Thursday, October 31, 2019

Business Law Essay Example | Topics and Well Written Essays - 250 words - 6

Business Law - Essay Example A member can be influenced by a number of factors—environment, ambitions, personal preferences, inherent traits, etc that can make it considerably difficult to keep his or her word. In this circumstance, the call for a leader cannot be undervalued. A leader ensures that all members are acquainted with the goals of the organization, of their duties and responsibilities; and that their performance is driven towards the success of the organization. The leader holds the coercive power upon whom members will tender respect and obedience to; thus instigating agreeable relationships within the organization. Similarly, an organization should sustain laws or a set of policies that all members across the board must adhere to. Laws are the embodiment of justice, a sense of equality among all ranks and status, and the regulating force that maintains order and discipline in an organization. They serve as a valid contract under which all organizational affairs are constrained. When laws are properly imposed, it may not be stimulation towards a job well done, but rationale of a favourable behaviour. Members will be discouraged to inflict harm upon another, or cause detriment to the organization for that

Tuesday, October 29, 2019

Urban poverty Essay Example | Topics and Well Written Essays - 1250 words

Urban poverty - Essay Example A detailed explanation of the reasons which resulted in formation of several neighborhoods around several cities of Britain is given by them. They have also explained on how the neighborhoods gradually turned out to be poverty ridden areas in the period 1981 to 1998. Some of their proposed solutions are detailed below. (Power & Houghton 2007) Several projects and ‘pilot’ plans were proposed by the government for the renewal of neighborhood and with their success, it has propelled several local authorities of each city to follow the same procedure. Power and Houghton (2007) suggest that the local authorities need to solve the immediate short term problems first than look at the long term problems. This is because, nationwide projects, generally tend to neglect these smaller problems but according to author’s view, they usually pose big threats to life in cities. The other common problem that is being reported by the author is the local crime incidents that happen in the cities that affect the day to day life of the residents. Any city that is clean and that follows the rules will flourish. So, the authors are of the opinion that police personnel are to envisage every doubtful street that could casus crime incidents and ensure strict adherence to rules and regulations by the residents. On the other hand, the author also warns that enforcing of rules by any kind of office personnel is a tough job and even more tough to consistently apply it. But, if applied, it would help the poor and people with low wage incomes to sustain their living. An example of such action was done in the late 1990’s in the city of Manchester. Reports suggest that it helped the city to greatly pull most of its so called waste lands back to business boundaries. The author concludes the analysis with this example to show that neighborhood management helps people t o be safer and to improve their way of living. (Power & Houghton 2007) The picture presented by

Sunday, October 27, 2019

CSR Policy At BHP Billiton

CSR Policy At BHP Billiton After thorough deliberation of the research, the analysis indicates that BHP boasts of a good CSR reputation. However the activities that feature in this report are questionable CSR practices and there is a growing gap between BHPs rhetoric and the reality of its operations. The report also evaluates why these controversial activities have not had a significant effect on BHPs corporate image. In particular, outlining BHPs use of its CSR Policy as a Public Relations (PR) tool to manage its reputation. Table of Contents Introduction BHP Billiton was formed in 2001 through the merger of the BHP (a natural resource company) and Billiton (mining company). It now operates in 25 countries, employs approximately 41,000 people and has a market value of over 250 billion (BHP Billiton, Our business n.d.). Milton Friedman describes CSR as a fundamentally subversive doctrine and states that there is one and only one social responsibility of business which is to use its resources and engage in activities designed to increase its profits so as long as it stays within the rules of the game, which is to say, engages in open and free competition without deception or fraud (Hamilton Fitzgerald 2005). While many leading companies are genuinely moving in this direction, others are simply seeking a relatively short-term improved public perception of their operations. Increasingly CSR has become a major concern in the global mining economy because of the heightened awareness of unethical business behaviour. Most recent examples of this include the devastating oil spill in 2010 by British Petroleum (BP) in the Gulf of Mexico (BP, Gulf of Mexico Restoration n.d.). Price Waterhouse Coopers identify a number of challenges BHP and many other natural resource companies face in todays environment: improving safety and reducing the environmental impact improving performance and operational effectiveness managing risk complying with regulatory reporting requirements and addressing sustainability issues. (Price Waterhouse Coopers, n.d) BHP Billiton BHP responds to community expectations with a combination of policys including a code of conduct, sustainable development policy and many others designed to set the standard of which it conducts its business. At the forefront of this approach stands BHPs CSR Policy. CSR Policy BHP define its CSR Policy as a requirement to address risks, explicitly stating it has zero tolerance for the misconduct of: child labour, forced or compulsory labour, treatment of employees, living wages, workplace health and safety, freedom of association, world heritage sites and protected areas, biofuels, corruption, bribery and extortion, compliance with laws, discrimination, indigenous rights and the environment (BHP Billiton, Corporate social responsibility requirements n.d). Communication and Advertisement BHP uses four communication channels on its website to advertise its CSR Policy: reports, which reference CSR information for stakeholders, announcements, available on its home page which are designed to provide updates on their CSR performance and activities, multimedia, the website also offers effective use of multimedia to enhance their CSR information through relevant images, interviews and other media, feedback, BHP invites stakeholders to provide feedback via their website by submitting online questions (BHP Billiton, Our business n.d.). Uniqueness of CSR Policy The level of CSR differs from each company, however after comparing BHP with Shell and British Petroleum, two of its natural resource competitors; it is clear all three competitors are trying to get value from their CSR reporting by focusing on the environmental and social concerns of their stakeholders. This includes such things as political, economic, environmental, social, legal and cultural factors. Drivers of CSR (Benn Dunphy 2007) argue that corporate social responsibility may in fact be the consequence of profitability rather than the cause. So the question stands, is BHPs CSR Policy driven by true concern for society, or is it another way to increase corporate profit? BHP argue that its decision to report on Corporate Social Responsibility is based on: consideration of the key health, safety, environment, community and socio-economic risks of our business consideration of stakeholder feedback and commentary with regards to issues of materiality a desire to continually improve reporting standards Evidence of Commitment to CSR BHP uses a number of methods to ensure it complies with its CSR Policy. This includes but is not limited to: conducting a progress assessment on its performance in relation to the UN Global Compact principle and the Global Reporting Initiative which are designed to align their operations. holding an annual Forum on Corporate Responsibility (FCR) that brings together representatives of senior management and key non-government organisations and community opinion leaders to discuss and debate social and environmental matters relevant to BHP. Investing in community projects and recording its community contributions spend against the UN Millennium Development Goals (MDG), this presents a consistent framework for measuring tangible progress. The reporting methods noted above are publically available on BHPs website, this is proof that BHP acknowledges the challenges in the nature of its operations. Assurance BHP commissioned the URS in 2006 to provide an independent review of its Sustainability Report (URS Australia, n.d). The results indicated that BHPs Sustainability Report fairly represents the health and safety, environment, community and socio-economic impacts of its operations. Rhetoric or Reality BHP Billiton has argued in theory that it abides by its strong corporate responsibility; however there is a growing gap between its rhetoric and the reality of its activities. The following cases are examples of challenges faced by BHPs operations when policy does not equate to practice: Natural Resource Industry BHPs core business is to provide natural resources, an industry which has had increased social pressures to act responsibly. It can be argued that BHPs CSR Policy was produced as a public relations tool to mitigate the negative impacts of its core business activities and also to maximise profits for its stakeholders. The real test here is does BHP act ethically when it has the opportunity to make a profit (Pratt Nikolova 2006). This was demonstrated most recently when BHP advised of its intentions to supply the Chinese energy market with an additional 10,500 tonnes of uranium annually. The Australian Conservation Foundation (ACF) warn that once the uranium enters China it will disappear from the safeguards radar, this could potentially lead to devastating outcomes such as nuclear proliferation. Clearly BHP has a greater CSR here but unfortunately the $80 million in revenue was more important than its public image or the health of the wider community. Economic Influence BHPs CSR Policy specifically prohibits the influence of government officials to support the company practices. Most recently in 2010 the Australian Federal Government proposed a super profit mining tax estimating to have made $100 billion in revenue between 2012-13 and 2020-21. However the government was subsequently influenced by three major mining companies including BHP, who explicitly opposed the tax proposal, threatening Australias investment capital (The mining company that cried poor 16 February 2011). As a result the Prime Minister slashed 30 per cent of the tax which means the Australian taxpayers will take a forecast revenue hit of $60 billion over a decade while BHP reports over $10 billion profit for the second half of 2010. Corruption, Bribery and Extortion Clarke (2007) argues that the debate concerning the true extent of the accountability and responsibility continues to the present day. BHP states that: All contract related transactions and payments, including those in connection with gifts and hospitality and other expenditures, must be accurately recorded in reasonable detail in the books and records of any supplier who works on behalf of BHP Billiton (BHP Bilton, Corporate social responsibility requirements). However in April 2010 BHP was investigated by the United States Securities and Exchange Commission after Cambodias Minister for Water Resources told the countrys National Assembly that BHP Billiton had paid US$2.5 million in unofficial payments, to the government, to secure a mining concession (An Alternative Annual Report 2010). BHP has not revealed what over payment was for but controversially the countries BHP operates in have poor records on corruptions and are desperately in need of foreign investment. Protection of the Environment BHP states that: Protection of the Environment: The supplier must operate in a manner that is protective of the environment and comply with all applicable environmental laws, regulations and standards, environmental permitting and re porting (BHP Bilton, Corporate social responsibility requirements). However in 1996 it was sued by Slater and Gordon for one of worlds most devastating environmental disasters when it discharged over one billion tonnes of tailings and waste material into the source of the Ok Tedi River in Papua New Guinea (PNG). This caused more than 3,000 square kilometres of deforestation, turned the tropical rain forests into savannahs, caused 95% decline in fish population (An Alternative Annual Report 2010). Workplace Health and Safety BHP states that it must ensure: the provision of safe and healthy working facilities and appropriate precautionary measures to protect employees from work-related hazards and anticipated dangers in the workplace (BHP Billiton, Corporate social responsibility requirements). However five of its workers in the Western Australia operations died in fatal injuries due to unsafe working practices from 2008-2010 (An Alternative Annual Report 2010). BHP also states that it must ensure: workers receive regular and recorded health and safety training (BHP Billiton, Corporate social responsibility requirements). However in its South African operations employees were not informed about the health and safety risks of handling a chemical element called manganese which causes illnesses such as Parkinsons Disease (An Alternative Annual Report 2010). Effectiveness of BHPs CSR Policy Despite its bad history BHP has usually maintained a good CSR reputation. In fact the Australian Centre for Corporate Social Responsibility went so far as to list BHP in the 2010/11 Top 20 Australian Listed Companies based on its advanced CSR capabilities (State of CSR in Australia Annual Review 2010/11). The real question here is has BHP earned its right to good CSR reputation? History of Public Relations It is a well-known fact that many companies spend a lot of money on Public Relations (PR) to manage their reputation. In the late 1990s BHP employed the Ecos Corp, an environmental PR company founded by former Greenpeace International Executive Director Paul Gilding to help repair its reputation after the OK Tedi Mine disaster in PNG (Ecos 2007). The public relations was aimed at countering the bad publicity through campaigns including advertisements in business publications such as the Financial Review and Australian TV. BHP also offered legal support to the PNG Government for the development of new environmental laws. Unfortunately for BHP, this resulted in an even bigger public outcry, as the company was accused of interfering with its legislation in an effort to protect its own interests (Quester et al 2001). Evaluation The evaluation of BHPs CSR Policy resides in the adequacy of its reporting standards. Clarke (2007) argues that in order for a company to receive creditability they must disclose their processes, procedures and assumptions in reporting. It can be argued that BHP has intentionally chosen not to transparently report on the cases as mentioned in this report, for the simple fact that it leaves it open to more risk and public scrutiny. However this lack of acknowledgement effectively contradicts its stewardship and attests its reliability. Increased public awareness demands that CSR reporting will no longer be used as a public relations tool. This can be seen, as mentioned previously, through the introduction of the Australian Federal Government Mining Tax and other legislation such as the UK Bribery Act, both will inevitably have a significant impact on the way BHP conducts its business. Additionally important are organisations such as BHP Billiton Watch, which was formed to deal with the prominent concerns of communities and organisations across the world regarding BHPs activities (BHP Billiton Watch n.d). Conclusion It is inevitable that organisations such as BHP, in controversial industries such as mining, are never going to be holistically accepted. However, todays forward thinking generation recognise the impacts and challenges of CSR including safety, environmental, community and socio-economic issues. Stakeholders including shareholders demand greater accountability than simply financial returns. Therefore verification and transparency are key to BHPs success and the credibility of its CSR. BHP boasts of a strong reputation and has an opportunity and increased responsibility to enhance and contribute to a safe renewable environment and set an example for other companies alike.

