Sunday, January 26, 2020

What Is Systematic Literature Review Information Technology Essay

What Is Systematic Literature Review Information Technology Essay Empirical software engineering requires the scientific employment of qualitative and quantitative data to realize and improve the software product and process. To conduct empirical studies, the process steering steps to be performed and research strategy are very essential elements [11]. Apart from the traditional method such as experiments, case studies and surveys, the systematic literature review, also called systematic review, is another strategy becoming normally used in empirical software engineering in order to identify relevant empirical studies and combine results to provide reliable information for researcher. This paper aims to provide the general idea of systematic review, process to conduct the review according to the existing guideline and suggestion to improve the guideline. The paper is structured as follows: section 1 gives an introduction to systematic review, explains the reason why systematic review is needed, discusses the differences from narrative review and pros and cons of systematic review. Section 2 explains process of conducting systematic review in detail according to Kitchenham ¿Ã‚ ½s guideline [1]. Since there are still some restrictions and gaps could be improved in the guideline, section 3 described those limitations and provides suggestions for improvement. Lastly, section 4 presents some concluding remarks. 1.1 What is Systematic literature review? Systematic literature review is the methodology that researchers use to gather and evaluate available information to specific research topic. The use of a SLR is mainly proposed to provide an unbiased and systematic approach to answer a structural question which focuses to research topics. The studies or articles that used for systematic review are called primary studies, the systematic review itself is considered as the secondary studies. The review process is very formal with strict procedures and sequence. Each step of the process must be well-defined and can be reproducible by other researchers. The selection criterion of primary studies and type of acceptable information are also defined before hand and thoroughly reviews. To identify the primary studies is done by the use of searching technique. All search methodology and selection criteria are transparent for the reader by described in review protocol. Thus, this means other readers can replicate this review in systematic way. Finally, selected primary studies are analyzed and aggregated, in which forming a systematic review for answer the research questions. 1.2 Why Systematic reviews is needed? Originally, systematic review has been introduced in medical and clinical field as a way to help clinical practitioner finds the answer to their question relating to their practices. Before systematic review was implemented, researchers have difficulties in several areas that traditional review cannot satisfy their need. There is no structural way to review primary studies and to ensure that all related evidence has been evaluated. To summarize and evaluate the knowledge from primary studies is very difficult and also because each study may use different design and organization of information may be vary. The result from traditional review is difficult to evaluation if there is conflicting result. Many times, reader of the review have some doubt to the quality of researchers ¿Ã‚ ½ work since the review method is not clear and explicit. In addition, due to broad scope of traditional review, the result of the review can easily be bias as the selection choice by reviewer may not be co nsistency without well defined guideline of the selection. Thus, systematic review methodology has been introduced to address those difficulties. Systematic review process have increasingly recognized and replaced traditional reviews in many academic fields including software engineering discipline since it provides effective way to summarize and determine research result to help those researchers in their studies. The researchers can utilize systematic review to design new studies that previously difficult in the past with traditional review. With systematic review, it helps reducing reviewer bias since it uses objective and reproducible criteria for primary sources selection with strict assessment of the resources. It also help s researchers to combine result from several small studies in which can help them conclude more precise and dependable result. Moreover, it assists in identifying gap that researchers could make further investigation [1]. 1.3 Differences between Systematic and Unsystematic review There are several key differences between systematic review and unsystematic review or traditional review. This topic will discuss each difference of these two types of review. First, the search for primary studies of these two reviews is widely different, with traditional review, the scope of primary studies search usually have wide range of coverage with no strict rules how to search. In contrast, the search of primary studies in systematic review is very focused on the topics, researchers need to identify question and predefined search rules that can be reproducible by other researchers. Second, the primary sources selection process is also different. With systematic review, selection process has to be predetermined; researchers must decide which type of resources is acceptable for the review so that the selection process is explicit and transparent, and then select primary sources with these strict rules and criteria. Unlike systematic review, traditional review selection process does not have specified criteria on the selection process and dependent on researchers experiences to select the primary sources. Finally, the evaluation method of systematic review followed strict evaluation rules to evaluate each of selected primary sources while traditional review is variable based on individual researchers methods. 1.4 Advantages and disadvantages of Systematic review Though there are several advantages that researchers can utilize systematic review method in their studies, there are still some disadvantages remain comparing with traditional review. Researchers will need to aware and select review type that is appropriate with their situation. This topic will discuss both advantage and disadvantage of systematic review. Advantages  ¿Ã‚ ½ One of the major advantages of the systematic review is that it improves the precision and completeness of the result. Because systematic review process uses well-defined method to search and select for primary studies in which will result in less biased sources comparing with traditional review  ¿Ã‚ ½ The systematic review process helps researchers to identify the consistency or inconsistency of the result from its selection process. If result is consistent, it provides strong answer to researchers ¿Ã‚ ½ questions. If not, researchers can identify the gap and then study the variance. This benefit will be difficult to identify through traditional review process.  ¿Ã‚ ½ Systematic review can apply statistic technique (meta-analysis) to help combining data from more than one primary studies which will give more precise answer to researchers question than using only one primary study. With traditional review, it will be more difficult for researchers to compare and conclude the result from several primary studies to answer their focus question. Disadvantages  ¿Ã‚ ½ Because of its limited focus and predefined method, as it is the advantage of systematic review, it can be disadvantage in some cases. Since the process does not allow comprehensive coverage of the evidence to answer research topics. Thus, researchers must carefully determine their condition and select technique appropriately. In general, traditional review is more useful if researchers want to obtain more broad perspective of their research topic comparing to systematic review.  ¿Ã‚ ½ Traditional review is more useful if the researched topic is the brand new topic, since not much primary studies will be available. Traditional review will have more information coverage than systematic review.  ¿Ã‚ ½ Due to its strictness in process and methodology, systematic review process usually needs more time and effort from researchers to conduct the review. 2. Systematic review guidelines As first introduced in medical research studied, systematic review has also been brought to software engineering field by B. Kitchenham (2004). Since software engineering research method is less strict and less experimented-dependent comparing with medical studies, the revision is needed in the process of systematic review to adapt to the characteristic of software engineering studies. The guidelines emphasize the distinction to medical systematic reviews and guide the software engineering researchers how to perform a systematic review. There are several activities involves in the systematic literature review and they are specified in the guideline. In this section, I refer to the guideline suggested by Kitchenham [1] which describes a systematic review process into three main phases: Planning the review, Conducting the review and Document or Reporting or the review. Each of them consists of order of stages. The implementation each phase involves iteration, feedback and refinement in order to move to next stage and finally reach satisfactory outcomes as illustrated in figure 1. Please note that there are some more optional stages described in the guideline. But I only refer to the stages that are essential to be performed Fig. 1. Phases in Systematic Review 2.1 Planning the review In the first phase of the review, the final outcome which would be produced is a review protocol. It is considered as a plan which defines the research questions that will be addressed by the review and basic review procedures. The planning phase consists of the following stages:  ¿Ã‚ ½ Identification of the need for a review  ¿Ã‚ ½ Specifying the research question(s)  ¿Ã‚ ½ Developing a review protocol  ¿Ã‚ ½ Evaluating the review protocol 2.1.1 Identification of the need for a review Before conducting the review, the reasons behind why the systematic review could answer the research questions or could be useful for further must be given. Originally, the need for a systematic review initiates from the demand to fairly sum up all existing information about some phenomenon. Probably the reasons are to represent more general conclusions instead of just obtaining from individual studies, or may be carried out to lead up to further research activities. In particular, Kitchenham notes that the researchers should first make sure that a new systematic review is really needed before starting the review. And they should consider finding any existing systematic reviews relates to the topic of interest. It could be possible that they do not even need a new systematic review if there existed. Besides, the already published systematic review could help construct a protocol. 