SlideShare a Scribd company logo
1 of 12
Running Head: CRITICAL ANALYSIS
1
CRITICAL ANALYSIS PAPER
7
Critical Analysis Paper #2
Professor McMahon
Waffa Elsayed
HBSE
03-25-2019
Introduction
In this paper, I will argue that “Intimate Partner” is used to
represent any inclusive romantic or sexual relationship between
two non-biologically-related people. Ideally, these kinds of
relationships show lots of love and support for each other.
Unfortunately, some people do not act like the ideal condition
and abuse their partners cause considerable emotional or
physical pain and injury (Belknap, Chu, & Deprince, 2012).
Sometimes abusing behavior brings violence and makes the
worse situation ever. Different type of abuses such as emotional
abuse, economic abuse, social isolation, physical abuses takes
place in case of creating intimate partner violence. Sometimes
some people start to stalk their partners with generating a
different motive such as anger, hostility, paranoia, and delusion
towards their partners (Belknap, Chu, & Deprince, 2012). One
partner verbally threats his/her partner through using emails,
text messaging, and social network Internet sites. In 2012, 4th
February, a 21-year-old California boyfriend had bound legs of
his girlfriend with tape and threatened her with pointing a gun
towards her and beaten her, and kept her for nine days. This
situation occurred as the girl received a text message from
another man on her cellphone (Belknap, Chu, & Deprince,
2012). It is clear that technology can lead to intimate partner
abuse. In this paper, I will argue that technology in terms of
electronic devices can be used as the trigger for more intimate
partner violent abuse. Comment by Sarah McMahon: I would
suggest having someone review your writing to help improve
your ability to convey your ideas. Comment by Sarah
McMahon: I am wondering what this means- different from
what? From IPV? It seems to me that it is a similar motive so I
am unclear. Comment by Sarah McMahon: The purpose of
this assignment is: “Develop an argument that compares these
types of violence in a specific way(s), such as the root causes,
the impact on victims, society's perception of the crime, or our
response to the crime. How are they similar or different?” I am
not sure your thesis answers that question?
Causes and Impact of Intimate Partner Violence and Stalking
and Electronic Abuse
These days, out of ten women, one lady murdered or badly
injured by her intimate partner. Life threatening matters are the
most common factor which can create physical violence among
intimate partners. Comment by Sarah McMahon: This is not a
full sentence. I would suggest having someone proofread your
paper as I suggested last time. Comment by Sarah McMahon: I
am unclear on what this means. What are the life-threatening
matters and what is the most common factor that causes
physical violence? If you are talking about the causes of IPV it
seems that you would be discussing things relating back to the
theories and that it is power, control, witnessing violence in
their parents, etc?
Early parenthood also is the reason for intimate partner
violence. The women, who are twenty-one year aged, were
normally made victims of intimate partner violence for twice
because, at that particular age, women were not supposed to be
a mother (Renna et al., 2018). On the other hand, twenty-one-
year men, who have children, were normally abused for more
than three times. Comment by Sarah McMahon: This is very
confusing. How is early parenthood a reason for intimate
partner violence? What women are 21 and normally made
victims? If you are discussing an article, you need to say
something like, “In the article by Renna et al., 2018, the authors
found that in a study of X number of women, X experienced
abuse” or something like that.
Though against the women, alcohol is not the reason for
violence, but in a relationship, alcohol can create violence
between the intimate partners. There are many examples are
available where males consume alcohol and make violence on
their intimate female partner (Renna et al., 2018). Heavy
drinking increases the risks for deadly and violent victimization
of females in intimate partner relationships. Comment by
Sarah McMahon: What is against the women?
Severe poverty can be a reason for intimate partner violence. Its
related stressors grow the probabilities of intimate partner
violence risk. When one partner finds a reduction of benefits
from the property, violence may happens between the intimate
partners (Renna et al., 2018). Comment by Sarah McMahon: I
would not say poverty is a reason for intimate partner violence.
It can certainly increase stress which can make situations worse.
Unemployment is another reason for intimate partner violence.
