Tuesday, December 24, 2019
Justice System Position Paper - 1845 Words
Justice System Position Paper Dorothy Brockington University Of Phoenix Introduction to Juvenile Justice Timothy Cariker March 5, 2011 Justice system position paper The purpose of this paper is to state my belief that juveniles should and can be rehabilitated. The goals and efforts of rehabilitation are to keep the juvenile offenders out of the correctional facility. Peers impact delinquency in several ways for instance; most teenagers follow their friends do to peer pressure.â⬠¦show more contentâ⬠¦The juvenile justice system should adopt the focus of rehabilitation verses punishment for reasons such as, when juvenile delinquents are order by a judge to become rehabilitated they tend to learn from their mistake and attempt to make a life change for the better. Most juveniles who committed to becoming rehabilitated have become successful with deterring from criminal activities. In many cases some juvenile delinquents have grown to be productive throughout their teenage years into adulthood after receiving rehabilitation. Rehabilitation has an affect on law enforcement, court process, probation, corrections, community service, and intervention programs for example, within law enforcement most juvenile offenders stand a lesser chance committing a second offense. This would allow the law enforcement to focus on new cases of criminal offenders. In addition to focusing on new offenses, law enforcement can utilize the funding that it would take support the process and use it in other areas most needed. ââ¬Å"Almost all federal support for juvenile law enforcement activities comes through grants made to states and local agencies.â⬠(Rabkin, J.N., 1998) Most juveniles are recommended rehabilitation during the court process. Until the juvenile delinquent has meet all requirements set by his or herShow MoreRelatedInvestigation Of Criminal Justice And Corrections1539 Words à |à 7 Pages Criminal Justice and Corrections Staci Pribbenow Kaplan University Introduction Criminal justice has been a passion of mine for many years. It wasnââ¬â¢t until recently that I decided to go back to school to obtain my masterââ¬â¢s degree in criminal justice. I have chosen to focus on the field of corrections in the criminal justice system. I want to make a difference and help those individuals that need help once being released from a prison setting. There are so many differentRead MoreCourt System Paper1265 Words à |à 6 PagesRunning head: COURT SYSTEM PAPER Court System Paper AJS 502 21 May 2013 John V. Baiamonte, Jr. PhD ââ¬Æ' Florida County Courts The state of Florida 67 County Courts along with the Circuit Courts, Florida District Court of Appeals and Supreme Court are established via the State Constitution under Article V titled Judiciary. County Courts Judges differed basedRead MoreTraining For A Leadership Position1523 Words à |à 7 Pagesleadership position. They are looking to secure the chief prosecutor s position in Macon County, South Carolina. ââ¬Å"Assistant prosecutor Norris has been a member of the Macon County Prosecutor s Office for 30 years. Norris joined the prosecutor s office straight out of law school, and he has acquired experience that cannot be matched by any other prosecutor in the office.â⬠(South University Online, 2016, para 1) Assistant prosecutor Norris concedes that he does not have the training and paper credentialsRead MoreExclusionary Rule Evaluation872 Words à |à 4 Pages Exclusionary Rule Evaluation Paper University of Phoenix CJA 364 Abstract The following paper will analyze the rationale and purpose of the exclusionary rule and identify exceptions to the exclusionary rule. In this analysis, it will state the costs and benefits of the exclusionary rule, as well as alternative remedies to the rule. The author will state their position on the exclusionary rule and provide support for their position. The author will also include supportRead MoreEssay about Swot Analysis: Police and Society979 Words à |à 4 PagesPolice and Society SWOT Analysis (Paper #1) Ever since September 11th, 2001 a lot of Law Enforcement agencies were created. Many were federal level agencies and others were state level agencies. When asked to compare two different Law Enforcement Agencies, I chose to compare and analyze the Drug and Enforcement Administration (DEA) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). The reason I chose to compare these two agencies is because I feel that these two agencies haveRead MoreThe Legalization Regulation Of The Sex Trade Essay849 Words à |à 4 Pages This paper argues for the decriminalization plus regulation of the sex trade. This paper will defend the position that activities associated with adult prostitution (advertising, buying, soliciting, living off the avails and keeping a bawdy house) should be decriminalized/ legalized due to: a) the capacity for criminalization to infringe on sex workerââ¬â¢s fundamental rights to life, liberty, and security and b) the capacity for criminalization to prohibit sex workerââ¬â¢s from actively preventing harmRead MoreJury Awards Should Be Restricted1648 Words à |à 7 Pagesaward policy has been under a scathing attack from various quotas. The tort liability system is perceived by many people to be out of control, unpredictable, and capricious. Some of the people who have voiced their frustration and disapproval of the system are judges, legislators, and executives from the pharmaceutical, medical, and insurance industries (Greene, Coon and Bornstein, 2001). The critics of the sys tem argue that jury damage awards are highly unpredictable and often excessive on the partRead MoreFidel Castro s Courtroom Defense Speech1317 Words à |à 6 Pages moving and addressed the issues that plagued the nation. This paper shall seek to defend most of his ideologies, explain the importance and relevance of the speech. Fidel Castro in his speech portrayed the government as a very corrupt institution, in his words, he said that the entire government comprised of wolves and individual that of coward countenance; this was because he had been denied any legal aids. His demands for justice fell entirely on deaf years. According to Fidel Castro the headRead MoreThe American Political System Is Built On A Foundation Of Checks And Balances928 Words à |à 4 PagesThe American political system is built on a foundation of checks and balances, yet there is one branch which has somehow evaded this practice. The federal court system is defined by Article III of the Constitution, it represents one of three of the most powerful hands in the federal government. Unfortunately, the article which outlines its functions and limitations is extremely vague in nature. As stated in Article II, Section 2, Clause 2, the President holds the authority to appoint a federal judgeRead MoreCriminal Justice System Paper803 Words à |à 4 PagesCriminal Justice System Paper CJA/204 Vonnie Cooper March 28, 2011 Ken Salmon The word ââ¬Å"crimeâ⬠means an illegal action that is prohibited by law or a breakage of certain laws set forth by the criminal justice system. When someone
Sunday, December 15, 2019
The Chemistry of Organic Molecules Free Essays
THE CHEMISTRY OF ORGANIC MOLECULES I. MACROMOLECULES-large molecules that are composed of smaller molecules and atoms that are bonded together. These are among the largest of all chemical molecules. We will write a custom essay sample on The Chemistry of Organic Molecules or any similar topic only for you Order Now A. Polymers-the largest of the macromolecules. These are composed of numerous, small identical subunits known as Monomers. There are 4 major polymers that are important for living organisms. These polymers are; carbohydrates, lipids, proteins and nucleic acids. B. Polymers are referred to as being organic compounds. Organic compounds are compounds that contain the elements carbon and hydrogen. 1. Chemical Properties of Carbon a. Carbon has 6 electrons. What is the structure of a carbon atom? b. Carbon can form 4 single covalent bonds with other atoms. It also has the ability to form double bonds with some atoms. Overall, the 4 bonds that carbon forms with other atoms makes the carbon stable. This stability is what makes carbon an important component of macromolecules. C. Functional Groups-groups of covalently bonded atoms that have definite chemical properties. 1. These always react in the same way, regardless of what molecule they are a part of. 2. Some polymers have several functional groups. . The exact arrangement of a functional group in a molecule greatly influences and determines the chemical properties of the particular molecule. 4. Important Functional Groups: a. Hydroxyl b. Carbonyl c. Carboxyl d. Amino e. Sulfhydryl f. Phosphate D. The Formation and Destruction of Polymers 1. Dehydration (Condensation) Reactions-reactions in which monomers bond together to produce polymers. a. Water is lost from the monomers in these reactions. 2. Hydrolysis Reactions-reactions in which polymers are broken down into monomers. a. These reactions require an input of water to occur. II. 4 MAJOR POLYMERS IN LIVING ORGANISMS A. Carbohydrates B. Lipids C. Proteins D. Nucleic Acids III. CARBOHYDRATES-includes sugars and related compounds. A. Carbohydrates are composed of three major elements: B. Carbohydrates tend to be very strong compounds due to the presence of carbon-hydrogen covalent bonds. C. Carbohydrates serve as a major source of energy for living cells. Some carbohydrates also serve as structural compounds in living cells. D. 3 Classes of Carbohydrates 1. Monosaccharides-simple sugars a. These serve as monomers for many of the larger carbohydrates. b. Structurally, these serve as rings or chains. c. Types of Monosaccharides 1. Glucose-C6H12O6 a. Serves as a major energy source for living cells. 2. Fructose a. Isomers-compounds with the same atoms and the same number of atoms but, that have different structures. Glucose and fructose are isomers of each other. 2. Dissacharides-sugars that are composed of 2 monosaccharides that are covalently bonded together. These are formed by dehydration reactions. a. Types of Disaccharides 1. Sucrose 2. Lactose 3. Maltose 3. Polysaccharides-sugars that are composed of more than 2 monosaccharides that are ovalently bonded together. These are often very large molecules. a. What types of reactions are these formed by? b. Types of Polysaccharides 1. Starch-a stored form of glucose in plant cells. Plants can use starch for energy under times of need or stress. Amylose is a common starch. 2. Cellulose-makes up the cell wall of plant cells. This is a thick, protective polysaccharide. Many animals do not contain the needed enzymes to break this compound down. Deer, cows and a few other animals have special bacteria in their stomachs that help digest and breakdown cellulose. 3. Glycogen-the storage form of glucose in animal cells. Many animals can convert glycogen into glucose under times of need or stress. This glucose can then be used as an energy source. Glycogen is stored in the liver and in some muscle fibers. 4. Chitin-a structural polysaccharide found in fungi and insects. This is also a thick, protective compound. IV. LIPIDS-includes fats, oils and waxes. A. All lipids are insoluble in water. 1. What does this mean? B. Functions of Lipids in Living Organisms: C. Structure of a Typical Lipid 1. Lipids are composed of 2 major components: . Glycerol-a 3 carbon alcohol. 1) Hydroxyl groups bond to each of the carbon atoms in glycerol. 2) Glycerol serves as the major backbone unit for most lipids. b. Fatty Acids 1) Three fatty acid molecules attach to glycerol to form a lipid. Each fatty acid replaces the hydrogen atom on the hydroxyl groups of the glycerol molecule. Due to this, there is one fatty acid bonded to each carbon atom of the glycerol molecule. a) Due to this arrangement, lipids are often referred to as triglycerides. 2) Saturated fats-occur when the fatty acid groups contain single covalent onds between their carbon atoms. There are no carbon to carbon double bonds in these. a) In other words, the carbon atoms are saturated with as many hydrogen atoms as possible. b) These are known as animal fats are solids at room temperature. c) Are these bad for us? 3) Unsaturated fats-occur when fatty acids contain double bonds between their carbon atoms. These are often referred to as vegetable oils. a) Polyunsaturated fats- b) These types of fats are liquids at room temperature. D. Types of Lipids 1. Phospholipids-contain only 2 fatty acid tails. These are found in cell membranes. They have hydrophilic heads and hydrophobic tails. 2. Waxes-serve as protective coverings over surfaces. 