Premium Essay

Willful Digital Moves

Submitted By
Words 1147
Pages 5
Case Analysis Write-Up: Under Armour’s Willful Digital Moves
Issue identification
The “Under Amour’s Willful Digital Moves” case brings several issues to the fore. Under Amour’s management has to make a decision as to whether the company should continue to target and grow its female market segment. So far, the “I Will What I Want” marketing campaign targeting female consumers had been very successful because it raised women’s apparel to 30 percent of total sales. Prior to this marketing campaign, women’s apparel contributed about 21 percent of Under Armour’s sales. Therefore, continued expansion into the female market segment has the potential to attract more female customers and raise the volume of sales in this segment.
The other issue is that Under Amour’s founder and chief executive is unsure of which route; whether online or television advertisements, to take in the company’s future marketing campaigns. Growing Under Armour Company to a $10 billion brand will require the rolling out of successful marketing campaigns. The “I Will What I Want” marketing campaign had gone viral because it had been …show more content…
Singularly targeting and growing the female market segment is a narrow approach considering other lucrative segments are cropping up. Therefore, the best strategy will be to address the existing needs of the broader population. The fitness market does not discriminate between men and women. People of both genders are signing up in their millions to a fitness club or gym and millions of others are exercising at home. This is a market segment that is poised to continuously grow as more and more people become health conscious. Therefore, Under Armour should expand into footwear and sports apparel for both men and women instead of only concentrating on general apparel for

Similar Documents

Premium Essay

No Electronic Theft Act

...NO ELECTRONIC THEFT ACT (NET) Within the Internet culture of unlicensed use, theft of intellectual property is growing. Pirating works online is the same as shoplifting a video tape, book, or computer program from a department store. Through a loophole in the law, however, copyright infringers who intentionally pirate works, as long as they do not do so for profit, are outside the reach of our nation's law enforcement officials. In 1997 President Bill Clinton introduced the No Electronic Theft Act (NET), which allows criminal enforcement against people who have no profit motive in the infringement. HR 2265 was viewed as a closing a loophole in the criminal law. Under the old statutory scheme, people who intentionally distributed copied software over the Internet did not face criminal penalties as long as they did not profit from their actions. The act was strongly backed by the software and entertainment industries but opposed by library and academic groups. The No Electronic Theft Act, as its name suggests, was enacted to criminalize the violation of copyrights through the posting of copyrighted materials on the Internet. The posting of a work on the Internet makes it extremely easy to access, read and copy that work. Because of the popularity of the Internet, moreover, any single copy of a work that is posted on the Internet could be read and copied many times over each month. Copyright law establishes rights for both copyright holders and for purchasers of copyrighted...

Words: 3388 - Pages: 14

Premium Essay

Meaningful Use

...this crucial environment, access to patients’ medical record in a timely manner is essential in providing efficient and quality patient care. In a town meeting held in Northern Virginia Community College in Annandale, Va., President Obama called for fixing the inoperative healthcare system by investing in electronic medical records. President stated, “ I know that people say the costs of fixing our problems are great – and in some cases, they are”. He also stated that, “The costs of inaction, of not doing anything, are even greater. They’re unacceptable.” In an effort to minimize the cost of our healthcare system, he emphasized that: "When everything is digitalized, all your records - your privacy is protected, but all your records on a digital form - that reduces medical errors. It means that nurses don't have to read the scrawl of doctors when they are trying to figure out what treatments to apply. That saves lives; that saves money; and it will...

Words: 3939 - Pages: 16

Premium Essay

Sec 584 Final Project

...paint a picture of the timeline that brought Bernie Madoff to his ultimate demise. From humble beginnings to Federal prisoner in North Carolina, the story is full of interesting facts and unbelievable occurrences. Other articles bring to life the sad story of other players involved in the Ponzi scheme. While others lay out in great detail the failings of our own government to put Bernie Madoff away much sooner than he was. Finally, this paper will explore the role of digital evidence in this Ponzi scheme and the simplicity of computer hardware and software involved. Bernie Madoff: The Makings of a Ponzi Scheme Bernie Madoff has been one of the most interesting and controversial figures in all of American financial industry history. In this paper, I will take you on a journey from his early childhood to his current status as a Federal prisoner in North Carolina. I will discuss all of the major players involved in the Ponzi scheme, the SEC’s failure to catch him on numerous occasions, and the digital evidence that he did or did not leave behind during his life of crime. After examining all of the above, I hope to piece together why Bernie Madoff is Bernie Madoff. They say great things come from humble beginnings. While the entire act could be considered great in some crazy kind of way, the humble beginnings part still holds true. Bernard L. Madoff stole billions of dollars from investors, bankers, celebrities and high profile sports team owners. The entire fraud...