2.1.2 Specifying the research question(s) This is the most important stage of the systematic review process. The research questions can be seen as a goal of the review since they drive the whole process of systematic review. To be in detail, the search process is conducted with the aim to classify primary studies that discuss the research questions. Furthermore, the data extraction and analysis processes must extract and synthesize the data in such a way to answer the questions. Kitchenham notes that asking the right question is the important issue in any systematic review. She provides some guideline questions to help in construct the correct questions. She also discusses the characteristics and various types of research questions which are proper for the systematic review. For detailed structure of the questions, the PICOC (Population, Intervention, Comparison, Outcomes, and Context) criteria are used to define the review question elements. Besides, Kitchenham discusses about the different kinds of experimental designs to derive the acceptable studies. In particular, she argues whether studies based on primary studies of one particular type should be accepted for systematic reviews in software engineering. 2.1.3 Developing a review protocol A review protocol is a concrete plan which details the process and strategy to perform a particular systematic review. A pre-defined protocol is crucial to minimize the possibility of researchers ¿Ã‚ ½ bias. The protocol contains all the essentials of the review and some other planning information. The elements described in protocol are: background, research questions, planned search strategy, study selection criteria and procedures, quality assessment criteria and procedures, data extraction strategy, data synthesis strategy and project timetable. Kitchenham suggests that the review protocol should be piloted during its development to find mistakes in the data search procedures, in which it can help to improve the review methodology. 2.1.4 Evaluating the review protocol Because the review protocol is significant for the systematic review, it should be evaluated before execution. The evaluation procedures are done by asking researchers or experts to review the protocol and the agreements among all reviewers must be reached. 2.2 conducting the review This is the execution phase which follows the plan defined in the review protocol. The final outcomes of the systematic review are generated in the end of this phase. To conduct the review, the subsequent stages must be carried out:  ¿Ã‚ ½ Identification of research  ¿Ã‚ ½ Selection of primary studies  ¿Ã‚ ½ Study quality assessment  ¿Ã‚ ½ Data extraction and monitoring  ¿Ã‚ ½ Data synthesis 2.2.1 Identification of research Since the systematic review aims to find all possible of available publications relating to the research question and make conclusion in a fair manner, how to generate the search strategy and publication bias are the critical issues that Kitchenham discusses in this stage. The search strategies defined in the protocol are used to discover the relevant publications. In general, the search strategies are done iteratively by trial searches using different combinations of search terms and in consultations with relevant experts. Typically the search term can be obtained by separate the research questions into individual elements base on PICOC criteria and then create a list of synonyms and relevant words. Another good way to derive the search term is by analyzing the heading of journals. Kitchenham notes that the search strategy should be designed to detect articles that report pessimistic results in order to illustrate researchers ¿Ã‚ ½ bias. Other major concerns regarding the systemat ic review are the completeness and repeatability. Kitchenham suggests that the review process must be transparent and replicable. By providing sufficient detail when documenting the review, this enables the study to be replicable and allows the external reader to evaluate the search terms. And the search terms should be documented properly. 2.2.2 Selection of primary studies The purpose of the selection process is to assess if obtained primary studies have any actual relevance to the research questions. So that we can identify ones that provide direct information for the review. This process should proceed according to the plan defined in the protocol. Kitchenham explains that the study selection is a multistage process. Firstly, base on the research questions, the researchers should define the study criteria to point out the direct relevant studies. These inclusion and exclusion criteria should be piloted to ensure the reliability and correctness when interpreted. The exclusion criteria should be applied first in order to exclude any irrelevant studies. Kitchenham suggests keeping the record of excluded publication with the reason of exclusion just after all unrelated publications have been filtered out. Then the inclusion criteria are applied to remaining studies. Kitchenham also mentions about how to increase trustworthiness of the process in an attem pt to decrease the possibility of bias. 2.2.3 Study quality assessment After applying the inclusion and exclusion criteria to select the primary studies, the quality of primary studies is also considered significantly important to be assessed. Kitchenham describes how important of the quality assessment for example, to allow researchers to evaluate differences in the study, and to weight the importance of each study when synthesize the results. She also discusses about the hierarchy of the evidence described in medical guidelines. Base on their assumption, this hierarchy can be used to control the sorts of study included in the systematic review and it is a ground for the initial quality evaluation. To explain, the top of the hierarchy is the evidence from systematic reviews and controlled experiments, which is believed in the medical area that it is more reliable than the bottom level evidence such as the evidence from expert opinions. However, this argument was later proved that it is not always true. After that, Kitchenham describes about how to defi ne and to use the quality instruments. Basically, checklists are used to assess quality in detailed. To construct the checklists, factors that could bias study results are considered. 2.2.4 Data extraction and monitoring Once the primary studies have been selected, the next step is to extract the relevant information. The extraction process should be performed as defined in review protocol which will describe the extraction forms used to collect the data from the filtered primary studies and also the procedure of data extraction. Kitchenham discusses what should be contained in the data collection form. Not only the information to facilitate the answer of review question and the criteria for quality assessment are included, but also the basic information such as name of reviewer, date of performing data extraction and publication detail must be given. Importantly, the extraction form must be piloted before implementation. Kitchenham suggests that there should be two or more researchers perform data extraction independently. And they have to set agreements either by consensus or by using additional researchers to resolve disagreements on the data. If each paper cannot be assessed by at least two resea rchers, some checking technique, such as random sample of primary studies, has to be employed to ensure that the data are extracted correctly. Monitoring data is also important to perform in this stage. Kitchenham notes that multiple publications of the same study should not be contained in the systematic review since it can lead to bias. It is sometimes needed to contact the authors to make sure if those publications refer to the same study or not and also to derive the required information if the data obtained from studies are missing or we need some unpublished data. 2.2.5 Data synthesis Data synthesis aims to gather and summarize the data extracted from selected primary studies. Same as other stages, the activities to be performed should be defined in the review protocol. Base on Kitchenham research on various options of data combination from several types of studies, sensitivity analyses is suggested to perform to find out the impacts on the synthesis results where some studies are higher quality than others. 2.3 Reporting the review The purpose of this last phase is to write the results of the review. The guidelines explain there are three main stages in this phase  ¿Ã‚ ½ Specifying dissemination mechanism  ¿Ã‚ ½ Formatting the main report  ¿Ã‚ ½ Evaluating the report The final report does not only include the answers to the intended research questions, but it also need to specify the dissemination strategy so that the researcher can expose the result efficiently. Kitchenham presents seven mechanisms to disseminate the systematic reviews results. They are: a) Academic journals and/or conferences b) Practitioner-oriented journals and/or magazines c) Press Releases to the popular and specialist press d) Short summary leaflets e) Posters f) Web pages g) Direct communication to affected bodies Basically, the results are reported in two formulas: in a technical report or in a conference or journal paper. After writing the reports, it is necessary to perform evaluation. Kitchenham discusses evaluation technique for each type of reports. One effective technique is organizing a peer review. The structure and contents of report papers can be seen in the Kitchenham ¿Ã‚ ½s guideline [1]. 