While a person is suffering from the issue of unemployment or
has the reduced stability of employment, violence has occurred
between the intimate partners. Comment by Sarah McMahon:
Again not a reason, but more of a factor that can contribute,
same as alcohol and poverty
Emotional and mental depression can create violence between
intimate partners. Approximately, half of the ladies are the
victims of serious domestic violence and they meet the criteria
of extreme depression. In the world, near about twenty-five
percent are suffering from a posttraumatic stress disorder and
thirty-two percent are from anxiety (Renna et al., 2018).
Comment by Sarah McMahon: Up to this point, it seems
like you were reviewing the causes and factors related to IPV.
The purpose of the paper is to compare different types of
violence. So I would expect in the next section that you would
be looking at the causes of another type of violence that you
mentioned- stalking or electronic abuse.
Recently, Technology such as Electronic devices is using as the
trigger for more intimate partner violent abuse. By calling or
messaging intimate partners creates violence. With technology,
partners can be affected by emotional abuse name calling,
insulting, blaming, stalking etc. As an impact, a partner can be
affected mentally, physically, financially, and social life.
In the article, named A Same-Sex Domestic Violence Epidemic
Is Silent, is an example typical framing of partner abuse as a
heterosexual issue. Here, two men Chris and José show an
intimate homosexual relationship. They had two months of the
relationship, But for a particular reason they made violence.
Here Chris was the victim of the violence and he was affected
for years. Their relationship was continued for nine months and
after that, it ended (Shwayder, 2013). Comment by Sarah
McMahon: I am not clear on what this means or how it is
related to your argument
Supporting Evidence
“Hundreds of Apps Can Empower Stalkers to Track Their
Victims” shows digital tools can gather cellphone data for
tracking any phone. So people are using this option with abuses
the technology to track their partners without consent
(Valentino-DeVries, 2018). This article also reveals that there
are more than 200 applications and services exists which allow
people to be stalkers with several facilities such as basic
location tracking, secretly recording videos etc. the New York
time reported that approx. twenty-four services were promoted
as observation tools for spying on intimidate partners
(Valentino-DeVries, 2018). Last year two surveillance
companies reveal that more than 100,000 users are registered on
their sites. In this year, the tracking application company told
The New York Times that they sold subscriptions to more than
27,000 users in the United States. The Centers for Disease
Control and Prevention reported that 27% of women and 11%
men in the United States became victims of stalking or sexual or
physical violence by their intimate partners (Valentino-DeVries,
2018). Comment by Sarah McMahon: You present interesting
information in this paragraph but how does it relate to your
paper and overall argument? This is not explained.
As this article explains, “What the Law Can (and Can't) Do
About Online Harassment” reveals about Jennifer Lawrence’s
live experience. Her partner always wanted to establish sexual
contact online. The U.S. Department of Justice statistics
reported that almost 850,000 American adults basically women
were targeted of cyber-stalking last year. It also reported that
approx. 40% of women were victims of dating violence
delivered electronically (Sweeney, 2014). Comment by
Sarah McMahon: Again, interesting example but how does it
relate to your paper? What are you comparing?Society’s
Perception of the Crime
Intimate partner violence is broadly perceived dilemma in
today’s society. It is also considered as the most complicated
issues to appropriately identify and prevent. There are many
studies that indicate there have high risks in intimate partner
violence against women in the male dominating society
(Sweeney, 2014). These days the society believes in inequality
between men and women and the rigid gender play the lead role
to approval and agreement of intimate partner violence. In
nations, where females are financially subordinate, the
difficulty of overcoming the IPV violence (Sweeney, 2014).
Comment by Sarah McMahon: I am confused as to the
purpose of this paragraph and how it relates to your paper. It
does also not seem to be about society’s perception.Conclusion
This critical analysis paper emphasizes the existing research on
electronic devices and services of intimate partner stalking.