Friday, October 25, 2019

Hamlet :: essays papers

Hamlet Compare and contrast between Hamlet and Laertes William Shakespeare’s â€Å"Hamlet† is known as the best tragedy play of all times. Each one of the characters has their own unique personality, but some of them are very alike. Hamlet, the main character, and Laertes, one of the other leading roles, are very much alike but at the same time slightly different. Their experiences collide and they both make some decisions, which change their lives forever. Hamlet and Laertes both display impulsive reactions when angered. Both Hamlet’s and Laertes’ fathers were killed. When Laertes discovered that his father’s been murdered he immediately assumes that Claudius is the killer. As a result of his speculation he moves to avenge Polonius’ death. Laertes lines in Act IV Scene 5 provide insight into his mind displaying his desire for revenge at any cost. â€Å"To hell, allegiance! Vows, to the blackest devil! Conscience and grace, to the profoundest pit! I dare damnation. To this point I stand, that both worlds I give to negligence, let come what comes, only I’ll be revenged most thoroughly for my father.† (Act IV Scene 5 lines 136-141) In contrast to Laertes speculation of his father’s killer, Hamlet assumes the individual spying on his conversation with Gertrude is Claudius. â€Å"Nay, I know not. Is it the King?† (Act III Scene 4 line 28). Without thinking, Hamlet automatically thrusts out attempting to kill who he believed was Claudius and actually kills Polonius. Fury and frustration instigate Hamlet’s and Laertes’ indiscreet actions and causes them not to think of the consequences that may follow. Hamlet and Laertes share a different but deep love and concern for Ophelia. Laertes advises her to retain from seeing and being involved with Hamlet because of his social status. He didn’t want her to get her heart broken by Hamlet, since he believed that his marriage would be arranged to someone of his social status, and that he would only use and hurt Ophelia. Hamlet on the other hand, was madly in love with Ophelia but it languishes after she rejects him. Ophelia’s death caused distress in both Hamlet and Laertes and it also made Laertes more hostile towards Hamlet. Association with their families makes Hamlet and Laertes even more similar. The love and respect that they have for their fathers bring them to life threatening situations. Hamlet compares his father to a sun god â€Å"Hyperion† and similarly Laertes highly respects and loves his father Polonius.

Thursday, October 24, 2019

What is DNA?

Alright, let me help you start off with the facts, DNA stands for Deoxyribonucleic Acid. Sound like a mouthful? Don't worry you'll get used to it. Anyway, from reading the title you can suggest that DNA is pretty important, it's what everything living on the planet is made out of, from a tiny piece of bacteria, to the tallest tree in the world. Cells are a little bit bigger, but not that much bigger, they're still invisible to the naked eye. Alright, that's enough introduction for now, let's get into some Deoxyribonucleic Acid! DNA is really important, from back in the billions of years ago without much life when the most lively thing on earth were bacteria, they were made out of DNA. Those bacteria were just Prokaryotic cells, but we'll get into that later. You can think of DNA like some code on a computer program, it's what makes it, without it, you've got nothing. It makes up the organism, tells it how to make more of itself, and displays what it can and cannot do. DNA is made out of a sneeze called ATCG which stands for Adenine, Thymine, Cytosine, and Guanine. ATCG in DNA are called nucleotides. Its structure is a double helix, it looks like a spiral staircase almost, or a spiral ladder. Adenine is connected through a bond made out of hydrogen atoms to Thymine, and only Thymine. The same goes for Cytosine and Guanine. These four substances can be arranged into almost anything, from a virus to the Chromosome of a Cell. DNA is you in a sense. It makes up everything you are, everything down to the smallest construct of you. Even down to the tiniest of red blood cells, there's DNA there too. Fun fact, one of the only things able to reach down far enough to break those hydrogen bonds I talked about earlier is called RNA; Which is what we're about to get down into right now! There are many types of RNA. Think of RNA like half of a DNA strand. Instead of DNA being Deoxyribonucleic Acid, RNA is just Ribonucleic Acid, no more of that Deoxy stuff, it sounds like a detergent. Anyway we'll be going over just 3 types of RNA, mRNA, rRNA and tRNA. Just a quick fact before we get into RNA, RNA contains AUCG. RNA is Adenine, Uracil ,Cytosine, and Guanine, all the same holds true for the bonding. Cytosine still binds to Guanine and Guanine only, but Adenine only bonds to Uracil now! mRna is messenger RNA. No, not that messenger app on your phone, mRNA is what copies half of the DNA strand information and sends off the DNA sequence information down to the tRNA, which is the next step in this whole DNA reproduction! The tRNA is what transfers that information down to the next stage rRNA. rRNA is the ribosomal or receiver RNA. It receives the rRNA and just builds that other half of the DNA and just rinse and repeat after that. All of this is happening inside you right now constantly until you die. Alright! Let's get into genes! Not those pants you're wearing, we're talking about genetic genes. And as such let's talk about a person for a moment. His name was Gregor Mendel, He was born in 1822 and died in 1884. But let's talk about what happened in between those points. Gregor mendel is referred to the father of genetics. A long time ago he had an experiment with pea plants. He took a pink pea plant, and a white pea plant, and cross breed them, meaning he took a seed from one and pollen from another and put them together. After all the seeds grew up, he got 100% pink pea plants and 0% white ones. â€Å"How could this be?† he thought. He performed the experiment again and he got 75% pink and 25% white ones. This is due to Dominant and Recessive Genes. A dominant gene, in this case was the pink leaf. The recessive gene was the white one. Let's say the white petals were ww chromosomes and the pink ones were PP. Remember how I said DNA could display what is could or could not do? well the chromosomes are just that. Only ww could make up white, but PP and Pw could make up pink. Cross breeding would get you 16 different results. And to how reproduction works you only pass down one of those chromosomes. So all of them came out pink if you do the math, that's the only possible combination being Pw. But cross breeding those two again gave him another 16 results, but this time, it wasn't PP vs ww, it was Pw vs Pw. And as such, the results were 4 white and 12 pink, because you only have 1/4th chance of getting a ww. And the others were either Pw or PP. And that's how recessive and dominant genes work. Now. Let's talk about something called Cells, I know you've heard of them, reader. Cells are made up of a membrane bound nucleus, lots of ribosomes, mitochondria, the Golgi apparatus and the soft and hard endoplasmic reticulum and a little bit of cytoplasm for filling. Let's start off with the center of a cell, the nucleus. The nucleus is the heart of the cell, however the nucleus is like a casing for the nucleolus, like the brain of the cell. The nucleolus is surrounded by chromosomes, which are in every cell, and those chromosomes look like a giant, but still tiny X. Farther out from the nucleus, we have the Endoplasmic reticulum (ER) right outside. The ER is useful in modifying and transporting proteins. Some of the time they stay put in the ER and sometimes they go out onto the Golgi apparatus! The Golgi apparatus is like the boxing part of the factory, it packages the proteins into lipids and vesicles. A lipid is what that makes up the cell membrane, like the outside shell. A vesicle is this bubble that actually leaves the cell and releases the proteins to other cells in the area. This is constantly happening inside your body as you are reading this. As you probably learned in biology some day that the mitochondria are the powerhouse of the cell. Something else that is really cool is that mitochondria have their own DNA that is specific to them, not shared throughout the cell. However mitochondrial DNA is highly susceptible to mutations because it does not have robust DNA. Inside the mitochondria is adenosine triphosphate or you can just call it ATP for short. ATP is energy for cells, it can transfer energy, and is sometimes referred to as the currency of the cells. Another thing they do is that they generate heat and help with signaling activities, and mediate cell growth and death. The number of mitochondria in the cell varies, like say in the liver, there are sometimes hundreds of mitochondria for energy to break down foods. Now, we are going to talk about Plant Cells. Actually, before we go and talk about Plant cells, let's talk about the difference between them. Plant cells are very similar to Animal cells, but Plant cells have Cell Walls, and Chloroplasts. That's pretty much it actually. Most of the rest is the same. You all know that plants perform photosynthesis, turning light energy into food, or ATP. But how do they do it? Well it starts was down in the cells with something called chloroplasts. This is something that animal cells do NOT have. Inside a chloroplast is many of these little green disks called thylakoids. These thylakoids contain chlorophyll, that's where the magic happens. If you didn't know, chlorophyll is green, and that is the major role in what makes most leaves and most plants green! That's why Big trees have so many leaves. They need so much food, so they need a wide area to capture sunlight,. Alright, let's get into some history. Plant and animal cells are called Eukaryotes and I'm about to talk about something much older. Prokaryotes are 2 billion years older than Eukaryotes. Fun fact: Eukaryotes came from Prokaryotes. Prokaryotes are very simple, they only have a singular but long strand of DNA that just floats inside the cell. Prokaryotes are just bacteria, that's the domain they belong to. The story on how Prokaryotes become Eukaryotes is that one day a Prokaryote swallows another bacterium, and the relationship works nicely. That other bacterium is called mitochondria. so when the cell reproduced through binary fission it split half of the mitochondria, and then the cycle repeated and other things were engulfed and then evolution came and then suddenly you have a Eukaryote after 2 billion years. But now, let's talk about our final category, Viruses. Everybody has heard of them and been infected by them, but what are they? s you may have guessed there are many different types of viruses. This is Called biological diversity. If there were only one virus in the world, we would become immune and the virus would die off without hosts. Viruses can only survive if they have host cells, and all viruses want to do is spread as far and wide as possible.