3. Improvement suggestions on Systematic review guidelines This section aims to present limitations and to provide suggestion for improvement on each step of the systematic review guidelines on software engineering. The recommendations are collected base on lessons learned and experiences from various articles which utilize systematic review as literature review technique. The study reported in [7] reveals that one of the significant problems of publishing low quality systematic review is that some people conducting systematic review do not understand exactly what systematic review is and how to perform it. So, they end up with having no obvious research questions, explicit search strategy and so on. The subsequent suggestions should be always kept in mind before starting and while performing the systematic review  ¿Ã‚ ½ Thoroughly review and study the guidelines, e.g. Kitchenham ¿Ã‚ ½s guidelines.  ¿Ã‚ ½ Review several SLR examples and experiences to help you understand the process.  ¿Ã‚ ½ Make sure you understand each step of activities and be reasonable for everything you do.  ¿Ã‚ ½ Record the decisions made during conducting the systematic review as much as possible since this information will be needed for writing the final report. According to [2], they suggest to perform training on systematic reviewing in the very first step in order to make the reviewers familiar with the specific terms in the area where they will conduct systematic review. Furthermore, this helps the reviewers get better understanding about the review process and activities. 3.1 Planning the review During this phase, the main activities to be performed are specifying the purpose of conducting a systematic review, formulating research questions, developing and evaluating a review protocol. 3.1.1 Identification of the need for a review In order to identify the clear statement of the objective of the review, the researchers should use the checklist to help pointing out the reasons and ensure their needs. Regarding this issue, there are several useful checklists provided in Kitchenham ¿Ã‚ ½s guideline [1]. In addition to identify rationale of the review, Staples and Niazi [3] collected information from case studies, surveys, and reports to check if the intended research questions are possible to be answered by systematic review. This is founded very useful since they come to know what is common and uncommon in the research questions. Sometimes people thought the question is normal and feasible to be answered by other researches but in the later phases when they try searching for the related literature, they found that their question is very uncommon and then they have to discard those questions. Another crucial point is that the researchers should try to identify the existing systematic review related to their topics of interested in order to avoid conducting a duplicate review. Nevertheless, it is quite difficult to find published systematic review in the area of software engineering comparing with medicine. Since there is no powerful scientific database which collects systematic reviews of studies related to software engineering empirical studies, like the Cochrane (www.cochrane.com) which stores a large amount of systematic reviews of medical research. Although there are currently several services providing access to sources of software engineering publications, there are still many restrictions of those publications as followings [17]:  ¿Ã‚ ½ The available studies is limited and disintegrated properly since many researchers in this field are focused on their own style to generate result rather than structural review process.  ¿Ã‚ ½ It is difficult to combine the result of software engineering review because the quality of review is so variable with no agreed standard for systematic review for this field.  ¿Ã‚ ½ There is no guideline that is well-accepted, though some guideline has been proposed but it neither addresses all necessary topics nor provided sufficient detail. 3.1.2 Specifying the research question(s) As mentioned before, the research questions are specified as part of the review protocol and will be used to construct the search string for searching related primary studies. Basically they will be revised repeatedly during piloting the review protocol and should not be changed when the protocol is committed. The most important point when formulate the research questions is to make them as obvious and concrete as possible. Other than structuring the question by using the PICOC criteria which is shown in [1], it is essential to specify rationale to formulate a particular question. Tabulate the question and purpose such in table 1 could be helpful. Table 1. Research question Research question Purpose RQ1: RQ2: Brereton et al [4] recommend that during protocol construction, researchers should anticipate to refine their research question both for increasing their understanding and making the automated search more effective. There are several systematic reviews, for example the  ¿Ã‚ ½Systematic literature review of guidelines for conducting systematic literature reviews ¿Ã‚ ½ in [4], which firstly define a few research questions. Later on, after investigation some information sources, those questions are extended in more detailed questions Regarding [5], the research questions are not only the questions that needed to be answer by the review, but also the question providing some idea in the area of such a topic for better comprehension. This is also confirmed by Staples and Niazi [3] since their research questions are part of a larger research project. By performing the systematic review on these questions will help them understand better in the project background. By selecting clear and narrow research questions, it helps confining the scope of a systematic literature. [4] proposes another method that may help to scope the research question. That is a systematic pre-review mapping study. The idea is to map out sorts of studies relating the systematic review question have been conducted. The mapping process can be considered as a quick data extraction but the studies described are not very details. The further information about mapping study can be found at [12]. 3.1.3 Developing a review protocol As explained in the section 2, the protocol provides information of the plan for conduction the review, including, for example, the procedure to be performed, the search strategy for selecting primary studies, the allocation of reviewers to some specific activities and the quality assessment criteria for evaluate primary studies. Lacking of a protocol, some process such as the selection of primary studies or data analysis and synthesis may be motivated by researcher bias [14]. And because one of the key features of the systematic review is repeatable, a well-documented review protocol is needed to guarantee the reproducibility of the review. Many experiences on systematic review show that developing a review protocol is an iteration process that needs several revisions to get the complete protocol. Thus, the researchers should expect protocol changes, take a long time and allot appropriate time for it. Brereton et al [4] suggests all members in systematic review team should participate actively in constructing the review protocol, in which helps all of them get insights about the protocol and understand the process of data extraction. Additionally, piloting the review protocol is highly suggested to be performed. Not only because it supports discovering misunderstandings and mistakes in the data extraction and aggregation process, but also it may specify that the researchers need to change the method planned to deal with the research questions. As mentioned above, the search strategy must be documented in the protocol, enabling the reader of a review to evaluate how accurate and complete this is. However, due to the restriction of existing software engineering search engines that are not well-supported systematic reviews like in medicine, the software engineers should conduct resource-dependent searches. In particular, they might have to use different search string for each searchable sources which have different form interfaces and search syntaxes [4]. The followings are recommendations to improve the search strategy.  ¿Ã‚ ½ Searches should be performed to title as well as abstract [6]. However, before making a decision to accept or reject a primary study, searching on summary and content is founded very useful. Since mostly in software engineering, the abstract and titles are not much indicative [6] and not so dependable for primary studies selection [4].  ¿Ã‚ ½ Any search strategy should be made up of multiple keywords, and it is essential to use a various combinations of terms to get the very successful search [6].  ¿Ã‚ ½ Using more standardized vocabulary will promote the search results [6].  ¿Ã‚ ½ For some software engineering topics, the publications in related fields should be searched as well. i.e. information systems, psychology, economics, quality, artificial intelligence [6]  ¿Ã‚ ½ To get the most out of relevant publications, synonyms of the main search term should be used for search [6].  ¿Ã‚ ½ It is likely that adding other more general terms to synonyms of the key search term detects more relevant studies. However, this tends to increase the number of irrelevant articles as well. So, it should only be used when there are a number of systematic review resources available in detecting and rejecting irrelevant articles [6]  ¿Ã‚ ½ It is not necessary to search on all the search fields because it is not considerably benefits the response and also requires a big effort [6].  ¿Ã‚ ½ Construct search strings using Boolean  ¿Ã‚ ½Ã‚ ¿Ã‚ ½AND ¿Ã‚ ½Ã‚ ¿Ã‚ ½ to link the key terms and  ¿Ã‚ ½Ã‚ ¿Ã‚ ½OR ¿Ã‚ ½Ã‚ ¿Ã‚ ½ to group synonyms [4]. An example could be the following: (experiment OR  ¿Ã‚ ½empirical study ¿Ã‚ ½) AND ( ¿Ã‚ ½software cost estimation ¿Ã‚ ½ OR  ¿Ã‚ ½software effort estimation ¿Ã‚ ½)  ¿Ã‚ ½ Try searching from synonyms to the term representing the study type need to search [6].  ¿Ã‚ ½ Include search fields that typically contain the key terms of the study type such as title and abstract [6].  ¿Ã‚ ½ To get the key search terms. ,beak down the research questions into single words pertaining to the types of study that will help answer the question, technology of interested, and the response test [4].  ¿Ã‚ ½ After deriving the key search terms, using various combinations of those terms to perform trial searches [6].  ¿Ã‚ ½ Specifying the year of the paper first published in the search string can help lessen the amount of irrelevant articles [4].  ¿Ã‚ ½ Be careful when using the Basic or Advances search forms because some search engines may produce different results even though the key searched terms are the s