3. Hormones-chemicals that regulate the growth and functioning of living organisms. 4. Steroids-there are several different types of steroids: a. Cholesterol-common steroid. 1) Humans do need a small amount of cholesterol for: a) The formation of Vitamin D b) The production of estrogen and testosterone 2) Cholesterol is carried through the human body by 2 proteins that are found in the human bloodstream: a) Low-density Lipoprotein (LDL)-this protein is responsible for elivering cholesterol to body cells and tissues where it is needed. This is often referred to as the ââ¬Å"bad cholesterol. â⬠b) High Density Lipoprotein (HDL)-this protein removes cholesterol from cells and tissues and transports it to the liver where it is secreted into bile. This is usually known as ââ¬Å"good cholesterol. â⬠1) Bile-compound that is secreted by the liver that aids in digestion. Bile is also a waste product that is excreted from the body. It contains fatty wastes and it is excreted via feces. 3) Cholesterol in the human diet comes only from animal products. ) Normal Cholesterol Readings in young individuals should be around 180mg/dl. This rises to 230-250 mg/dl as humans age. 5) An important issue relating to cholesterol is the LDL/HDL Ratio. a) A high HDL values ensures that cholesterol is removed from body tissues in an adequate fashion. b) A low HDL values indicates that cholesterol removal is not occurring as it should. c) If cholesterol is not removed from the body, it can form plaques or deposits in the arteries of the body. This is a major cause of heart disease and heart attack. 6) How can an individual increase their HDL levels? b. Anabolic Steroids 1) These steroids are thought to increase muscle mass. 2) Side Effects of Steroid Use Include: c. Not all steroids are bad. Some are used to treat allergies and other human illnesses. These steroids do not cause the side-effects mentioned above. V. PROTEINS A. Functions of Proteins in Living Organisms 1. Make up cell membranes 2. Make up enzymes- 3. In collagen-protein that provides strength and support to structures in the body. 4. In keratin-a thick, protective protein. 5. Transport-some protein carry various materials through the body. An example would be hemoglobin. 6. Defense-proteins are in antibodies. 7. Proteins make up the contractile portion of human muscle. The major contractile proteins are actin and myosin. B. Proteins are found in and are essential for both plants and animals. C. Protein Structure 1. Proteins are composed of many amino acids that are bonded together. 2. Peptide Bonds- 3. Chains of bonded amino acids are often referred to as polypeptides. 4. What attaches amino acids together? 5. Amino Acids-there are 20 naturally occurring amino acids. They can bond in a variety of sequences to produce proteins. a. General Structure of an Amino Acid: . Some common amino acids include: phenylalanine, tryptophan, asparagine 6. Proteins can occur as simple chains or they can exhibit complex structures. 7. Denaturation- a. What can cause denaturation to occur? VI. NUCLEIC ACIDS A. These are composed of nucleotides that are covalently bonded together. What forms these bonds? B. Individual Nucleotides Contain: 1. A 5 Carbon Sugar 2. A Phosphate group 3. A Nitrogen-containing base C. Types of Nucleic Acids: 1. Deoxyribonucleic Acid (DNA)- 2. Ribonucleic Acid (RNA)- 3. Adenosine Triphosphate (ATP)- 4. Coenzymes- VII. MACROMOLECULES AND THEIR MONOMERS How to cite The Chemistry of Organic Molecules, Essay examples
Saturday, December 7, 2019
Models of Cloud Computing-Free-Samples for Students-Myassignment
Question: Discuss about the "Advantages and Disadvantages of Cloud Computing for Businesses". Answer: Introduction Globally, business have incorporated Technology in their business operations with aim of making service delivery more dynamic (Truong 2010, p. 5). To organizations which have already adopted Technology, they have gained competitive advantages compared to their competitors. In current business world, many of the advanced organizations have changed their scale on Technology. They have gone a step ahead to adopt a more dynamic technology such as cloud computing technology which facilitates storage of data in the space. Similarly, other services such as application can be offered from the space without necessarily installing them on the client machine or a workstation. In view of the services offered online by some companies, cloud computing has become so reliable by many of the organizations which feel storing data on their own is quite delicate and expensive (Krutz Vines 2010, p. 20). Despite many advantages from adoption of cloud computing, there are still some drawbacks which organi zations find challenging when planning to invest in cloud computing. It would be quite important for organizations to research and evaluate on type of business services which would be offered from cloud before opting for the service. Project Objective The main goal is to determine if organizations benefit from cloud computing investment. It has to focus on evaluating whether cloud computing offers benefits to all business irrespective of their size and determine if there is a major beneficiary in cloud computing between customers and service providers. Project scope This project involves evaluation of the advantages and disadvantages of cloud computing to businesses. It covers advantages that various businesses have realized by adopting cloud computing in their daily operations. Google Inc, Zappos and IBM are some of organizations that would be used to evaluate the context of the project. It has to evaluate benefits and disadvantages as they are realized by both customers and service providers. Literature Review Businesses that have adopted cloud computing services in their operation has following benefits; IBM has realized substantial benefits because its customers are able to deliver quality IT services. According to Marston et al (2011, p. 78), through cloud computing, Technological services are delivered smoothly to various customers efficiently and from the globe. In addition, IBM realized how cloud computing could help in enhancing ways in which it can meet organizational Technological resource demand. In turn, IBM has gone an extra mile in implementing successful cloud computing in its business operations. It is quite interesting to have IBM praising how cloud computing has helped it to respond effectively to its organizational customer needs. In one of the interesting scenarios, through cloud computing, IBM has been able to offers to its esteemed customers flexible and very scalable solutions when demands of services has been high such that, organizational IT staff cannot meet custom er need due to high demand of the a given product (Armbrust et al 2010, p. 45). Through implementation of cloud computing, IB has been able to offer servers with high storage and networking capability with a short period of time compared to previous experience when there was no cloud computing services. Moreover, it is through cloud computing that, IBM has been able to improve on its productivity services from European benchmark center. The center has been used by customers to test if provided IT resources work as expected by international standards. Through European benchmark center, cloud computing has reduced selling cycle time and has resulted to increase in center capacity (Hofmann Woods 2010, p. 23). Hence, high profit margin from IBMs increased business activities. In other IBM research centers such as Watson and Zurich, cloud computing has been a major tool in scheduling and completing more than expected projects. With help of cloud computing technology, IBM has been able to provide requested research software within short period of time and in many remote locations. In return, IBM has evidenced better utilization of resources, consolidation of capital budgeting within organization and increase in scale of production (Sultan 2010, p. 56). Further, in current diverse busines s environment, cloud computing is known to improve business value since IT specialists and professionals can give out a lot of their time in strategizing on how to increase the value of IT services in their business. Through cloud computing, it is possible for organizations to liberate liberates its services that it used to do before discover of cloud computing services. Truong (2010, p. 63) asserts that, it is only through cloud computing that, it has been possible to avail some IT applications and their related infrastructure in a more dynamic way despite location of the customer. Increase in service delivery has been due to ability to initiate tasks that can help in creating, configuring and adding extra computing power in order to support IT organizational business service delivery. As a result of enhanced service delivery, it increases customer delivery trust making it easy to enhance market coverage. Consequently, according to Aljabre (2012, p. 102), cloud computing has demonstrated ability to promote Technological optimization which helps in configuring IT resources more effectively while organization cost-benefits. IT resources optimization has been made possible due to the fact that, cloud computing has ability to support high business scalability while meeting any period of high demand. At the same time, it has to be so flexible to avoid underutilization of available IT capacity. It has been possible to regulate IT resource utilization by worldwide through use of cloud computing. As most of business realize the importance of cloud computing, it is would be good to make sure they achieve resilient. In this regard, IMB has gone an extra mile in offering cloud validation application which is used to confirm the resiliency of any organization offering its services through cloud computing. Through use of IBM validation program, customers are able to identify and partner with verif ied service providers that have undergone rigorous evaluation on their capability to offer services (Leavitt 2009, p. 12). This makes cloud computing customers get quality service with all expected benefits from cloud computing. Finally, data storage in cloud computing services has proved to be very secure since there are no risks that can be associated employees deleting or tempering with stored organizational data. In relation to organizational data security, data availability is assured all times by the service provider through cloud computing (Truong 2010, p. 71). Security is a duty to the hosting company and it has to guarantee its customers no data risk would be encountered and privacy of the information would be at the topmost priority. Cloud computing has become norm of the todays business due to competitive advantage that many of the organization has been reaping. After some of the companies analyze how peer companies have successfully employed cloud computing in their business operation, they have been forgetting there are still consequences that are associated with cloud computing. First, data stealing has been a major issue that organizations implement cloud computing has been faced with (Dikaiakos 2009, p. 10). It has been evidenced that, number of internet users has increased substantially probing system attacks through viruses, worms and cyber terrorists. A good example was witnessed in Google Inc, where there servers were hacked. It has been observed that, adopting cloud computing has become one of the highest rated issue in cyber security. This has become a major concern since service providers are faced with challenge of securing other organizational data. Some of the areas which has been of interest by m any organization include; organizational databases, systems operating and transaction (Abadi 2009, p. 33). In a different scenario, Zappos Company was affected by cyber theft where over 24 million account details were stolen including credit card information. It is very clear that, data stealing has been a major issues in the cloud computing because some of service providers cannot guarantee safety of their customers data. Similarly, according to Jensen et al (2009, p. 201), malware Injection Attack has been so widespread where organizational systems has been compromised by hackers. This has been common to organizations hosting their services on the cloud. In normal circumstances, hackers target organizational hosted application by finding out on their vulnerabilities then change their normal way of business operations. When a vulnerability is identified on cloud hosted system, an application is created to help in injecting malware in subject organizational services. Through such activities, the hacker is able to have control of the data or listen to sensitive data flow