Wednesday, October 23, 2019

Hundreds of emails and no sleep: does this sound like a satisfying job Essay

Questions & Answers: Q 1: Do you think that only certain individuals are attracted to these types of job? or is it the characteristics of the jobs themselves that are satisfying? The jobs seem extreme in nature with exceptional long and irregular hours of more than the normal 40- hour work week, constant travels and serious lack of work-life balance. Only certain individuals would be attracted to these jobs. These individuals are willing to sacrifice family time for job sake. Looking at the extreme nature of the jobs they are far from satisfying any normal worker, even if compensation is considered, but the jobs would be satisfying to a special breed of people who find the jobs as challenging. The four individuals displayed high levels of job satisfaction, job involvement and organizational commitment that enable them to accept the hardships as a positive challenge. These individuals are positive people because negative people are usually not satisfied with their jobs, more so if the jobs are as stressfu l as mentioned in the case. These individuals also have positive core self-evaluation that contributed to their being more satisfied with their jobs even under extreme conditions. Pay was not the determinant†¦ Questions; – Do you think that only certain individuals are attracted to these types of jobs, or is it the characteristics of the jobs themselves that are satisfying when you are doing them? – What characteristics of these jobs might contribute to increased levels of job satisfaction? – how might this satisfaction relate to your job performance, behaviour, attitude, turnover of staff? – if there is a lot competition for this kind of position how might that affect an individuals behaviour, attitude and performance at work? 1.Do you think only certain individuals are attracted to these type of jobs or is it the characteristics of the job themselves that are satisfying? When we talk about an individual, or certain group of individuals, job satisfaction solely depends on their perspective. For them, job satisfaction need not be high salary, better position or other job conditions. What factors may motivate us, may not give us happiness. Personality plays a very important role in job satisfaction. People who believe in their inner self and basic competence are more satisfied than those who don’t have self core evaluation. Hence only certain individuals are attracted to these type of  jobs, and it’s not just the characteristics of the job. 2. What characteristics of these jobs might contribute to increased levels of job satisfaction? Rajesh bisht is an investment banker. The way it has been described about Mr. Rajesh here shows that he is very enthusiastic about his work, which implies that he loves what he does. Being an investment banker requires strong background in finance as it involves a lot of financial analysis of a company or an organization. The work requires him to analyze and give solutions to an organization which might be in crisis. So the entire organization is dependent on Mr. Rajesh’s analysis. This job requires more involvement and Mr. Rajesh likes his responsibility. In Ravi Goyal’s case, he heads the international marketing team of an engineering firm. Ravi Goyal is always and ever ready to work because his work involves maintaining relationships globally. CASE 2: Long hours, hundreds of emails and no sleep: does this sound like a satisfying job? Observations: Characteristics of the 4 jobs were quite similar. John Bishop: good stable job, irregular long hours (90 to 100- hour work week), no complaints, willing to take things to the extreme Irene Tse :good stable job, long hours (80 – hour work week), no complaints, willing to take things to the extreme and highly motivated Tony Kurz : good stable job, long irregular hours, constant travels, highly satisfied with job, prefers job more to personal relationships David Clark: good stable job, long irregular hours (60- hour work week), frequent travels, need to attend to many emails daily, serious lack of work-life balance, highly motivated.

Tuesday, October 22, 2019

The Four Market Structures

The Four Market Structures Free Online Research Papers Economists group industries into four distinct market structures: pure competition, pure monopoly, monopolistic competition, and oligopoly (McConnell Brue 2004). Understanding the different market structures will help to understand how price and output are determined and will also help to evaluate the efficiency or inefficiency of those markets (McConnell Brue 2004). This paper will briefly explain each market structure and will also explain how Quasar Computers evolved through each structure. Monopolistic Competition Monopolistic competition is defined as â€Å"a market structure in which several or many sellers each produce similar, but slightly differentiated products, each producer can set its price and quantity without affecting the marketplace as a whole† (InvestorWords, 2008). Quasar Computers is under intense competition within the computer industry. The company pioneered an optical notebook computer; new competitors have entered the market making optical technology easily available. Quasar planned ahead and set aside $200 million to develop their brand and keep their product differentiated. By thinking ahead and being proactive Quasar proved that they were ready for the monopolistic competition. Oligopoly Quasar Commuters has evolved into an oligopoly market because the patent on the optical technology expired. â€Å"Oligopoly involves only a few sellers of a standardized or differentiated product; so each firm is affected by the decisions of its rivals†¦Ã¢â‚¬  (Brue, McConnell, 2004). Orion Technologies has entered the optical notebook market. Quasar must effectively price and advertise their product in order to gain additional market share from Orion. Orion competitively lowers their product price to beat the price of Quasar, causing Quasar to lose additional market share. Although Orion is lowering its prices and increasing its market share, the company is not increasing its revenue. A balance must be made between the cost of the product to be sold and the amount of revenue that each company will achieve. Perfect Competition Characteristics that make perfect competition unique are the market usually involves identical, standardized products that are produced in mass quantities. Perfect competition products do not set pricing and market entry and exit is easy for an organization. Quasar recently acquired a controlling interest in Opticom the organization whom supplies Quasar with Optical Display Screens (ODS). Quasar is trying to determine the best strategy for making the organization profitable. A requirement of the perfect competition market is that products are identical; product improvements will mean Quasar’s products are no longer similar to their competitors’ products resulting in above-market profits. Eventually, Quasar’s competitors will duplicate their products, which could decrease market prices and revenue. Monopoly Even though a monopolist r is a price maker, cost cannot be passed on to customers. Quasar has to be careful in raising their prices. This is due to a downward slope, by a monopolist. However, an increase will lead to a decrease in demand. Therefore, to improve profits even a monopoly player has to invest in advertising, improve productivity, and eventually cutting costs [This sentence is confusing. Rework for clarity and conciseness. (16b)] . Quasar’s advertising team or department has to strategize carefully their planning, therefore, by not to increase significantly, customers like when prices fair are and reasonable. [This sentence is long and confusing. Please rewrite for clarity.(16)] Realistically consumers like bargains, uniqueness, and easiness. Conclusion Quasar computers have had the opportunity to operate in all market structures. By learning and understanding those market structures, Quasar has effectively made smart business decisions when faced with the challenges of operating in each market structures. Quasar has a better comprehension of price and output determination. Making more informed and educated decisions has enabled Quasar to evaluate their efficiency or inefficiency more in-depth in their respective markets. Research Papers on The Four Market StructuresDefinition of Export QuotasOpen Architechture a white paperMarketing of Lifeboy Soap A Unilever ProductBionic Assembly System: A New Concept of SelfTwilight of the UAWIncorporating Risk and Uncertainty Factor in CapitalThe Project Managment Office SystemHip-Hop is ArtGenetic EngineeringStandardized Testing

Monday, October 21, 2019

The Tigris River of Ancient Mesopotamia

The Tigris River of Ancient Mesopotamia The Tigris River is one of two main rivers of ancient Mesopotamia, what is today modern Iraq. The name Mesopotamia means the land between two rivers, although perhaps it ought to mean the land between two rivers and a delta. It was the marshy lower ranges of the conjoined rivers that truly served as a cradle for the earliest elements of the Mesopotamian civilization, the Ubaid, in approximately 6500 BCE. Of the two, the Tigris is the river to the east (towards Persia, or modern Iran) while the ​Euphrates lies to the west. The two rivers run more or less parallel for their entire length through the rolling hills of the region. In some cases, the rivers have a rich wide riparian habitat, in others they are confined by a deep valley such as the Tigris as it rolls through Mosul. Together with their tributaries, the Tigris-Euphrates served as the cradle for the latter urban civilizations that evolved in Mesopotamia: the Sumerians, Akkadians, Babylonians, and Assyrians. At its heyday in the urban periods, the river and its human-constructed hydraulic systems supported some 20 million inhabitants. Geology and the Tigris The Tigris is the second largest river in Western Asia, next to the Euphrates, and it originates near Lake Hazar in eastern Turkey at an elevation of 1,150 meters (3,770 feet). The Tigris is fed from snow which falls annually over the uplands of northern and eastern Turkey, Iraq, and Iran. Today the river forms the Turkish-Syrian border for a length of 32 kilometers (20 miles) before it crosses into Iraq. Only about 44 km (27 mi) of its length flows through Syria. It is fed by several tributaries, and the major ones are the Zab, Diyalah, and Kharun rivers. The Tigris joins the Euphrates near the modern town of Qurna, where the two rivers and the river Kharkah create a massive delta and the river known as Shatt-al-Arab. This conjoined river flows into the Persian Gulf 190 km (118 mi) south of Qurna. The Tigris is 1,180 miles (1,900 km) in length. Irrigation through seven millennia has changed the course of the river. Climate and Mesopotamia There are steep differences between maximum and minimum monthly flows of the rivers, and the Tigris differences are the sharpest, nearly 80 fold over a period of a year. The annual precipitation in the Anatolian and Zagros highlands exceeds 1 meter (39 inches). That fact has been credited with influencing the Assyrian King Sennacherib to develop the worlds first stone masonry water control systems, some 2,700 years ago. Did the variable water flow of the Tigris and Euphrates rivers create the ideal environment for the growth of the Mesopotamian civilization? We can only speculate, but there is no doubt that some of the earliest urban societies blossomed there.   Ancient Cities on the Tigris: Baghdad, Nineveh, Ctesiphon, Seleucia, Lagash, and Basra.Alternate Names: Idigna (Sumerian, meaning running water); Idiklat (Akkadian); Hiddekel (Hebrew); Dijlah (Arabic); Dicle (Turkish). Source Altinbilek D. 2004. Development and management of the Euphrates–Tigris basin. International Journal of Water Resources Development 20(1):15-33.