Several articles are encountered which recognize the multitude
of techniques that phones and computers can be used to abuse
and keep women from access to formal and informal support
systems and safety. All data and facts concluded that phones or
computers act as a trigger in influencing more intimate partner
violent abuse. Further research will directly ask the male and
female victims about their abusive relationships. This research
also encountered about how systems of technology have been
used to abuse them could enable more evidence-based training
for a victim. The reviewed research paper revealed a lack of
awareness regarding stalking and harassed by their partners.
The research focused on electronic applications and services
with having different technology to aware male and female in
order to get safe lives. The implications of the analysis for the
social work, it identifies the implications of the citizenship and
neo-liberal perspectives. But it does conclude that imperatives
of budgetary reduction are limiting the opportunities for social
workers to practice within the context of personalization.
Comment by Sarah McMahon: I am sorry but I do not
understand what this means.
Reference
Belknap, J., Chu, A. T., & Deprince, A. P. (2012). The Roles of
Phones and Computers in Threatening and Abusing Women
Victims of Male Intimate Partner Abuse. DUKE JOURNAL OF
GENDER LAW & POLICY, 19(373).
Renna, M. E., O'toole, M. S., Spaeth, P. E., Lekander, M., &
Mennin, D. S. (2018). The association between anxiety,
traumatic stress, and obsessive–compulsive disorders and
chronic inflammation: A systematic review and meta‐analysis.
Depression and anxiety, 35(11), 1081-1094.
Shwayder, M., (2013). A Same-Sex Domestic Violence
Epidemic Is Silent. Retrieved
from:https://www.theatlantic.com/health/archive/2013/11/a-
same-sex-domestic-violence-epidemic-is-silent/281131/
Sweeney, M. S. (2014, NOV 12). What the Law Can (and Can't)
Do About Online Harassment. Retrieved on 16th March, 2019
from
https://www.theatlantic.com/technology/archive/2014/11/what-
the-law-can-and-cant-do-about-online-harassment/382638/
Valentino-DeVries, J. (2018, May 18). Hundreds of Apps Can
Empower Stalkers to Track Their Victims. The New York
Times. Retrieved on 16th March, 2019 from
https://www.nytimes.com/2018/05/19/technology/phone-apps-
stalking.html
Waffa, you raised some interesting points about technological
abuse but the paper was again, very difficult to follow. When
we spoke last time, I emphasized the importance of having
someone else read and proof your paper and make sure that it
makes sense but it does not seem that was done here. As a
result, it was very challenging to read and try to understand
your argument. The assignment was to compare different types
of abuse, but I did not see an analysis comparing anything. It
seemed that you provide some information about IPV, then
some information about electronic abuse, but it was not really
connected nor analyzed.
Criteria
Possible points
Earned Points
Clear thesis statement
5
4
Clarity and strength of argument
30
20
Substantiated points with the research articles that are
integrated into paper
25
23
Critical analysis of issues
30
23
Discussion of implications for social work
5
3
Spelling, grammar, and citations
5
3
Total
100
76
1.
The Total U.S. beer market was estimated to be around $106
billion. The total economic impact of the beer market is
estimated to be 2.0 percent of the total US GDP. Barrels
produced in the U.S. is relatively constant for the past five
years. Globally, growth was expected in developing countries
and it seems to be fueled by the introduction of different styles
of beer. Exported beer to both developed and developing
regions was expected to help drive future growth. The case
states that there were over 3000 US-based brewers in 2014 and
over 4000 in 2015 U.S.
The global market was segmented by producer and brand, with
the larger, global producers owning a portfolio of brands within
their operations. Acquisition of smaller, microbreweries was
becoming more common as larger global producers looked to
maintain market share as smaller craft brands competed against
the larger, global brands.
2.
Competition in the craft beer industry could be considered
global, due to both the product portfolio of the largest
producers and the acquisitions to bring more of the craft brands
under these companies. However, there were hundreds of
regional local breweries that did not compete internationally,
yet faced significant competition from the brands of these
global producers.