flowing through organizational communication channels. When hackers gain access to organizational servers, they try to compromise data or take control of the entire organizational data resulting to system unavailability. From Google Inc instance, the attacker gained access to organizational database and copied all sensitive information such as credit card numbers and clients account details. A lot of sensitive data went to the wrong people due to use of cloud computing technology without proper security implementation (Lawson, Wolthuis Cooke 2010, p. 97). Therefore, before any organization can opt to venture on cloud computing services, it is important to analyses if there is enough security to host their data. Some of the scripts that are mostly used by hackers to gain access to organizational cloud systems include; HTML and VBScripts. Additionally, cloud computing has been blamed by many organization due to its inability to have data privacy. Cloud computing makes data available to all organizations in unencrypted form. The problem of data privacy has been complicated by lack of lack of system control and failure to follow regulation set to offer data protection (Subashini Kavitha 2011, p. 109). It has been a common norm that, many of organization upload their data to cloud in order to share without knowledge of issues that might be caused by data privacy and confidentiality. Rules of data confidentiality and privacy holds that, personal and organizational information has to be safeguard from unauthorized access in order to maintain secrecy of operation and conducting business. In cloud computing, privacy has been a major issues since organizations do not know where their data is stored, who has control over it and what has been happening on it. Besides data privacy, there has been Denial of Services (DoS) which has become another issue on service availability offered by cloud computing service providers. Through use of various types of attacker, hackers make cloud services inaccessible to certain organization by bringing all its services down (Krutz Vines 2010, p. 263). One of the common known DoS has been on network level where organizational network is completely taken down by sending a lot of traffic to the servers to make them inaccessible. The main target of the hacker is to overload the server such that it cannot provide service requested by the customer. Consequently, in the era where technology is becoming obsolete so fast, cloud computing technology and infrastructure has been changing so fast forcing organizations to incur a lot of cost to overhaul current data centers. In reference to research done in 2007, it was found that before 2012, most of organizations would be required to modify their data centers in order to keep in with required cloud computing technology (Kaufman 2009, p. 58). These changes are getting their way in to the market due to; users increase in demand where almost entire technological society is in need of having real time data access and in a secure computing environment. High customers expectations have resulted to creation of data centers that IT administrators are not able to meet their requirements. Finally, most of data centers are composed of different collections ranging from Operating System that support entire cloud computing applications, hardware and other application systems that have accumulated for several years without update. This scenario gives rise to high demand of having so many system images without knowledge of IT administrators. Buyya, Beloglazov Abawajy (2010, p. 14) argues that, with this complex system within an organization, it may require technical staff in order to be able to troubleshoot issues that may arise form data centers as well as reduce risks that are associated with outages of required services by customers. Increase in amount of services being offered by cloud computing providers, more services are still getting their way into the cloud. This is increasing demand of services from various users who are using different devices and operating system resulting to increased data management. Conclusion To customers who have opted for cloud computing, they have gone ahead to dump other costly operational systems since with cloud services, they are able to incur very minimal cost of managing the system when compared to inbuilt systems. With cloud services being accessible from anywhere and anytime, organizations are able to reduce expenses incurred while hosting many employees in offices since most of the offered services can be managed from single computer from individual home. This has been made possible by the fact that, cloud computing services are accessible from anywhere but just click of a button. Lastly, important to remember is that cloud computing has its drawbacks that limits many of the small business from venturing in it. It would be wise to have a thorough research before investing in cloud computing services. References Abadi, D. J. 2009. Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull., 32(1), 3-12. Aljabre, A. 2012. Cloud computing for increased business value. International Journal of Business and social science, 3(1). Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. Zaharia, M. 2010. A view of cloud computing. Communications of the ACM, 53(4), 50-58. Buyya, R., Beloglazov, A., Abawajy, J. 2010. Energy-efficient management of data centerresources for cloud computing: a vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308. Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., Vakali, A. 2009. Cloud computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5). Hofmann, P., Woods, D. 2010. Cloud computing: The limits of public clouds for business applications. IEEE Internet Computing, 14(6), 90-93. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L. 2009. On technical security issues incloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). IEEE. Kaufman, L. M. 2009. Data security in the world of cloud computing. IEEE Security Privacy, 7(4). Krutz, R. L., Vines, R. D. 2010. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Lawson, J., Wolthuis, J., Cooke, E. 2010. U.S. Patent Application No. 12/900,368. Leavitt, N. 2009. Is cloud computing really ready for prime time growth, 27(5), 15-20? Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. 2011. Cloud computing. The business perspective. Decision support systems, 51(1), 176-189. Subashini, S., Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11. Sultan, N. 2010. Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116. Truong, D. 2010. How cloud computing enhances competitive advantages: A research model small businesses. The Business Review, Cambridge, 15(1), 59-65. Zhang, Q., Cheng, L., Boutaba, R. 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18.
Saturday, November 30, 2019
Study of Mobile Phone Addiction and Usage Behavior Among Youths free essay sample
The purpose of this report is to investigate the mobile phone addiction and usage behaviors focused on young users and research the relationships of them. The research shows that most of young users keep their phones on hand all the day because they need to contact with friends through talking on the phone or text message with them. In addition, as the development of internet, people can release fresh news anytime at anywhere. Anyone else could see that and they could exchange ideas about fashions on the phone through internet too. Besides, the author believed that the more use of mobile phone, the more attendant problem will appear. The conclusion has shown that the relationship between mobile phone addiction and usage behavior is cause and effect. Peer relationship restrict them have to take their mobile phone everywhere, it is quite possible to be addicted in the mobile phone uses and lead to some bad usage behaviors. We will write a custom essay sample on Study of Mobile Phone Addiction and Usage Behavior Among Youths or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The recommendations of the report are focused on young people restrictions. On the other hand, young people should also be encouraged to engage in some extra activities after class to build up their true relationships and learning some living skills. Introduction In this day and age, it is universally acknowledged that mobile phone is among the most prominent kinds of information and communications technology (ICT) and is probably also the one that has shown the most spectacular development during the past few years with regard to technological innovations, social impact, and general use by the majority of the population (M. Choliz, 2013). Especially in young people, mobile phones are spreading in popularity, increase their social communication frequency and expand their opportunities for making social relationships (Igarashi et al. , 2005 and Matsuda, 2000) using this technology. However, there are also some negative effects on using mobile phones among young people. For example, the use of mobile phones in schools reduces the concentration of the students during class (Hiscock, 2004 and Selwyn, 2003), creates billing problems (Funston and Mac Neill, 1999 and Youth Action, 2004), leads to unsafe driving habits (Pennay, 2006 and Walsh et al. 2008), and causes mobile phone addiction (Ehrenberg et al. , 2008 and Walsh and White, 2007). Of all of these outcomes, mobile phone addiction has the strongest relationships with mobile phone usage. Therefore, examining the relationships between mobile phone addiction and mobile phone usage for adolescents can help them keep away from addiction and cultivate healthy habits of usag e behavior. Method This survey was completed by interviews of schoolmates and some investigations in the electronic database. Ten respondents (5 male and 5 female) were asked a series of questions regarding their opinions of mobile phones addiction and their mobile phones usage situation includes the daily mobile phone usage-time and the amount of money spent monthly on mobile phone. Respondents provided details about their average daily time using mobile phone; then they were asked to answer two open-questions. In the meantime, in order to clarify the relationships between the mobile phones addiction and usage behavior, the author also searches the electronic database to find some authoritative articles in Expanded Academic ASAP Journal. Mobile phone addiction and mobile phone usage behavior According to the survey, 95% of the respondents said they spent almost half of the daytime on their mobile phones, even at night; they are unwilling to put it away from hands. Research shows that mobile phone addiction is significantly correlated with the total of phone-talk time, and the number of calls and text messages (Billieux et al. , 2007 and Billieux et al. , 2008). Besides, mobile phone usage behavior can spread fast through young people because they like to chat or contact with friends no matter when and where. If someone do not have a mobile phone or do not usually use it, it maybe means that he/she cannot catch up with fresh news or fashionsâ⬠according to one of my classmates. Therefore, it is common to see that mobile phone has almost become a necessity between young people. The research also tends to show that the hypothesis of the greater the use of mobile phones then the higher will be the instance of mobile phone addiction and the attendant problems. For instance, the earlier the respondents began to use the mobile phone, the worse grade they have got and the deeper near-sighted they were. Conclusion In conclusion, the study revealed some reasons that caused mobile phone addiction and usage behaviors. The relationship between the two results is causality. Because most of young people share their opinions through mobile phones, the relationships restrict them to carry their phones. They could fall into bad habits, like addiction. Then the usage behavior will soon come into being. The report concludes that there are problems that need to be solved and it will list recommendations in the next section. Recommendations As a result of interviews of schoolmates, it is recommended that: â⬠¢ Mobile phones should not be carried with hand in classrooms â⬠¢ As far as the author concerned that there should be a time constraints of young mobile phones users in which they could more likely keep away from the negative effect. â⬠¢ Students should be encouraged to join into after class activities to establish the real relationships around themselves and cultivate the great skills or habits of their life. â⬠¢ The mobile phone users are becoming younger and younger; they should be attached great importance to the phone addictions and usage behaviors.