Sunday, October 20, 2019

Standard, Standardize, and Standardized

Standard, Standardize, and Standardized Standard, Standardize, and Standardized Standard, Standardize, and Standardized By Maeve Maddox A reader has asked for a discussion of the words standard, standardize and standardized: I ask because of a statement I made sometime ago, where I said, we took a standard test. But my friend thought it should have been we took a standardized test. I think Im correct since standard in this context is an adjective that qualifies the noun test. On the other hand, standardize is a transitive verb and it should convey a sense of action. However, when I surfed the internet to see how these words are used, I found a puzzling example: â€Å"There was no standardized time until train travel became common.† Would you consider this a correct way of using the word standardized? The verb standardize derives from the noun standard. Among the different meanings of the noun and the verb, these are the ones relevant to this discussion: standard noun: An authoritative or recognized exemplar of correctness, perfection, or some definite degree of any quality. standardize verb: To bring to a standard or uniform size, strength, form of construction, proportion of ingredients, or the like. Both standard and standardized function as adjectives, but with different meanings. One can speak of a â€Å"standard test† or a â€Å"standardized test,† but the two phrases do not mean the same thing. A standard test is the usual test given. For example, a â€Å"standard driving test† requires the learner to parallel-park. A â€Å"standard joke† is one that is often repeated. A â€Å"standard excuse† for not doing something is â€Å"I didn’t have time.† A  standardized test  is a  test designed, administered and scored according to specific guidelines based on a standard that has been established by some authoritative body. It’s even possible to speak of a â€Å"standard standardized test.† For example, a particular standardized test like the PARCC or ACT might be the â€Å"standard standardized test† in one state or district, but not in another. As for the phrase â€Å"standardized time,† the same sort of contextual considerations apply. One may speak of â€Å"standardized time† and â€Å"standard time.† Before train travel became common, local times, based on the sun or a locally chosen meridian, were sufficient. Once people had to plan journeys with departure and arrival times in different regions, a standardized method of telling time became necessary. The result of the nineteenth-century century standardization of time is standard time: a standard system of reckoning based on geographical time zones. Context, of course, rules, but generally speaking, standard conveys â€Å"the usual,† whereas standardized conveys something systematically designed and administered. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Writing Prompts 101One Fell SwoopApostrophe with Plural Possessive Nouns

Saturday, October 19, 2019

HRM Policies of Microsoft Incorporation Essay Example | Topics and Well Written Essays - 2500 words

HRM Policies of Microsoft Incorporation - Essay Example The present research has identified that the role of HRM is significant in this respect, where it synchronizes employees’ potential with company’s objective. The sales team looks from a perspective of sales generation alone however, the HR team looks through a broader window to cover customer intentions and corporate environment to synchronize the company’s strategy with the market needs. As said earlier that HRM is a very diverse and broad subject, therefore, the fields of supply chain management, promotion and marketing strategies, recruitment and employee satisfaction all fall in the domain of HRM. Therefore it can be said, that no matter what the size and nature of the company is, the unit of HRM cannot be separated from the management as it is integrated with all the functional units of the company. Moreover, factors of globalization and inflation crisis have intensified internal and external competition for a company. The internal competition is between emp loyees battling for higher costs and benefits. This has further augmented the role of HRM in the internal matters of the company, to ensure sound working environment and ethical practices. This illustrates that the bigger the company the more will be the need for proper HRM. Microsoft is the leading name in the IT world that changed the trend in computing through its tremendous technology of Windows Operating System. It has set many landmarks since its date of foundation in 1975, by Bill Gates (Chairman) and Paul Allen. The key aim of the company is to provide computing solutions that are accessible and handy for all. Their technology, following this mission, has been able to earn huge acceptance and has taken Microsoft to heights that no other company had ever touched.

Friday, October 18, 2019

Law o tort Essay Example | Topics and Well Written Essays - 1000 words

Law o tort - Essay Example Stevenson 1932). The claimant should prove that the negligent behaviour of the defendant has caused injury or loss in order to win the case. in the case of North Glamorgan N.H.S. Trust v Walters, it can be seen that the defendant was negligent in that the â€Å"claimant's infant son developed an epileptic fit as a result of the admitted negligence of the defendant trust, which caused irreparable brain damage and death when the child's life support system was turned off.† The act of turning off the support system aggravated the problem and this led to the claimant suffering a pathological grief reaction. The claimant is a secondary victim and is entitled to claim damages as a result of the horrific experience she encountered at the hospital. The psychiatric injury experienced by the claimant is a direct result of the action of the medical staff at the hospital and this is the reason why she is entitled to get damages. Though the defendant does not directly accept the charges, t he facts are so glaring that it can be seen that they are responsible for the illness experienced by the claimant after the horrific incidence. 3. a. ... The harm is a direct result of the actions of the medical staff and these factors were taken into consideration by the trial judge. b. The control mechanism that was in dispute is that the 36 hour period involving all the events that transpired could be held in law as one horrifying event. The defendant also argues that the judge erred when he concluded that the case was sudden since it transpired over a certain period of time that was characterised by changing events. However, the judge upheld that the control mechanisms were satisfied by the claimant in this particular case. . 4. a. The ground for appeal by North Glamorgan N.H.S. Trust is that the judge expanded the control mechanism involved in the case. In other words, the defendants are saying that the judge did not take into account the provisions of the law with regards to the facts that should be considered in case of a secondary victim suffering psychiatric harm as a result of the actions of the defendant. The defendants als o argue that the mother appreciated the removal of the life support system from the child which led to his death. The dependents also tried to invoke certain sections of public policy but it was established that the judge did not take any incremental position in passing the judgement in favour of the claimant. b. The Lord Justice Ward considered the issues that constituted the necessary event in dismissing the appeal by the defendants. The events took place in a progressive way which led the judge to believe that there was an element of secondary causation of psychiatric injury to the claimant. The other issue that was taken into consideration by the judge is that the aspects of proximity in terms of time and relationship between the two

Unfair Dismissal and Redundancy Outline Example | Topics and Well Written Essays - 1000 words

Unfair Dismissal and Redundancy - Outline Example This includes drug abuse, disclosure of confidential information, theft, violence, unauthorised absence and breach of contract among others. Redundancy is also a ground for fair dismissal when conducted in a fair manner. The recent global financial crisis places much focus on redundancy; hence, the issue is detailed later as an independent topic. The fourth reason upon which the fairness of a dismissal rests is statutory restriction, where the employer would be in contravention of a statutory provision if the employment continues. The considerations for this ground include situations where a breach of immigration rules may occur, loss of a driving license and presence of a criminal record among others. The fairness of a dismissal may also be argued based on â€Å"some other substantial reason† (s.98 Employment Rights Act (ERA) 1996) due to the impossibility of capturing all grounds under the law. Here, examples include conflict of personalities and relationship breakdowns, res istance to necessary changes in employment terms and legitimate commercial reasons among others. A valuable consideration which arises here is the reasonableness of the dismissal, where the law expects the employer to act reasonably at all times. Automatically Unfair Dismissals Certain circumstances qualify a dismissal as unfair without question according to the law. These include unlawful discrimination; for having asserted a statutory right; when an employee raises issues of health and safety; whistle-blowing; trade union activities/membership; pregnancy, maternity or childbirth; working time regulations; National Minimum Wage; and information and consultation rights. Redundancy The recent global financial downturn... This essay discusses that one of the most significant considerations in the fairness of a dismissal is the legal definition of an employee. An employee is one who has entered into, or works under a contract of employment. The law also requires sufficiency of service as proof of being an employee; one must have worked continuously for over a year to qualify as an employee. The next aspect that needs definition is dismissal itself, with the importance of defining the term exemplified by the Futty v D & D Brekkes 1974. Legally, a dismissal takes place on three occasions; first, when the employer terminates employment with or without notice; secondly, when the employee resigns with or without notice and where the employer constructively dismisses them; and lastly, when the employer does not renew a fixed term contract. Hence, independent resignation, mutual contractual termination and operation of law in termination do not qualify as dismissals under the law. Certain circumstances qualif y a dismissal as unfair without question according to the law. These include unlawful discrimination; for having asserted a statutory right; when an employee raises issues of health and safety; whistle-blowing; trade union activities/membership; pregnancy, maternity or childbirth; working time regulations; National Minimum Wage; and information and consultation rights. The recent global financial downturn saw many employees around the world dismissed on one particular ground; redundancy.