Friday, January 17, 2020

Compare How Atonement and Spies Explore the Journey from Innocence to Experience Essay

Compare how Atonement and Spies explore the journey from innocence to experience. Both Atonement and Spies are bildungsroman where the protagonists are reminiscing about events in their childhoods which impose on them in their adult lives. In Atonement, Briony is narrating throughout the text; however the reader only finds this out at the end and in Spies Stephen is narrating with his older and younger self through duel narration with slippage between the two. Both text were published within a year of each other, Atonement in 2001 and Spies in 2002; however they both focus on the same time in history, during (and after) the Second World War. Spies focuses on one point in time around 1940; whereas Atonement ranges before, throughout and after the war with the view points from different characters throughout unlike Spies where the reader sees only from young or old Stephen. Both protagonists are naive and easily influenced in the beginning of the novels and their misinterpretations draw the narrative to a conclusive disaster. In Spies, Stephen misinterprets the Mrs Hayward’s diary’s x’s and exclamation marks for some form of German â€Å"code† and believes that she is a spy- â€Å"she actually is a German spy†- Similarly in Atonement, where Briony misinterprets what she witnessed in the library which leads her to the conclusion that Robbie raped Lola, which she sticks to with conviction â€Å"it was Robbie†. The misinterpretations made by the protagonists reflect the lack of knowledge about the adult world and emphasise their innocence in the beginning of the novels. In Atonement the peak of Briony’s innocence is at the beginning with the â€Å"Trials of Arabella† and sulking when she gives up the main part of â€Å"Arabella† by killing nettles which foreshadows the impending doom of her actions. I believe at this point Briony triggers a transition to adult knowledge with the letter and therefor conclusively decides the narrative with her intrusion of Robbie and Cecilia’s privacy; however in the film adaptation others have interpreted this differently. Peter Bradshaw believes that it is the â€Å"mysterious scene by the fountain that is to trigger Briony’s terrible misguided sense that she has a personal insight and a grievance; it appears to give her an access point into shocking adult phenomena†. However key the scene is in the narrative as a whole, I do not believe it to be a pivotal role in Briony’s contribution to the downfall that is witnessed later in the novel due to the confusion she feels when confronted with the situation. In Spies Stephen and Keith play childish games such as â€Å"monkey hunting†; however this is contradicted increasingly throughout the novel with the seriousness of their accusations made in regards to Keith’s mother. John Mullan believes that the â€Å"The boys show ominous signs of adulthood behaviour when supposedly children: the boys never seem to call each other by their first names except when taking some horrendous sounding oaths†. The protagonists both believe a fictitious story conjured from their own imaginations and thus relieves them of their innocence leaving them open to the repercussions of their actions. Briony convinces herself that she saw Robbie and swears that she did whilst we find out later in the novel that she was unsure. In the first interview with the police she states â€Å"I know it was him†, not clarifying that she â€Å"saw†, him leading the reader to believe that she does so because of her misunderstandings over the fountain and letter earlier in the novel. In spies Stephen and Keith are certain that Mrs Hayward is a spy after they witness her first â€Å"disappearance† which they both rationalise after they have seen it. This act of misunderstanding is less harmful than that of Briony’s action however; they are invading the privacy of someone else which does add to the compromising of their innocence. Both stories conjured by the protagonists are not clarified throughout the narrative; the author leaves hints for the reader about the events themselves, and this lack of knowledge is a hallmark of postmodernism and the unreliable narrator present within each text. The inevitability of the protagonist’s actions is that both are shown to be guilty in their adulthood. The reader learns that Briony becomes a nurse and gives up a chance to go to Oxford and the class privileges that result from it. The reader learns that â€Å"the purpose of becoming a nurse was to work for her independence† as well as learning what Robbie is going through in the army. We later learn that the narrative has been written by Briony and some parts have been fictionalised such as the meeting with Robbie and Cecilia so she can try and put right what she could not do in life. Like Atonement Stephen in Spies feel guilty about the death of Uncle Peter and revisits The Close in which he grew up to atone. This is where the narrative takes place, â€Å"you can’t go back everyone knows that† implying that â€Å"everyone† knows that it was his fault. This is an interesting comment made by Stephen because surely Stephen and the reader know that it is Keith’s father who is to blame ultimately for the discovery and death of Uncle Peter after Stephen and his confrontation over the picnic basket. Both protagonists, we learn have been putting the idea of properly confronting and trying to amend (as best they can) their actions off until the latest time possible. The reader learns that Briony falsities the ending and meeting of Cecilia and Robbie in the final chapters where she is close to forgetting all of her memories through dementia. Like Briony Stephen has waited till very late on in his life to re-visit the close. We learn that he has lived a full but somehow sorrowful life until he returns and faces the actions that he made when he was a child â€Å"I can sort out whether I belong here or there† Both novels explore the motif of love and sexuality in spies the reader is given details about one of two sexually attracted women in his life: Barbara Berrill, and his future wife. The reader only learns that his wife is German and no more information throughout the novel other than the fact that Stephen had a family with her and that she died. The reader is witness to the presumably only sexual act between Barbara Berrill and Stephen where they exchange two kisses â€Å"she leans closer still, and rests her lips against mine† it is presumed that this is Stephens first kiss with a girl due to his initial reactions â€Å"Nice?†¦ I was too busy thinking about the germs† a typical young boy’s reaction to the opposite sex. This scene can be said to be one of the most normal childlike behaviour in the entire text, through the experimental aspect that has been associated with growing up. The motif of sexuality and relationships is greatly explored in atonement compared with that of Spies. Early on in the narrative Robbie and Cecilia â€Å"make love† this act creates and spurs on a relationship throughout the rest of the narrative with longing for a similar experience; however like spies this act never occurs again whereas unlike spies neither Cecilia or Robbie indulge in any sexual contact after their initial â€Å"library scene† because of both their untimely deaths emphasising the importance of that moment in the readers eyes. This singular act of â€Å"love† somewhat adds to the innocence and sympathy felt towards both characters. Unlike the other two protagonists in Spies and Atonement (Stephen and Robbie) McEwan never mentions Briony to have any sexual contact throughout the novel unlike Robbie’s And Cecilia’s characters the absence of Briony’s sexuality evokes no sympathy. I believe that McEwan includes this as part of her atonement, because of the deprivation of sexuality that Briony causes. Both novels show clear points in the narrative where the protagonist’s develop their experiences in the world of adult life through their actions; however it can be said that the protagonists have never been allowed to fully pass into the full realms of adult knowledge because throughout their lives they cling to an event that happened in their child hood without being able to come to terms with it until the end of their lives.