Tuesday, November 26, 2019
Absentee Voting essays
Absentee Voting essays The symposium last February 11, 2000 titled Absentee Voting for Overseas Filipinos was a successful one. They have expressed their insights regarding the topic in an orderly manner. The facilitators actually have a passion to educate and at the same time encourage students to support this proposal to the government. Also, the three facilitators are very well prepared and they are very organized in delivering their respective topics. Sad to say, many of the students just keep talking with each other up to the point that they are distracting some students like us (ahem!) that are willing to be educated on this matter. For me, even if there are about seven million Filipinos on different parts of the world that are willing to vote, absentee voting is not the solution. If they want to choose a good leader, then they must go home here and take their chances. I said this because many of the Filipinos overseas dont have any idea on who are they going to vote. Its because they are not here. They dont even know the background of the person they will choose. We can never trust the reliability of others regarding this matter. I myself can say that I practice my right to vote based on my own perception on who is the right person to vote. I did not listen to what others even my parents say. Secondly, Absentee Voting may be one of the sources of scams or any cheating activities. We know damn well that our country has the dirtiest politics in the whole world. We cannot tell if the politicians will buy the votes of our countrymen abroad. We also know how smart the Filipino politicians when it comes on cheating. Lastly, Absentee Voting will cost much because the process itself will be very expensive. The government must send the authenticated ballots abroad then send it back again. The result of the election also can be delayed because the Comelec will have to wait for the ballots from abroad for final tal ...
Friday, November 22, 2019
An Influenza test
An Influenza test RESULTS: An Influenza test is ordered when a provider suspects the patient has Influenza or if someone else in the family/household has been diagnosed with Influenza or is suspected of having it (Feemster, 2016, pg. 504). If the test result is negative, it would still be sent to the lab for PCR confirmation (Blosser, 2016, pg. 507). The Rapid Influenza test requires a respiratory sample collected on a swab from the nasopharynx or a nasal aspirate (McMullen et al., 2016). HPI The patient presented with a cough, nasal congestion, sore throat, fever, vomiting, and diarrhea with an onset of 3 days. The physical exam findings of Influenza may include cough, nasal congestion, vomiting, diarrhea, macular or maculopapular rash, or fever (Feemster, 2016, pg. 504). COMPONENTS OF THE RAPID FLU TEST The test detects viral nucleoprotein antigens in respiratory specimens, giving a qualitative result within 15 minutes (McMullen et al., 2016). One downfall of the rapid influenza antigen test is that it has a high number of false-negative results (Cunha Connolly, 2014). Another issue is the sensitivity to detect Influenza A and B; sensitivity for B is lower than A (Centers for Disease Control and Prevention, 2017).Also, when Influenza activity is low, false positive results can happen as well (McMullen et al., 2016).These tests usually identify as low as 5% and as high as 50% of influenza cases (McMullen et al., 2016). According to the CDC, if an individual is suspected of having Influenza, even if you tested negative, you should not withdraw treatment (Centers for Disease Control and Prevention, 2017). If an individual tests negative, a viral culture PCR may be sent to confirm. These tests can detect either only Influenza A viruses, or both A B, and either distinguish or not disti nguish between the two (Centers for Disease Control and Prevention, 2017). There are no rapid influenza diagnostic tests that determine any information about influenza A virus subtypes (Cuhna Connolly, 2014). ABNORMALS IDENTIFIED Rapid Flu positive Influenza B positive and Influenza A negative INTERPRETATION The positive lab result test confirms that the patient has a diagnosis of Influenza B and not Influenza A. A positive result means that the test detected the influenza viral antigen, but it does not mean the person has the Influenza virus or they are contagious (Cuhna Connelly, 2014). A negative result means that the test did not detect any influenza viral antigen (Cuhna Connelly, 2014). Positive results are typically higher when Influenza activity is high and lower when Influenza activity is low (McMullen et al., 2016). You are more likely to have a true positive result if the individual it was collected on had an onset within 4 days (Centers for Disease Control and Prevention, 2017). PREVENTION/TREATMENT Influenza is highly contagious; it is easily spread through contact. Hand hygiene is key to prevent spreading. Prevention includes receiving the Influenza vaccination annually for 6 months of age and older (Kelly Sandora, 2016, pg 319). It is important children receive the vaccine as soon as it is available before the yearly influenza season starts; they are a major vector for influenza transmission because they tend to contract the virus far more than adults (Blosser, 2016, pg. 490). When a positive result is confirmed, the recommendation/interventions for these positive results include medication treatment and supportive care. Medication treatment may include antiviral treatment, such as neuraminidase inhibitors; they can help shorten the time period and reduce the symptoms (Feemster, 2016, pg. 505). The reason why you would use antiviral medications over antibiotics are because antibiotics are not effective against viral infections like Influenza; antibiotics are generally prescr ibed for bacterial infections. Neuraminidase inhibitors are the recommended antiviral medication for treatment and chemoprophylaxis for Influenza A and Influenza B (Feemster, 2016, pg. 505). However, the effect on antivirals change yearly depending on the virus and strains for the winter season (Blosser, 2016, pg. 508). Medications that are approved for treatment are Tamiflu (Oseltamivir), Relenza (Zanamivir), and Rapivab (Peramivir). Amantadine and Rimantadine are only recommended for influenza A and not Influenza B treatment because it is not effective on Influenza B (Blosser, 2016, pg. 508). The dosages of these medications are determined by the age and weight of the patient. When a patient is diagnosed with Influenza, it is important to provide supportive measures as well. These may include keeping the child well hydrated with plenty of fluids, bed rest, antipyretics for a fever, or decongestants if they are congested (Blosser, 2016, pg. 508). Using a humidifier in the room that the child sleeps in is beneficial as well. Parents should be educated on what signs or symptoms to contact the office or seek further medical attention, such as difficulty breathing, dehydration, or muscle weakness.
Wednesday, November 20, 2019
Hewlett Packard Computers Term Paper Example | Topics and Well Written Essays - 2500 words
Hewlett Packard Computers - Term Paper Example Current market factors as well as projected consumer demand for computer products are assessed in light of industry opportunities and threats. The analysis compares Hewlett Packardââ¬â¢s overall marketing effectiveness with two of its major competitors; Dell and Apple. A number of critical issues are raised for consideration by the President and members of the companyââ¬â¢s Board of Directors. Founded in 1939 by Bill Hewitt and Dave Packard, Hewlett Packard had its beginnings in a garage in Palo Alto, California and was later transformed into one of the worldââ¬â¢s leading manufacturers and distributors of multi-media technology products and services (hp.com). Today, Hewlett Packard has five global regional offices serving sixty-eight countries and is the second largest technology company in the world behind Samsung. The companyââ¬â¢s 2009 net revenues were $114.9 billion with operating profits of $10.1 billion. Sixty-four percent of net revenue was derived from operations located outside of the United States (Annual Report, 2009). The companyââ¬â¢s core operations continue to relate to the sale of network and server platforms to businesses and government institutions and personal computers and printers. Recently, the company has attempted to develop and market its technology services division which provides technology systems design and engineering protocols for business. Since 2004, Hewlett Packard has invested in excess of $17 billion in research and product development and an additional $20 billion in the acquisition of technology-related companies such as Compaq and Palm that are intended to enhance the mission of HP (Consolidated Financial Statements, 2009). The company is governed by a twelve member Board of Directors which includes Mark Hurd as Chairman and Chief Executive Officer. There are nine Executive Vice-Presidents. The responsibility for corporate marketing falls under Chris Curtin, Vice-President, Digital
Tuesday, November 19, 2019
Response Paper Essay Example | Topics and Well Written Essays - 500 words - 11
Response Paper - Essay Example However, what I find surprising is the reason for all the denial; despite the rigidity to change by the activists, it was very apparent that calligraphy was bound to flourish. But again, only one question, whose answer is very evident, comes to my mind. Were these radicals unable to see the obvious fact that calligraphy, as part of writing, would flourish? Well, anyone rigid to change never sees the other side of their perspective. Likewise to the real world, there are very clear examples scenarios similar to those illustrated by the author. One such instance is in politics, transitioning from one form of leadership has always faced myriad obstacles from those who resist the change; the result? Political chaos. Interestingly, such resistance to change relate perfectly even to my life experiences. Many are times I have opposed moving from one residential area to the other for reasons not so justifiable; this clearly reflects the human nature of resisting change. The most interesting part of this writing how it brings out the power of the pen. In other words, calligraphy, as a form of writing, is so powerful that amidst the sheer opposition by the activists, it penetrated the Chinese as if it was not being opposed. But I cannot stop asking myself what methods of resistance the activists used; if they were serious, they would manage to bar calligraphy since it was truly a form of feudalism. On the same note, were the Chinese contented with feudalism? What quickly comes to my mind is that the activists were not so vigorous in their opposition. At the same time; the feudal stipulations profoundly influenced so many Chinese to the extent that it would consume way more effort to convince them otherwise. Just, in the same way, as a Christian, it would take a lot of persuasions to convince me against the stipulations of the Bible. In one way or the other, this text still emphasizes the link between the Chinese past and its
Saturday, November 16, 2019
Polar Bears Essay Example for Free
Polar Bears Essay Class: Ursidae. 9bPhysical characteristics: Bears have big heads, round ears, small eyes that face forward, very short tails, and stocky legs. They are plantigrade, walking on the heels and soles of their feet like humans do. Each paw has five curved claws that are not retractable, or cannot be pulled back. Habitat: The polar bear habitats encompass the entire Arctic region. Polar bears have adapted to be able to live in the water and on land. Unlike other bear species, the polar bear are excellent swimmers, and have been spotted more than 100 miles away from land or ice. The polar bear habitat is that of the entire Arctic region. Life cycle: Female polar bears reach sexual maturity at about four to five years. Male polar bears reach sexual maturity at about six years. Breeding takes place from March to June on the sea ice, but most occurs during April and May. During the breeding season, males and females find each other by congregating in the best seal-hunting habitats. Male polar bears have been seen following the tracks of breeding female polar bears for more than 100 km Competition for females is intense. Females breed about once every three years; therefore, there are about three adult males to every breeding female. Before mating, a female polar bear may be accompanied by several males. The males fight fiercely among themselves until the strongest or largest male succeeds in chasing the others away. Dominant males may succeed in mating with several females in a season. Females have babies in the den while hibernating. Polar bears life span is about 15-18 years. Prey: The Polar bearââ¬â¢s main prey is the Arctic seal which is a rich source of high-fat blubber. They have a very interesting way of catching their prey. A Polar bear would make a breathing hole somewhere in the middle of a vast ice expanse. Seals would often come out of these holes to breath. The Polar bear would patiently lie on its stomach with its mouth near the hole, waiting for any unfortunate seal to appear. This wait could sometimes last for several hours before a Polar bear could have his meal. Polar bears also prey on bearded seals and harp seals. When this prey is difficult to find, Polar bears would attack young walrus, narwhal, fish, seabirds and eggs. Species status: Polar bears were added to the list of threatened species because polar bears are vulnerable to this loss of habitat. Hunting of polar bears as a food source by certain native people and trade in native handicrafts made from polar bears will also continue. However, importing polar bear products from Canada (where trophy hunting is legal) will be banned. Pollution from man-made kills polar bears also Use for humans past and present- pas was they were hunted for food and fur. Present still hunted but also hunted for trophies but that has been banned Interesting facts: Polar bear cubs learn to freeze and remain still while their mother hunts. If they move, the mother disciples them, with a whack to the head. A polar bears fur is not white!! It is hollow. The fur reflects light. The hollow fur also traps the suns heat to help keep the polar bear warm. Known as the king of the artic.