INTERNATIONAL STUDIES IN BUSINESS Research Paper - 1

INTERNATIONAL STUDIES IN BUSINESS - Research Paper Example The Ottoman Turks started their conquest of Turkey in the early 13th century by overpowering the Turkish and Mongol bands and taking over the Christian Balkan states (Rhodes, 2004). The Turks captured Constantinople in 1453 and conquered Vienna about 200 years later. The Ottoman Empire, which dominated the region for approximately 600 years, collapsed politically, administratively, and economically after its defeat in World War I (Szczepanski, 2014). National hero Mustafa Kemal founded present day Turkey in 1923. Mustafa Kemal was honored with the title Ataturk which means ‘Father of the Turks’ Turkey is besieged with corruption and favoritism in government and daily life (Eroglu & Picak, 2011). The government has initiated some anti corruption measures; however the stringent implementation of these strictures still remains an issue. Turkish is the official language of the country. A vast majority, 90 percent, of the people in the country speak Turkish. In addition to Turkish, the Kurdish language is spoken by around 6 percent of the population. The other minority languages include Arabic, Circassian, Greek, Armenian and Judezmo (BBC Monitoring European, 2009). The Turkish society has a rich culinary culture which is evident from the vast variety of food items including eggplant dishes, salads, kebab, hamsi,  and pastrami  available in the country. The food habits of the Turkish vary according to geographic regions, socio-economic status, and religious structures and norms. The business culture in Turkey is pretty formal. Exchanging cards during the introductions is a norm. The Turkish are extremely hospitable and view foreigners as their guests. Meetings in person are preferred over telephonic conversations. Businesses thrive on relationships, trust and rapport with other stakeholders. Informal dresses in a business meeting are deemed to be lack of seriousness (Business Culture, 2014). Turkey is fundamentally a free-market economy where the

Thursday, October 17, 2019

Quantitative Comparison of Academic Achievement in NYC Public Schools Dissertation

Quantitative Comparison of Academic Achievement in NYC Public Schools vs. NYC Charter Schools Measured by 2009 - 2010 NYS ELA and Math Exams - Dissertation Example According to the research findings charter schools are public schools that operate independently of the district board of education, making them a one-school public school district. They have their own charters written by private individuals: parents, educators, community leaders that enumerate their laws, governance structure and principles. This autonomous setup results in bigger accountabilities for the school. Because of this autonomy and customized curricula, many people believe that charter schools are far more beneficial to children, as compared to public schools. People also believe that charter schools provide better services because of the high standards they set for themselves. There are studies that compare the effectiveness of public schools versus charter schools. However, they differ in their findings. As our understanding of the cognitive development of young children increases, so does the need for high-quality childhood education programs facilitated by confident, c ompetent instructors. The growing appreciation for the potential benefits of quality educational programs has strengthened funding agencies’ and policy makers’ commitment to ensuring all families have access to programming that can support and enhance children’s development, growth, and learning. These benefits can be realized, however, only in high-quality programs with characteristics linked to positive outcomes for children. The establishment of a stable formula for measuring the academic achievement of the students from public schools and charter schools is needed. According to research conducted by Lubienski and Lubienski (2006), public schools and charter schools in New York City are both able to produce students that exemplify academic excellence. Since the No Child Left Behind (NCLB, 2002) legislation was enacted, schools must show that they are contributing to a child’s academic achievement, especially in the areas of English Language Arts (ELA) and Mathematics. Brennan (2009) indicates that New York City public school students outperform their peers from comparable school districts, giving the distinct impression that public schools are also effective educational forums. Conversely, the achievement analysis conducted by Hoxby, Murarka, & Kang (2009) indicates that charter schools are superior to public schools in their ability to educate students in a multitude of academic categories. In addition, Lubienski & Lubienski (2006) indicate that charter school and the â€Å"private-style organizational models† (p.2) were ahead of public schools in providing a model for

Wednesday, October 16, 2019

Human Resource Management Soft and Hard Practices Essay

Human Resource Management Soft and Hard Practices - Essay Example Human resource management involves several distinct but intersecting areas of administrative activity. The five wide functions of HRM are people resourcing, managing performance, managing reward, human resource development, and employment relations. Each of these will be discussed in detail below. To start with, people resourcing is making sure there is sufficient staffing for the present and future needs of the business through activities like human resource planning, induction, selection, recruitment succession planning, talent management, and the dissolution of the Employment affiliation (including managing redundancy and retirement). Second, managing performance is the process of managing a team and individual performance and the support of employees to the accomplishment of the goals of the organization, for instance, through performance appraisals and goal setting (Bratton & Gold 2012). Thirdly, managing reward is implementing and designing the pay and reward systems covering c ollective and individual, economic and non-economic reward, comprising workers benefits, pensions, and perks. In addition, employee relations is managing the communication and participation of employees in activities of the organization like decision making, managing workers welfare, handling union-management affairs (comprising collective bargaining and industrial action over the terms and conditions of hiring), handling employee discipline and grievance.

Quantitative Comparison of Academic Achievement in NYC Public Schools Dissertation

Quantitative Comparison of Academic Achievement in NYC Public Schools vs. NYC Charter Schools Measured by 2009 - 2010 NYS ELA and Math Exams - Dissertation Example According to the research findings charter schools are public schools that operate independently of the district board of education, making them a one-school public school district. They have their own charters written by private individuals: parents, educators, community leaders that enumerate their laws, governance structure and principles. This autonomous setup results in bigger accountabilities for the school. Because of this autonomy and customized curricula, many people believe that charter schools are far more beneficial to children, as compared to public schools. People also believe that charter schools provide better services because of the high standards they set for themselves. There are studies that compare the effectiveness of public schools versus charter schools. However, they differ in their findings. As our understanding of the cognitive development of young children increases, so does the need for high-quality childhood education programs facilitated by confident, c ompetent instructors. The growing appreciation for the potential benefits of quality educational programs has strengthened funding agencies’ and policy makers’ commitment to ensuring all families have access to programming that can support and enhance children’s development, growth, and learning. These benefits can be realized, however, only in high-quality programs with characteristics linked to positive outcomes for children. The establishment of a stable formula for measuring the academic achievement of the students from public schools and charter schools is needed. According to research conducted by Lubienski and Lubienski (2006), public schools and charter schools in New York City are both able to produce students that exemplify academic excellence. Since the No Child Left Behind (NCLB, 2002) legislation was enacted, schools must show that they are contributing to a child’s academic achievement, especially in the areas of English Language Arts (ELA) and Mathematics. Brennan (2009) indicates that New York City public school students outperform their peers from comparable school districts, giving the distinct impression that public schools are also effective educational forums. Conversely, the achievement analysis conducted by Hoxby, Murarka, & Kang (2009) indicates that charter schools are superior to public schools in their ability to educate students in a multitude of academic categories. In addition, Lubienski & Lubienski (2006) indicate that charter school and the â€Å"private-style organizational models† (p.2) were ahead of public schools in providing a model for

