Saturday, August 31, 2019

Beer Et Al’s (1984) Harvard Model of Hrm Notes Essay

Despite almost two decades of debate in the mainstream literature around the nature of human resource management (HRM), its intellectual boundaries and its application in practice, the field continues to be dogged by a number of theoretical and practical limitations. This book is intended to provide students with a relatively advanced and critical discussion of the key debates and themes around HRM as it is conceptualized and operationalized in the early part of the twenty-first century. Thus the current contribution is intended to be in the tradition of Storey (2007) and Legge (1995) and aims to provide students with a well-grounded and critical overview of the key issues surrounding HRM from a theoretical and practical perspective. In doing so we draw on contributions from the leading scholars in the field who provide detailed discussions on key debates in their respective offerings. In this introduction we provide the context for the book though considering a number of overarching themes within which key debates in the field of HRM are situated. Specifically, we provide a summary discussion of the theoretical and intellectual boundaries of HRM, consider its emergence in historical context and identify some of the pervasive contradictions and limitations which prevail in the literature. Finally we provide a short outline of the structure and content of this volume. HRM defined Our discussion begins by considering what HRM actually means. Given the importance of definition in understanding the boundaries of a field, this issue is clearly an important point of departure. However, this question is more difficult to answer than one would expect, since from its emergence HRM has been dogged by the still largely unresolved ambiguity surrounding its definition. As Blyton and Turnbull (1992:2) note ‘The ways in which the term is used by academics and practitioners indicates both variations in meaning and significantly different emphases on what constitutes its core components’. One of the dominant definitions (in the UK at least) has been to define HRM as a contested domain, with rival soft and hard approaches. The soft approach to HRM is generally associated with the Harvard School and in particular the writings of Michael Beer and colleagues (see Beer et al., 1984; Beer and Spector, 1985; Walton and Lawrence, 1985). The soft school emphasizes the importance of aligning HR policies with organizational strategy; it emphasizes the role of employees as a valuable asset and source of competitive advantage through their commitment adaptability and quality (Legge, 1995; D’Art, 2002). It stresses gaining employee commitment to the organization through the use of a congruent suite of HRM policies. Soft HRM draws on behavioural sciences in particular, with strong resonance with the human relations school, while the concept of human growth, which is central to its theory, echoes ‘all-American’ theories of motivation, from McGregor’s Theory Y to Maslow’s Hierarchy of Needs (Legge, 1995). Hence it is sometimes conceptualized as ‘developmental humanism’ (Storey, 1989; Legge, 1995). HRM is operationalized in terms of strategic interventions designed to develop resourceful employees and to elicit their commitment to the organizational goal (Storey, 1992). However, sceptics have conceptualized soft HRM as the ‘iron fist in the velvet glove’, arguing that the theory of soft HRM ‘reduced †¦ the complex debate about the role of people in work organizations to the simplistic dogma of an economic model which even its â€Å"creator† Adam Smith would probably not have wished applied in such an indiscriminate manner’ (Hart, 1993:29–30). Another uncharitable definition of soft HRM is that it constituted a desperate rearguard action by liberal academics and practitioners, mostly writing in the United States, to sell more humane forms of managing people to essentially conservative owner interests that have in increasing numbers ruthlessly pressed for a maximization of short term profits, regardless of the cost to both employees and the long term good of the organization. In other words, soft HRM is about trying to encourage firms to be ‘nicer’ to their people, on the basis that such ‘niceness’ is likely to translate into greater commitment and productivity, and hence, even more profits. Soft HRM stands in contrast with the hard variant. Hard HRM is generally associated with the Michigan School (Forbrun et al., 1984). Its emphasis is on the use of human resource (HR) systems to ‘drive’ the attainment of the strategic objectives of the organizations (Forbrun et al., 1984). While sof t HRM emphasizes the human element of HRM, the emphasis of the hard approach is very much on the resource as a means of maximizing shareholder value over the short term. The duty of managers is quite simply to make money for owners, and a focus on other issues such as employee rights is simply a distraction: rather, by focusing on returns, the organization will perform most efficiently, which ultimately is in the interests of all. It has been argued that, in the tradition of Taylorism and Fordism, employees are viewed as a factor of production that should be rationally managed and deployed in quantitative and calculative terms in line with business strategy (Tyson and Fell, 1986; Storey, 1992). However, rather different to classic Taylorism or Fordism, job security in the new hard HRM is seen as an unnecessary luxury, whilst pay rates are to be kept to the lowest level the external labour market would permit: there is little mention in the literature illustrating how hard HRM echoes Henry Ford’s famous commitment to a 5 dollar/day wage. Human resource policies in the hard variant are designed to be both internally consistent and externally ali gned with the organizational strategy. These interventions are designed to ensure full utilization of the labour resource (Storey, 1992). It is legitimized and finds its impetus from a market-responsive frame of reference (Storey, 2007). At the extreme, implicit contracts regarding pensions and tenure are seen as hampering effective management: these should, if possible, be jettisoned, with employee rights being pared back as much a possible. Critics of this point of view have argued that such a focus is likely to make for higher staff turnover rates, with the inevitable loss