Thursday, November 14, 2019
Human Genetics :: essays research papers fc
Human Genome Project A genome is defined as the complete collection of an organisms genetic material. The human genome is composed of about 50,000 to 100,000 genes located on 23 pairs of chromosomes in a human cell. It is said that a single human chromosome may contain more than 250 million DNA base pairs, and it is estimated that the entire human genome consists of about 3 billion base pairs. The DNA is gathered through blood samples taken from many different people. Though each person has a unique set of DNA the difference in a given pair of samples is less than 1 percent making the differences pale in comparison to the similarities. The Human Genome Project is an international collaboration of scientists whoââ¬â¢s goal is to gain a basic understanding of the genetic blueprint of a human being. This information is found in each cell of the body, encoded in the DNA. The intent of this project is to identify all genes in the nucleus of a human cell, to map where those genes are on the chromosomes of the nucleus, and to determine the seqeuncing or the order of these chemical subunits of the DNA. The idea to undertake such a project was came about through a series of scientific conferences held between 1985 and 1987. The actual project ,however, did not begin until 1990 with the expansion of funding from the NIH and DOE. There are many nations involved with this project as part of an informal pact including France, Germany, Japan, the United Kingdom, and many other european nations. Also in an effort to speed up the mapping and sequencing process several private companies have been enlisted to help such as Celera Genomics. Today there is a lot of research being done under the umbrella of the Human Genome Project. For instince gene therapy is being developed as a very real cure for such hereditary diseases as Cystic Fibrosis and Parkinsons where somewhere in the genetic make up of the body there is a glich tht alows the nervous tissue of the brain to deteriorat e at a slow but steady rate. With gene therapy we will be able to replace the tissue in the brain with correctly funtioning tissue from an animal such as a pig. As of early 1999 the Human Genome Project was ahead of schedule. There is said to be nearly 10 percent of the genome sequenced already or about 7,600 genes have been mapped to particular chromosomes.
Monday, November 11, 2019
“Offenders Are Heterogeneous in Nature” Discuss.
ââ¬Å"Offenders are Heterogeneous in nature, discussâ⬠Offenders are a heterogeneous population of individuals, which range from shop lifters to murderers. There are clear intergroup differences based on characteristics of the offender, victim and the crime. Therefore it is very difficult to discuss the possible heterogeneity of all offenders as one group, thus this paper will focus on one particular type of offender. Sex offenders are frequently viewed as a homogeneous class of individuals, the public do not tend to distinguish the difference between indecent exposure and rape merely considering these offenders as ââ¬Ëderanged or evilââ¬â¢ (Bartol & Bartol 2008). On the other hand research conducted by Knight, Rosenberg and Schneider (1985) shows that sex offenders differ extensively in terms of the frequency and type of sexual activity they engage in. They also differ in personal traits such as ââ¬Ëage, background, personality, race, religion, beliefs, attitudes, and interpersonal skillsââ¬â¢. Furthermore there are fundamental differences in the Modus Operandi (M. O) of sex offenders, for instance gender and age of the victim, the degree of planning before the offence and the amount of violence used or intended. Therefore preliminary research shows clear disparity regarding the heterogeneity of sex offenders, thus the homogeneity of this group will also be considered. A person is labelled a sex offender when they are convicted of a sex crime; this may include, rape, sexual assault, child sexual abuse, paedophilia, frotteurism, exhibitionism, incest, necrophilia and so on. The majority of studies used in this essay will be centred on sex offenders who have committed rape, sexual assault, child sexual abuse and paedophilia. Thus it is necessary to define some of these terms, the most common definition of rape is ââ¬Ëthe penetration of the anus or vagina by a penis, finger or object or the penetration of the mouth by a penis. ââ¬â¢ (Polaschek, Ward & Hudson, 1997). Sexual abuse is defined by the Sexual and Domestic Violence Services (SDVS) as ââ¬Ëwhen a sexual act is intentional and is committed either by physical force, threat or intimidation and by ignoring the objections of another person. . The major difference between sex offenders is the age of their victim, rapists and offenders who commit sexual abuse prey on persons of 16 years of age or over, whereas child molester and paedophile victims are under 16 years of age. Firstly we need to consider when discussing the heterogeneity of sex offenders is the various typologies involved. Research has shown that offenders sexual aggression can be divided into two distinct groups; instrumental and expressive. Instrumental sexual aggression occurs when the sex offenders only use enough coercion so that the victim complies and expressive sexual aggression this is when the offenderââ¬â¢s fundamental motive is to physically and psychologically harm the victim (Bartol & Bartol, 2008). On the other hand the assumption that sexual offenders always exhibit aggression is not always congruent; according to Revitch and Schlesinger (1988) many sex offenders are not prone to violence but rather are timid, shy and socially inhibited. Intra-group typologies should also be considered when looking at the differences between sex offenders. For example Groth et al. 1979) categorised Rapists into four main sub groups; power-assurance, power-assertive, anger-retaliatory and anger-excitement. This first sub group is the most common type of rapist, who rapes due to insecurities about their masculinity. The power-assertive rapist is socially skilled, displays a high level of violence and is sexually confident . The third sub group has high levels of anger towards women, commits blitz attacks and also degrading activities are often involved. Finally the anger-excitement rapist is rare and gains pleasure and sexual excitement from seeing the distress of the victim (Bartol Bartol, 2008). Groth and Birnbaum (1978) created the regressed-fixated dichotomy of child molesters. Regressed offenders are men who have matured sexually but have returned to an earlier level of psychosexual development. Fixated offenders are said to be ââ¬Ëdevelopmentally fixated onâ⬠¦ basis such that their sexual interest is in childrenââ¬â¢ (Howitt, 2002). These typologies give an insight into the major differences in basic characteristics and motives of sex offenders, which illustrate the point that they diverge in terms of their ââ¬Ënatureââ¬â¢. The demographics of sex offenders also shed light on the similarities and differences of sex offenders. First gender will be considered, unsurprisingly the majority of sex offenders are male, and 95. 5% of sex offenders in the Federal Probation and Pre-trial Services System in the U. S are male. On the other hand, Kaplan and Green (1995) reported data which indicated that between 4 and 25 percent of victims of child sexual abuse stated their abusers were female. Therefore it indicates that the population of female sex offenders is underestimated. However it can be said with conviction that the majority of sex offenders are male, this fact contradicts that they are heterogeneous in nature. Surprisingly research shows that sex offenders are often adolescent males (Bartol & Bartol, 2008), Becker and Johnson (2001) found that 20-30 percent of all rapes and 30-50 percent of child molestations are committed by this group. However the issue of average age of a sex offender has been found to be more complex, as Hanson (2001) reported that child molesters tend to be older. This conclusion was supported as Henn, Herjanic, and Vanderpearl (1976) found that 75 percent of convicted rapists were under the age of 30 and 75 percent of child molesters were over. This indicates that the average age of the sex offender is in dispute. Knight, Rosenberg, and Schneider 1985 conducted a study which demonstrated a number of notable commonalities between aggressive paedophiles and rapists. The first is that sex offenders have problems with alcohol. Another similarity is that they have a high rate of high school failure and dropout; this is supported by a recent case study of 437 sex offenders conducted by Black and Pettway (2001). They discovered that 60 percent of child molesters and 70 percent of rapists did not graduate high school. The third commonality found was that sex offenders tend to have unstable work histories in unskilled occupations, Black and Pettway (2001) study supported this; however it was found that child molesters had a higher history of stable work. The final commonality noted was the sex offenderââ¬â¢s tendency to come from a low socioeconomic class. However, the case study previously discussed also enlightened several differences between sex offenders; it found that the majority of rapists had never been married (65%) whereas two thirds of child molesters were married (66%). Another characteristic that showed disparity between sex offenders was race, it found that a larger proportion of child molesters were white (72%) and a greater proportion of rapists were black (60%). This shows that as a whole sex offending occurs across races, although it illustrates that specific sex crimes have a specific racial majority. Research has shown homogeneity in the level of intelligence of sex offenders. Cantor et al. (2005) found that male sex offenders score significantly lower in IQ measures than male who commit non-sexual offences. Nevertheless, this difference is not displayed uniformly across sex offender sub-types; it was found that those offenders that commit rape against adults have the same IQ as non-sexual offenders. It was found that a significant decline in the level of the IQ of the sex offender came hand in hand with a decline in the age of the victim. Cantor et al. (2005) concluded that these results do not indicate that low IQ scores cause sex offending, merely that something may have happened during early childhood to inhibit their cognitive functioning. Studies have supported the conviction that someone who has experienced sexual abuse as a child is more likely to later engage in sex offences. For example Seto and Lalumiere (2008)conducted a meta-analysis and found that sex offenders were much more likely to have been sexually abused than non-offenders. Therefore, groups of adult sex offenders contain a disproportionate number of individuals who have experienced sexual abuse. This provides evidence that sex offenders are homogeneous and a high number of them suffered sexual abuse as a child. Personality research into sex offenders has shown a homogenous trend among sex offenders. Aromaki, Lindman and Eriksson (2002) conducted a study into the levels of antisocial personality traits among a group of Finnish sex offenders and found that 50% had an anti-social personality disorder according to DSM-IV specifics. Furthermore sex offenders reliably demonstrate high levels of psychopathology (Stinson, Becker & Tromp, 2005). In a study of adult sex offenders it was found that 63% of these offenders exhibited a significant level of psychopathic traits ranging from mild to severe. Another homogeneous trait which male sex offenders share is cognitive distortions; cognitive distortions are attitudes and beliefs which offenders use to deny, minimise