The one of the strongest competitive force is the bargaining
power and leverage of buyers. Due to the regulatory
environment, the need to sell to distributors is a significant
competitive force faced by craft breweries. Larger producers
have potentially better negotiating power with distributors, in
compare to the small producers. In my opinion another strong
competitive force is the rivalry among competing sellers of craft
beer since there were many producers. Competition among
major brands centered primarily on brand image and
advertising, price, as well as distribution and tap and shelf
space. Competitive pressure was also driven by the increasing
number of local breweries, each attempting to occupy the local
craft brand for the geographic location. Moreover, this
competitive force may have the greatest effect on industry
attractiveness and the potential profitability of new entrants.
In my opinion the weakest competitive force is the competition
from substitutes. There may be many substitutes to craft beer,
including any other alcoholic beverage, however, in my opinion
consumers of craft beer drink are focused and dedicated ones. I
analyze craft beer market as a niche market.
3.
My strategic group map would place local distribution for nano
and micro breweries and occupy a better price and quality
position. Global producers can have an advantage because of the
Global distribution and moderate pricing position. In my
opinion, Craft Brewing Alliance and Boston Beer Company will
have best positions because they possess a suitable combination
of high-quality products and large market share, and
MillerCoors and AB InBev will have worst positions because
the companies have been experiencing the decrease in their
annual profits.
4.
Factors that are necessary for competitive success for a start-up
craft brewery are; brand image, use of social media for
marketing exposure, distributors access, sufficient sales volume.
The craft beer brand image is an imperative for market
differentiation among consumers, as well as maintaining the
higher price in the market. Consumer who cannot see a
difference between brands are not necessarily willing to pay a
higher price.
Another important factor is usage of social media. To keep costs
low, free or relatively-free marketing through social media is a
necessary tactic. Marketing on social media became an
important marketing tool in a nowadays technological world.
Start-up or small craft breweries may be at a disadvantage with
distributors. Distribution represents the key factor as small and
large producers compete for shelf and tap space. Especially at
the local level, there is insufficient space to accommodate the
current producers, as well as the anticipated entry of future
breweries.
Last, but not the least important factor is to maintain the sales
volume in order to achieve the scale economies in marketing
expenditures successful craft breweries were required to have
sufficient sales volume to keep marketing expenses at an
acceptable cost per unit basis.
5.
The threat of the new companies and the power of the suppliers
seem to be the strategic issue for craft brewers in 2017. The
threat of new entering company is can have a severe impact on
the willingness to expand the product line in the pressure that
the new company will produce the substitute product. The
shortage of suppliers has given the power in the negotiation
process for the essential items required in the production.
In the beer industry, although there are many types of buyers it
is most important to understand the preferences and buying
behavior of the beer drinkers. Their purchase decisions are
driven by price, taste, convenient access, and marketing. This is
the strategic issue that craft breweries are facing in 2017.
The key strategy factor includes a strong network of wholesale
distributors - to get the company’s brand stocked and favorably
displayed in retail outlets, bars, restaurants, and stadiums,
where beer is sold) and clever advertising (to induce beer
drinkers to buy the company’s brand and thereby pull beer sales
through the established wholesale and retail channels). Because
there is a potential for strong buyer power on the part of large
distributors and retail chains, competitive success depends on
some mechanism to offset that power, of which advertising is
one.
6.
The primary goal in any brewery is to focus on making high-
quality beer. Quality beer is a critical factor of success. Focus
on consistency. The consumer may find risk associated with
your beer if the experience is not the same every time.
Make sure you plan ahead, keep up with demands and don’t run
out of beer. Gaining consumer loyalty can be a long process, but
it only takes one bad experience or one missed opportunity to
destroy that trust. If your loyal consumers are not able to get
their favorite beer, they will accept a substitute which results in
your loss and another’s gain.
Manage your brewery’s growth effectively. As craft breweries
grow it becomes harder to produce consistent, quality,
differentiated beer that satisfies demand. Managing growth and
the complexities that accompany it can ensure consumer
retention and help your brewery remain competitive.