of job specific skills and accumulated wisdom, low trust, low levels of organizational commitment, and hence, higher transaction costs (see Marsden, 1999). In other words, hard HRM is likely to make organizations less efficient. It could be argued that most successful incrementally innovative high value added manufacturing firms have shunned hard HRM. In contrast, it has been more widely deployed in more volatile areas of economic activity, such as f inancial services. A second and simpler way of viewing things is that HRM in the narrow sense can be defined as a strategic approach to managing employees, which came to the forefront in the liberal market economies, particularly the US and the UK, in the 1980s. Whilst having both soft (‘people friendly’) and hard (‘people as a resource to be deployed, utilized, and, if need be disposed of’) variations, common to this approach was an emphasis on optimal shareholder outcomes, with enhancing outcomes for other stakeholders being at the best a secondary objective, and at worst, an unnecessary distraction. This ‘two sides of the same coin’ point of view argues that, since the end of the long boom that lasted from the post World War II period up until the 1970s, there has been a period of erratic and unstable growth and recession. This period has been characterized by employers gaining the upper hand over employees, on account of the very much weaker bargaining position of the latter (cf. Kelly 1998). Given this, managers – particularly in the liberal market economies, such as the US and UK, where workers have historically had fewer rights under both law and convention – have taken the opportunity to fundamentally change the way they manage people. This has taken the form of systematic attempts to undermine collective bargaining with unions, replacing this with weak forms of consultation with individual employees. Collective employment contracts – where workers performing similar jobs are rewarded according to a pre-agreed pay scale – are replaced with individual ones, with employees being rewarded on the basis of regularly appraised performance, and/or through pay rates simply being linked to outputs. In other words, the role of the employee in the firm is not a dynamic and, in som e sense, negotiated relationship, but rather simply the deployment of a resource, in the same way a firm would deploy other physical resources, such as raw materials. A third way of looking at things is to simply conceptualize HRM as little more than a renaming of personnel management. In this vein, writers such as Armstrong (1987) describe HRM as ‘old wine in new bottles’, while Guest (1987) pointed to the fact that many personnel departments changed their names to HRM departments, with little evidence of any change in role. In practice, this would suggest that much HR work really concerns the administration of systems governing the administration of pay, promotion and recruitment procedures, etc. In turn, this would imply that HR managers are likely to lack power within the organization and have little say in setting real organizational strategies. Finally, HRM may be defined broadly in terms of including all aspects of managing people in organizations and the ways in which organizations respond to the actions of employees, either individually or collectively. The value of this catch all term is that it describes the wide range of issues surrounding both the employment contract, situations where an employment contract has yet to be agreed on (recruitment and selection), and ways in which employees may be involved and participate in areas not directly governed by the employment contract to make working life more agreeable and/or to genuinely empower people. In other words, it goes beyond simply ‘industrial relations’ or ‘employment relations’. The terms ‘personnel administration’ or ‘personnel management’ would not provide a totally accurate label, given their administrative and non-strategic connotations. Some insights into the different ways HRM has been conceived have been provided by the Keele University affair in 2007–2008. A conservative university administration resolved to restructure business and management studies in the university through the simple device of making acade mics that had formally specialized in ‘industrial relations’ redundant. In many respects, this was a surprising decision, given robust student numbers, and the fact that industrial relations research was one area where Keele had gained an excellent reputation. Backed up by the findings of a committee of external ‘experts’, university administration implied that industrial relations academics were likely to be less capable of teaching HRM, and, by implication, had skills sets not relevant to modern business education. Tellingly, a petition signed by many leading HRM and industrial relations academics in Britain, in response to this decision, included a statement that HRM could not be separated from industrial relations, and that the skills necessary to teach industrial relations could broadly be applied to understanding HRM. In other words, HRM was simply a collective noun describing work and employment relations in the broadest possible sense, and was not really about special new skills, or a new and different agenda (see www.bura.org.uk). The preceding discussion highlights the ambiguity around the boundaries of HRM. These differences are summarized in Table 1.1. The tension around definition persists in the literature and a central theme in this volume is highlighting the contradictions between these two broad understandings of HRM. We argue that for ethical and sustainability reasons, more stakeholder orientated approaches to people management are preferable, with shareholder dominant approaches facing both quotidian micro-crises at firm (encompassing problems of human capital development and commitment) and at macro-economic (encompassing problems of excessive speculation-driven volatility, industrial decline, and chronic balance of payments problems) levels. HRM and personnel management compared As noted above, a key point of reference in definitions on HRM is through comparing it with its predecessor – personnel management. Although this debate is somewhat dated, it remains important. Thus it merits summary discussion. During the early days of HRM’s emergence as a mainstream approach to people management a number of commentators were