Sunday, January 26, 2020

Marketing strategy of vegetable distribution system

Marketing strategy of vegetable distribution system This research paper examines the overall marketing strategy of a consumer product of vegetable distribution system. More specifically, this study addresses the marketing strategy of Colombo district. This paper will deeply analyze the effectiveness of the vegetable distribution system and customer satisfaction on that and also the success and failure of the system. The research will carry out by way of self completed questionnaire to identify the households attitudes on vegetable distribution system and awareness on that. Other than households responses, an interview will carry out data will analyzed by giving high concentration to the prevailing practical situations and thereby the conclusions will carry on. In the current modern world marketing touches all of us every day of our lives. This marketing system facilitates the traditional exchange systems and also provide us high standard of living consists of many large and small companies, where all looking for success. Therefore to emphasize the significance of marketing in this present era is important. The specific research study is also based on the marketing aspect, which is analyzing the vegetable distribution system in a specific area. This paper especially analyzes the current distribution system in Colombo district using the relevant theory and current news. Also I am interested in evaluating customer satisfaction on that system. Through this study I can find the cost effectiveness in this study and also I can find out the success or failure on the distribution system. So that it will help to find the solution for the problem it means we can find the reason for the failure so it will help to find the solution for the failure and we can recommend the best strategy. 1.2 Background of the Study 1.2.1 Vegetable Distribution System in Sri Lanka The conservative Vegetable Distribution system in Sri Lanka is having High public sector involvement, Markets were stagnate and less dynamic, Low or no processing (no value addition), High price instability Long supply chains with little integration, High wastage, Low accountability in the system, Large number of supply chain partners, operating independently, High market uncertainties at both producer consumer ends. The Emergence of a new demand and responsive supply Chain increases the competition the reason for the Changes Includes Rapidly growing urban population, rising income levels, changing socio-cultural environment, Changing taste and preferences, Explosive growth in information/communication capacity, High level of coordination/ integration of stakeholders and business orientation in the marketing system. 1.2.2 Vegetable Distribution System in Colombo For Vegetables to reach the Colombo consumer it must pass through many hands and often through a number of channels. Several participants are involved in a variety of marketing, negotiation and organizational systems. Each of these participants has their own need for infrastructure, services and legislative and regulatory support. The Main Components of vegetable Distribution Systems in Colombo district is vegetable comes into cities utilizing a variety of transport modes such as head loads, hand and animal drawn carts, small vehicles, large trucks, trains, and river and seagoing vessels. All these modes need to be accommodated in terms of facilities and access. Then vegetable is usually distributed to one or a number of wholesale markets. Other thing is from the wholesale markets the vegetable is distributed to a variety of retail outlets such as retail food markets, local food shops, and modern supermarkets. It can be seen in the Following diagram. Farmer Transporting Agent Commission agent at the Colombo wholesale Retailer Wholesaler Consumer (Fig 1.1) 1.3 Objectives of the Study Objectives of this Investigation are, To evaluate the performance effectiveness of the Retail Shop (in terms of customer satisfaction, Reasonable Price, Freshness and Quality product availability, Located in convenience Place, method of collecting information and transferring) To discover the cost effectiveness in Distributing Vegetables. To identify the reasons for success and failure of performance of Distribution system. Identifying (Marketing Strategies) Solutions for the problems identified during the investigation. 1.4 Research Question My research question is the Empirical Study on Vegetable Distribution System in around Colombo Metropolitan Area. I select this topic because Im very much interested in marketing area. This study will give the knowledge of the current vegetable distribution system in Colombo and how effective this system for the consumer. In Sri Lanka vegetable is a main food used in the day to day life. It has the high demand comparing to the other product. So it is important to know the system of vegetable distribution. Sri Lanka is a developing country many people are not affordable to buy high price products but it is not the issue in Sri Lanka but also most of the country. People are looking for high quality product with lower price. Effective distribution system can provide the people high quality product with low price. Distribution system means how the product make available for the people. It is very much important to know about the marketing channel because various channels used to distribu te the product to the consumer. Vegetable are transformed from the farmer to wholesaler and wholesaler to retailer and retailer to consumer. It is important for the marketing channel how ability to deliver the vegetables quickly to the consumer with the lower cost. The city of Colombo in Sri Lanka does not have dedicated wholesale markets for products with the existing three markets for grains, fruits and vegetables and fish conducting both wholesale and retail trading. Although originally recognized as wholesale markets the incorporation of retail actions due to inadequate planning of retail markets has meant that the markets are now highly congested and the whole area around and inside the markets is severely affected by traffic congestion during the morning hours. Buyers frequently spend over two hours in the market to purchase. Maintenance of greatly used facilities is difficult and the inadequate drainage has resulted in flooding and damage to road surfaces. Sri Lanka has an international trade deficit in vegetables, mainly because of high imports of onion and chilies from India. The country could save much foreign exchange by encouraging domestic production of vegetables. For this, however, a systematic effort would be required to identif y the vegetables most suited for production in Sri Lanka, and to identify barriers limiting their cultivation. More transport facilities will be needed for bringing production to wholesale areas and then to retail markets. This movement will result an increasing traffic congestion and pollution. Higher transportation costs, a main component of food prices, will contribute to increasing food prices for the metropolitan poor. I am interested to identify how effective the distribution system for vegetable in Colombo area currently. How they are satisfying the customer in that particular area. I need to identify the customer perception on the available distribution system. Whether, customer satisfied through this system. If the particular distribution system satisfies the customer or if it is very efficient and effective I can find the reason how it is effective and the strategy of the system. If not we need discover the reason for the failure of the distribution system on that particular area. My hypothesis for the research is: Ho: Vegetable Distribution System in Colombo is Effective. H1: Vegetable Distribution System in Colombo is Not Effective. CHAPTER 2: LITTERATURE REVIEW It is highly important that the theoretical aspects on which the study is based are clearly understood. It is especially emphasis on basics of marketing, distribution system etc. which are significant for this study. 2.1 Marketing According to American Marketing Association (2007) Marketing is an organizational function and a set of process for creating, communicating and delivering value to customer and for managing customer relationships in ways that benefit the organization and its stakeholders. 2.1.1 Activities Included in Marketing Marketing activities are various and it also varied because they fundamentally include everything need to deliver the product into the customers hands. The marketing activities are Designing the product to design a product we need to do a market research. Through that we can identify the customer needs and wants according to the customer desires we can design the product. Promoting the product how we are going to introduce the product to the market. It includes advertising, marketing communications etc. Setting a price it is important to capture the market producing in low cost will give high profit. People expect high quality product with lower price if we satisfy them only we can survive in the market. (Mary, [no date]). 