Thursday, January 9, 2020

Reality Television Has A Negative Impact On Society

As a kind of television programming which has lower production fee and a larger range of audiences,reality television has become a major force of television entertainment.It changes the way audiences watch television by providing imaginary space for them,allowing them fantasize themselves as the part of the show(Hicks,2009).However,while the reality television is argued as ‘highly edited reality’,the positive effects are doubted by some observers.The reality television in this essay can be defined as a genre of television programming with unscripted real-life situations,usually features ordinary masses as the protagonist rather than famous stars,which usually consists of four types:Watching people live or work,Self-improvement,Competition and Competition in a special living situation.(Australian Government Australian Communications and Media Authority,2007)This essay will argue that ‘reality television’ has a negative impact on society by focusing on its ef fects to girls,teenagers and children. The reality television could have a negative impact to girls because the luxurious and shining lives in some program are what most girls yearn for.To attract audiences’ attention,the edition may focus on the aspect that is excited rather than positive,which could cause the information conveyed to the audiences incomplete.The reality television does affect lives of the participants as well as the audiences.Adrienne Maloof,for example,a woman who is extremely successful in her lifeShow MoreRelatedThe Impact of Reality Tv on the Teenagers1732 Words   |  7 PagesThe Impact Of Reality TV on the Teenagers in Mumbai Nimish Satpute St. Andrews College Instructors : Prof. Meenakshi Kamat : Prof. Jenny Benoy Abstract Reality-based television programming has become a dominant force in television over the past seven years and a staple of most networks’ primetime lineups. This relatively quick change in the television landscape and the sudden increase in viewers’ consumption of reality televisionRead MoreThe Reality Of Television Has On Store For Me Tonight1547 Words   |  7 PagesIt is Monday morning and I am already thinking about what reality television has in store for me tonight. There are so many shows to choose from at prime time, so instead of making a hard decision, I simply plan to watch them all. From Basketball Wives and Black Ink Crew to Love and Hip-hop and The Real Housewives of Atlanta, my Monday night seems to be very eventful. It is something about the constant drama that keeps my glued to the TV screen – the constant shouting and fussing, not to mentionRead MoreReality Television : Is It Reality?849 Words   |  4 PagesIs it Reality? Pop culture is popular culture that dominates a society at a point in time. Today, reality television is a part of the society’s popular culture (Johnson 289). The question is why? Reality television is a genre of television programming that focuses on members of the public living in conditions made by the creator, and displays how people are intended to behave in everyday life (Johnson 290). Reality television is debasing and should be strictly controlled, if not banned altogetherRead MoreThe Effects Of Reality Television On Our Lives901 Words   |  4 PagesWashington D.C.. She has the experience of being a business and real estate reporter, and also the editor for The Washington Post for more than twenty years. Haggerty has also graduated from George Washington University with a bachelor’s degree. She is a fan of reality television and has written this article to show the effect of reality television in the world we live in today and the messages they are sending t o their audiences. Haggerty focuses on popular reality television shows, such as KeepingRead MoreAfrican American Stereotypes Reality Television1531 Words   |  7 PagesReality programs have dominated television networks since their rise in popularity began in the early 1990s with MTV’s The Real World. The reality genre quickly gained viewership as it redefined the formulaic set up of televisions shows from the past. Reality television has infiltrated television because networks prefer low budgets for their programs that also generate high ratings (Hasinoff, 2008). People watch reality shows because they are intrigued by the seemingly â€Å"real† drama with ordinaryRead MoreThe Effects Of Reality Television In Our Society Can Be1509 Words   |  7 Pages The effects of reality television in our society can be seen within the people and even within the government. Reality TV has affected our society in some drastic ways. Reality television started off by showing fam ilies supporting each other and being loving, this no longer the case in the year 2017. Reality TV is now promoting acts of aggression, twisting the society s morals, and values. This genre of television has greatly influenced some preposterous behaviors within teenage viewers and undoubtedlyRead MoreThe Effects Of Modern Media On Us1046 Words   |  5 PagesEverything in our society impacts us in one way or another; these influences can either be positive or negative. For example, when we see something good happen to others around us we tend to be in a happier mood and when something tragic happens to our country, such as what happened in 9/11, we can’t help but mourn. We never notice how the small things in life could influence us in big ways. We never would notice that things like modern media, such as television, ads, and the internet would impact us in waysRead MoreThe Effects Of Television On Today s Society1550 Words   |  7 PagesTelevision has greatly evolved sinc e the 1950s, and has become a part of most American households over the years. Today’s society has turned to television for a variety of purposes including; entertainment, intellectual growth, and as a way to stay updated with what is going on in our society. While these seem like all positive aspects that have come with the progression of television, there are also negative components that have a direct affect on today’s society. Therefore this paper will discussRead MoreInfluence of Media and Culture on Self Image1724 Words   |  7 Pagesleading to self confusion? Having access to information twenty-four hours a day does not necessarily have a positive impact on society and self image. Media content despite its public charge does not exactly mirror real self image. Mass communication with television ads and movies offer an unrealistic view of the everyday person in various aspects of life. Media can have a positive or negative influence on culture and the way pe ople view their lives compared to those in the public eye. There is much speculationRead MoreThe Distortion of Image in Americas Top Model Essay1227 Words   |  5 PagesReality Television Essay In this contemporary society, many individuals are getting hooked and exposed to numerous kinds and different genres of reality television shows. Most of the producers of the reality television seem that they are aiming to give us entertainment and show us what â€Å"reality† is through their programs. However, these shows are intended to persuade, influence, and manipulate its viewers in many ways. In Reality Bites Back: The Troubling Truth about Guilty Pleasure TV, Jennifer