sceptical about the extent to which it represented something different to its predecessor – personnel management. Over time it has become apparent that there are substantive differences between the two, Table 1.1 Definitions of HRM†¦ Definition | Implication | Contested domain | HRM is a contested domain, with two rival paradigms, hard and soft HRM | Two sides of the same coin | Whether hard or soft, HRM is about the management of people in a particular, new way. This may involve the use of strategy to manage people, or simply reflect structural changes that have strengthened management at the expense of employees | ‘New wine in old bottles’ | HRM is little more than the extension of traditional personnel management | Collective noun | HRM is a commonly reflected description for a range of practices associated with managing work and employment relations | At least at a theoretical level. In illuminating these differences a brief discussion on personnel management is merited (for a full discussion, see Legge, 1995). While there are a number of accepted definitions of personnel management, some of which in the US context are closer to accepted definitions of HRM (see Kaufman, 2001; Strauss, 2001), there is a degree of consensus as to its key characteristics. First, personnel management is largely conceived as a downstream activity with a limited strategic role. And, despite the rhetoric, HRM is often not that strategic: after all, both hard and soft HRM ultimately depict HRM as a transmission belt, passing down an agenda of shareholder value. Further, personnel management is generally considered to be reactive and piecemeal with little integration between its various elements. One of the greatest management thinkers – if popular management writing can be considered thought at all – of the last century, Peter Drucker (1961:269), neatly summarized the personnel role as ‘a collection of incidental techniques with little internal cohesion. As personnel administration conceives the job of managing worker and work, it is partly a file clerk’s job, partly a house keeping job, partly a social worker’s job and partly fire-fighting to head off union trouble or to settle it’. This limited role is alluded to by Legge’s (1995:88) observation that ‘in the UK â€Å"personnel management† evokes i mages of do-gooding specialists trying to constrain line managers, of weakly kowtowing to militant unions, of both lacking power and having too much power’. Indeed it has been argued that the perceived welfare role of the personnel function was one aspect of it that limited its credibility as a managerial function. It also resulted in females playing a key role in personnel in its formative years in the UK context (Legge, 1995). A scrutiny of the gender composition of classes at many Chartered Institute of Personnel and Development approved training centres provides some corroboration for the gendered nature of much HR work. A further dimension of the broad personnel role in the UK was its key role in negotiating with trade unions, a characteristic which points toward the fire-fighting role of personnel. Indeed, it was this element of the role that bought increasing numbers of males into the profession (Gunnigle et al., 2006). However, more recent evidence in the UK points to a shift in the balance towards a greater feminization of the HR function (Kersley et al., 2006:69). This engagement with trade unions points to a collectivist orientation and, owing to the historical prominence of trade unions, particularly in the UK and Ireland, personnel management became infused with a pluralist frame of reference (Flanders 1964). Given the importance of bargaining, managing the industrial relationship gained a distinct identity: it is worth noting that the divide between basic personnel management and industrial relations persists in the academic literature, with, as a general rule, those academic journals focusing on the former having low prestige, and on the latter, high prestige. Newer explicitly HR journals represent something of a cross over and incorporate aspects of both, as well as insights from, other disciplines. The preceding discussion suggests that HRM and personnel management – and industrial relations – may differ in a number of substantive ways. The first is that HRM is conceived as having a more strategic role and hence elevated t o the top management table, suggesting a more upstream role, even if, in practice, this has been little more than wishful thinking. Nonetheless, HRM does concern attempts to develop an integrated and congruent set of HR policies as opposed to the piecemeal approach apparent in the traditional personnel role. Furthermore, HR policy and practice is also targeted at the individual level. This is reflected in the preference for individual performance related pay, individual communication mechanisms, employee opinion surveys and the like. A final key distinguishing factor is that, reflective of the individualist orientation, HRM is premised on a unitarist understanding of conflict. Unitarism suggests that there are no intrinsic conflicts of interest in the employment relationship as all within the organization are working toward a common goal for the success of the organization. The common goal is reflected in the idea that there is a single source of authority within the organization – management. Given that there are argued to be no conflicts of interest within the organization – conflicts are caused b y breakdowns in communication or by troublemakers. Conflict should be suppressed by improving communication or removing troublemakers from the organization. Unions are opposed on two grounds: (1) there are no conflicts of interest within the workplace and thus they are unnecessary and (2) they would represent an alternative source of authority. Alternatively, unions may be co-opted to the managerial agenda, through ‘partnership’, with unions trading off militancy for continued recognition, and the benefits that would arguably flow from greater organizational competitiveness. More critical strands of the HR literature suggest that this focus is mistaken, that employees often retain a collective identity, and that managerial power will inevitably continue to be challenged in ways that would make new accommodations necessary if the organization is to work in the most effective way. http://lib.myilibrary.com/Open.aspx?id=223448&src=0#