Running Head CRITICAL ANALYSIS                      1 C.docx

More Related Content

More from todd271

Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docxtodd271
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxtodd271
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxtodd271
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxtodd271
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxtodd271
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxtodd271
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxtodd271
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docxtodd271
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docxtodd271
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxtodd271
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxtodd271
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docxtodd271
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxtodd271
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxtodd271
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxtodd271
 
Running head COMPANY NAME .docx
Running head COMPANY NAME                                      .docxRunning head COMPANY NAME                                      .docx
Running head COMPANY NAME .docxtodd271
 
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxRunning head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxtodd271
 

More from todd271 (20)

Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docx
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docx
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docx
 
Running head COMPANY NAME .docx
Running head COMPANY NAME                                      .docxRunning head COMPANY NAME                                      .docx
Running head COMPANY NAME .docx
 
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxRunning head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Running Head CRITICAL ANALYSIS 1 C.docx

  • 1. Running Head: CRITICAL ANALYSIS 1 CRITICAL ANALYSIS PAPER 7 Critical Analysis Paper #2 Professor McMahon Waffa Elsayed HBSE 03-25-2019 Introduction In this paper, I will argue that “Intimate Partner” is used to represent any inclusive romantic or sexual relationship between two non-biologically-related people. Ideally, these kinds of relationships show lots of love and support for each other. Unfortunately, some people do not act like the ideal condition and abuse their partners cause considerable emotional or physical pain and injury (Belknap, Chu, & Deprince, 2012). Sometimes abusing behavior brings violence and makes the worse situation ever. Different type of abuses such as emotional abuse, economic abuse, social isolation, physical abuses takes place in case of creating intimate partner violence. Sometimes some people start to stalk their partners with generating a different motive such as anger, hostility, paranoia, and delusion towards their partners (Belknap, Chu, & Deprince, 2012). One partner verbally threats his/her partner through using emails, text messaging, and social network Internet sites. In 2012, 4th February, a 21-year-old California boyfriend had bound legs of his girlfriend with tape and threatened her with pointing a gun towards her and beaten her, and kept her for nine days. This
  • 2. situation occurred as the girl received a text message from another man on her cellphone (Belknap, Chu, & Deprince, 2012). It is clear that technology can lead to intimate partner abuse. In this paper, I will argue that technology in terms of electronic devices can be used as the trigger for more intimate partner violent abuse. Comment by Sarah McMahon: I would suggest having someone review your writing to help improve your ability to convey your ideas. Comment by Sarah McMahon: I am wondering what this means- different from what? From IPV? It seems to me that it is a similar motive so I am unclear. Comment by Sarah McMahon: The purpose of this assignment is: “Develop an argument that compares these types of violence in a specific way(s), such as the root causes, the impact on victims, society's perception of the crime, or our response to the crime. How are they similar or different?” I am not sure your thesis answers that question? Causes and Impact of Intimate Partner Violence and Stalking and Electronic Abuse These days, out of ten women, one lady murdered or badly injured by her intimate partner. Life threatening matters are the most common factor which can create physical violence among intimate partners. Comment by Sarah McMahon: This is not a full sentence. I would suggest having someone proofread your paper as I suggested last time. Comment by Sarah McMahon: I am unclear on what this means. What are the life-threatening matters and what is the most common factor that causes physical violence? If you are talking about the causes of IPV it seems that you would be discussing things relating back to the theories and that it is power, control, witnessing violence in their parents, etc? Early parenthood also is the reason for intimate partner violence. The women, who are twenty-one year aged, were normally made victims of intimate partner violence for twice because, at that particular age, women were not supposed to be
  • 3. a mother (Renna et al., 2018). On the other hand, twenty-one- year men, who have children, were normally abused for more than three times. Comment by Sarah McMahon: This is very confusing. How is early parenthood a reason for intimate partner violence? What women are 21 and normally made victims? If you are discussing an article, you need to say something like, “In the article by Renna et al., 2018, the authors found that in a study of X number of women, X experienced abuse” or something like that. Though against the women, alcohol is not the reason for violence, but in a relationship, alcohol can create violence between the intimate partners. There are many examples are available where males consume alcohol and make violence on their intimate female partner (Renna et al., 2018). Heavy drinking increases the risks for deadly and violent victimization of females in intimate partner relationships. Comment by Sarah McMahon: What is against the women? Severe poverty can be a reason for intimate partner violence. Its related stressors grow the probabilities of intimate partner violence risk. When one partner finds a reduction of benefits from the property, violence may happens between the intimate partners (Renna et al., 2018). Comment by Sarah McMahon: I would not say poverty is a reason for intimate partner violence. It can certainly increase stress which can make situations worse. Unemployment is another reason for intimate partner violence. While a person is suffering from the issue of unemployment or has the reduced stability of employment, violence has occurred between the intimate partners. Comment by Sarah McMahon: Again not a reason, but more of a factor that can contribute, same as alcohol and poverty Emotional and mental depression can create violence between intimate partners. Approximately, half of the ladies are the victims of serious domestic violence and they meet the criteria of extreme depression. In the world, near about twenty-five percent are suffering from a posttraumatic stress disorder and thirty-two percent are from anxiety (Renna et al., 2018).