and rationalise their behaviour (Murphy, 1990). Most rapists tend to conform to attitudes that support men to be ââ¬Ëdominant, controlling and powerfulââ¬â¢ whereas women are expected to be ââ¬Ësubmissive permissive, and compliantââ¬â¢ (Bartol & Bartol, 2008). Furthermore Malamuth and Brown (1994) studied the perceptions of women in sexually aggressive men and found that suspicion was associated with attitudes which supported sexual aggression. These men generally believed that women do not tell the truth when it comes to sex (Milner & Webster, 2005). Also Polsheck and Gannon (2004) found that male rapists view women as hostile and they ââ¬Ëare dangerousââ¬â¢. The combination of these attitudes and schemas has a strong disinhibitory effect on sex offenders, they encourages them to interpret ambiguous behaviour of their victims as ââ¬Ëcome-onsââ¬â¢ and believe that sexual behaviours that are intended to coerce women are not offensive. They also believe their rape victims derive satisfaction from being assaulted. Lipton, McDonel, & McFall, 1987). Cognitive distortions are also common among child molesters and paedophiles. For example Abel, Becker, and Cunningham-Rathner (1984) outlined seven common cognitive distortions among child molesters these included ââ¬Ëif children fail to resist advances, they must want sexââ¬â¢, ââ¬Ësexual activity with children is an appropriate means to increase the sexual know ledge of the childrenââ¬â¢ and so on. Several researchers confirm that child molesters do report similar sexual attitudes and beliefs about children. Hayashino et al. 1995) found in a comparison between the level of cognitive distortions of child molesters and non-offenders, that child molesters had more. This shows there is a theme of cognitive distortions among sex offenders. An imbalance of sex hormones has been shown to be a homogeneous factor throughout sex offenders, although the type and levels of hormones do vary between sex offender sub groups. A recent study conducted by Dabbs et al. (1995) high testosterone was found to be linked to crimes of sex and violence, so that the highest risk ratios for high testosterone men were observed for rape, child molestation and homicide, respectively. The Giotakos et al. (2003) study in rapists provides a more complex account of the hormone imbalance noting that, rapists were found to have higher levels of plasma testosterone, dihydrotestosterone and free androgen index than controls but lower levels of a major metabolite of serotonin. In paedophiles several serotonergic disturbances and increased epinephrine levels have been found (Maes et al. , 2001). Thus hormonal imbalances are a congruent theme in various sub-groups of sex offenders, indicating homogeneity. Another homogeneous aspect of the nature sex offenders is there general increase in sexual arousal due to ââ¬Ëabnormal sexual materialââ¬â¢. Many studies have used phallometric measurements in order to measure the sexual arousal of a participant to a specific sexual stimulus. Abel et al. (1997) used this technique to create the rape index which measured responses to erotic material including force and coercion. The men with the highest response have the greater rape potential. A similar index was created for dangerous child molesters (Avery-Clark & Laws, 1984). The validity of this index was confirmed by Wormith (1986) who found that the majority of the classifications based on circumference phallometric measurements of sex offenders were accurate. The final feature of the sex offender which should be discussed is their likelihood to commit recidivism. Some statistics show homogeneity in this area too, Hanson (2001) discovered a 19 percent sexual recidivism rate for child molesters and a 17 percent recidivism rate for rapists during five years follow-up time after release. This points towards rates of recidivism being just under 20 percent for sex offenders. Although other studies show disparity in recidivism rates, one study found a 39 percent recidivism rate in child molesters after a three year follow up (Langan, Schmitt & Durose, 2003). In conclusion, although research indicates significant fundamental homogeneous themes of sex offenders such as alcoholism, low IQ, high school drop-out, history of sexual abuse, unskilled occupations, hormone imbalance, cognitive distortions and personality disorders. However these were shown to vary depending on the sub-group of sex offenders being discussed. Research has shown that sub-groups of rapists and child molesters vary on levels on the themes previously discussed. Demonstrating sex offenders can be divided into clear heterogeneous sub-groups based on their nature. This paper has highlighted the complexities of researching the heterogeneity of the offender as a whole group and has clearly supported the idea that sex offenders have inter-group heterogeneous characteristics. References Aromaki, A. S. , Lindman, R. E. and Eriksson, C. J. P. (2002) Testosterone, sexuality and antisocial personality in rapists and child molesters: a pilot study. Psychiatry research110 (3), 239-247. Bartol, C. R. , & Bartol, A. M. (2008). Criminal behaviour: a psychosocial approach, 8th Ed. Pearson Education. Chapter 12 & 13. Blumenthal, S. , Gudjonsson, G. and Burns, J. (1999) Cognitive distortions and blame attribution in sex offenders against adults and children. Child abuse & neglect23 (2), 129-143. Giotakos, O. , Markianos, M. , Vaidakis, N. and Christodoulou, G. N. (2004) Sex hormones and biogenic amine turnover of sex offenders in relation to their temperament and character dimensions. Psychiatry research127 (3), 185-193. Howitt, D. (2002). Forensic and criminal psychology. Prentice Hall: Pearson. Chapter 9 & 10 Jespersen, A. F. , Lalumiere, M. L. and Seto, M. C. (2009) Sexual abuse history among adult sex offenders and non-sex offenders: A meta-analysis. Child abuse & neglect33 (3), 179-192. Johnson, J. L (2006), Sex offenders on federal community supervision: Factors that influence revocation. Federal probation a journal of correctional philosophy and practice 70 (1). Milner, R. J. , & Webster, S. D. (2005). Identifying Schemas in Child Molesters, Rapists and Violent Offenders. Sexual Abuse: A Journal of Research and Treatment, 17, 425 ââ¬â 439. Robertiello, G. and Terry, K. J. (2007) Can we profile sex offenders? A review of sex offender typologies. Aggression and Violent Behavior12 (5), 508-518. Stinson, J. D. , Becker, J. V. and Tromp, S. (2005) A preliminary study on findings of psychopathy and affective disorders in adult sex offenders. International journal of law and psychiatry28 (6), 637-649. Taft, B. , Wilkinson, R. A. , Stickrath, T. J. (2001) Profile of ODRC sex offenders assessed at sex offender risk reduction center. Journal of rehabilitation and correction (1) www. womenscenter. virginia. edu/sdvs/assault/definition
Saturday, November 9, 2019
Brainstorm of the places where we use computers Essay
The main uses of ICT in Coopers is to educate pupils that attend also to help teachers keep track of their daily teachings. The uses of ICT like interactive boards and projectors have played an important part in the way education is being taught in ST Edwardââ¬â¢s. These functions allows teachers to browse the Internet in front of the class and go on educational websites. Also to use the interactive board with a interactive pen to draw straight lines easier than a whiteboard. Systems like SIMS are very useful for teachers every day routine as it allows them to do features like see students timetables, personal details like address and home telephone number also their face identity. This is useful because this can be arranged so that a whole classes pictures are printed of in alphabetical order in order for a teacher to know there class pupils quicker by face by arranging the class in alphabetical order. The public school Coopers is allocated in Romford, Essex was formed over 300 years ago. It contains around 1200 pupils with six formers and over 100 teachers, which the school had to accommodate by building a new building alongside the old one. The head teacher of Coopers is Mr Drew. The school is very multicultural as it accepts students from the local borough as well as outside the borough, which makes the school very unique in its area of Havering. Also recently Coopers was one of the 19 schools in the whole of London to been given the top grade from OFSTED inspectors. The school dress code of Coopersââ¬â¢s pupils is to blue blazers with a badge showing a cross and doves also charcoal grey trousers. The tie has diagonal stripes of yellow, navy and light blue. Microsoft office plays a very important role in the education system at Coopers through programs like Microsoft Word, Excel, and PowerPoint. Some of the uses that these programs enable are: Spreadsheet > Microsoft Excel: Use are being able to mail merge, spread sheet formulas Word Processing > Microsoft Word: This programs enables you to Do Fax template documents, Invoices and basics such as Letters Presentation Software > Microsoft PowerPoint: PowerPoint presentations allow students to present class to their class on an interactive board. Database > Microsoft Access: Mainly used throughout Cooperââ¬â¢s school for tracking studentââ¬â¢s behaviour and for teaching throughout the schooling industry. Also by teachers into allowing them to organise their timetables and see where they have free periods or when a class needs a supply teacher as a teacher is away from school. Desktop Publishing (DTP) > MS Publisher, Photoshop, and Corel Draw: Generally used in school to edit and draw pictures. List of Hardware: (computer Specification) How ICT is used in subjects that are taught and used in school. CDT: This subject has specialised software on the ICT program like 2D Design, which enables students to draw different shapes and letters then have specially designed into a 2D key chain using a high tech machine. MFL: the subject MFL has software installed on the schools computer system, which allows teachers to access it through the interactive boards and teach students on their speech thought the boardââ¬â¢s speakers. Also through the interactive pen, the teachers can ask students to come to the front and moves individual words to the right sentences. Security software: an administrator through logging on a computer can access The CCTV cameras. This allows the admin to control the movement of the cameras. Most classrooms in Coopers are locked with a specialized security system with only opens by inserting a card with a special chip build into it. The door will only open if it recognises the chip. Systems on different doors can be programmed to accept the chip. This will allow the user to open a number of doors throughout the school. The school technicians would install anti ââ¬â virus softwareââ¬â¢s like Northern Art: The use of digital cameras and software allows users to edit photos and images. Also it can be used to evaluate pieces of work and how to make improvements. The benefits of using ICT in Art are that students can do animations and add special effects to pictures, which cannot be done by hand. Library: The heritage used to the check if the book you want hasnââ¬â¢t been taken out. Also the library uses ICT to controls what is borrowed and taken out in the library also students who have books that are overdue. I also found my school is using networking in 10 computer rooms; each room has a local network. All local networks are connected together with router and Gateway. After accessing to the network manager I found that the school network is using the star network. Preferably Maths: ICT is used in maths to do accurate pie chart and bar chart diagrams. Also spreadsheets and calculations in programs like MS excel. Finance