2.1.2 Marketing Strategy A marketing strategy identifies customer groups which a business can serve well than its target competitors. Providing tailors product offerings, prices, distribution, promotional efforts, and services toward those market segments to capture the market. Preferably, the strategy should address customer needs that offer adequate potential profitability. A good strategy helps a business to focus on the target markets it can serve best. By analyzing the product portfolio and customer segment, assess distribution channel we can generate our own customer strategy (Angele, 2000). 2.1.3 Marketing Plan When we developed a marketing strategy, it is written down as a marketing plan. The plan frequently go further than the strategy, it includes detail such as budgets. We need to develop a marketing strategy before write a marketing plan. The marketing strategy is to understand and match the capabilities of business opportunities available in the market. So we need to collect more information regarding that such as: data about the market ( size, growth, Potential customer), Competitive data ( Direct competitors, product and price of competitive product) (Matt, 2010). 2.1.4 Target Market Owners of small businesses usually have limited resources to spend on marketing. Concentrating their efforts on one or a few key market segments gives the most return from small investments. We should select to whom we are going to market. Target marketing method is help to reach the customer efficiently. (Chelle, 1994). It is also no agreed that health of the company is largely depends on Customer behavior and attitude needs. (Margret, 1985). 2.1.5 The Marketing Mix Marketing mix is a choice of the organizations to bring a product or service to market. In order to achieve marketing goals we need to have a strategy. The marketing mix elements help to determine the strategy (Gummesson, 2002). The marketing mix elements are: Place Product Price Process Promotion Marketing Mix People Physical evidence (Fig 2.1) Price In marketing selecting the price is one of the strategies. We need to identify the cost of production and other cost to determine the price. Right price will maximize the profit. Promotion It is the way to introduce the product to the market. It includes advertisement. Product Product strategy may include developing a highly specialized product and high quality product to the customer in a attractive way. Like special packing etc. Place It is the way of distributing the product to the customer. People People in the market cannot be underestimated. People have the direct impact on the product perceived. People are the important element in the marketing because products are for the people. (Mind Tools 1994). Process It is the manner of handling sales process and after-sale service it help to achieve marketing strategy. Physical Evidence Showing the tangible product to the customer is giving the chance to the customer to make a decision. Customers like to know about the product through the smell and touching. Offering free trial or advertisements are physical evidence. The marketing mix model helps to decide how to take a new offer to the market. Through that we can evaluate the current marketing strategy (Clarity Marketing, 2005). 2.2 Distribution System Initially it is necessary to consider about what is Distribution system. Frequently there may be a chain of intermediaries; each passing the product down the chain to the next level, before it finally reaches the consumer. This process is known as the distribution chain or the channel. Each of the elements in these chains will have their own specific needs. The Distribution system is also clear-cut as a set of interdependent organizations involved in making a product or service available to consumers or industrial users. Usually a number of different institutions are involved in a distribution Channel because such specialization increases the efficiency by marketing activities are performed. The Main thing is to select the distribution aspect is that marketing of a product highly depend on its distribution efficiency, even the best Quality, Brand, Price, Promotion will not be successful if the product wouldnt reach the consumer hands by utilizing a good distribution system. Therefore the distribution systems are very important where the channel management leads to attain the product availability, cost effectiveness, Promotional activity, Channel members satisfaction etc. The cost of selling and distributing is becoming high due to high transport charges wages and commissions etc. But the benefits are not sure that it is achievable, so it is important to achieve the maximized benefit and minimized cost through good distribution systems. Companies can design their distribution channels to make products and services available to customers in different ways. The figure below shows some examples of channel levels for consumer marketing channels: Consumer Manufacturer1 Retailer Consumer Manufacturer Wholesaler Retailer Consumer Manufacturer Wholesaler Jobber Retailer Consumer Manufacturer (Fig 3.1) In the figure first one is called a direct-marketing channel, since it has no intermediary levels. In this case the manufacturer sells directly to customers. An example of a direct marketing channel would be a factory outlet store. Many holiday companies also market direct to consumers. The remaining channels are indirect-marketing channels. Second one is contains one intermediary. In consumer markets, this is usually a retailer. The consumer electrical goods market in the UK is typical of this arrangement whereby producers such as Sony, Panasonic, Canon etc. They sell their goods directly to large retailers such as Comet, Dixons and Currys which then sell the goods to the final consumers. Third one is contains two intermediary levels a wholesaler and a retailer. A wholesaler typically buys and stores large quantities of several producers goods and then breaks into the bulk deliveries to supply retailers with smaller quantities. For small retailers with limited order quantities, the use of wholesalers makes economic sense. This arrangement tends to work best where the retail channel is fragmented i.e. not dominated by a small number of large, powerful retailers who have an incentive to cut out the wholesaler. A good example of this channel arrangement in the UK is the distribution of drugs. Distribution is important because it affects the sale of the product. It also affects the competitiveness as well as profit because the margin is squeezed by distribution cost. Delivery is the part of activity that influencing the customer satisfaction (MMC learning [no date]). 2.2.1 Functions of a Distribution Channel The main function of a distribution channel is to provide a link between production and consumption. Organizations form any particular distribution channel. So that they can overcomes the major problems. Members of the Marketing channel perform many key functions: Information Gathering and distributing marketing research and intelligence information about actors and forces in the marketing environment needed for planning and aiding exchange. Promotion Developing and spreading persuasive communications about an offer. Contact Finding and communicating with prospective buyers. Matching Shaping and fitting the offer to the buyers needs, including such activities as manufacturing, grading, assembling and packaging. Negotiation Reaching an agreement on price and other terms of the offer so that ownership or possession can be transferred. Physical Distribution Transporting and storing Goods Financing Acquiring and using funds to cover the costs of the channel work. Risk Taking Assuming the risks of carrying out the channel work The first five functions help to complete transactions; the last three help fulfill the completed transactions. 2.2.2 Importance of Channel Members Many producers lack of financial services to carry out direct marketing; these direct marketing would require many producers to become middlemen for the in order to achieve mass-distribution economies. The use of retailer or middlemen largely boils down to their greater efficiency in making goods available to target markets. Through their contacts, experience, specialization and scale of operation, middlemen usually offer the firm more than it can achieve on its own. From the economic systems point of view the role of middlemen or a retailer is to transform the assortment of products made by producers into the assortments wanted by consumers, Producers make narrow assortment of products in large quantities, but consumer want broad assortments of products in small quantities. In the distribution channels, middlemen but the large quantities of many producers and break them down into the smaller quantities and broader assortments wanted by consumers. Thus middlemen play an important role in matching supply and demand. 