Friday, August 30, 2019

Nothing Lasts Forever: Critical Analysis of Ozymandias

Nothing Lasts Forever: A New Critical Analysis of â€Å"Ozymandias. † Throughout the history of man, there has always been a select few who wish for immortality. They build awe-inspiring kingdoms, erect massive statues, all in a vain effort to leave their mark on the world. None of them has been successful, thus far, and Ramesses II is no exception. In the poem â€Å"Ozymandias,† by Percy Bysshe Shelley, a traveler shares his experience at the site of a statue depicting Ramesses II. The statue has fallen into disrepair at the hands of the harsh environment, as well as the eroding process of Time.At first reading, the text presents itself as a poem about the withering away of a once great statue. However, through the use of symbolism, setting, diction, and irony, the poem reveals that while men may strive for immortality, the true â€Å"king of kings† (line 11) is Time. Legs on the human body are necessary for motion and balance, but they also act as an important symbol of Ramesses II’s kingdom. Without these twin apparatuses, the human body is incapable of moving forward. In this respect, the two â€Å"vast and trunkless legs of stone† (line 2) found bodiless in the poem symbolize the overthrow of Ozymandias’s empire by Time.Without legs on which to stand, his kingdom has lost its momentum and has subsequently been devoured by the sand. In addition, the top half of the statue—the head and part of the torso—is laying in the sand â€Å"half sunk† (line 4). As with the legs, the positioning of the head and torso is symbolic. Ozymandias is gazing at the sky, looking up what remains of his decimated kingdom, a â€Å"wrinkled lip, and sneer of cold command† (line 5) on his face. To look up to someone else is to acknowledge their position of authority over others.Through the positioning of the statue, Ramesses II is acknowledging that Time has conquered him. His empire has been reduced to dust, clai med by the sands of Time. The poem describes the setting as â€Å"boundless and bare/The lone and level sands stretch far away† (line 13-14), which amplifies Time’s dominance as a theme. What is a desert? To the unknowing reader, it is nothing more than a large sandbox. With the exception of sand and rocks, it’s an empty, dead land. However, when compared to other terrains, such as a forest or ountain range, it is surprisingly uncomplicated. In â€Å"Ozymandias,† the harsh environment and unforgiving terrain is a symbol of brutal honesty. Humans are poorly tolerated in deserts, and should a man decide to build his empire in one, he will be faced with brutal honesty and will be tested. The choice of location is just as crucial to the theme as the location itself. Since the statue is in its original environment, overtaken by the harsh winds and buried in the sand, and not preserved behind a glass case, it argues against Ozymandias’s immortality.Rathe r than be displayed for others to learn and respect his accomplishments, the remains of his kingdom have been left behind, deemed useless and unwanted by the world. Had the traveler viewed the remains of the statue in a museum, Time’s purpose in the poem would have taken on a whole new meaning. Given the state of his later surroundings, Ozymandias’s words â€Å"Look at my works, ye Mighty, and despair† (line 11) are ironic, and the imagery of his former kingdom proves that Time has conquered him. When the traveler recounts his visit to the â€Å"antique land† (line 1), he describes a landscape that is covered in sand.A statue is a symbol of longevity and permanence. Its appearance, if well-maintained, does not wane or deteriorate, forever capturing the beauty and magnificence of the subject for which it was created. Such is the case with Michelangelo’s â€Å"David†, which has only continued to thrive because it is maintained. However, there are no servants remaining to tend to Ramesses II’s statue, no one to remember his legacy. The statue of Ozymandias has broken in half, and the head lays on the ground close by. â€Å"Nothing beside remains† (line 12) the traveler explains, noting â€Å"†¦ the decay/Of that colossal wreck† (lines 12 – 13).Can the King of kings’ legacy continue without proof that it ever truly existed? No, it cannot, which means the words scripted on the pedestal have taken on an entirely different meaning. It is not Ozymandias that the Mighty should fear, but the true King of kings—Time. Time’s empire is in actuality the thing that is â€Å"boundless† (line 13), not the kingdom of Ozymandias, which had a time limit all along. The diction choices in the sonnet are very specific, particularly those describing the statue, and they serve to reflect Ramesses II’s downfall. The raveler describes the statue as being â€Å"on the sand/Half sunk† (line 3-4), which is often interpreted to mean that the statue is buried halfway in the sand. Considering the ironic words engraved on Ozymandias’s statue, the word â€Å"sunk†Ã¢â‚¬â€the past participle of the word â€Å"sink†Ã¢â‚¬â€takes on a different meaning. What is sand, and more importantly, how does it relate to the theme of the poem? When used in conjunction, sand and Time make up an hourglass—the universal symbol of time. The sand surrounding the statue is not merely a mass accumulation of sedimentary rock, but a symbol for the Sands of Time, a term given to the inside of an hourglass.The statue, as well as the kingdom has been devoured by Time. Another few centuries, and the last remnants of Ramesses II’s empire will fall through the hourglass completely. Furthermore, line four continues with â€Å"a shattered visage lies† (line 4). When something is shattered, it is almost impossible to reassemble them. Even a shatte red limb takes months to heal properly, and it is never quite the same from then on. The â€Å"shattered visage† (line 4) spoken of in the poem isn’t just Ramesses II’s statue; it is his legacy that has been broken. The empire that he had created, the one that he was so sure would endure, has collapsed.The hubris of kings is pride and the desire for immortality. Unfortunately, as Shelley’s poem demonstrates, Time is not something that can be manipulated. With his death, Ramesses II’s empire came to a standstill, but Time continued to move and ultimately overthrew the pharaoh. Time is the true King of kings. Through the use of symbolism, setting, diction, and irony, Shelley proves that humans are finite beings and nothing lasts forever. Works Cited Shelley, Percy Bysshe. â€Å"Ozymandias. † Literature: Reading and Writing with Critical Strategies. Ed. Steven Lynn. Pearson-Longman. New York City. 2004. 618 – 619. Print.