Words: 3522 - Pages: 15

Premium Essay

Technology

...Technology Author(s): H. Stephen Wright Source: Notes, Second Series, Vol. 56, No. 3 (Mar., 2000), pp. 591-597 Published by: Music Library Association Stable URL: http://www.jstor.org/stable/899642 Accessed: 01-10-2015 14:13 UTC Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at http://www.jstor.org/page/ info/about/policies/terms.jsp JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. Music Library Association is collaborating with JSTOR to digitize, preserve and extend access to Notes. http://www.jstor.org This content downloaded from 103.5.183.171 on Thu, 01 Oct 2015 14:13:57 UTC All use subject to JSTOR Terms and Conditions TECHNOLOGY BY H. STEPHEN WRIGHT In an astonishing 1945 article, scientist Vannevar Bush offered his vision of a marvelous machine he called the "memex."' As depicted by Bush, the memex would enable scholars to search a vast repository of scholarly information, take notes, copy information as needed, and create new scholarship-all with incredible speed. One of the most striking features of the memex is what Bush called "associative indexing," in which links can be built between items of information...

Words: 3383 - Pages: 14

Premium Essay

Microsoft

...William (Bill) H. Gates is chairman of Microsoft Corporation, the worldwide leader in software, services and solutions that help people and businesses realize their full potential. On June 27, 2008, Gates transitioned out of a day-to-day role in the company to spend more time on his global health and education work at the Bill & Melinda Gates Foundation. He shares his thoughts about the foundation and other topics on Gates Notes, a Web site launched in January 2010. Gates continues to serve as Microsoft's chairman and as an advisor on key development projects. In June 2006, Craig Mundie assumed the new title of chief research and strategy officer at Microsoft and is responsible for the company's research and incubation efforts. 1. Bill Gates’ early life 1.1 Family Born on Oct. 28, 1955, Gates grew up in Seattle with his two sisters. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schoolteacher, University of Washington regent, and chairwoman of United Way International. 1.2 Education Gates attended public elementary school and the private Lakeside School. There, he discovered his interest in software and began programming computers at age 13. In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, now Microsoft's chief executive officer. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer - the MITS Altair. 1.3 Personal...

Words: 7316 - Pages: 30

Free Essay

Right to Information Act

...Introduction Freedom of thought, conscience and speech is recognized in the Constitution of the People’s Republic of Bangladesh as one of the fundamental rights and right to information is an inalienable part of freedom of thought, conscience and speech; and whereas all powers of the Republic belong to the people, and it is necessary to ensure right to information for the empowerment of the people; and Whereas if the right to information of the people is ensured, the transparency and accountability of all public, autonomous and statutory organizations and of other private institutions constituted or run by government or foreign financing shall increase, corruption of the same shall decrease and good governance of the same shall be established. Right to Information Act In today’s world, freedom of information is the pre-requisite of sustainable development due to its driving power. Free flow of information and its consumption boosts a country’s progress and prosperity. Effectiveness of democracy and security of human rights vastly depends on freedom of expression and information, in other word, freedom of the press. Understanding the essence many countries- from developed to developing- now open the shutters and nod the people’s right to the access of information resources. In recent years, a number of nations enacted the freedom of information law including neighboring India in 2005, Pakistan in 2002, and Nepal in 2007. After the restoration of democracy in 1990,...