  • 4. Comment by Sarah McMahon: Up to this point, it seems like you were reviewing the causes and factors related to IPV. The purpose of the paper is to compare different types of violence. So I would expect in the next section that you would be looking at the causes of another type of violence that you mentioned- stalking or electronic abuse. Recently, Technology such as Electronic devices is using as the trigger for more intimate partner violent abuse. By calling or messaging intimate partners creates violence. With technology, partners can be affected by emotional abuse name calling, insulting, blaming, stalking etc. As an impact, a partner can be affected mentally, physically, financially, and social life. In the article, named A Same-Sex Domestic Violence Epidemic Is Silent, is an example typical framing of partner abuse as a heterosexual issue. Here, two men Chris and José show an intimate homosexual relationship. They had two months of the relationship, But for a particular reason they made violence. Here Chris was the victim of the violence and he was affected for years. Their relationship was continued for nine months and after that, it ended (Shwayder, 2013). Comment by Sarah McMahon: I am not clear on what this means or how it is related to your argument Supporting Evidence “Hundreds of Apps Can Empower Stalkers to Track Their Victims” shows digital tools can gather cellphone data for tracking any phone. So people are using this option with abuses the technology to track their partners without consent (Valentino-DeVries, 2018). This article also reveals that there are more than 200 applications and services exists which allow people to be stalkers with several facilities such as basic location tracking, secretly recording videos etc. the New York time reported that approx. twenty-four services were promoted as observation tools for spying on intimidate partners (Valentino-DeVries, 2018). Last year two surveillance companies reveal that more than 100,000 users are registered on their sites. In this year, the tracking application company told
  • 5. The New York Times that they sold subscriptions to more than 27,000 users in the United States. The Centers for Disease Control and Prevention reported that 27% of women and 11% men in the United States became victims of stalking or sexual or physical violence by their intimate partners (Valentino-DeVries, 2018). Comment by Sarah McMahon: You present interesting information in this paragraph but how does it relate to your paper and overall argument? This is not explained. As this article explains, “What the Law Can (and Can't) Do About Online Harassment” reveals about Jennifer Lawrence’s live experience. Her partner always wanted to establish sexual contact online. The U.S. Department of Justice statistics reported that almost 850,000 American adults basically women were targeted of cyber-stalking last year. It also reported that approx. 40% of women were victims of dating violence delivered electronically (Sweeney, 2014). Comment by Sarah McMahon: Again, interesting example but how does it relate to your paper? What are you comparing?Society’s Perception of the Crime Intimate partner violence is broadly perceived dilemma in today’s society. It is also considered as the most complicated issues to appropriately identify and prevent. There are many studies that indicate there have high risks in intimate partner violence against women in the male dominating society (Sweeney, 2014). These days the society believes in inequality between men and women and the rigid gender play the lead role to approval and agreement of intimate partner violence. In nations, where females are financially subordinate, the difficulty of overcoming the IPV violence (Sweeney, 2014). Comment by Sarah McMahon: I am confused as to the purpose of this paragraph and how it relates to your paper. It does also not seem to be about society’s perception.Conclusion This critical analysis paper emphasizes the existing research on electronic devices and services of intimate partner stalking. Several articles are encountered which recognize the multitude of techniques that phones and computers can be used to abuse