Thursday, August 29, 2019

Discuss attitudes towards health and illness and the effect these Essay

Discuss attitudes towards health and illness and the effect these would have on your work as a practising nurse - Essay Example ealth and illness and use of a specific set of ideals has â€Å"important clinical implications.† An ideal is the motivational standard by which to evaluate our goals and our reasons for pursuing these goals. The â€Å"goal is the what; the ideal is the why.† (â€Å"The Edgar Cayce Primer,† Bantam Books, New York 1982.) The ideal attitude gives people a greater sense of purpose and meaning in life, making them look at illness as more of a challenge than a tragedy. Those bereft of such a lofty ideal are prone to depression and self-condemnation in the face of disease which provokes fear in them and a feeling of being victimized by something outside and beyond their control. This attitude of weakness and surrender stunts a person’s psychological initiative and weakens his/her will power to render healing more difficult and painful. Our thoughts, feelings, behavior and purpose in life contribute a great deal to health or illness, Edgar Cayce declares. To develop the ideal attitude for combating disease, we have to take some degree of responsibility for our situation by defining a course of action that takes all aspects of our experience – spiritual, mental and physical – into consideration. People who are able to make such an attitude adjustment feel more empowered to deal with their illness. (â€Å"Meditation and the Mind of Man,† H.B. Puryear & M.A. Thurston, A.R.E. Press, Virginia Beach 1987.) Functionalists believe that attitudes are â€Å"enduring systems.† Once attitude is acquired, it becomes virtually impervious to change. The reason is, attitudes serve a particular motivational function related to the ego and to change them you need to change what motivates the individual as well. This school of thought moreover holds the view that an attitude change is made more difficult by the fact that what lies behind motivation is usually unknown even to the individual as it often exists in the subconscious level. If attitudes toward health and

Wednesday, August 28, 2019

Recently History Essay Example | Topics and Well Written Essays - 500 words

Recently History - Essay Example the southern African Americans faced a great deal of problems in the 1915-16, They were denied the right to vote, lived under severe poverty, faced crop infestation which affected them greatly as most of them were occupational farmers and most importantly they lived under heavy debt. Lack of facilitation and opportunities in the south prompted them to migrate to the north where the urban areas had flourish in the wake of the war. Since Europe was in the midst of a sever war that had haltered its economic progress, the United States became the facilitators in this case for the war torn countries. As a result not only did it strengthen economically, it also hosted a number of quality and well-paying job, a feature absent in the south (Exhibitions.nypl.org). They war had opened many avenues for them in the economic world of production and services and hence, the southern blacks moved to the north in search of greener pastures. This migration is known as the great migration in history an d played a great role in revolutionizing the black community in the United States. The female black population of the United States was positively affected as well. They contributed to the war efforts and as a result were able to get equitable jobs in the country as well. They became politically active as well and provided significant support to the black soldiers as a result. Many war service organizations specifically for women were also established like the Red Cross, Womens Auxiliary of the New York 15th National Guard etc. and thus, they were accepted as a strong opinionated part of the American population. Many instances also depict the increased employee sense that these minorities developed and retaliated against their white employees for due employee rights they were denied. Where the black Americans saw progress and growth at the war time, another minority faced dire consequences. Majority of the American population consisted of foreigners. Even though the german-americans