Words: 3631 - Pages: 15

Premium Essay

Residential Segregation of African Americans in 20th Century America

...In Twenty-First Century, modern America one can trace the effects of various actions and decisions of past government leaders and ordinary citizens in the shaping of the America we see today. Throughout human society, the conflicts, issues, and divisions among peoples, which one observes at any point in time, are not matters of chance, but are products of history, and forces of human undertaking. Today, American society is faced with a residential, geographic phenomenon among urban and suburban communities that disadvantages African American citizens through the discriminatory denial of residential and economic freedom, a Constitutional promise that is guaranteed to all Americans. Modern America is confronted with a socially and geographically segregated society structured on the hierarchies of race, having the greatest consequences for African American communities, the most segregated racial group in American society. The Great Migration of the early twentieth century was a symbolic beacon of hope for African Americans leaving their homes in the rural South to a new land of promise in the urban North. While this migration created vast amounts of opportunity for African Americans that could have not existed in the Jim Crow-era South, the movements of these people would carry the racial divisions and hostilities of society to the level of a national plight. Northern whites implemented various practices in order to manipulate urban housing markets in the effect of restricting...

Words: 6457 - Pages: 26

Free Essay

Patent Law Outline

...Table of Contents General IP Policy/theory 1 Trademarks 2 Foreign Treaties 4 Types of Marks 4 Infringement (Polaroid Test) 9 Defenses 10 Internet/UDRP 12 Dilution 13 Remedies 14 Copyrights 16 Derivative Works 19 Moral Rights 21 Renewal/Termination 23 Infringement (tests) 24 Fair Use/Defenses 15 DMCA 27 Remedies 29 Publicity/Misappropriation 32 Patents 34 Patent Prosecution 36 Utlity/Novelty /Non-Obvious 38 Priority 39 Statutory Bars 40 Infringement 41 Defenses 43 Remedies 44 Trade Secrets 46 IP In General I. Origins a. Patents began in Venice b. Copyright began in England - Publisher competition c. Trademarks - Guild System would mark the bottom of product so that people would know from whom they were purchasing II. Federal Authority a. Copyright/Patent Authority Article I Sec.1 cl. 8 i. “Progress of science and useful arts” 1. Science is copyright, and useful arts is patents 2. In the days of the Constitution means “knowledge.” ii. Utilitarian clause – not based on the moral rights iii. Most protection is pretty much on federal level. iv. Certain States with particular businesses adopted their own laws, which Congress eventually incorporated...

Words: 34600 - Pages: 139

Premium Essay

Miss

...The ChildTrauma Academy www.ChildTrauma.org EFFECTS OF TRAUMATIC EVENTS ON CHILDREN AN INTRODUCTION Traumatic Event Prolonged Alarm Reaction Altered Neural Systems BD Perry MD, PhD Bruce D. Perry, MD, Ph.D. This booklet is one in a series developed by the ChildTrauma Academy to assist parents, caregivers, teachers and various professionals working with maltreated and traumatized children. All Rights Reserved © 2003 Bruce D. Perry Effects of Trauma on Children: Perry 2 Introduction Each year in the United States approximately five million children experience some form of traumatic experience. More than two million of these are victims of physical and/or sexual abuse. Millions more are living in the terrorizing atmosphere of domestic violence. Natural disasters, car accidents, life-threatening medical conditions, painful procedures, exposure to community violence – all can have traumatic impact on the child. By the time a child reaches the age of eighteen, the probability that any child will have been touched directly by interpersonal or community violence is approximately one in four. Traumatic experiences can have a devastating impact on the child, altering their physical, emotional, cognitive and social development. In turn, the impact on the child has profound implications for their family, community and, ultimately, us all. Traumatic events in childhood increase risk for a host of social (e.g., teenage pregnancy, adolescent...

Words: 7654 - Pages: 31

Free Essay

Cyber Crime in Bangladesh

...Chapter 1 INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become...

Words: 14728 - Pages: 59

Premium Essay

Acer America

...Fourth Edition, last update November 01, 2007 2 Lessons In Electric Circuits, Volume IV – Digital By Tony R. Kuphaldt Fourth Edition, last update November 01, 2007 i c 2000-2010, Tony R. Kuphaldt This book is published under the terms and conditions of the Design Science License. These terms and conditions allow for free copying, distribution, and/or modification of this document by the general public. The full Design Science License text is included in the last chapter. As an open and collaboratively developed text, this book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Design Science License for more details. Available in its entirety as part of the Open Book Project collection at: www.ibiblio.org/obp/electricCircuits PRINTING HISTORY • First Edition: Printed in June of 2000. Plain-ASCII illustrations for universal computer readability. • Second Edition: Printed in September of 2000. Illustrations reworked in standard graphic (eps and jpeg) format. Source files translated to Texinfo format for easy online and printed publication. • Third Edition: Printed in February 2001. Source files translated to SubML format. SubML is a simple markup language designed to easily convert to other markups like A LTEX, HTML, or DocBook using nothing but search-and-replace substitutions. • Fourth Edition: Printed in March 2002. Additions...