  • 6. and keep women from access to formal and informal support systems and safety. All data and facts concluded that phones or computers act as a trigger in influencing more intimate partner violent abuse. Further research will directly ask the male and female victims about their abusive relationships. This research also encountered about how systems of technology have been used to abuse them could enable more evidence-based training for a victim. The reviewed research paper revealed a lack of awareness regarding stalking and harassed by their partners. The research focused on electronic applications and services with having different technology to aware male and female in order to get safe lives. The implications of the analysis for the social work, it identifies the implications of the citizenship and neo-liberal perspectives. But it does conclude that imperatives of budgetary reduction are limiting the opportunities for social workers to practice within the context of personalization. Comment by Sarah McMahon: I am sorry but I do not understand what this means. Reference Belknap, J., Chu, A. T., & Deprince, A. P. (2012). The Roles of Phones and Computers in Threatening and Abusing Women Victims of Male Intimate Partner Abuse. DUKE JOURNAL OF GENDER LAW & POLICY, 19(373). Renna, M. E., O'toole, M. S., Spaeth, P. E., Lekander, M., & Mennin, D. S. (2018). The association between anxiety, traumatic stress, and obsessive–compulsive disorders and chronic inflammation: A systematic review and meta‐analysis. Depression and anxiety, 35(11), 1081-1094. Shwayder, M., (2013). A Same-Sex Domestic Violence Epidemic Is Silent. Retrieved from:https://www.theatlantic.com/health/archive/2013/11/a- same-sex-domestic-violence-epidemic-is-silent/281131/ Sweeney, M. S. (2014, NOV 12). What the Law Can (and Can't) Do About Online Harassment. Retrieved on 16th March, 2019 from
  • 7. https://www.theatlantic.com/technology/archive/2014/11/what- the-law-can-and-cant-do-about-online-harassment/382638/ Valentino-DeVries, J. (2018, May 18). Hundreds of Apps Can Empower Stalkers to Track Their Victims. The New York Times. Retrieved on 16th March, 2019 from https://www.nytimes.com/2018/05/19/technology/phone-apps- stalking.html Waffa, you raised some interesting points about technological abuse but the paper was again, very difficult to follow. When we spoke last time, I emphasized the importance of having someone else read and proof your paper and make sure that it makes sense but it does not seem that was done here. As a result, it was very challenging to read and try to understand your argument. The assignment was to compare different types of abuse, but I did not see an analysis comparing anything. It seemed that you provide some information about IPV, then some information about electronic abuse, but it was not really connected nor analyzed. Criteria Possible points Earned Points Clear thesis statement 5 4 Clarity and strength of argument 30 20 Substantiated points with the research articles that are integrated into paper 25 23 Critical analysis of issues 30 23 Discussion of implications for social work 5
  • 8. 3 Spelling, grammar, and citations 5 3 Total 100 76 1. The Total U.S. beer market was estimated to be around $106 billion. The total economic impact of the beer market is estimated to be 2.0 percent of the total US GDP. Barrels produced in the U.S. is relatively constant for the past five years. Globally, growth was expected in developing countries and it seems to be fueled by the introduction of different styles of beer. Exported beer to both developed and developing regions was expected to help drive future growth. The case states that there were over 3000 US-based brewers in 2014 and over 4000 in 2015 U.S. The global market was segmented by producer and brand, with the larger, global producers owning a portfolio of brands within their operations. Acquisition of smaller, microbreweries was becoming more common as larger global producers looked to maintain market share as smaller craft brands competed against the larger, global brands. 2. Competition in the craft beer industry could be considered global, due to both the product portfolio of the largest producers and the acquisitions to bring more of the craft brands under these companies. However, there were hundreds of regional local breweries that did not compete internationally, yet faced significant competition from the brands of these global producers.