Dept: This department uses ICT to deal with problems such as calculating staff salary and tax using spreadsheets and SAGE line 50 or Payroll software. Why the organisation uses ICT? Coopers Comprehensive uses ICT as it is very effective in helping to manage and organise the work of the school. Examples; The organisation uses word processing software such as Microsoft Word to design templates which they will use every time they want to send a letter to pupilââ¬â¢s homes. This is effective as this system will enable the organisation to save time not writing by hand the information that would be stored as a template. E.g. school address and logo Locations where ICT is used 1. Reception a. Photocopier b. Computer c. Lights d. Fax 2. Classrooms a. Lights system b. Computer c. Fan d. Projector e. 3. Staff room a. Computers b. Lighting system 4. Science Lab a. Computers b. Interactive board 5. Interactive board a. Sound system b. Internet browser c. Interactive board d. Video e. Projector 6. Library a. Heritage i. Resource library ii. Computer iii. Database 7. Six form sweet 8. D.T a. Computers 9. Technicians office a. Laptops b. Computers 10. Art room a. Computers 11. Music room a. Keyboards b. Interactive board c. Lights d. Sound system 12. Food room a. Digital camera (for taking pictures of food) b. Computer c. Pocket computer (keeps track of his daily routines) Roles 1. Teaching a. Worksheets b. Timetables c. Teachers planners d. Room changes e. On call system 2. French a. Interactive whiteboards 3. History a. Computer b. Interactive 4. Security a. CCTV (24 hours in motion a day.) b. School alarm c. Fire alarm 5. Internet a. School website b. Revision sites for learning 6. Mr Chapmenââ¬â¢s Office a. Letters home b. Reachout 7. Mr Drewââ¬â¢s office a. Photocopier 8. Homework 9. Maths a. Calculators b. Projectors c. Interactive board 10. SEN Dept 11. S.T.E.D.S a. Calculators 12. Mr Browns Office a. Timetables 13. SIMS (schools information management system) a. NOVA b. Timetables for students and teachers c. Cover d. Administration e. Pupil profiles f. Students behaviour Now I am going to highlight more details how the organisation is using ICT to meet the specific needs. Making lessons interactive: the school uses a smart interactive white board and computer system in every classroom to make lessons interactive. When the teacher is teaching he can write down everything on the whiteboard and using the special software SMART, writing can be saved and played back whenever necessary. Teachers can use many tools to make lessons interactive for example, drawing tools, setting the background colour, selecting font, importing diagrams, showing animation and effects and so on. To make the interactive board work the following hardware and software I identified > Projector > Computer with necessary software e.g. operating system Windows XP and applications software e.g. MS Word and hardware e.g. keyboard, mouse and > Driver program comes with interactive whiteboard > USB memory to transfer and save lessons. > Digital pen or stylus ââ¬â using this device teachers can use software interactively without coming to the computer > Cable connection between whiteboard and computer The objective of the organisation is to educate students interactively within a short time. Using such interactive system the teacher can teach many things to each student e.g. printing handouts of what he taught at the end of the lesson, without writing he can show it again and again if the student doesnââ¬â¢t understand. Students donââ¬â¢t need to take all notes and can take soft copy of the lessons. When a student is absent he or she can take the soft copy to catch up. registering and maintaining student database creating school brochure templates designing writing letter to parents mail merge save time donââ¬â¢t make mistakes Issuing and receiving books in the school library Searching for books in the library: the school uses ICT in libraries so that books can be found easily and can also to record pupils taking books out and returning them easily without making mistakes and losing books. The benefits are: > Saves time just scanning books instead of writing it down manually every time a pupil wants to take a book out. > Pupils can easily search for books on a database instead of finding it on shelves > Overdue books can be worked out by the computer whereas you may forget when the pupil was due to bring back the book.
Thursday, November 7, 2019
Red Means Stop! Professor Ramos Blog
Red Means Stop! From the time I was a little kid, I wanted to drive. Growing up I remember wanting to drive my Barbie dolls car, and later I would dream of driving a Lamborghini. I even went through a phase where I wanted to drive a Volkswagon Beetle. Now that I am driving, I really enjoy it, and my usual vehicle is a great big, blue, 2001 Ford Excursion that my family has dubbed ââ¬Å"Bubbie.â⬠I should probably add that Bubbie, with her giant size and blue color, is a whale of a car, so we named her after a whale from the cartoon, The Marvelous Misadventures ofà Flapjack. The day I decided that driving was an achievable goal occurred when I was six years old. My little brother was just born, and in between visiting times with my mom, my dad would let my older brother and I take turns steering our car around the hospital parking lot. At the time I thought I was actually driving; I hadnââ¬â¢t yet realized that steering is a very small part of being a driver. By the end of that day I had made up my mind, I was going to learn to drive one day. As I got older, I became more eager to start driving. I was about fourteen when I started to practice driving my parentsââ¬â¢ green 2006 Dodge Grand Caravan. We live on a Native American Reservation and the rules arenââ¬â¢t the same as a regular neighborhood, so I could drive without a license quite legally. While the reservation allowed me to practice to a certain extent, I was still not prepared to even have a driverââ¬â¢s permit. I had to wait because I was too young to have one. When I was old enough, I had to consider the fact that to get the driverââ¬â¢s permit, not only would I have to reach the age requirement of fifteen and a half, but I also had to take the test. In order to qualify for the test, I had to study the driverââ¬â¢s manual as if it were a sacred manuscript. For a few weeks, I read that tiny book over and over. Then, when I had practically memorized the entire book, I was finally ready to take that test and get that permit. The test was a piece of cake, and by the end of the day, I had earned my driving permit. I had taken my first step toward getting my driverââ¬â¢s license. I was now allowed to drive outside of the reservation, which was a scary thought for me and for my parents as well. In all honesty, I was an awful driver. I often practiced driving with my parents, but it took me a long time to progress. This was the most difficult time of my training as a driver. Every time I made a mistake, I felt terrible. I felt I was putting whoever I was driving with in danger. I would drive too slow and hesitate when it wasnââ¬â¢t necessary, or I would make a decision hastily and end up doing something reckless. I was simply a beginner, and Iââ¬â¢m sure now that it is normal to make mistakes while just starting to drive. At the time, though, I was discouraged. Every time I drove, I would make a mistake. This made me want to give up. I told my parents, ââ¬Å"Maybe I will just be someone who doesnââ¬â¢t drive.â⬠They wouldnââ¬â¢t let me give up though, so I learned to make less mistakes. There was a whole other area that I had to cover as well to get my driverââ¬â¢s license, driverââ¬â¢s training classes. ââ¬Å"You just ran a red light, remember red means stop,â⬠I recall my driving teacher, a blonde woman who liked to talk about The Walking Dead, telling me after I carelessly drove across an intersection. It was early in my driverââ¬â¢s training, and I had never run a red light in my life. I was surprised at myself and disappointed that I had done that simply because I was nervous.à This basically sums up my driverââ¬â¢s training, being nervous while driving with a new person and making really stupid mistakes. My teacher wasnââ¬â¢t angry when I ran the red light, only flustered. She told me this, ââ¬Å"If you were taking the driving test, that dangerous maneuver would have been an automatic fail.â⬠As aforementioned my main obstacle in learning to drive was my annoying tendency to either be too cautious or to be just downright careless. On this occasion, I was guilty of doing both. I looked both ways while crossing the intersection, but I didnââ¬â¢t care to check whether the light was green or not. Something else happened on this occasion though; I decided that day that I would never be so careless while driving again, and that I would work harder to become a safe driver. I canââ¬â¢t go around saying that getting my driverââ¬â¢s license was my doing only. Had it not been for my parents, I would have given up on driving shortly after I got my permit. I donââ¬â¢t like doing things wrong, and every mistake I made was like a punch to the face. My parents went about this in different ways, of course. My mom, who looks like an Irish princess but curses like an Irish sailor, is the positive reinforcement type and would say, ââ¬Å"You are just a beginner,â⬠and that my older brother was ââ¬Å"just as badâ⬠when he first started driving. My dad, a long haired Native American man who is always wearing 49ers football shirts, had a more honest approach. I recall an occasion in which I didnââ¬â¢t move out of the way in time when there were debris on the freeway. He told me, ââ¬Å"That is just bad driving.â⬠He was right, I had run over a part of a bicycle on the freeway. When he told me that, I felt bad, but it also made me want to co nduct myself better behind the wheel so that I wouldnââ¬â¢t feel so sheepish while driving. I eventually finished my driverââ¬â¢s training and was able to take my driving test. I remember the anticipation of the week before the test, I was so scared. I was too close to give up now though, and the worst that could have happened was failing and just trying again another day. I did not want to fail though, so I did what I do best; study. I read the driverââ¬â¢s manual again and I drove around the reservation a lot by myself, being sure to stop at every stop sign and to use my turn signals. I memorized where every little button was in the Excursion (Bubbie) in case I was asked to point them out at the beginning of the test. I practiced pulling up to the curb with my tires perfectly aligned with the sidewalk. I practiced, and when I was done practicing one thing, I practiced doing a completely different thing. I wasnââ¬â¢t going to fail that test, I was going to try to pass it with the best score a person could get driving an Excursion. After taking the test, I found ou t that the only checks the test giver had to make on his sheet were that I turned too wide and too narrow at times. I was fine with that because I passed the test and I was officially a licensed driver. Though I finally have my driverââ¬â¢s license, my driving still isnââ¬â¢t perfect, and my parents continue to help me try harder to become a good driver. I wouldnââ¬â¢t be the driver I am today without them. à My parents taught me the real lesson in learning to drive which is that it isnââ¬â¢t easy, and that you canââ¬â¢t just give up when it gets frustrating. I started my journey to becoming a driver thinking it was going to be piece of cake, but it was one of the most difficult things that I have ever learned to do. As I mentioned before, I often felt like giving up while learning to drive, but I kept practicing, and now I get to enjoy being a licensed driver.