Wednesday, January 1, 2020

William Chaucer s The Cock And The Fox - 910 Words

Before the written language, stories were passed down through generations by oral communication. This often led to variations in similar fables that many authors would then write out. Robert Henryson, the successor to Geoffrey Chaucer, wrote a comparable version of Chaucer’s The Nun’s Priest’s Tale called The Cock and The Fox. Although there are vast comparisons such as elaborate language, bestiary, and similar character development, each tale uses a different main action, has separate social aspects, and has variations to redirect towards the moral. Robert Henryson’s work is often compared to Geoffrey Chaucer’s and while he did not encounter the same fame, he does mirror Chaucer’s characteristics. Parallels between The Nun’s Priest’s Tale and The Cock and The Fox include style, themes, and character development. These tales are told in mock-heroic, which takes a trivial event and elevates it into something of greater importance . It treats a trivial event as if it were inspirational. Chaucer uses elevated language to describe a fox catching a rooster in a barnyard a far cry from the classic epics. When the fox, runs off with Chaunticleer in his jaws, the chase that ensues involves every creature in the barnyard, and the entire scene is narrated in the elevated language found in the great epics where language was used to enhance the deeds of epic heroes. The twist on a classical tragic style gives room for comedic and dramatic passages such as the near death scenes from each

Tuesday, December 24, 2019

The Internet Is Good Or Bad - 1074 Words

Have you ever walked in the street and someone says to you â€Å" Are you that guy? Why did go there? Are you a friend of that horrible guy? Why did you even go to that city? Etc,, †. Stopping for a minute wondering who this guy is. Asking yourself †have I met that guy before? Or even how has he/she known that thing about me. When the internet became available, we got all of the general public including some unsavoury characters that didn t have your best interests at heart, so we got a lot of bad things showing up on the net in addition to the overwhelming positive value that is available, he told TechRadar†(Goss). In other word, we have become using the Internet widely that we do not even know what we are doing. Indeed that we are in†¦show more content†¦As we can see, the Internet is filled with things that consider to our privacy. â€Å"With ever increasing penetration rates, the usage of mobile communication technology has integrated into our society. The usage of mobile phones has created social norms related to acceptable user behaviour and habits, e.g. turning the tones off during movies or lectures. However, the normative behaviour and limits of personal territories are still evolving, and may vary between users and user groups. Privacy issues have lately gained lot of attention in future development trends related to mobile computing, see e.g. [5]†(Hà ¤kkilà ¤). By having the mobile phone our using of the Internet becomes easy and available to everybody. Which is open to us many doors that make us posting every single thing that happens in our daily life. Moreover, the users of the Internet have become fixable with posting his/her daily life on it that makes super normal in our society spatially to these things that we used to consider it our privacy. In case that you have forgotten what privacy means, here is a definition that may make us realize what are the things that we are not supposed to post every single thing in our daily life. â€Å"I propose that privacy be defined as the Condition of not having undocumented personal information about oneself known by others. To clarify this definition the notion of undocumented personal information must be explained. Very few legal scholars