  • 9. The one of the strongest competitive force is the bargaining power and leverage of buyers. Due to the regulatory environment, the need to sell to distributors is a significant competitive force faced by craft breweries. Larger producers have potentially better negotiating power with distributors, in compare to the small producers. In my opinion another strong competitive force is the rivalry among competing sellers of craft beer since there were many producers. Competition among major brands centered primarily on brand image and advertising, price, as well as distribution and tap and shelf space. Competitive pressure was also driven by the increasing number of local breweries, each attempting to occupy the local craft brand for the geographic location. Moreover, this competitive force may have the greatest effect on industry attractiveness and the potential profitability of new entrants. In my opinion the weakest competitive force is the competition from substitutes. There may be many substitutes to craft beer, including any other alcoholic beverage, however, in my opinion consumers of craft beer drink are focused and dedicated ones. I analyze craft beer market as a niche market. 3. My strategic group map would place local distribution for nano and micro breweries and occupy a better price and quality position. Global producers can have an advantage because of the Global distribution and moderate pricing position. In my opinion, Craft Brewing Alliance and Boston Beer Company will have best positions because they possess a suitable combination of high-quality products and large market share, and MillerCoors and AB InBev will have worst positions because the companies have been experiencing the decrease in their annual profits. 4. Factors that are necessary for competitive success for a start-up
  • 10. craft brewery are; brand image, use of social media for marketing exposure, distributors access, sufficient sales volume. The craft beer brand image is an imperative for market differentiation among consumers, as well as maintaining the higher price in the market. Consumer who cannot see a difference between brands are not necessarily willing to pay a higher price. Another important factor is usage of social media. To keep costs low, free or relatively-free marketing through social media is a necessary tactic. Marketing on social media became an important marketing tool in a nowadays technological world. Start-up or small craft breweries may be at a disadvantage with distributors. Distribution represents the key factor as small and large producers compete for shelf and tap space. Especially at the local level, there is insufficient space to accommodate the current producers, as well as the anticipated entry of future breweries. Last, but not the least important factor is to maintain the sales volume in order to achieve the scale economies in marketing expenditures successful craft breweries were required to have sufficient sales volume to keep marketing expenses at an acceptable cost per unit basis. 5. The threat of the new companies and the power of the suppliers seem to be the strategic issue for craft brewers in 2017. The threat of new entering company is can have a severe impact on the willingness to expand the product line in the pressure that the new company will produce the substitute product. The shortage of suppliers has given the power in the negotiation process for the essential items required in the production. In the beer industry, although there are many types of buyers it is most important to understand the preferences and buying behavior of the beer drinkers. Their purchase decisions are driven by price, taste, convenient access, and marketing. This is
  • 11. the strategic issue that craft breweries are facing in 2017. The key strategy factor includes a strong network of wholesale distributors - to get the company’s brand stocked and favorably displayed in retail outlets, bars, restaurants, and stadiums, where beer is sold) and clever advertising (to induce beer drinkers to buy the company’s brand and thereby pull beer sales through the established wholesale and retail channels). Because there is a potential for strong buyer power on the part of large distributors and retail chains, competitive success depends on some mechanism to offset that power, of which advertising is one. 6. The primary goal in any brewery is to focus on making high- quality beer. Quality beer is a critical factor of success. Focus on consistency. The consumer may find risk associated with your beer if the experience is not the same every time. Make sure you plan ahead, keep up with demands and don’t run out of beer. Gaining consumer loyalty can be a long process, but it only takes one bad experience or one missed opportunity to destroy that trust. If your loyal consumers are not able to get their favorite beer, they will accept a substitute which results in your loss and another’s gain. Manage your brewery’s growth effectively. As craft breweries grow it becomes harder to produce consistent, quality, differentiated beer that satisfies demand. Managing growth and the complexities that accompany it can ensure consumer retention and help your brewery remain competitive.