Tuesday, August 27, 2019

Journal Essay Example | Topics and Well Written Essays - 500 words - 23

Journal - Essay Example The members of the group try to help each other. If one person cannot do something, another person will try to do it. In return, the first person should try to find a way to do the second person’s task when he or she is available. This type is a 5.5 in Blake and Mouton’s Conflict Grid. We are able to maintain the peace among the group. However, our progress is very slow because each person needs to adjust to the schedule of the other person. So, a task is only finished when someone is free to do it. 4. My style of conflict management depends on the conflict. Sometimes I use collaboration. Other times I use competing and other times I use accommodating. I think one style of conflict management is not perfect in all types of conflict. The style I choose will depend on the people in the conflict and the goal to meet. I think sometimes I have to be firm and decide alone. In other situations, I have to get consider suggestions from my subordinates. In other situations, I have to adjust something while my subordinate also adjusts something so we can meet in the middle. 5. For our group, these factors helped the most: people will accept changes that have a part in planning and changes will be more readily accepted when people are involved in gathering the facts that indicate the need for change. These factors helped because the opinions of all the members were considered. 6. The most helpful of the Ten Commandments of Implementing Changes is Number 9: Communicate, involve people, and be honest. If everyone in the group knows about any changes, they can prepare for it. The least helpful is Number 6: Line up political sponsorship. I think this is not important in making changes. Also, political sponsorship cannot help if many people do not want change. 7. All the persons in my group are Early Majority. They do not accept change easily. I think it is because each person is busy with personal activities. They do not like tasks from

Monday, August 26, 2019

Outline, Thesis, and Introduction Coursework Example | Topics and Well Written Essays - 250 words

Outline, Thesis, and Introduction - Coursework Example Review of Literature – evaluates and summarizes relevant information from the identified secondary sources regarding legalization of marijuana in the United States. Findings – stipulates highlights of findings from secondary sources and from interviews Recommendations Conclusion References Introduction The use of marijuana as a medical tool has been subject to controversy with regards to the benefits and costs to the users and to society. Various researches have supported its use for medical purposes and interviews with patients have validated preferences to its use in contrast to the traditional medications. Contemporary statistics have revealed that there are currently 16 states plus Washington, DC that have enacted laws legalizing the use of marijuana for medical purposes, of which California, has been listed among its roster since 1996 (ProCon, 2011). The current research aims to proffer issues and concerns regarding the legalization of marijuana for medical purpose s.

Sunday, August 25, 2019

Should English be declared the official language of the United States Research Paper

Should English be declared the official language of the United States - Research Paper Example Even a great majority of the immigrants who have settled in different states learn the language in order to make it principal means of communication. However, despite all these figures, the truth is that English has never been declared as the official language of the U.S. There may be around 30 states out of the 50 that the country is composed of that have given official status to the language but at the federal level, no such legislation has been made. The irony here is that English is declared as an official language in countries where it is not the native tongue or not even used in ordinary conversations. Countries as far-flung as the interior regions of Africa such as Botswana and Swaziland and the small Pacific island-states such as Fiji and Samoa have made the language their own medium for official transactions. This may prove that English is the world’s most spoken language. However, this also highlights the irony in the fact that U.S., whose cultural influence is the m ajor factor for the spread of English as a language, has never made it official. Thesis Statement The reason why English should be declared as the official language though is based not solely on the fact that it is spoken by the most number of people in the country. It is a fact that people, even newly-arrived immigrants are conscious of the necessity to learn the language as soon as possible, knowing that business and government transactions employ it. The more important point is that language is not just a medium of communication; it is also a symbol of nationhood and of unity as a people. A country without a common language that is declared as official would certainly be wanting in terms of identity. Since English is the most commonly spoken by Americans and even by people who wish to become American citizens, it may as well be declared official. Pros and Cons of Making English the Official Language The proposal that English be made as the country’s official language is ac tually not new. In fact, arguments in favor and against this proposal have been around ever since the early days of the republic. Benjamin Franklin, one of the founding fathers, had proposed that the use of other languages should be limited other than English. It was in the latter part of the 1700s that the John Quincy Adams made concrete steps towards legislation in favor of its official status. He actually recommended that the congress create a resolution that would establish an institution that would study and improve the language’s usage in line with its being official. However, this was countered with the argument that making English official is anathema to democracy and to individual liberty, two basic principles enshrined in the Constitution. A century after the Adams’ failed attempt, President Theodore Roosevelt once again pushed for the legislation of English as an official language. Roosevelt whipped patriotic fervor in asserting his point. He said that †Å"we have but one flag† and therefore â€Å"we must also learn one language, and that language is English.† (Hogg and Denison 417) Despite the appeal to patriotism though, Roosevelt also failed to make English as an official language. Legislators and certain sectors, particularly those groups advocating the rights of immigrants, have successfully blocked such attempts for about two centuries already. Their most solid defense is the country’s evidently uncompromising stance as regards individual liberty. According to them, making