Monday, December 16, 2019

Managing Global Trade Operations Free Essays

Introduction This purpose of this document is to discuss the trade between McDaniel’s Commodities UK Ltd and Yamaha Koshimoto (YK) Impex Japan. The document specifies the seller’s conditions for the completion of the export of dried cassava chips to YK Impex Company. The transportation method, payment terms, required documentation and other important inputs, processes and terms needed to accomplish the trade between both parties would be discussed. We will write a custom essay sample on Managing Global Trade Operations or any similar topic only for you Order Now Each of the clauses in the following sections contains discussions on the conditions and requirements for the trade between the two parties. Clause No. 1: Commodity and Country of Origin. The commodity concerned is processed dried cassava chip pellets used for the production of industrial starch, and the country of origin is the UK. According to Barbrow and Judson (1976) and the international system of units, the best way to measure commodities in international trade is through Metric Tonnes (MT). Metric tonne is equivalent of 1000kg. As a result therefore, all weight measurement concerning the trade shall be measured in metric tonnes. Clause No. 2: Product Specification The specifications of the Cassava chips referred to by the seller meets buyer’s requirements: the following are the criteria which specify the seller’s offer. As noted by WTO (2008) one of the challenges of global trade is meeting product specifications given the technicalities, barriers, standard problems and issues of safety, therefore for trade to be successful, seller’s must ensure that they meet adequate standards even where it is not stated in trade agreements. The physical test: (A)- The product is free from smell and other radioactive materials. (B)- The chips are dried, cut into sizes and free from foreign matters. (C)- It is free from any insects or Animals. (D)- It is free from any solvents or chemicals used during extraction and processing. The Product Specification StarchMinimum 75% Moisture:Maximum 11% FibreMaximum Content 3% SandMaximum 2% SkinPeeled and Pelted Crop year2010-2011 SizesIrregular Shipment and Packaging Given that the product would be required in hundreds of metric tonnes and in light of their fragile nature, all shipments are to be arranged in bulk bagging of 100 Kg each. It would be shipped in 40 ft containers provided by the shipping company. To ensure that the shipment and packaging meets the international standards, the seller would ensure that it is accordance with (INCOTERMS 2000). Incoterms according to Morrissey et al (2000) are a series of pre-defined commercial terms published by the International Chamber of Commerce (ICC) widely used in international commercial transactions. Clause No.3: Transportation Maersk, which is known as the foremost global shipping company will be used as the shipping commodity to handle the cargo and the shipment will be in ther the following order. The commodity will be shipped via sea from the Felixstowe port of UK to the Port of Hakata in Japan. Further transportation upon clearance at the port shall be arranged from the port by the buyer. SELLER and BUYER shall mutually appoint internationally recognized first class independent surveyor company SGS/CIQ at both the loading port and unloading port to assess and certify the quality and quantity of the cargo according to the provisions herein started. Costs of the inspection will be shared equally by the seller at loading port and by buyer at unloading port, as per surveyors invoice. Clause No. 3: Payment Terms. The payment shall be by irrevocable, transferable, confirmed, documentary letter of credit payable 100% not later than 60 days against presentation of shipping documents. To ensure safety in the payment arrangement it is commonplace as noted by Pierreand Stewart (2010) to comply with incoterms arrangement with regards to payment and as such the following must be ensured. The Buyer shall open a non operative confirmable, irrevocable, transferable; auto revolving Letter of Credit (L/C) within 7 working days after final signing of agreed sales and purchase agreement by both parties. The LC shall be subject to UCP 2007 revision, ICC publication NO. 600 cover 100% of the total contract value in favour of the seller Buyer’s letter of credit shall comply with other terms of uniform customs and practice (UCP 600) issued by (ICC). The buyer’s letter of credit payment value shall be only for the net cassava quantity actually delivered to the discharge port and upon the shipping documents submitted by the seller to the buyer’s bank. The buyer’s bank shall issue the operative Letter of credit only in favour of the seller’s company which signed the final contract with the buyer’s. All official communications between the seller’s bank and the buyer’s bank shall be by: Society for Worldwide Inter-bank Financial Telecommunications (known as S.W.I.F.T.). Before the shipment of any part of the contract seller shall confirm that all forms of payment are satisfactory and conforms to legal standards. In case the BUYER’s letter of credit is delayed and seller is not able to receive payment as a result of the buyer’s bank fault or the buyer or any of its agents. The BUYER will pay a penalty to the SELLER at rate of 0.1% for each day of delay but not more than 2% of unpaid amount. Clause No. 4: Required Shipping Documents All shipping documents shall be original and written in English language only. The INCOTERMS does not permit that carbon copies of documents should be acceptable by the Seller as it might create dispute, therefore all documents must be original. The sellers agrees to provide insurance certificate covering all shipment risks issued by the buyer’s favour through a known global insurance Company in the value of (110%) one hundred ten percent. Analysis certificate of the shipment issued by seller: this would include all the technical specifications of the commodities produced by the party or an official party on the seller’s behalf. Signed commercial invoices issued by the seller in the Buyer’s name with reference to commodity description, contract type buyer’s name (Letter of credit number Issuance date as well as unit, price quantity, value and date. 2/2 of Bills of Lading (B/L) originals and copies) signed and stamped by the vessel’s captain and marked â€Å"clean on board†, indicating the vessel’s name and address of the vessel’s owner, vessel’s master name, loading port and date, contract number, buyer’s (letter of credit) Number and issuance date. Certificate of Commodity Inspection and Quarantine issued by Defra UK Two original and copies of certificate of origin issued and authenticated by the (Department for food, forestry and Agriculture: UK) or its representative. Two original and 2 copies each of the inspection certificates issued at the loading port Confirming product specifications, quality, packing and that the shipment in line with the contracted specs in clause 2. Insurance certificate covering all shipment risks issued in favour of EXW by prime insurance Company in the value of (110%) one hundred ten percent of the (letter of credit value issued in US dollars. Two original and two copies each of certificate of origin issued and authenticated by the UK Defra at the port of origin Two originals and two copies each of official shipping advice issued by the seller’s shipping company showing in-depth details about the shipment such as: vessel’s sailing date, vessel’s name / registration date number / age/ nationality/ flag, name of Loading and Delivery port, name of shipped goods, (SGS) tests report at the loading port, name and address of the buyer’s company, name of the vessel’s captain, invoice date and value, oil country of origin, bill of lading date and number, contract number, net quantity loaded, voyage itinerary and vessel’s estimated time of arrival (ETA) to the delivery port. Beneficiary’s certificate confirming that all original shipping documents were sent to the buyer’s bank by international courier services (as Fedex or any express courier). Any other payment documents stated in the buyer’s letter of credit letter of credit The original shipping documents shall be sent at seller’s account to the buyer and to the buyer’s bank via approved courier services (as DHL or equivalent) as soon as possible to match the vessel’s Final arrival date to the delivery port. The original shipping documents for all shipments shall be presented to the buyer’s bank within the Validity period of the buyer’s operative (letter of credit). The Seller shall notify the Buyer of the expected date of arrival at discharge port within 120 hours after the completion of the loading. The Seller shall require the tankers Master to advise the Buyer and ship Owners Agent at the port of discharge, the ships estimate time of arrival (ETA), its name, tonnage, flag, draughts, loaded quantity in every holed, etc. at least 144 hours before her arrival of the destination port. Clause No. 5: Raising Finance With respect to finance for accomplishing the trade, both parties will be under financial obligations to ensure that the trade is accomplished. This would require that each party must have available finance obtainable. On the Seller’s side, the payment required would be that to pay shippers, insurance, inspectors, local transportation, shipping documents, administration and shipment given that the arranged INCOTERMS is C.I.F. Similarly, the buyer will be under obligation to pay for transportation and the C.I.F cost. For the seller in particular the most feasible and preferable option would be through short term trade finance. According to Humphrey (2009) short term trade finance are always available to exporters when they have sufficient evidence to demonstrate that they can fulfil a particular order and has the capacity. Humphrey points out that although banks usually assess risks of the trade and the fitness of the exporter to fulfil the terms before granting short term fina nce. However, since such terms can be fulfilled by the Seller given the product availability, it is likely that such finance would be accessible from the bank. Usually, short trade finance must be paid within 6 months therefore, since the payment arrange with the buyer would be within 60 days L/C maturity, no problem with regard to raising such finance is anticipated. Failing this however, the UK trade and investment short term finance program would be tapped into for financing the trade while other Angel investors would be explored. For the buyer, the most feasible payment option is to finance the trade by lodging cash in the bank in order to be entitled to a sound and reliable letter of credit. Or otherwise, the buyer can set up a payment plan with its banks by giving proof of through its previous financial records that payment would be returned to the bank upon receiving and selling the product. Clause No. 6: Business Procedure. The buyer signs, seals and sends the final contract to the seller as e-mail attachment. The seller signs, seals the final contract and sends it back to the buyer within (3) three days by fax or email attachment. The paper copy signed and sealed by both parties and sent by DHL or equivalent expedited courier shall be deemed the original contract. Within (3-7) Three to seven banking days from the signing of the final contract, the buyer’s bank shall send SWIFT a pre advice to the seller’s bank confirming the presence of a non-operative letter of credit covering the value of the quantity. The buyer and the seller are fully committed to execute the signed contract upon established terms. Clause No. 7: Delivery Terms. The date of the bill of lading (B/L) shall be considered the date of shipment and shall be within fifty to sixty days. Discharge rate and demurrage charges shall be the buyer’s responsibility. The delivery port is Port of Hakata, Japan. The seller’s shipping agent shall notify the buyer and the buyer’s shipping agent at the delivery Port by e-mail attachment the information about the vessel’s position (7) seven days, (72) seventy two hours and (24) twenty four hours of the vessel’s final berthing. References Barbrow, L.E.; Judson, L.V. (1976). Weights and measures standards of the United States – A brief history Humphrey, J. (2009). Trade financing: Available at: http://voxeu.org/index.php?q=node/3507 Accessed: 3rd of May, 2012 Morrissey, M. Joseph F.; Jack M. Graves, K. (2008). International Sales Law and Arbitration: problems, cases and commentary. Kluwer Law International. p. 23 Pierre D. Stewart, R. (2010). International Logistics: the management of international trade operations (3rd ed.). Cengage Learning. p. 113. The International System of Units (SI) (PDF), 8th Edition, 2006, Section 4.1 How to cite Managing Global Trade Operations, Essay examples