2.2.3 Goals of Logistics System Some companies state their logistics objective as providing maximum customer service at the least cost. Unfortunately, no logistics system can both maximize customer service and minimize distribution costs. Maximum customer service state that fast delivery, large inventories, flexible assortments, liberal returns policies, and other services. All those activities are raising distribution cost. In contrast, minimum distribution costs imply slower delivery, smaller inventories, and larger shipping lots which represent a lower level of overall customer service. The goal of marketing logistics should be to provide a service to targeted level of customer at the lower cost. A company must first research the importance of various distribution services to customers and then set desired service levels for each segment. The objective is to maximize profits. Therefore, the company must consider the benefits of providing high quality of product and services against the costs. (Kotler and Amstrong 1992) . 2.3 Related Research Findings It has found that as in many European countries, the food retailing industry in France is dominating powerful companies. The research aimed at examining the idea that small producers are limited or even totally lacking in the supplier portfolios of bunch merchandisers in France. The common principles used by the retailers to select manufacturers are summarized. It has discussed using evidence from ten companies. Choosing a supplier is a critical step in a distribution firms buying process. It is a influential factor not only in the firms competitiveness but also in its corporate image. In the French food distribution channel, manufacturers products advertise directly to customers but sells to retailers. Retailers prefer to purchase from the suppliers who capable of launching large advertising. These are seem to be the required conditions for the retailer to sell large quantities of products to consumer. As a result the supplier incurs extra cos. Since the ability to assurance stock y ield depends on marketing resources and skills, French mass merchandisers concentrate mainly on assessing the potential marketable performance of the various manufacturers. In conclude that because they do not spend much on sales promotion programs small producers find difficulties in competing with larger producers in making sales in the distribution channel (Gilles, 1996). Natilia (2010) states that how the food supply and distribution systems took place in Accra, Ghana compare to Colombia. His study also made some recommendation to the policymaker to improve the efficiency of market distribution system. He analyzed the success, failure and challenges of urban food market in Accra. He also emphasis the market reform strategies on his research. Ross (1995) states that according to his research on marketing strategy he found the dynamic of appliance retail business also he estimated major customer decision making criteria. CHAPTER 3: METHODOLOGY OF THE STUDY 3.1 Research Design The most suitable research method is determined by the research problem and the objectives of the research problem. According to that the Descriptive research method will be used to perform the research study, since the research problem is based on evaluating the performance of a Retailer in distributing Vegetables around Colombo Metropolitan. And also it is a kind of a basic research because it is being conducted primarily to improve the understanding of general issues in distributing vegetables. And also secondary data such as journal articles will be used. The Reason for selecting Descriptive Research method is because it describes the phenomenon as they exist and also used to identify certain information on the Characteristic of a particular Situation or problem.The study will be conducted as a qualitative study by using primary and secondary data. 3.2 Data Collection Techniques. (Methods Tools) The type of data will be used for this specific study is mainly primary data. The Study is based on the Colombo Metropolitan. Therefore the primary data for the research will be collect within the Colombo Metropolitan region. Secondary data will used to analyze the relationship between the customer satisfaction and the sales volume of the vegetable. It is a qualitative research The Data will be collect from consumers. Data will be collected by Personal Interviews with the retailer and Questionnaires are distributed to consumers of that specific area. A questionnaire will be developed with questions based on the customers perception on Vegetables. Under interviewing people both the open ended question and closed ended question will include. The whole Colombo Metropolitan area is defined as the universe for this study, and the sampling unit is basically the vegetable consumers of that area. The Sampling Frame that is the source list from which the sample may be drawn is set with in the Colombo metropolitan. The size of the sample is 100 vegetable consumers. The non Probability technique will be applied in order to obtain a representative sample from the sampling frame the sampling unit which is vegetable consuming individuals especially the home makers. The consumers above age of 25 are included in the sample, because according to the research topic these consumers will be the best sample to achieve the efficiency and reliability. The sample does not afford any basis for estimating the probability that each item in the population has of being included in the sample. 3.3 Analysis of the Empirical Data The Data will be code and analyzed by using statistical software program, and also the data will be analyzed using analytical techniques such as mean, mode and averages. Appropriate graphs and charts will be use to interpret and present data in this study. Since the ordinal Measurement will indicate the relative position of two or more objects it will be used in this investigation to rank the Customer satisfaction factors and other factors. Using the information from the questionnaire can conclude the results of this research. This research methodology follows the research onion. F:Powerpointpe_ukPE083-SaundersFinal_FilesGifch04C04NF001.gif (Sources: Mark, 2006) (Fig 4.1) 3.4 Significance of the Study Competition between retailers has increased due to new super markets operation in the surrounding area and also due to Economical Condition of the country including Cost of living, inflation, Transport cost etc. Factors which is affect the firms profitability and to meet the customers expectation and satisfaction. Therefore it is important to analyze the problems faced by the retailer in distributing vegetables and give him a solution for the problems. The significance of this research is to identify whether the retailer can meet the customer expectation and satisfy them continuously and also to identify the exact problems prevailing during the research period how the distribution system effecting and then providing solutions, analyzing the cost benefits or cost effectiveness for the consumer. 3.5 Limitation of the Study Being an individual assignment, the effort exerted in to this study will be limited. Specially in selecting of the sample it is very difficult to take a complete representative sample as the population is high. The significant lack of secondary data specially in competitors data will be a major limitation to analyze data Because of the qualitative research it will very much time consuming. Financial limitation also there. Conclusion I can conclude that by conducting this research I can improve my knowledge in the distribution system on Colombo area. It will help me to apply these findings in other area too. I can identify the distribution system in a particular area and how effective that system also how that distribution system provide the customer satisfaction. Through this study I also can identify the success and failure of the distribution in a particular area and I can find the reason for that. It will help me to identify and recommend the solution for the existing problems. CURRICULAM -VITAE OF L.J.Shakthivel 12, Longford Gardens Hayes. UB4 OJW E-mail: [emailprotected] Contact No.07574957290 CAREER OBJECTIVE To become an individual who possess a wider knowledge and ability on things what she does and uses it for the enhancement of the work place and the society. PERSONAL PROFILE 1.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Name in Full  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   :  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Lenita Jency Shakthivel 2.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Gender   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      :  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Female 3  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Date of Birth  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   :  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   3rd June 1983 4  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Nationality  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   :  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sri Lankan 5.