that any web interface in the thing has a record lockout framework Ensure that any web interface in the thing has been striven for XSS, SQLi and CSRF vulnerabilities Ensure that any web interface can use HTTPS to guarantee transmitted information Incorporate web application firewalls to guarantee any web interfaces Ensure that any web interface allows the proprietor to change the default username and mystery keyword Ensure that any entrance requiring confirmation requires solid passwords Ensure that client parts can be appropriately isolated in multi-client situations Actualize two-component confirmation where conceivable Ensure secret word recuperation instruments are secure Ensure that clients have the alternative to require solid passwords Ensure that clients have the alternative to drive watchword termination after a particular period Ensure that clients have the choice to change the default username and secret key Ensure all gadgets work with a negligible number of system ports dynamic Ensure all gadgets don't make system ports and/or administrations accessible to the web by means of UPnP for instance Survey all required system administrations for vulnerabilities, for example, support floods or dissent of administration On additional notes, the implementations of Smart Home and Wearables should analyzed and the best aspects should be utilized by the company. Customers are starting to search for remote ability on their gadgets they purchase for their home, and new home development is progressively introducing remote empowered gadgets as the default establishment decision. Hence, smart home is definitely a feasible business for the company that is seeking to gain more control over the market and possibly expand over other regions of the country. Again, From Apple iWatch and Google Glass to wellness groups and patient crucial sign screens, the body zone systems (wearable, patchable, or implantable gadgets associated with the cell phone or tablet, or a more particular gadget. Hence, the company can start up with wearable, which is one of the applications of IoT. The company should also understand the advantages and potential of IoT in business. Hence, they should take suitable action to implement IoT in their business in order to gain more control over the market and expand to other regions of the country as well. References Akash, S. A., Menon, A., Gupta, A., Wakeel, M. W., Praveen, M. N., Meena, P. (2014, September). A novel strategy for controlling the movement of a smart wheelchair using internet of things. InGlobal Humanitarian Technology Conference-South Asia Satellite (GHTC-SAS), 2014 IEEE(pp. 154-158). IEEE. Ansari, A. N., Sedky, M., Sharma, N., Tyagi, A. (2015, January). An Internet of things approach for motion detection using Raspberry Pi. InIntelligent Computing and Internet of Things (ICIT), 2014 International Conference on(pp. 131-134). IEEE. Atzori, L., Iera, A., Morabito, G. (2014). From" smart objects" to" social objects": The next evolutionary step of the internet of things.IEEE Communications Magazine,52(1), 97-105. Bonomi, F., Milito, R., Zhu, J., Addepalli, S. (2012, August). Fog computing and its role in the internet of things. InProceedings of the first edition of the MCC workshop on Mobile cloud computing(pp. 13-16). ACM. Chandrakanth, S., Venkatesh, K., Uma Mahesh, J., Naganjaneyulu, K. V. (2014). Internet of Things.International Journal of Innovations Advancement in Computer Science,3(8), 16-20. Da Xu, L., He, W., Li, S. (2014). Internet of things in industries: A survey.IEEE Transactions on Industrial Informatics,10(4), 2233-2243. Drucker, P. F. (2015). Internet of Things. Frost, S. L. (2015).Internet of Things(No. LA-UR-15-23789). Los Alamos National Laboratory (LANL). Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), 1645-1660. Hamraz, S. H. (2013). Internet of Things.Computer Science. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges.Wireless Networks,20(8), 2481-2501. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges.Wireless Networks,20(8), 2481-2501. Madisetti, V., Bahga, A. (2014). Internet of things. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), 1497-1516. Mulani, T. T., Pingle, S. V. (2016). Internet of Things.International Research Journal of Multidisciplinary Studies,2(3). Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey.IEEE Communications Surveys Tutorials,16(1), 414-454. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., McCann, J. A., Leung, K. K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities.IEEE Wireless Communications,20(6), 91-98. Skarmeta, A., Moreno, M. V. (2013, August). Internet of things. InWorkshop on Secure Data Management(pp. 48-53). Springer International Publishing. Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), 3-9. Suryadevara, N. K., Kelly, S., Mukhopadhyay, S. C. (2014). Ambient assisted living environment towards internet of things using multifarious sensors integrated with XBee platform. InInternet of Things(pp. 217-231). Springer International Publishing. Turner, V., Gantz, J. F., Reinsel, D., Minton, S. (2014). The digital universe of opportunities: rich data and the increasing value of the internet of things.IDC Analyze the Future. Whitmore, A., Agarwal, A., Da Xu, L. (2015). The Internet of ThingsA survey of topics and trends.Information Systems Frontiers,17(2), 261-274. Xia, F., Yang, L. T., Wang, L., Vinel, A. (2012). Internet of things.International Journal of Communication Systems,25(9), 1101. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014). Internet of things for smart cities.IEEE Internet of Things Journal,1(1), 22-32.