Tuesday, October 15, 2019

Intrusion Detection System Essay Example for Free

Intrusion Detection System Essay Introduction There are several security systems that were developed to resolve serious issues pertaining to the safety of a particular network or organization structure. Malicious attempts to access and make use of such systems without permission from the owner of the said network have been damaging to numerous businesses and have exposed a lot of highly confidential files. As a result, more money has been lost and profits have been decreased greatly. However, many companies are still clueless about the ways on how to stop this information technology theft and the computer hackers continue to proliferate from this illegal works. One of the solutions that are currently available to resolve the abovementioned problems is to utilize a software-based intrusion detection method. This can also be a mixture of both hardware and software implementation dedicated to stop any unwanted access to information by any user attempting to get in on the said system. It is also intended for detection of any malicious wares that is being injected into the computer system. In addition to that, any attack even from authorized personnel who deliberately destroys the files and data in the network are also being identified by the said infringement recognition scheme. There are several modules that are being integrated to establish an intrusion detection system. One of the major parts of an intrusion detection system is the transducer. These transducers are devices that are responsible for producing logic information on the system. Its major role lies on the sensitivity of the said sensors being used for detecting such harmful files or manipulations. Another module that is a part of the anti-intrusion scheme is the monitoring system that is in charge of controlling the transducers or sensors. It also provides periodic observation of any event that occurs on the area covered by the system. The next module that completes the intrusion detection system is the central processing structure. This records the observed events by the monitoring system and processes the appropriate response for the said network stimulus. This also decides if there will be approval or denial of access and service. Anti-Intrusion Scheme Terminologies There are terminologies that are associated with the intrusion detection system. Alarm or alert is a term used if there is an attack detected by the system. True attack stimulus is a phrase that is used to describe an incident that causes the anti-intrusion system to send an alarm signal and respond accordingly similar to the real aggression happening. False attack stimulus, on the other hand, is used when the intrusion detection scheme produces an alert response even when there is no attack occurring. False positive is the phrase used to describe when an alarm was made by the system even there is no actual system attack occurring while False negative is used when there is a failure on the part of the system to detect an actual assault on the system. Noise is the term used that interferes the original data and that can cause false alarm on the system. Another terminology used in the system is the site policy wherein it includes the guidelines and regulations that covers the entire organization that has an intrusion detection system. Site policy consciousness is the terminology used to describe the ability of an anti-intrusion scheme in a continuous changing environment. Intrusion Detection System Types Several variations of intrusion detection scheme were already developed and each has its distinct approach and modules like sensors, processors, and monitor devices. Each type has its own system processes depending on the need of the corresponding network being served by the said computer security systems set-up. Hybrid types or combination of two types is also being used by some networks to establish their need for network security system. Classification of Intrusion Detection System Source: www. windowsecurity. com Network Intrusion Detection System A network intrusion detection scheme is a type of an anti-intrusion arrangement where the transducers are strategically located in critical points being covered by the system. Particular borders are also recognized on the network systems that are considered prone to malevolent traffic flow of information. Protocol-Based Intrusion System The protocol-based intrusion scheme is a network intrusion category that processes on the protocols for any improper or unlawful message flow or any sort of unlawful access of the network. The sensors used with this type of system are placed at the front section of the server network to be able to analyze communication protocols between connected computer devices. In a web-based network, the protocol being observed is on the internet protocols being used to interconnect the said system set-up with other networks also linked to the internet. Application Protocol-Based Intrusion Detection System This type of anti-intrusion set-up comprises of approaches where the monitoring system is focused on a specific type of protocols particularly under the highest layer in the OSI model which is the application layer. This scrutinizes the application layer software being used in the system against any sort of illegal activities that can be damaging to the system as a whole. Host-Based Intrusion System The hot-based intrusion system focuses all the monitoring efforts on the activities made by the hosts where various software installations are located. It also looks on application logs and other file variations for any intrusion states. Passive System against Reactive System A passive anti-intrusion system provides an alert signal once a particular sensor detected a likely network security violation. It also log important information related to the said detection for future references on the said intrusion attempt. On the other hand, a reactive intrusion detection system provides a more responsive approach on the network infringement attempt on the set-up. The said reactive system makes some real-time adjustments to counter the said intrusion like resetting the link or the firewall program that would be necessary to maintain the security within the network. Such adjustments occur instantly, depending upon the pre-programmed responses of the intrusion system on the said network infringements. An intrusion prevention system differs a lot from a conventional intrusion detection system because the first looks for any possibility of harming the system before the subjected program or software enter the system while the latter only detects for the any possible intrusion after the entrance of the said suspicious programs. With the use of firewalls, they filter the programs that might pose risks on the network and denying access from any unknown sources or unreliable hosts. Invasion prevention scheme can also be classified under a specific firewall application layer. Intrusion detection structure uses two common methods in detecting any anomaly in the system. One of these methods includes the statistical process of determining whether a network infringement occurred in the system. This approach is called statistical anomaly-based technique. Another method that is also being employed in the intrusion recognition system is the signature-based technique. Under this approach, any network attack is being recognized through familiar patterns which are acknowledged as system attack signatures. Many of these identified attack signatures are being held in the database of a computer system for future references and further detection will be much easier for detection of these familiar network intruders. Moreover, the lists of these signatures are continuously being renewed to ensure the validity of the threat signatures on the system. All intrusion detection modules have constraints in their overall routine and efficiency in performing its duties to detect network anomalies in the system. One of the limitations that hinder the effect of anti-network hacking system is the noise that degrades the reliability and sensitivity of many of the intrusion detection schemes. There is also inherent noise on the system that should be controlled to be able to produce better detection results. Corrupt data and inefficient recognition of potential intruders are some of the problems resulting from the proliferation of noise in the entire network security set-up. Another problem is that real threats on the network system occurs less frequent compared to invalid risks that also appear on the system. Because of this, anti-intrusion systems sometimes neglect the real warnings and looked at it as another false attack where problems begin to propagate. The next limitation is on the need for regular updating of threat signatures. Without such efforts, some agents that causes harm to the entire system would easily passed on the security line because the said network anti-infringement scheme do not have the update information on the current or new harmful agents that might inflict damage to the system. Anti-intrusion techniques can also be bypassed by other means and this can be done on several ways. One of the techniques is to develop more network attack procedures as a product of thorough research on the current protection systems. Loopholes in the anti-intrusion schemes are also valid grounds for development of new approaches on how to circumvent the security hurdles implemented by the said anti-intrusion procedures. (www. ) Developments on Intrusion Detection System A lot of advancements in the field of intrusion recognition system are being made to resolve the key issues in the said system. Various ideas continuously undergoes experimentation for further testing and implementation once the test results appear to have passed all the standards set by the authorized technical agencies. One key development in the field of network security system is the inclusion of access logs for to be able to trace any anomaly that occurred during the entire operation of the network. In the year 1984, another valid finding was made with regards to the possibility of network attack anomalies with the increasing amount of memory being used. It was stated that the need for more resources that can be used to scan and monitor the entire system. Two years after, a model was structured and made available by a computer network professional defining the over-all composition of an anti-intrusion scheme. This model was adapted by many companies and implemented on their own respective systems. The model utilized appropriate mathematical tools that analyze data statistically. Neural complex algorithm is also being integrated into the anti-intrusion structure to have a more interactive approach in dealing with network violators. This neural set-up poses more advantages compared to the mathematical approaches. (www. windowsecurity. com) Conclusion Intrusion detection system plays a vital role in managing a network communications structure of companies. Though the scheme has complexities in terms of the processes and the modules included in it, the anti-intrusion system still has greater benefits compared to the aforementioned intricacies of the said system. Various developments are still under way in order to enhance the procedures of detecting network anomalies that are trying to implicate the system. Competent people should also be assigned on this task of monitoring the flow of the network because much responsibility is assigned on maintaining the entire system hack-free. Continuous upgrading on the approach should also be made regularly to ensure that they are in pace with the network violators and its illegal schemes to get access on the confidential data and files of a network. Moreover, system hardware and software should also be updated on a regular basis to avoid lapses on its primary function as an anti-network infringement system. References Intrusion Detection Scheme. Retrieved on April 26, 2009, Retrieved from www. windowsecurity. com Elson D. : â€Å"Intrusion Detection, Theory and Practice. Retrieved on April 27, 2009. Retrieved from http://online. securityfocus. com Frederick K. K. : Network Intrusion Detection. Retrieved on , April 28, 2009. Get well soon www. webonline. securityfocus. com.

Monday, October 14, 2019

Concept Of Strategy According To Henry Mintzberg Business Essay

Concept Of Strategy According To Henry Mintzberg Business Essay According to Henry Mintzberg in his 1994 book The Rise and fall of Strategic planning focused on strategy being used by people in different ways. The commonly used strategic ways are as follows: Strategy is a Plan: This describes the word How which allows achieving your target/ goal from one end to the other. Strategy is a Pattern: It is a pattern in terms of actions delivered for example a company uses high end strategy to market expensive products to maintain standard, Quality and supersede competitors. Strategy is a Perspective: a vision that provides direction to achieve outcomes. Strategy is a Position: it reflects the decisions involved in the deliverance of the organizations service/product in a particular market. Concept of strategy according to Michael Porter Michael Porter in his 1996 Harvard Business Review article and 1986 book, Competitive Strategy points out that competitive strategy is all about being different and unique. He added, It means deliberately choosing a different set of activities to deliver a unique mix of value The basic concept of strategy comes from a military background and it is now widely practiced in a variety of business. The adoption of the strategic concept from that of the military into the business was considered to be easy as it was modest. As in the military and likewise in the business, strategy is bridging the gap between tactics and policy. Being very specific in defining strategy is not easy as the different perspectives on strategy vary. Thus a very broad conception of strategy according to De Wit and Meyer in their book (2010), Strategy, Process, Content, Context, is, A course of action for achieving an organizations purpose STRATEGY PROCESS: Strategic Management is a process which is lead by different ways. According to many other text books including De Wit and Meyer (2010) the Strategy process is a linear progression trough a number of distinct steps. As in this competitive market organizations tend to go through a process in order to achieve best outcomes. This process is divided into different stages which includes, strategy analysis, strategy formulation and implementation stage. The report evaluates the three strategy dichotomies of the strategy process contained in the following perspectives: Strategic thinking Strategic formation Strategic renewal Figure -1: Strategy process and its Aspects. STRATEGIC THINKING (Logic vs. Creativity) A lot goes on in the mind of a strategist prior to the process of strategy implementation. Strategists are constantly engaged with problems during the strategic process. These paradoxes that arise during the strategic process can be challenging in different situations and the right type of action taken to resolve them. According to the Rational or logical reasoning perspective the demand and need of constant market analysis and its capacity assumed to gain advantage from the market should be based on actual facts. Logical thinking will provide a better understanding of the opportunities and threats upon critical analysis of the environment. Creative thinking is the opposite of logical thinking as a logical thinker will only be able to draw conclusions on success of strong arguments thus the thinking is limited and based on formal rules where as creative thinking does not have set boundaries and the thinker can think beyond the set rules and draw conclusion. Creative thinking gives a bigger picture and vision for the future created in the real sense. It holds a higher risk but often needed when identifying and diagnosing strategic problems. As creative thinking and logical thinking are opposite, the demand of both can be contradictory yet they are needed at the same time, (DeWit and Meyer, 2010). The best example of creative thinking is Apple Inc case study (DeWit and Meyer 2010) as their strategy involves creative innovative products and service in the competitive market. (Refer Appendix A). STRATEGY FORMATION (Deliberateness vs. Emergence) It is the process which determines the steps formed by organizations or individuals prior to its action. The process by which an intended strategy is created is called Strategy formulation (DeWit and Meyer 2010). Mainly top positions in an organization is responsible for strategy production. Managers do not only get themselves involved in the process of strategy formation but also in the ways it will be strategically implemented. When we think strategically we examine that deliberateness and emergence in the process of strategy formation cannot be kept apart. The major fact with strategy is that it deals with both, the plans made for the future and the process to implement those plans to achieve the aims demanding flexibility and adaptability. Deliberate strategy is more towards logical thinking and reflects the formal process of strategic planning and is based on actual facts, but the future is unpredictable and it becomes a foremost need of organizations to deliver their actions an d adapt according to the unfolding circumstances providing them opportunity of experimentation and trails in a particular market. A strong interconnection of such strategy is observed in the example of UPS case study (DeWit and Meyer 2010), (Refer Appendix B). STRATEGIC RENEWAL (Revolution vs. Evolution) When we talk about competitive markets in this changing world, dynamic environment, new technologies, transforming economics and customer demand all aspects are subject to constant changes in a challenging environment. For an organization to meet challenges and face threats in the market it is important to implement strategic changes to remain in harmony with the external environment. (DeWit and Meyer 2010). A change that breaks the old framework is said to be Revolutionary change and the change that is incremental is referred to as gradual change. Both the approaches are vitally essential in reshaping organizations despite of having conflicting qualities.