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Married / Single  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   :  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Single 6.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   School Attended  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   :   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   St.Annes Girls Maha Vidyalaya Colombo -13. ACADEMIC QUALIFICATIONS  Ã‚  Ã‚   Doing Post Graduate Diploma in Management Studies at Icon College, London.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     B.Com (Special) Degree University of Sri Jayewardenepura Gangodawila, Nugegoda. General Pass   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   G.C.E A/L  Ã‚   Examination (2002)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      Accounting A, Economics A, Business Studies A. G.C.E O/L  Ã‚   Examination (1999) 5 Distinctions include Mathematics (111), Religion, Tamil and Science (1). 5 Credits including Science (11), Commerce, Social, Arts and English PROFESSIONAL QUALIFICATION Æ’ËÅ"  Ã‚  Ã‚  Ã‚  Ã‚   Computer Literacy  Completed MS Office Æ’ËÅ"  Ã‚  Ã‚  Ã‚  Ã‚   Completed DIPLOMA IN ENGLISH at Nalravi English Language Centre. Studied SAGE Accounting Package Following Post graduate Diploma in Management Studies in London.   EXTRA AND CO-CURRICULAR ACTIVITIES      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚ ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Secured Places in athletic meets  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Secured Place in Essay Competition  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Served as a Games Captain.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Participated in English Speech. EXPERIENCE I have worked at Belcon agency Ltd (Shipping Company) as an accounts trainee for 1 year. (Book Keeping) I have worked at Peoples Bank Dam Street for 1 year under the internship program. (Customer Serve and Cheque Clearings) I have worked as an Assistant Accountant at SPS Enterprises for 1 year (Book Keeping and Customer serve) I hereby affirm that the above particulars furnished by me are true and accurate to the best of my knowledge. Yours faithfully L.J. Shakthivel

Saturday, January 18, 2020

Cyber Laws and Cyber Crime

Presented by: Kale Sandeep N. Gaikwad Avinash R. S. E. (Comp) S. E. (I T) E-mail: [email  protected] com E-mail: avi. [email  protected] com Mob: 919970061442 Mob: 919960308551 G H Raisoni Institute of Engineering and Management, Jalgaon (M. S) Index Topics Page No. 1 Abstract 1 2 Introduction 2 3 Cyber crime 2 4 Classification of Cyber crime 2 5 Status of Cyber Crime 6 6 Cyber law 7 7 Cyber Law in India 8 8 Advantages of Cyber Law 9 9 General Suggestions and information 10 0 Suggestions for better security 10 11 Conclusion 11 12 Reference 12 Abstract: Cyber law and cyber crime is becoming an important issue for social and economical concerned. The use of computer, electronic devices and software is increased; the need to protect these devices and software properly is inherently appeared with this. To protect these, it becomes necessary to know about cyber crime and cyber law. Cyber crime is unlawful act in which computer is either tool or target. After development of internet ev ery computer is able access data and information from all over the world. This also lead to the misuse of computer and internet for Crime such as Financial crimes, Cyber pornography, Online gambling, Intellectual Property crimes, Forgery, Cyber Defamation, Cyber stalking, Email spoofing, Email bombing, Denial of Service attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling etc. Now days most of financial and non-financial activities are done with computer and computer related services such as Internet. Also the concept of e-Governance coming in picture, where the confidential document of an organization is process and stored. The need of protection Cyber security resulted into development of cyber law in India and all around the world. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. The paper throw light on the brief types of cyber crime, status of cyber crime and cyber awareness in India, Cyber law in India , Advantages of it in brief. Also this paper suggests the precaution measures and tips for cyber security for the users of computer and internet. 1. Introduction The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B. C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. Today, computers have come a long way, what with neural networks and nano-computing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. 2. Cyber crime At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, cyber crime was broken into two categories and defined thus: 2. 1. Cyber crime in a narrow sense: Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. 2. 2. Cyber crime in a broader sense: Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession offering or distributing information by means of a computer system or network. As per Indian law, Crime has to be voluntary and willful, an act or omission that adversely affects a person or property. A simple definition of cyber crime would be â€Å"unlawful acts wherein the computer is either a tool or a target or both†. 3. Classification of Cyber crime Cyber Crime is classified into 4 major categories as (A) Cyber crime against Individual B) Cyber crime Against Property (C) Cyber crime Against Organization (D) Cyber crime Against Society 3. 1. Against Individuals 3. 1. 1. Email spoofing : A spoofed email is one that appears to originate from one source but actually has been sent from another source. E. g Avinash has an e-mail address [email  protected] com His enemy, Rohan spoofs his e-mail and sends obscene messages to all his acquainta nces. Since the e-mails appear to have originated from Avinash, his friends could take offence and relationships could be spoiled for life. 3. 1. 2. Spamming: Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. 3. 1. 3. Cyber Defamation This occurs when defamation takes place with the help of computers and / or the Internet. E. g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person’s friends. 3. 1. 4. Harassment and Cyber stalking: Cyber Stalking Means following the moves of an individual's activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms, user net groups. The Oxford dictionary defines talking as â€Å"pursuing stealthily†. Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. 3. 2. Against Property: 3. 2. 1. Credit Card Fraud :You simply have to type credit card number into www page of vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. . 2. 2. Intellectual Property crimes: These include Software piracy i. e. illegal copying of programs, distribution of copies of software ,Copyright infringement Trademarks violations ,Theft of computer source code 3. 2. 3. Internettimetheft: The usage of the Internet hours by an unauthorized person which is actually paid by another person. 3. 3. Against Organization 3. 3. 1. UnauthorizedAccessingofComputer: Accessing the computer/network without permission from the owner. This activity is commonly referred to as hacking. The Indian law has, however, given a different connotation to the term hacking, so we will not use the term â€Å"unauthorized access† interchangeably with the term â€Å"hacking†. It can be of 2 forms one is Changing/deleting data i. e. unauthorized change in data and other is Computer voyeur where the criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. 3. 3. 2. Denial Of Service When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. Denial of service attack involves flooding a computer resource with more requests than it can handle. This causes the resource (e. g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. Denial-of-service attacks have had an impressive history having, in the past, brought down website like Amazon CNN, Yahoo and eBay 3. 3. 3 Virusattack A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a possibly evolved copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to. 3. 3. 4. Email Bombing: Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. 3. 3. 5. Salami Attack: When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. 3. 3. 6. Logic Bomb : Its an event dependent program , as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E. g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. . 3. 7. Trojan Horse A Trojan is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. There are many simple ways of installing a Trojan in someone’s computer. The Common Types of Trojan horse are †¢ Remote Administration Trojans (RATs) †¢ Password Trojans †¢ Privileges-Elevating Tr ojans †¢ Destructive Trojans †¢ Joke Programs 3. 3. 8. Data diddling This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. 3. 4. Against Society 3. 4. 1. Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. 3. 4. 