Saturday, August 24, 2019

The Advantages of teamwork Essay Example | Topics and Well Written Essays - 250 words

The Advantages of teamwork - Essay Example According to Hosftede, we get ourselves in life situations where we are dealing with people from diverse cultures and we have to work together for a common course. Hence, one needs to have knowledge of the cultural dimensions as illustrated by Hosftede. They include power, individualism, gender, uncertainty and long term orientation. Teamwork is a better illustration of the famous ancient phrase that says two heads are better than one. Teamwork enables people to share ideas among their team in relation to the shared task. It involves each person giving an idea and participating in decision making of the way forward in doing an activity or in the process of problem solving. Teamwork also saves time. Things get done much faster and efficient. When a group or team is assigned a task or responsibility, it is more likely that it will be done in less time with so many areas covered all at one time. Another merit of teamwork is the ability to account for weak areas. People are diverse; different cultures and each has their strengths and weaknesses that differ a lot. When people come together to do a similar task, it is easier to get solutions through each stage since there are possibilities of having one or two persons who are conversant with an identified area of weakness (McMillan & Reynolds, 2002, p. 23-34). In addition, teamwork is able to break the cultural differences that may present during a task. At workplaces, teamwork improves relationships among the work mates and the management of an organization. These relationships results to teamwork not only in the workplace but also outside work and across cultures (West, 2012, p. 56). In additions, it brings about job satisfaction and morale to engage in even bigger tasks. One thing that is essential for any manager to invest on in business or organization is teamwork. It saves a lot of time and dependency on the

Citibank Internet Banking Assignment Example | Topics and Well Written Essays - 2000 words

Citibank Internet Banking - Assignment Example banks could honestly claim that Internet banking is, at last, contributing to the bottom line (Johnson, 2006). In this age when a few seconds delay is much too long, why did it take rich banks this long to do it right Which brings us to our key question: are banks finally doing the "right" things "right" Our experiment called for an evaluation of how basic marketing principles and the Internet were combined to produce a successful Internet Banking customer experience. Our findings will show if Citibank U.K. have done their homework, matching strategic vision with real customer needs. In the case of internet banking, this involves the attainment of near-frictionless commerce, allowing customers to connect to the bank and do business anytime and from anywhere, with speed and convenience, and hopefully with each transaction generating value for the customer and a tidy profit for the bank. White and Nteli (2004) in their article's title asked an embarrassing question: some ten years after the hype began, "why are there not enough customers" The estimated millions of customers and the billions in profits were not there. Since then, studies by Datamonitor (2004) and Deutsche Bank (2006) showed that of the U.K.'s 60 million population, an estimated 15 million or 25% regularly do banking transactions on the Internet. Offhand quite an impressive figure, but considering that 80% of households in the U.K. had multiple bank accounts (Cruikshank, 2000), and 40-50% of account holders in Sweden and Finland do internet banking (Deutsche Bank, 2006) - of course, there are only 14 million Swedes and Finns on earth - market penetration remains an issue that point to internet banking's huge, promising, and untapped potential. This essay tries to unravel the mystery with a critical analysis of the internet banking capability of Citibank U.K. But before doing so, we briefly look at the findings of White and Nteli and other academics, and explain our basic method of primary research. A Problem of Banking or Marketing White and Nteli (2004) argued that internet banking is not bringing in the expected numbers because of marketing issues related to five service quality attributes: credibility, security, product variety/diversity, responsiveness, and ease of use. They identified two customer clusters with different priorities: traditional customers with security and credibility concerns, and non-traditional customers focused on ease of use and responsiveness. Both customer clusters gave banks low scores on product variety/diversity, making the authors conclude that this is a potential source of competitive advantage. As White and Nteli (2004) and Kotler and Armstrong (2005) emphasised, systematic application of marketing principles continue to be an important weapon in the banking industry's arsenal, especially in this age of intense global competition. Marketing enables the bank to create value that would attract customers, engaging and retaining them into a long-lasting and profitable relationship. Especially in this age when shopping for value could be done 24/7 at the click of a mouse, banks are pressured to minimise churn whilst maximising customer profitability. Several studies (Stevens, 2006; Wisskirchen, Vater, Wright, De Backer, and Detrick, 2006) show that churn or customer defection rates in key U.K. consumer industries increased from 16.9 percent in 2003 to 19.1 percent in 2005 and

Friday, August 23, 2019

Argument Synthesis paper Essay Example | Topics and Well Written Essays - 750 words