Sunday, October 13, 2019

Genetically Modified Foods Essay -- GMOs, Genetically Modified Crops

Public cities around the world are becoming more involved with a wide array of new technologies without realizing it. From super computers that calculate the movement of satellites without human involvement, to handheld personal computers. Consumers abide with an egregious array of brand new scientific advances that are accompanied by confusing new terms. The food and drug administration, commonly known as the F.D.A, is focusing much of their time with food biotechnology. The all-encompassing use of biotechnology when applied to agriculture and food production increases the deeply felt environmental, economic and ethical concern. The liberation of genetically engineered organisms into the environment poses apprehensive questions regarding the serious promising risk to human health. Genetic engineering or genetic modification is a procedure that requires direct human manipulation of organism’s genetic makeup, altering their DNA that would not commonly happen under natural circumstances. Such applications include the implementation of human genes into animals as well as animal genes into other animals and plants. The industry which practices this gene modification is commonly known as biotechnology. In the next few years this industry has plans to release genetically engineered bacteria, viruses as well as transgenic animals into the environment. With the release of engineered organisms, many feel apprehensive and concerned with the potential harm it may cause to human health. Because the modified organisms are living, they are more likely to be unpredictable than chemicals. Jeremy Rifkin suggests, â€Å"the long-term cumulative environmental impact of releasing thousands of genetically engineered organisms could be equally destruc... ... Fry-Revere, Sigrid. "Cloning Animals for Food Is Morally Permissible." Detroit: Greenhaven Press, 2009. At Issue. Gale Opposing Viewpoints in Context. Web. 1 Dec. 2010. Pollack, Andrew. "F.D.A. hearing focuses on the labeling of genetically engineered salmon." New York Times 22 Sept. 2010: B3 (L). Gale Opposing Viewpoints in Context. Web. 1 Dec. 2010. Pollack, Andrew. "Rules near for animals' engineering." New York Times 18 Sept. 2008: C15(L). Gale Opposing Viewpoints In Context. Web. 3 Dec. 2010. Phillips, Susan C. "Genetically Engineered Foods." CQ Researcher 4.29 (1994): 673-696. CQ Researcher. Web. 1 Dec. 2010. Entine, Jon. "Genetically Modified Foods Are Safe." Ethical Corporation (Apr. 2006). Rpt. in Genetically Engineered Foods. Ed. Nancy Harris. San Diego: Greenhaven Press, 2003. At Issue. Gale Opposing Viewpoints In Context. Web. 5 Dec. 2010

Saturday, October 12, 2019

The Possible Secrecy of UFOs :: Unidentified Flying Objects Aliens Essays

The Possible Secrecy of UFOs Unidentified flying objects, or UFOs, are one of the most controversial mysteries known to mankind. From ancient to present times, unidentified objects have been seen in the sky by millions of people. The question is, of course, what is it that we are seeing in our skies? Are they foreign spacecrafts from distant planets, merely Air Force experiments, or only our imagination? Many people believe that extraterrestrial life is existent and far more advanced then us. Conversely, many believe that aliens are just figments of our optimistic imaginations. What about our governments? Are they hiding vital information from us, the citizens of the world, in belief that we are better off not knowing the truth? Countless government employees have continually denied allegations of UFOs being in contact with our planet. Then again, many of these officials have also allegedly taken part in UFO cover-ups and seen flying saucers ­ for themselves. Is there some huge conspiracy, or are there only at tention-hungry people who wish to be in the spotlight? Arguments are incredibly strong for both sides. There is an excessive amount of information which could lead one to assume that UFOs are fiction, yet there is also an abundant amount of evidence which suggests that UFOs are in fact out there. What, and who, are we to believe? I. On September 1, 1859, Richard Carrington, a renowned astronomer of his time, saw two luminous bodies that he said were not meteors flying through the air (Lore 53). Nine years later at Radcliffe Observatory in Oxford, many astronomers witnessed a luminous object that moved quickly across the sky, stopped, changed course to the west, then to the south, where it hovered for four minutes. Then it headed toward the north. (Lore 53) UFOs. What are they, and where do they come from? Unidentified flying objects, or UFOs, are one of the worldÆ’Â ­s oldest and most intriguing mysteries. UFOs are commonly called flying saucers ­, which the American Heritage Dictionary defines as any of various unidentified flying objects typically reported and described as luminous discs (272). Esteemed Idaho businessman Kenneth Arnold coined the phrase flying saucer ­ when in June of 1947 he saw saucer-shaped discs flying over the Cascade Mountains. It was in this year that these unidentified flying object sightings began to escalate. About one month after Arnold saw these objects in the sky the incident at Roswell occurred.

Friday, October 11, 2019

Netflix Inc Case Study: Emily Heath Part 3- Alternative Solutions

Netflix Inc. ,: Streaming Away From DVD’s Case Study: Emily Heath Part 3- Alternative Solutions To ensure the company will achieve stability by maintaining customer appreciation and satisfaction, Netflix must invest their time and finances into new alternative solutions. The solutions are based on what problems have presented themselves and are in best interest of the customers and the company. The main concerns at the moment seem to be the unreliability and instability of the company as the guidelines for prices and methods of delivery are constantly changing.There are a few possible suggestions that are up for experimentation to resolve Netflix’s problems. 1. Incorporate commercials before and after everything that is viewed on Netflix. One of the greatest features about Netflix is the commercial free streaming that is available. However, to generate more income, including commercials before and after each video and movie will assist with that. Doing it at the beginni ng and the end still keeps that commercial free feel, as its not interrupting what’s being watched every five minutes the way regular TV does.Also, keeping the commercials to a minimum will allow for a quick message from the advertiser to the viewers. Although commercials are reoccurring and usually disruptive, if the customers know they are getting a better movie selection, they will be satisfied. By airing these quick commercials, we are generating more income from advertisers. Solution: Seek potential advertisers that will pay to advertise their products briefly before and after viewing videos.Advantages: Generating income for the company, potentially the reason Netflix may be able to expand its selections Disadvantages: Netflix will not be considered commercial free. 2. Expand the target market. Netflix is directed towards younger viewers (not by choice, due to the selection available, a target market was formed). By adding in a variety of older selection movies and TV sh ows that may appeal to different age groups will broaden the customer base. Also, extending the variety to younger markets.As of now, the limited variety of movies and TV shows do not accommodate extremely young and older potential subscribers. If there is more selection incorporated, we can include all age groups. By incorporating cartoons and shows for young children, we are opening up a door for new customers. Young children will be able to tune in and watch their favorite shows, making it a favorite for parents. By adding in older movies and TV series like Coronation Street that target the older market, we are opening the door to potential customers in an older age group.Solution: Incorporate more variety for a broader age group. Include child friendly TV shows and movies, to increase viewers at a younger age. Incorporate some of the older, less common TV shows and movies that target the elder customer base. Advantages: Opens the door for even younger and older customers Disadva ntages: May be costly for the company to initially start and will rely completely on the outcome. Netflix must be sure they will gain this extra customer base before making the investment. 3. Create a Customer Base (Expand Social Network) to improve the services of Netflix.The entire business relies on subscribers. If they don’t feel as if they are important, they will hesitate to continue paying their fees. Also, being able to communicate with the customers will create a more friendly and personal atmosphere. Starting up a chat room on Netflix to discuss what movies and episodes the subscribers want is a great option to explore. Also, by doing this we can get first hand information and opinions from the source. Letting the customer know we care about them will improve the bond they have with the business.With a way to communicate to the customers, Netflix will be able to expand their customer appreciation and make better decisions to satisfy the consumers. Solution: Create a chat room to incorporate customer feedback. Advantages: This will create a bond with customers, will allow for opinions based completely on the consumer and will allow for Netflix to make accommodating changes to any issues affecting the subscribers. Also this may save some potential investments down the line because with a better understanding from the customers, the company will know which areas to splurge on. Example: knowing what the customers want, allows Netflix to purchase more of the popular demands rather then take the risk with less popular options. Disadvantages: It may be costly to start up. Also, it will require someone always on hand to review the feedback. 4. The biggest problem that is associated with Netflix is the unstable price and payment plan. The reason Netflix is so popular is because that is what the people love. The fact there is a flat rate to watch unlimited movies is the greatest selling point for consumers.Every time Netflix announces a change to their flat rate, the amount of viewers decline along with the reputation of the business. It is the smartest idea to combine everything into one flat rate. A slight increase may allow for a newer and greater selection on Netflix. If customers are aware of the slight price change and understand it will be beneficial for them rather then the company, they will be a lot less hesitant to pay it. Solution: set a fixed price rate and plan for the customers. Advantages: With a straightforward price and plan, it becomes easier to account for.Consumers enjoy simplicity and are more willing to invest/continue paying for something that seems organized and permanent. Disadvantages: Loosing the separate effect of DVD’s and TV shows. Rather then support what Reed wants by keeping it separate, the company must support what the customer wants as it relies on consumer satisfaction. 5. Creating a rewards program for customers will encourage viewers to continue using the service and will potentially increase the time spent on Netflix by the consumers.By incorporating a reward for using the product, it will increase daily views by already existing customers and will open the door to a large amount of new ones. If consumers know that their time spent is valuable to the company, they will be more willing to continue subscribing and potentially increase their viewing times. Solution: Create a reward system that is based on views. (The more videos viewed, the better the reward) For example, if customers view over 30 hours a week on Netflix, a 5% decrease on the monthly payment may take effect. Not an actual set price and reward system for Netflix). Advantages: This increases weekly views and will assure the company a certain amount of views is always being accounted for. This also encourages people to spend more time using the product and attracts new customers. Disadvantages: a potential loss in the beginning for the company if they don’t have the sufficient funds. This is a lso time consuming for the company and will require attention to be spent primarily on rewarding the customers. Fixing Netflix With the 3 P’s (Conclusion)Price: Solution 1 and 4 (above) focus on the price. Netflix must erase competition by fixing a competitive price. Also, they need to make sure they are offering the most for the cost. Promotion: Solutions 1, 3 and 4 (above) focus on the promotion. By promoting itself with a new approach, Netflix can gain new customers and continue building relationships with the previous ones. Distribution: Solution 2 and 5 (above) focus on the distribution. Netflix must make sure its available to everyone and that it is a high demand.Using the solutions suggested will expand the customer base and improve distribution, allowing Netflix more control than other companies. Netflix has the capability to be a great dependable DVD rental and online video streaming service. A few slight changes and improvements made will ensure the business will st ay striving for years to come. Netflix must settle on a fixed rate to offer customers. As a completely customer reliable business, it is necessary to involve them in every way possible. As a company, it should and will be Netflix’s goal to show the customers what they want to see.By opening this two-way road, company workers and everyday customers will be able to discuss and potentially vote for what shows and movies they would like to see more of. Another thing to take into account are the opportunities for advertisements. The more advertisements Netflix can show throughout a day without interruption will improve the variety of TV shows and movies that they can air due to a budget increase. Netflix needs to become dedicated to its customers in order for it to be successful. Following these suggested solutions may help increase overall yearly sales and customer satisfaction.