2. Cyber Terrorism: It is use of computer resources to intimidate or coerce others. Computer crime has hit mankind with unbelievable severity. Computer viruses, worms, Trojans, denial of service attacks, spoofing attacks and e-frauds have taken the real and virtual worlds by storm. The term â€Å"cyber terrorism† can be defined as â€Å"Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. 3. 4. 3 Web Jacking Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. 4. Status of Cyber Crime Ba ck in 1990, less than 100,000 people were able to log on to the Internet worldwide. Now around 500 million people are using the net around the globe. UK has the largest number of infected computers in the world followed by the US and China. The US is the leading source country for attacks. China is second and Germany is third. 4. 1. In India: i) During 2003, a total of 411 cases were registered under IPC Sections as compared to 738 such cases during 2002 thereby reporting a significant decline of 44 percent in 2003 over 2002. ii) A total of 475 persons were arrested in the country for Cyber Crimes under IPC during 2003. iii) The age-wise profile of the arrested persons showed that 45 percent were in the age-group of 30-45 years, 28. percent of the offenders were in the age-group of 45-60 years and 11 offenders were aged 60 years and above. Above figures doesn't mean that cyber crime is declining in India, the fact is that people in our country do not report cyber crimes for the following reasons: a) They don't want to face harassment by police. b) The fear of bad publicity which could hurt their reputation in society. Also, c) It becomes extremely difficult to convince the police to register any cyber crime, because of lack of awareness about cyber crime and cyber law and also about their registration and handling by the police. A recent survey indicates that for every 500 cyber crime incidents that took place, only 50 are reported to the police and out of that only one is actually registered. These figures indicate how difficult it is to convince the police to register a cyber crime. The establishment of cyber crime cells in different parts of the country was expected to boost cyber crime reporting and prosecution. However, these cells haven't quite kept up with expectations. 5. Cyber law The cyber world has no physical boundaries, no single authority who governs the internet. The Internet is the medium for freely sharing information and opinions; It provides everyone with round the clock access to information, credit and financial services, and shopping. Even network information systems are being adopted by the government worldwide, that's why the governments across the world are recognizing the need to securing & regulating the cyber world. 5. 1. Why Cyber law? When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence there is need for Cyber laws in India. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives. . 2 Who should concern about Cyberlaw? Everyone, Cyber law is of everyone’s concern. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in Cyberspace can and will have a Cyber legal perspective. From the time one register Domain Name, to the time one set up a web site, to the time one promote a website, to the time when one send and receive email, to the time one conduct electronic commerce transactions on the said site, at every point of time, there are various Cyber law issues involved. One may not be bothered about these issues today because one may feel that they are very distant from him/her and that they do not have an impact on Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyber law for your own benefit. 6. Cyber Law In India: Cyber Crimes are a new class of crimes to India. It is rapidly expanding due to extensive use of internet. India is among few countries in the world that have a separate law for cyber crimes. Recently Nepal has passed Bill against Cyber crime. Indian parliament has passed the legislation known as Information Technology Act 2000 drafted by the Ministry of Communication and Information. The Information Technology Act came into force on 17th October, 2000. IT Act amends some of the existing legislation, such as Indian Penal Code,1860 Indian Evidence Act, 1872 Bankers Book Evidence Act. 1891, Reserve Bank of India Act, 1934 6. 1. Features of The IT Act 2000: i)Legal recognition of electronic contracts, digital signature, digital certificates. ii) Various types of cyber crime committed in India and outside India is covered alongwithpenalties. ii) Appointment of Certifying Authorities(CA) to issue digital signature, digital certificates. iv)Controller of Certifying Authorities to act as depository for all Certifying Authorities. v) Appointment of Adjudicating Officer for holding enquiries under this Act. vi) EstablishmentofCyberAppellateTribunal. vii) Cyber Regulations Advisory Committee who will advice the Central Government an d CA. Technology. The act is based on the â€Å"United Nations Commission on International Trade Law†(UNCITRAL) model on electronic commerce. 6. 2. IT Act 2000 does not include: ) Specific Definition of cyber crime is not given.. ii) Intellectual Property Rights such as trade Marks, Patents, Digital Copyright Issues. iii) Domain name disputes and their resolution, Data protection issues are not covered. iv)No provision is made for the Taxation issues arising due to e-commerce 7. Advantages of Cyber Laws The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records. The IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Digital signatures have been given legal validity and sanction in the Act. The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. The Act now allows Government to issue notification on the web thus heralding e-governance. It shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. 8. General Suggestions against cyber crime †¢ Don't delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these. †¢ Try not to panic. †¢ If you feel any immediate physical danger of bodily harm, call your local police. †¢ Avoid getting into huge arguments online during chat or discussions with other users. †¢ Be extremely careful about how you share personal information about yourself online. †¢ Make sure that your ISP and Internet Relay Chart (IRC) network have an acceptable use policy that prohibits cyber-stalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints. If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. †¢ Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet System Administrators or Law Enforcement Officials. 9. Suggestion s for better security †¢ Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. †¢ Make regular back-up of critical data. Back-up must be made atleast once in each day. †¢ Use virus protection software. Checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Use a firewall as a gatekeeper between your computer and the Internet. †¢ Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. †¢ Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. †¢ Regularly download security patches from your software vendors. 10. Conclusion Thus, the awareness of cyber crime and cyber law has become a necessity for persons in cyberspace. The study of cyber crime and its different aspects will be helping to individual in cyberspace to avoid and restrict the cyber crime around them and related to them. Also the study of cyber crime will keep them alert against cyber crime. Absence of Cyber security policy in organization may lead to critical problem for Management to maintain the data security of organization. Recent incidents relating to cyber crime have not just increased the vulnerability of various socio-economic constituents, but also brought forth the need for better managerial and operating capabilities of our legal framework in stopping this growing menace. Cyber law in India is nothing but the outcome of this need. Cyber law will be helpful to control the cases of cyber crime. IT act 2000 has given constitutional support to fight against cyber criminals. This act has also given legal status to e-business, digital signature cause to increase faith in online trading. The number of cases reported is much less than what it is in reality. This is because of unawareness of law. Awareness program on Cyber law and Cyber Crime should undertaken by Social Organisation. The program may include basic information of cyber law, internet security, and minimum hardware and software security measures required for an individual or organisation. Reference: (1) Cyber and Information Technology –Article By Talwant Singh (Judge) (2) Perspective of Cyber crime in India – Kernila Seth (3) Cyber law ,Data Protection in India – Article by Gurpreet Singh (4) www. cuil. com (5) www. cyberlawsindia. net (6) www. cybersmart. in (7) www. indlii. org (8) www. asianlaws. org (9) www. report cyber crime. com (10) www. scribd. com

Friday, January 10, 2020

Beliefs, Philosophy and Religion