Sunday, December 8, 2019

Smart Manufacturing Handling Preventive

Question: Discuss about the Smart Manufacturing for Handling Preventive. Answer: Introduction: In terms of Economics, a model is discussed with the help of the economics theory and also with the set of variables and logical associations. The modern economic theory is referred as the intricate machine[1]. The major job deals with the inadequate resources as well as the distribute of the output within the different agents. The agents are governments, individuals and also within the firms. The measurable signals refers that there is the orders that can diverts the complexity during the allocation of goods and the services. In addition, the tendency of the annual productivity of the developed nations is upward sloping. The economic model has a simple description of reality and also planned to determine the hypothesis for the economic performance. Nonetheless, all of the economic models are considered as subjective and it estimates the reality. It would highlight the observed occurrence. The government of an economy needs to ignore the predictions, as the predictions are tempered b y the arbitrariness fundamental information, which can describe the validity of the theories. No economic models provide a relevant explanation of the reality. The major reason of this inadequate attention can create a link among the entire demand, wealth and excessive risks. It can be mentioned that there will be considerable research into the exposure. This research highlights to the behavioral equations in order to present the economic models. The economic models are needed to adapt the existing equations in order to make a connection with the help of new equations and the financial sector. Economists focus to the usage of the tools to test the models that highlights the statistics and the case studies. The main drawbacks highlight the effective market hypothesis and the logical expectations hypothesis. It can be stated that the market operators not only behave rationally[2]. In this context, economists Keynes explained the fact and therefore, economics is a segment of moral science. In this purpose, it can be stated that the price elasticity of demand is a measurement, which refers that the connection between the quantity demand of the goods and the change of the price of the goods[3]. Therefore, price elasticity of demand= (Percentage change in demand/ percentage change in price). Price elasticity of normal goods: It is known that in case of the normal goods, the demand for the goods will be increased with the rise in the income level. However, if the level of price of the products would increase, then the demand for the goods would be decreased. From the above figure, it can be observed that the demand for the goods would rise with the increase in the income level. However, if the level of price of the normal goods would rise, the quantity purchased by the customers would be decreased. This would decrease the price elasticity of demand for the normal products would decrease. As per the concept of consumer theory of economics, the giffen goods are the goods, which are consumed by the customers more if the price of the products would rise and the level of income would decrease[4]. In this context, salt and sugar are the examples of giffen goods. The demand for the giffen goods is perfectly elastic. Therefore, it can be inferred that if the price of the products would be fluctuated, then the percentage change for the quantity demand would be equivalent. The above figure highlighted that it can be stated that the demand curve for the giffen goods is perfectly inelastic. If the level of income would decrease or the level of price would rise, then the percentage of quantity demand would be raised. On the other hand, it can be observed from the above figure is that with the rise in the price level from P1 to P2, the demand for the giffen goods would not be changed. Hence, it can be inferred that the price elasticity would be raised. In addition, it can be pointed that the income effect would dominate the substitution effect of the goods[5]. Price elasticity of luxury goods: In terms of economics, luxury goods are the goods, for which the demand for the products would be increased greater than the rise of the level of income. On the other hand, it can be mentioned that the change of the quantity demand for the luxury goods would be decreased when the price level of the products would be increased. Nonetheless, if the income level of the customers would increase, then the demand for the luxury goods would also increase. It can be stated that the price elasticity of the luxury goods is perfectly elastic. Some of the examples of luxury goods are cars, air conditions, jewellery etc[6]. The above diagram highlights that if the price level of the luxury goods would rise from the P1 level to P2, then it can be observed that the percentage of quantity demand would increase from D1 to D2 when the level of income increase. Therefore, the change of the price level is lower than the change of the demand for the luxury goods, which can be clearly observed in the in the above diagram. As a result, it can be mentioned that due to the change of the price level, the quantity demand would also increase when the income level would increase. According to Varian (2016), the price elasticity of demand would be inelastic for the upper income group people. Bibliography Coglianese, J., Davis, L. W., Kilian, L., Stock, J. H.. Anticipation, tax avoidance, and the price elasticity of gasoline demand.Journal of Applied Econometrics (2016). Koh, Y., Lee, S., Choi, C.. The income elasticity of demand and firm performance of US restaurant companies by restaurant type during recessions.Tourism Economics,19(4) (2013), 855-881. Lao, L., Ellis, M., Christofides, P. D.. Smart manufacturing: Handling preventive actuator maintenance and economics using model predictive control.AIChE Journal,60(6) (2014), 2179-2196. Levin, L., Lewis, M. S., Wolak, F. A..High frequency evidence on the demand for gasoline(No. w22345). National Bureau of Economic Research (2016). Rabin, M.. An approach to incorporating psychology into economics.The American Economic Review,103(3) (2013), 617-622. Thimmapuram, P. R., Kim, J.. Consumers' price elasticity of demand modeling with economic effects on electricity markets using an agent-based model.IEEE Transactions on Smart Grid,4(1) (2013), 390-397. Varian, H. R.. How to build an economic model in your spare time.The American Economist,61(1) (2016), 81-90.