Words: 29763 - Pages: 120

Premium Essay

Cyber Crime

...Project on Cybercrime www.coe.int/cybercrime Strasbourg, 15 January 2010 Draft Discussion paper Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from “Cloud Computing Providers” Prepared by Joseph J. Schwerha IV TraceEvidence, LLC Project funded by Romania, Monaco, Estonia, Microsoft, McAfee and the Council of Europe Council of Europe – Project on Cybercrime For further information please contact: Economic Crime Division Directorate General of Human Rights and Legal Affairs Council of Europe Strasbourg, France Tel: Fax: +33-3-9021-4506 +33-3-9021-5650 Disclaimer This technical report does not necessarily reflect official positions of the Council of Europe or of the donors funding this project or of the parties to the instruments referred to Email: alexander.seger@coe.int www.coe.int/cybercrime 2 Council of Europe – Project on Cybercrime Contents 1 2 3 4 Introduction ___________________________________________________ 4 Council of Europe Convention on Cybercrime Overview __________________ 5 What are Cloud Computing Providers? _______________________________ 6 The United States Perspective _____________________________________ 8 5 What are the challenges in the transnational acquisition of evidence from Cloud Computing Providers?_______________________________________________ 9 5.1 5.2 5.3 5.4 5.5 It can be impossible to know where the data resides ________________________________ 9 What Law Applies When...

Words: 10207 - Pages: 41

Free Essay

Od Glossary

...360 Degree Feedback         An evaluation method that provides each employee the opportunity to receive performance feedback from his or her supervisor and four to eight peers, reporting staff members, co-workers and customers.   ABE - Adult Basic Education         Adult Basic Education   Accreditation         Certification by a duly recognized body of the facilities, capability, objectivity, competence, and integrity of an agency, service or operational group or individual to provide the specific service(s) or operation(s) needed. Recognition given to a person or organization meeting certain standards.   Achievement         Performance as determined by some type of assessment or testing.   Action Plan         A specific method or process to achieve the results called for by one or more objectives. May be a simpler version of a project plan.   Action planning and processes         Deciding who is going to do what, by when and in what order for the organization to reach its strategic goals. The design and implementation of action planning depends on the nature and needs of the organization. An action plan includes a schedule with deadlines for significant actions.   Action Projects         A specific planned process and steps for completing one or more strategic goals and objectives, including ownership of the project. The Action Projects are the annual goals and challenges currently being addressed by San Juan College.   Active listening         A way of listening that...

Words: 9791 - Pages: 40

Premium Essay

Can Wikileaks Be Found Guilty of a Crime for Its Release of the Iraq War Materials?

...Can WikiLeaks be Found Guilty of a Crime for Its Release Of the Iraq War Materials, Afghanistan War Materials and Diplomatic Cables? In 2010, WikiLeaks released three large groups of information – classified documents concerning the Iraqi war, classified Pentagon documents concerning the conflict in Afghanistan, and U.S. State Department diplomatic cables. There was an outcry from members in the U.S. government, U.S. lawmakers, and U.S. citizens as they questioned how WikiLeaks could have legally obtained and released this information. There were also those who applauded WikiLeaks and saw them as part of the new media, simply carrying on the struggle between the people’s right to know versus national security. In this new Internet age, where data can be immediately published to an enormous audience from anywhere in the world with the simple push of a button, and where wars are no longer declared on a country but on generalized “terror,” is a site like WikiLeaks protected? WikiLeaks Background WikiLeaks states on its website: WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for revealing of supposed and censored injustices. WikiLeaks...

Words: 5807 - Pages: 24

Premium Essay

Biometric

...http://link.springer.com/chapter/10.1007/978-3-642-01793-3_20 Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. https://www.eff.org/wp/biometrics-whos-watching-you September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a...

Words: 7685 - Pages: 31