One of the most notable conflicts that have been debated by many scholars since the medieval ages is the controversy regarding the place of philosophy and religion in a society. The two have been used to attack each other in order to uphold their own credibility. The study of Philosophy is directed towards the speculation of the things that govern the world and its processes, and the nature of man and his relationship with other individuals as well as with the world (Gasset, 1964). Philosophy attempts to scrutinize and make rational explication of almost everything that can be grasped by the human mind.Yet, it does not really provide sufficient and concrete answers to all its queries. Religion, on the other hand, focuses its scope on explaining things and phenomena that cannot be explained by science and at some point even those that cannot really be made explicit by philosophy. It tries to give reason for everything that is happening. Its justification for every reason that it provi des is primarily founded on faith (Nasr, 1996). Hence, by faith, it need not be verifiable. A strong faith or believe could suffice one’s doubt and hesitation. However, philosophy would not really admit faith as the justification of something.Reason cannot be supported by merely appealing to one’s faith (Leahy, 2003). Philosophy moves away from dogmatism, which is a character present in religion. Philosophy has a character of skepticism. This means that not unless something is proven to be certain (that which is indubitable or cannot be doubted) philosophy would recognize its validity (Heidegger, 1956). It entails careful and keen analysis of the subject that is being studied. Whereas in religion, it is enough that someone has faith on something in order for it to become valid (Nasr, 1996).These are the most common distinctions that distinguish philosophy from religion. The purpose of this paper is to discuss how philosophy and religion are realized in particular Schoo ls of Thought that influence China namely: Confucianism, Buddhism and Daoism/Taoism. This paper will also compare and contrast these three Schools of Thoughts with Christianity by appealing to their own definitions of Philosophy and Religion. Schools of Thought Confucianism Confucianism is an anthology of ethical values and beliefs that is often equated with religion.These values and beliefs were rooted and developed from the teachings of one of the great thinkers in China, Confucius. His teachings and philosophy were used as the foundations of laws and way of government China and later on in other Asian regions (Chai & Chai, 1973). The teachings of Confucius, like that of Socrates, were neither formally written nor published. Yet his students and disciples made the spread of his teachings. However, according to the Chinese History, most of the recordings of the Confucian teachings were burned up at some point in the Qin Dynasty (Chai & Chai, 1973).Hence, there was a conflict of int erpretation of the Confucian teachings that is evident in various strands of Confucianism. The rebirth of Confucianism was made during the Han Dynasty. It was the motivation for instituting the laws and set of rules of China. Nonetheless, it again faded after the fall of the Han Dynasty wherein Buddhism was introduced to China. Only in the seventh century that Confucianism was revived (Elman, 2002). The chief ideas that the Confucian teachings has were directed toward the ruler, upper class and scholars.Such is a great difference between Confucianism and Buddhism where the latter aims to include the common masses. The instillation of virtues to rulers and noble men is the most original concept in the Confucian teachings. The Golden Rule (Do not do unto others what you do not want others do unto you) is its most celebrated principle that which promotes harmony among all people (Chai & Chai, 1973). With this, Confucianism detests war and the employment of too many laws. Confucianism u pholds its defined five most fundamental relationships which entails varying responsibilities.These relationships include husband and wife, parent and child (filial piety), the elders and the younger ones, ruler and subject, and friendship (Elman, 2002). Among these five, filial piety is the most important relationship that is nevertheless accentuated these days in contemporary China. Lastly, Confucianism puts high regard with the notions of Heaven’s decree, Great Men and Saints, as well as in performing rituals or Li. Buddhism As mentioned earlier, Buddhism’s teachings are directed towards the general populace (Ch'en, 1972).The very concept of Buddhism is founded on the idea of the Enlightenment (wherein Buddha is said to be the Enlightened One). From then on, the goal of Buddhism is to bring man into Perfect Enlightenment or Nirvana (Hanh, 1999). Siddhartha Gautama is the Buddha. He reached nirvana or the enlightenment period through passionate contemplation. Reachin g nirvana would make one free from hunger and selfish desires. It also marks the end of suffering. Once one reaches the enlightenment period, his mind will have everlasting peace (Hanh, 1999). Buddhism advocates the method of truthful inquiry. It tells man not to be overwhelmed by their blind faith.It teaches man to become open-minded and skeptic about the things around him. In accordance with this suggested way of inquiry, Buddhism has established the Four Noble Truths. This tells man that: 1. ) all forms of being, human and other wise are afflicted with suffering, 2. ) the cause of suffering is craving (an illusion of the soul), 3. ) suffering has a lasting end in the experience of nirvana, and 4. ) enlightenment is achieved by a gradual training of the Eightfold Path. These eightfold path is directed towards the clearing of mind and action from indulgence and lustful desires (Ch'en, 1972).Buddhism does not believe in a God or the likes. There is no one that can fully control oneà ¢â‚¬â„¢s own self than him alone. Thus, one has the full responsibility of himself and his actions. And these are not predetermined by a Supreme Being. The concept of Karma is also one of the most distinct features in Buddhism (Ch'en, 1972). It pertains to the belief that all actions have subsequent consequences that are directed to the acting agent. Karma can be a good one or bad one. It depends on the nature of the action performed that produced the consequence that is reflected on the performer of such action.The concept of Rebirth can be best understood by appealing to the principle or doctrine of Karma (Hanh, 1999). Taoism/Daoism Taoism is a school of thought pioneered by Lao Tze or Lao Tzu, also one of the great thinkers in China. Taoism means the path or the way of living to obtain a harmonious relationship with the world and all its definitive processes (Po-Tuan, 2001). Taoism was started as simple philosophical discourse but eventually evolved and took the form of religion. One of its beliefs is the concept of Tao which is defined as the root cause of everything.Tao motivated the rise of the Yin Yang which causes the formation of the universe. Taoism highlights that man should live in harmony with the nature (Po-Tuan, 2001). And only when man achieves such harmony that he will leave in peace and prosperity. Taoism maintains the principle of Wu Wei or non-action which means that man should not go against the nature and must instead go with its operation (Taoist Association of China, 2002). Man need not act since the nature will do the action provided that man lives in harmony with it. Unlike, Buddhism, Taoism believes in multiple Gods.It has hierarchy of Gods that represents system of government in the ancient China (Taoist Association of China, 2002). The ethics defined in Taoism is represented by the three Jewels that which symbolizes compassion, moderation and humility (Po-Tuan, 2001). Taoism encourages the people to examine their way of living by f irst making them realize that living with accordance to nature would mean peace. It also suggests that man should not overly use his being a man. It says that man should prioritize his needs and lessen his wants and desires. Lastly, it orders man not to become egocentric and egotistic.Christianity in China Confucianism, Taoism and Buddhism are the prevailing religions in China. Before the entrance of Buddhism, Confucianism and Taoism are two most notable and most patronized religions in China (Legge, 2004). In fact, the two seemed to be opponents of each other primarily because of their consistent difference on particular viewpoints and issues. But the penetration of Buddhism marks a turning point with regards to the religious inclinations in China. When Buddhism entered China, it signaled the redistribution and reconstruction of religions all throughout China.Confucianism, Taoism and Buddhism have been even combined at particular regions to serve as one religion. Hence, Chinaâ€⠄¢s religion cannot really be said to be concentrated with one of its three most recognized religions (Legge, 2004). In the seventh century A. D. , Christianity was introduced to China (during the Ming Dynasty) (Bays, 1999). Christianity is a very different religion as compared to the earlier religions in China. From