Thursday, October 10, 2019

Religion and Politics in the Philippines Essay

I. What Struck Me? i. The Roman Catholic Church as an organized and institutionalized religion has had a significant role in and impact on Philippine political life. In recent times it served as the primary locus against the dictatorship of the Marcos regime and facilitated the 1986 People Power revolt that restored democratic structures and processes. ii. The Church’s efforts to help balance and establish boundaries of power in the Filipino polity revolve around the axis of clean, honest and fair elections†¦.Key church leaders do not have the patience to study issues in depth and, like ordinary citizens, lose interest once the winning candidates take office. iii. †¦.the more convincing explanation for the country’s poverty and underdevelopment lies more with how the elite factions compete for control over people, production, markets and resources and the success with which the winning faction, acting as patrons to government bureaucrats and politicians, uses the apparatus of the state to pass or enforce laws and policies which preserve or promote their class interests. 2. Agree or Disagree? i. With the first point I consider striking, I agree with it because I guess it’s an obvious fact, but I would like to comment on the fact itself. Religion, most of which, if not all, was Roman Catholic, played a big part in the Filipinos’ fight for democracy. Without the countless nuns and other religious personality uttering their respective prayers while holding their rosary, the result of the People Power Revolution could have been different,  not to mention the fact that Pres. Corazon Aquino, herself, was a devoted Christian. But now, the religious sect failed to be of great help in maintaining the democracy we all once fought for. It’s just too ironic to know that while Roman Catholic built back Democracy, it might just be the same reason for its downfall. ii. I agree. It’s not a secret to Filipinos that church leaders are one of the most influential personalities in terms of choosing a candidate for election. Worth the mention would be the Iglesia Ni Cristo group who are known for voting the candidate desired by their leader. Once their head announces his choice, everyone would be saved from wasting time thinking about what name they should write in their ballots. But after election, not a ruckus will be heard again about the relationship of the INC leader and the candidate he chose, no one would even know if they could still remember each other’s name. What the author posits in his contention is that the church, of whatever religion it may be, should not leave everything to the candidate after e has won. If church leaders really are for a good government, they shall not end their quest for it in just choosing a candidate. What lies ahead of that candidate after election is a bigger deal, something not a even an acolyte should ignore. iii. The last one may be the most interesting one. When we’re asked about what we think is the reason why our country has never gone farther than being a developing country, we often say it’s the lack of discipline on the side of the Filipinos, the unresolvable unemployment, or CORRUPTION. The last one is the most frequently-heard response, but the author here says that there’s a more convincing reason as to why we remain poor—the elite factions of the country and their ways of running the economy which then reflects to our current global standing. This has been evident in the Philippines, may just not be known to everyone but reality speaks, this country is ruled by oligarchs, and how we’ve become now economically, it’s their doing. This has been opened up once by the late Angelo Reyes, that cabinet member who shot himself when he has been faced by countless accusations which included using the money of the government which amounted to billi ons for personal purposes. 3. Author’s Conclusion and My Opinion The author concludes that the church should widen the scope and breadth of practicing what it seriously preaches. I believe that yes, they should go beyond what they normally do and what they thought the only thing they could do. What priests preach shall reflect what church does. Philippines is undeniably a religious country, not to mention her being the Asian country with the biggest number of Christians, and with this, we could say that what the church says is a big deal for everyone. Democracy and religion may be two different planets, but what we have here is a religious Filipino who lives in a democratic Philippines, so the Church plays and may continue to play a big role in the democratization of the Filipino polity, and she can do big. Questions: i. I may have agreed to the contentions of the writer, but all those time, I was wondering if letting the Church meddle in the affairs of the state, specifically political, would not violate the provision on Article II, Section 6 of the 1987 Philippine Constitution which declares that â€Å"Separation of State and Church shall be inviolable.† ii. The author often asserts that the social teachings of the Church would be the best tool in changing this country to be more democratic. Isn’t he aware of the fact that these teachings are never even proven to have penetrated the corrupt hearts of an individual, how much more a polity? iii. The Church is said to be one of the agents for nation-building, what steps has the Church taken to live up to her purpose as a nation-builder? ——————————————– [ 2 ]. See, for instance, the three papers presented in the 1989 symposium on religion and politics in the Philippines sponsored by the Association of Asian Studies, namely: Gretchen Casper, â€Å"The Changing Politicization of the  Philippine Roman Catholic Church, 1972–1988†; Robert Youngblood, â€Å"Aquino and the Churches: A ‘Constructive Critical Solidarity’?† and Lela Garner Noble, â€Å"Religion and Opposition to the Marcos Regime,† in Pilipinas 13 (Fall 1989): 43–55, 57–72 and 73–87 respectively.

Wednesday, October 9, 2019

Profiling of Street Crime in Philippines Essay

Introduction Street crime is – criminal activity that happens in a public place usually in a town or city, for example stealing people’s personal possessions or snatching, vandalisms, theft, physical injury and extortion. Street Crimes are usually committed in outdoors and it can be happen in strange or to an unfamiliar places. It can even take place to your own community. Street Crimes can be done in many different forms such as pick-pocketing, bag, necklaces, earrings and gadget snatching, car theft, motorcycle theft and even hit and run and many other related criminal acts that takes place within a street. (http://www.thepoc.net/thepoc-features/buhay-pinoy/buhay-pinoy-features/15180-how-to-protect-yourself-from-street-crimes.html). These Street crimes are very wide spread in the area of responsibility in of DV-Soria, police community precinct 01. Criminals usually choose to commit these crimes in a specific places and specific times to attack their victims. Does the street crime only exist in the night time? Or, does the street crime is rampant in day time? Who are the usual victims of street crimes? Male or Female ? Young or adults ? These questions will be answered by means of this study. Actually, the researcher was a victim of this street crime. Way back then, when he was in high school his class schedule ends at night time and he could still remember the time when he was walking alone along the Velez St. heading home to Capt. Vicente Roa St., there was a group of people who blocked his way and threatened him while asking a big amount of money, but he have nothing to do but to give what he has. Being a victim of Street Crimes is not a good experience, at first it could leave a trauma to the victim such as being afraid to walk alone in the evening especially if there is a group of people gathering to a particular area. Everyone could be a victim of Street Crimes especially all of us go out to our houses. The researcher decided to pursue the study of street crimes received in police station 01 because it was introduced by his instructor and he wanted to know how it contributes outcome in our community in terms of the percentage of crime volume. The Community Precinct 01 was placed in the heart of the city along Abejuela /T. Neri /Burgos Sts, Cagayan de Oro city. Station is one of the very high populated areas in Cagayan de Oro because of the affordable items in stores and many other business establishments which bring a large number of people to visit the place. The Police Station No.01 (PS 01), formerly Operation Kahusay ug Kalinaw (OKK), is located at the heart of the city along Abejuela /T. Neri /Burgos Sts., this city, with the boundaries from North – Barangay 17 and 18, South – Barangay 01, West – Carmen River and East – Barangay 03. PS 01 composed of Twenty (20) Urban Barangays from 01 to 20 with a total land area of ninety three point seven hundred twenty five (93.725) hectares. Based on present statistics, it is inhabited by more or less 18,446 inhabitants. Vital installations located in the Area Of Responsibility (AOR), Twenty Nine (29) commercial establishment and Four (04) government banks, Three (03) churches, Fifteen (15) government offices, One (01) water reservoir, One (01) mall, Three (03) communication towers and Four (04) private hospitals.. In the Independent Variables of this study includes the: Classification of Street Crimes Theft / pick pocketing: Is an act where any person taking the property belonging to another person without force or violence. Any person who steals objects or items from the pocket or shoulder-bags of the other person in a public places or of any establishments along the street. Physical Injury: is an act of any person inflecting pain, damage, harm or hurt to another person. Robbery / Extortion: The act of securing, seeking, money or favors by means of threat, blackmail or intimidation. Hit & Run: It involved in or denoting a motor-vehicle accident in which the driver leaves the scene without stopping and give assistance to the harmed or injured person, or give information to the police. Vandalism: Is an act of a certain person writing the wall or any part of the establishment by use of paint, coal, of any forms of writing instrument by destruction. In the dependent variables of this study includes the: profiles of street crime victims Profile of Victims: refers to the profile of any person or individual being injured, extorted, snatched, pick-pocketed, and more being stated in the independent variables. Age of the Victim: Refers to the age of the victim during the incident, if the common victims are children, teenagers, adult or even old. Gender of the Victim: corresponds to the sex of any person and which is integrated in this study to see the usual victims of street crimes. MALE: refers to a boy [Masculine] FEMALE: refers to a girl [Feminine] Time of Incident: refers to the time when crime was committed if it is dawn, morning, noon, afternoon, evening and midnight, it is being included to this study to discover what time usually a certain street crime will occur. Date of Incident: Refers to the month of the incident when crime was being committed, and it is included in this study to determine what month, a certain street crime will be having a large number of existence. Location of Incident: Refers to the Address or place were the crime was committed, and it is included in this study to identify which place of the community precinct 02 area of responsibility crime was much uncontrolled. Statement of the problem This research studied the classification of street crimes from January to December in the year 2011. Specifically, it sought to answer the following questions. 1.What is the most extensive street crime in the area of responsibility in Police Station 02 in the year of 2011 and 2012. a.Theft / Pick Pocketing b.Physical Injury c.Robbery / Extortion d.Hit & Run e.Vandalism 2.What is the profile of victims in each street crimes in terms of a.Age of the Victim b.Gender of the Victim c.Time of Incident d.Date of Incident e.Location of Incident Significance of this study The objective of this study is to collect information or data on the classification of street crimes received in police station 02 in the year 2012 and to be a reference of the for future researcher for related studies and compare the volume of street crimes before and nowadays in the record of police stations specifically in station 02, next is to present to the community precinct 02 the exact place and time were a certain crime is over exceeding. PNP Personnel, this study will serve as the basic guidelines of the police personnel to perform their job well and to be more alert to a certain area in a certain time; it will also help them to make plans for their future action in preventing the occurrence of the street crimes. To Community, On the other hand the police community relation could disseminate the information to its community and make the civilians aware to the existence of such street crime existing to a specific area and time, and to avoid being a victim of it. Barangay Officials, the local government unit will also be alert and Should deploy barangay police to a specific place where a high incidence of street crime is existing in order to maintain the peace and order and prevent those criminal minds in committing such street.