Monday, November 4, 2019
Contemporary Retail Environments Essay Example | Topics and Well Written Essays - 3500 words
Contemporary Retail Environments - Essay Example Shopping is no more a simple act based on the human need, exchange of the currency and the goods but much more. The perception of shopping and its experience differs as few people perceive it to be a part of entertainment, act of expression, path for happiness and stress therapy (Tuttle, 2010). The experience of the shopping is judged by the accomplishment of the individual perception in the retail environment. Shopping can be deciphered as a contradiction that yields both pleasures and anxieties among the people based on their experience. The concept of shopping experience has changed to a greater degree for the modern shoppers based on their psychology, lifestyle and requirements. Consequently, the shopping experience is the point at which the tension, promises of modernity and postmodernity are apparent. The experience of shopping can be evaluated by the people on the basis of the information gathered, product variety and wide range of products. The easy accessibility of the servi ces and goods through the use of online sources and mobiles has made the shopping experience convenient, economical and exciting (Falk & Campbell, 1997). Shopping experience can be a recreational aspect depending on the consumer behaviour and their considerations. Shopping experience is cherished by meeting the emotional value and affect behaviour of the individual. As illustrated by Levy, ââ¬Å"People buy products not only for what they can do, but also for what they meanâ⬠(Hirschman, 1986). The objective of the essay is to emphasise the shopping behaviour and experience of the individuals in the retail environment. It evaluates the component, motivational factors, role of environment and the models to explain the shopping experience. Explanation of Shopping Experience The shopping process is initiated by the need recognition of the individuals. It the behaviour by which the unwanted needs of the individuals are realised and are being fulfilled in the retail shop. The needs of the people differ and so the choice of buying, some prefer design over brand, some look for uniqueness and some consider budget. It is observed that before buying a product customers tend to gather information by searching for the same products in various shops. This process of gathering information and taking advices are part of the holistic shopping experience. Information gathering through various sources to get the knowledge about the price of the product, availability and features influence the shopping decision of the individuals. Moreover, the evaluation of the alternatives is a part of shopping wherein the personal views and opinions along with advices from the friends influence the decision process of the individual. The huge displays of the products in the retail environments affect the process of evaluation of the individuals and make their shopping process easier or at times complex. Individuals tend to shop based on their need but at times due to the influence of ret ail environment they tend to buy products which are not desired by them before coming to the retail shop. The impulsive shopping makes the experience of shopping great as it signifies the fulfilment of the undesired
Saturday, November 2, 2019
Orgnistionl context of PEPSI INC Assignment Example | Topics and Well Written Essays - 1750 words
Orgnistionl context of PEPSI INC - Assignment Example Stakeholders are generally defined as any individuals or organizations who have the ability to directly or indirectly affect or are affected by the operations of a program. (Wnous, Reichers, Mlik, 2004) In Pepsi Inc there are two main distinctions concerning the type of stakeholder: internal and external. Internal stakeholders are typically all employees, and might include specific groups such as agency managers; program managers; front-line supervisors; direct-service employees; subject matter experts or occupational specialists; and evaluation, planning, and budgeting staff. External stakeholders are individuals or groups outside the organization that regularly exercise actions that can promote, inhibit, or change the operations of the organization. Types of external stakeholders who might participate include: elected officials, interest groups, union representatives, the media, customers, and citizens. Powerful externl stkeholders re cpble of dominting n orgnistion's strtegy. It i s importnt to scertin ech stkeholder's level of interest concerning the orgnistionl purposes nd strtegic choices, nd the level of power they yield. Implementing stkeholder mpping mtrix provides n insight into this, which in turn fcilittes the understnding of Pepsi Inc's politicl priorities. 4. Corporte strtegy Pepsi Inc brnd nmes re mong the best-known nd most respected in the world. Some of the Pepsi Inc brnd nmes re 100 yers old, but the corportion is reltively young. Pepsi Inc. ws founded in 1965 through the merger of Pepsi-Col nd Frito-Ly. Tropicn ws cquired in 1998. In 2001, Pepsi Inc merged with the Quker Ots Compny, creting the world's fifth-lrgest food nd beverge compny, with 15 brnds - ech generting more thn $1 billion in nnul retil sles. The success of PepsiCo is the result of superior products, high stndrds of performnce, distinctive competitive strtegies nd the high level of integrity of our people. Compny's overriding objective is to increse the vlue of our shreholders' investment through integrted operting, investing nd finncing ctivities. Pepsi's strtegy is to concentrte our resources on growing our businesses, both through internl growth nd crefully selected cquisitions. Corporte strtegy is continully fine-tuned to ddress the opportunities nd risks of the globl mrketplce. T he corportion's success reflects our continuing commitment to growth nd focus on those businesses where we cn drive our own growth nd crete opportunities. Pepsi's Keys of Corporte Governnce nd Business Ethics: strong record of community support nd corporte citizenship, contributing through The PepsiCo Foundtion, which includes grnts to orgniztions, support of employee volunteerism nd mtching gifts. Commitment to culture of inclusion, providing equl opportunity nd workplce where ll employees hve the opportunity to rech their potentil. Commitment to helping employees blnce their work nd home lives. Cultivtion diverse supplier bse, purchsing growing percentge of our products from minority- nd women-owned firms. Striving to develop
Thursday, October 31, 2019
Research Proposal for Juvenile Justice Essay Example | Topics and Well Written Essays - 3250 words
Research Proposal for Juvenile Justice - Essay Example Obviously, though, juvenile justice is more than just benevolent guidance f youths during adolescent development or family crisis. It is also a system for monitoring and controlling juveniles and their families who may be engaged presently in activities deemed dangerous or deviant. To make matters even more confusing, these two sets f system demands (despite their seemingly opposed natures) often become intertwined and sometimes nearly indistinguishable in practice, with clearly coercive tasks disguised in treatment metaphors. "Intensive treatment units" are often secure, locked institutions; "aftercare counseling" often means regular reporting to a probation officer. In practice, the multiple goals f juvenile justice become blurred and combined into singular activities. As a result, we are often left with the uncomfortable dilemma f not knowing whether we are doing something to a youth in order to do something for that youth (Allen, 1964) or whether we are doing something to a youth for justifiable retribution and deterrence. It is rarely a clear determination in juvenile justice. This blurred picture is the context in which prevention programming, research, and treatment must operate. It cannot be escaped; it pervades each step f applied research and professional practice in this area. Even a brief exposure to this seemingly sympathetic site will convince the prevention-minded researcher or practitioner attempting to improve service delivery in this system that even more or less "standard" ethical issues take on a distinctive quality when imbedded in the context f juvenile justice. Problem Definition The ethical issue f problem definition is a subtle but central one in juvenile justice research and practice. Because delinquency is a legal ascription rather than a behaviorally based description and local practices vary widely, a broad range f youths are classified as delinquents. This locally determined selection bias f any sample population makes it unwise to treat juvenile delinquents as a unitary class when constructing theories about adolescent antisocial activity (Reppucci & Clingempeel, 1978). Moreover, a consideration f case characteristics beyond the mere presence f delinquency is needed to accurately assess the impact f any intervention. The expected prevalence or progression f antisocial activities in the youths sampled must be considered in such assessments (Blumstein, Cohen, Roth, & Visher, 1986). Furthermore, researchers and practitioners working with a legally defined population f delinquents must be aware that they are accepting the values implicit in designating some youths as delinquent and others as merely undergoing normal adjustment problems. These professionals may even be furthering these values by focusing intervention efforts on the youths most troubling to authorities. Such involvement can lend professional certification to a system that could benefit from a critical appraisal f its values and practices (Rappaport, Lamiell, & Seidman, 1980). On an individual treatment level, dealing with a socially rather than personally defined problem
Tuesday, October 29, 2019
Feminist organizations Essay Example | Topics and Well Written Essays - 500 words
Feminist organizations - Essay Example Accordingly, the following brief analysis will make an inventory of each of these aspects as a function of further delineating and defining the National Organization for Women. Firstly, the website which was analyzed denoted that fact that the ultimate goal of the group was to take immediate action for the equality of women. Although this is specifically tied to the manner in which womenââ¬â¢s issues and womenââ¬â¢s rights are exhibited within the United States, the group also seeks to effect change in various regions around the globe on behalf of women and their needs/rights. The mission statement itself further seeks to hone the areas of focus that NOW seeks to integrate with. Accordingly, the mission statement is as follows, ââ¬Å"the purpose of NOW is to take action to bring women into full participation in the mainstream of American society now, exercising all privileges and responsibilities thereof in truly equal partnership with menâ⬠(NOW 1). Similarly, with regards to the political orientation of the group, the website itself promotes the understanding that the group is specifically interested in engaging in actions that promote womenââ¬â¢s rights, feminism, anti-racism, ending homophobia, promoting LGBT rights, and promoting reproductive rights. As might be easily inferred, the group generally promotes a more liberal interpretation of the political paradigm; siding more often than not with liberal and progressive elements within the United States and typically aligning with the Democratic party. However, with that being said, it must also be understood that NOW does not promote any one single political party; rather, their interests are supra-political and the group only sides with more progressive and liberal ideologies due to the fact that these most specifically represent the goals and ends that the group is trying to effect. With such a constraining level of missions and values, the group is invariably at
Subscribe to:
Posts (Atom)