then on, Christianity has been said to be the fastest growing religion in China. It is recorded that 40 million to 100 million of population in China are either Catholic or Protestant.This means that China has started to embrace the western religion that is very unlike with their traditional and ancient religions (Bays, 1999). The arrival of Robert Morrison in China has started the spread of Christianity towards China. The Bible has been even translated to Chinese in order to communicate with Chinese people and for them to have easy access to it. Since then, several Christian missionaries have visited and taught the doctrine of the Christian Faith (Bays, 1999). Christia nity The most celebrated feature of Christianity is the fact that it deifies one God. This God is the cause of everything and the director of everything.All man’s action is caused by this all-powerful and all-knowing God. But these descriptions do not suffice the notion of the Christian God. The concept of the Holy Trinity, salvation, and life after death are also included in the doctrine of the Christian Faith (Borg, 2004). The story of Jesus Christ and His death on the Cross is also the highlights of the Christian Faith (Borg, 2004). It represents the martyrdom of the Son of the God in order to save mankind. All in all, the Christian Faith equates all the happening in this world to what God has originally ordained to occur.And no one can interfere nor change what God has decreed. God and Fate or Destiny have been often characterized as the same thing (Borg, 2004). But the former has the most perfect and powerful character. Analysis: Compare and Contrast Confucianism and Chr istianity Among the other school of thoughts (discussed in this paper), Confucianism is the most compatible religion with Christianity. They both advocate that Heaven’s decree is the most fundamental source of order in the world (Chai & Chai, 1973). Only that, in Confucianism, there is no stress given to a god or a deity to be worshipped (Elman, 2002).Such obedience is directed to the Heaven itself. Whereas in Christianity, there is a God that is the end of one’s being obedient (Borg, 2004). As mentioned in the introduction, the defining mark that distinguishes philosophy from religion is the fact that the former repudiates dogmas that tend to confine and limits one’s way of thinking while the latter deliberately suggests and recommends particular doctrines in which one needs not to be certain of (Leahy, 2003). Philosophy speculates and examines the very concept of faith which is often used to justify religions and their established tenets.The belief of the Conf ucianism and the Christianity about the notion of Heaven’s decree obviously falls under the sphere of religion. It is primarily because the existence of such decree from heaven cannot be verified or confirmed yet can be justified through faith. Yet philosophy does not admit such finality. As cited, philosophy is still at the period of examining the very nature of faith as a source of justification of knowledge (Gasset, 1964). With regards to ethical patterns included in the Confucian and Christian faith implies that man should be virtuous in order for him to have a harmonious life.Yet both have different ways of looking at the concept of a harmonious life. For Confucianism, a harmonious life is the achievement of order in human relationships (Chai & Chai, 1973). On the contrary, for Christians, a harmonious life is being free from sins which separate man from God (Borg, 2004). Seemingly Confucian notion of a harmonious life is philosophic in nature which really explains how h armony could be affected by human relationships – that is verifiable and can be validated. Conversely, the Christian notion of a harmonious relationship is really superficial and metaphysical.One cannot really confirm the truthfulness of such statement. And it cannot even be explained by reasoning. But only faith can support it. Hence it is more of a religious belief rather than a philosophic one. Buddhism and Christianity On the other hand, Buddhisma and Christianity is not really compatible with each other (as religions). As discussed above, Christianity advocates a religion that which is primarily directed towards the belief to a God. Yet Buddhism undermines the concept of a Supreme Being that which is all-powerful and all-knowing, and that which controls man’s actions.Buddhism maintains that man can have the full control over his life therefore he does not need a god that would provide guidance and direction for him (Ch'en, 1972). Perfect enlightenment is the stage wherein a man successful reached the point of having a complete understanding of everything including his being (Hanh, 1999). For this reason, God and Buddha is never really equal to each other. Having such distinction, it can be inferred that Buddhism tends to avoid metaphysical speculation since it does not allow the concept of a supernatural entity as cause of man’s actions.Buddhism keeps its teachings to the moral standpoint and its reliance on experiential insight. Whereas, Christianity admits the existence of a God though there is no concrete and material evidence for such existence. The two can be analyzed in the light of a rationalist and an empiricist wherein Buddhism most likely supports the empiricist view of knowledge, that which lies in experience. However, Christianity supports the rationalist’s view that only reason itself even without experience can prove God’s existence. Thus, Buddhism and Christianity is really opposites of one another.Neverth eless, both of them considers codes or doctrines that are needed to achieved their established purpose (Buddhism is for enlightenment; Christianity is for salvation). Hence both suggest dogma that which their disciples must follow in order to achieved their goals. This is where religion is obviously manifested. In the first place, one can go against these codes and doctrines and look for other ways that can also bring the actualization of their goals. Philosophy suggests that one should not limit himself from what is traditionally accepted as true or what is traditionally accpeted the right way of doing something (Heidegger, 1956).Taoism and Christianity Like Buddhism, Taoism is also not compatible with Christianity. There are two major factors that make Taoism and Christianity very different with each other. The first one is that, Chirtianity is a monotheistic religion while Taoism adheres to mulitple gods hence making it a polytheistic religion (Legge, 2004). For Christians, there is only one God (The Holy Trinity is a representation of One God) (Bays, 1999). For Taoists, they have different and particular deities that vary in different regions (in China) (Taoist Association of China, 2002).Secondly, Christians believed that the order in the universe is predetermined and directed by God. On the contrary, Taoists believed that nature is responsible for whatever order the universe has. Such conceptions are significantly and obviously different. There is a semblance of philosophic character that is evident from the two. By appealing to ehtical or moral principles, Taoism suggests that man should live in harmony with nature thus also implying that man should act in accordance with what nature ordained. This appears like the Natural Law Theory.Nonetheless, Christianity upholds the Divine Command Theory which states that man’s action and all the process in the world is ordered and commanded by God or a Divine Entity. Such regard for who or what implies the order of the universe and all its processes can be considered as a philosophical discourse. Yet such is not really explicit in Christianity. On the other hand, Taoism is most likely illustratiing how nature directs and affects the universe and all the things that lie within it including the human persons and their relationship among each other (Po-Tuan, 2001).Conclusion Philosophy and religion are two different spheres. Philosophy does not provide all answers to all the questions that one can give but can provide different ways and approaches on arriving at the possible answers. Religion, in contrast, tends to have answers for all man’s questions that are founded and based on particular doctrines that it has. Yet, it does not give man the chance of verifying the truthfulness of each doctrine by means of other method but faith. Confucianism, Buddhism and Taoism are the most recognize and extensively used religions in China.But after the entrance of Christianity, the Chinese tr aditional culture and relgion have changed significantly due to differences that are distinguishable from the three schools of thoughts and Christianity. The most important note here is the fact that before these schools of thought became religions themselves, they first became philosophical underpinnings which aim to make people realize the obscurity of the world. But eventually they became religions when people started to impose doctrines and rules that are grounded from these teachings in order to live harmoniously with the world.

Thursday, January 2, 2020

Christianity, Islam, And Judaism Essay - 1967 Words

Christianity, Islam, and Judaism represent the three most influential religions in the world throughout history. Judaism is, however, not as widespread as both Islam and Christianity, but it still has a profound impact in the world. Judaism, Islam, and Christianity are also known as the Abrahamic religions because their history is traced to the ancient individual, Abraham who is first referred to in the Hebrew Bible. There are many similarities as well as some differences between these religions, even regarding death and the afterlife. These differences are seen with regards mainly to be written in the Judaism, Islam and Christian Holy books. In some cases, it is found, however, Islam refers to details which are not present in the earlier traditions so comparison cannot be made. In both the Judaic and Christian teachings, there is a lot of information regarding the afterlife and this has led to many scholars creating many hypotheses as well as speculations about death and what is to be expected in the afterlife. Islam also gives many details pertaining to what will take place after death. In the Christian religion, there is a straightforward dualistic conception of existence which is the body and soul. At death, the non-physical soul separates from the physical body, however there is also different perspectives. (Segal 2010, p24). For example, others believe that the spiritual body which might have three dimensions as well as physical resurrects after death, even thoughShow MoreRelatedJudaism, Christianity, And Islam992 Words   |  4 PagesJudaism, Christianity and Islam are three of the most recognized monotheistic religions worldwide. These religions are often referred to as the Abrahamic religions because of their history to the founding father, Abraham. Judaism, Christianity and Islam are closely related with varying differences. Christianity was born from within the Jewish tradition, and Islam developed from both Christianity and Judaism. We take a look at some of the major similarities and major differences of these widely practicedRead MoreJudaism, Christianity, and Islam1538 Words   |  6 PagesJudaism, Christianity and Islam Christianity and Islam are the most influential religions in the world. Judaism has only fourteen million followers across the continents which makes Judaism the 12th largest religion. Although Judaism is not as large as Christianity and Islam, It still has an impact on the world. Prophet Abraham is the called in Islam the father of all prophets and because of that, sometimes Christianity, Islam and Judaism are called Abrahamic Religions. There are many known differencesRead MoreJudaism, Christianity, And Islam1052 Words   |  5 PagesAubrey Fletcher 3/9/15 Humanities Professor Michaud 417868 Judaism, Christianity, and Islam There are roughly 4,200 different religions in the world today, among them the largest are Judaism, Christianity, and Islam. These three religions are more similar then one would think. Christianity is the largest religion in the world with 2 billion followers and are called Christians. Islam is the second largest religion in the world with 1.3 billion followers. They are called Muslims, which means â€Å"oneRead MoreJudaism, Christianity, And Islam875 Words   |  4 Pageshave believed in a higher power or powers. Christianity, Islam and Judaism, the three most dominant religions are no different. They are all Monotheistic meaning they believe in one sole higher power or God. Though they share this common idea and many other similarity, they have many distinct features of their own that make them different as a whole. Many past religions have believed in the idea of multiple gods, Polytheism. Judaism, Christianity and Islam believe in one Supreme creator, MonotheismRead MoreChristianity, Islam, And Judaism1636 Words   |  7 PagesChristianity, Islam, and Judaism All three religions believe and worship the same God but they do it in different ways. Judaism happens to be the oldest religion today but they don’t have an official creed. They aim to teach you about God, the Messiah, human beings, and the universe which makes Jewish beliefs very important to them. But it is important to understand that being Jewish is more of a race and culture than it is a religion. Some Jewish people may have no interest in Judaism. Judaism hasRead MoreJudaism, Christianity, And Islam1679 Words   |  7 Pages Completely Different but Surprisingly Similar Judaism, Christianity, and Islam are all three different religions that many may not think can even be compared. At a glance, the religions are derived from different locations, the members of the religions look and act different, and some of the widely known practices are what make the religions so distinct. However, they are more similar than most people think. In the core of the three religions, many of their beliefs and practices show to be extremelyRead MoreJudaism, Christianity, And Islam902 Words   |  4 Pagesmost famous three religions -People of the book- are Judaism, Christianity, and Islam. Judaism is the oldest organized religion in the world; however, it only has 14 million followers around the world most of them centered in North America and Israel. Christianity, came after Judaism and have two billion believers around the world, and that’s about one third of the world population. Finally, Islam came after Judaism and Christianity. Even though Islam came afte rwards, it spread quickly around the worldRead MoreJudaism, Christianity, And Islam1016 Words   |  5 Pagesthat keeps many people going in life but at the same time, the same reason our world has so many problems and has been torn apart. Through studying the main tenets in call, Judaism, Christianity and Islam were analyzed for weeks. Christianity and Islam take the cake for the two biggest religions in today’s population however, Judaism plays the smallest role. These three religions, although different, are easily able to be compared and contrasted because of all of the history and information we have attainedRead MoreJudaism, Christianity, And Islam1087 Words   |  5 PagesJudaism, Christianity, and Islam are among the best known and most widely practiced religions today, and have had enormous cultural, ideological, and historical impact on the peoples of every continent. Arguably more so than any other ideological systems, Abrahamic religion has been among the most i nfluential forces in human history. The shared elements of their traditions have allowed them to develop in part through a multi-faceted dialogue with each other. These faiths, despite sharing a commonRead MoreJudaism, Christianity And Islam995 Words   |  4 Pageshistory, different cultures and religions have created ways for the mourners to cope with the tragedy of losing a loved one. In this paper, I will be comparing the advantages offered by religious traditions for the mourners, focusing on Judaism, Christianity and Islam. In addition, I will be contrasting them with the benefits offered by our modern secular funeral services. To start, Judaism’s priorities are on community and on law. Therefore, Jewish traditions regarding procedures after the death of