Argument Synthesis paper - Essay Example tstanding question that needs an immediate address evolving as the greatest robotic debate or argument is the jobs, ethical and social values destroyed by the artificial intelligences, automation. Therefore, as a turning point usage of robots in the modern society to solve life issue in handling robotic concept and principles in dealing with ethical, social and job issues cause some vulnerability in than good. For example people living with autism as claimed by Judith (2014). On a broad aspect, the impacts of artificial intelligence as a data-driven model, accountable and control tool or operational model as carefully evaluated, examined and rebutted against artificial intelligence in solving the human problems from different dimensions based on the reliable facts and evidences obtained by Judith (2014) claims from an economic point of view are pointing out the impacts of artificial intelligence and automation on employments and job opportunities in creating technological unemployment. Based on the economic skeptical Luddism approach (Noel 2008; Robbie 2012) applies the similar pattern to visualize the new robotic life it has caused in creating mass unemployment as robots can handle much work with long working hours compared to human labor. Nevertheless, neoclassical economist argues that, though most predication have worked out is solving human problems such as solving health problems, collecting the highways and other areas, digital revolution or accel erating technology causes the modern employment crisis. Wang claim supports Robbie (2012) findings by basing his findings and conclusion from a developmental and cognitive point of view against the overdependence of robotic intelligence in addressing human issues. According to his findings, the use of robotic intelligence has always resulted to the outstripping of the human brain processing power as the most of reasoning and cognitive activities are taken by the use of computerized devices. Comparatively, the

Thursday, August 22, 2019

Overseas empire Essay Example for Free

Overseas empire Essay Suppression of the Muslim threat in North Africa was less successful though. The area was one of important economic and commercial advantage to Aragon and so seizure of large areas would have been of significance. Perhaps the key reason behind the policy though was the increasing Turkish influence in Naples and Sicily. Ferdinands failure came in an expensive garrisoning project, which held little authority and merely contained the problem. Perhaps the reason behind the lacklustre campaign was his preoccupation with Italy. In 1485 he successfully defended Naples from France and then the Holy Roman Empire. Despite careless disengaging of troops during the illness of Louis XII the policy in Italy was on the whole regarded as a success. Taking advantage of French involvement in the North, Ferdinand reclaimed Rousillon and Cerdagne. Then in 1512 following the death of Germaine de Foixs father, Ferdinand annexed Navarre. Isabellas fortuitous support of Christopher Columbus and hence the involvement in the New World had an increasingly significant impact on the economies of Castile and Aragon. Columbuss discovery opened new trade links and resources. In particular the trade of gold and slavery were of great economic benefit in future years. Furthermore Pope Alexander VI settled the rivalry with Portugal without conflict and expense with the division of the Americas. Isabellas piety determined that the extensive period of convivencia, which existed prior to her reign, would end. Since the pogrom of 1391 there had been sporadic anti-Semitic outbreaks largely born out of a resentment of rich Jewish families. For Isabella however the growing trend of conversos practising Judaism in private was of the greatest concern. Therefore in 1478 an Inquisition into conversos was established in Castile and then one in Aragon in 1481. As a result Jews became confined to ghettos and forced to wear yellow badges. Those suspected of heresy were put on trial and punished. In 1492 conversion was then made compulsory with emigration the only other alternative. Whilst only around 3% of the total population actually emigrated a significant social and economic impact was felt. The commercial welfare of the two Kingdoms was severely damaged and perhaps more crucially the policy disillusioned much of the wider population. The assessment of Isabella and Ferdinands social, economic, religious and foreign success reveals that the period in Spanish history is not as clear cut as contemporary chroniclers have suggested. They failed to curtail the nobility, failed in implementing economic growth and embarked on unwise foreign conquests. In saying this however they also achieved numerous successes such as securing the throne, conquering Granada and increasing the overseas empire.

Wednesday, August 21, 2019

ISO 14001 Advantages and Disadvantages

ISO 14001 Advantages and Disadvantages Over time, the need for the protection of the environment has increased as different industries, companies and institutions have contributed to environmental degradation in different degrees depending on the activities carried out by these organisations. Therefore, as the concept of sustainable development emerged in the late 1980s, environmental management tools such as Environmental Impact Assessment (EIA), Strategic Environmental Assessment (SEA) and Environmental Management Systems (EMS) have been increasingly utilized to try to reduce the pressure on environmental impacts and resources in a systematic manner. The British Standard Institute defines environmental management system (EMS) as the organisational structure, responsibilities, procedures, processes and resources for determining and implementing environmental policy (in Welford 1998 pg 38). It is also defined as a set of management process and procedure that allow an organisation to analyse, control and reduce the environmental impacts of its operations and services to achieve cost savings, greater efficiency and oversight and streamlined regulatory compliance(Schaltegger et al 2003 p 296). In other words, it puts a check on the activities of an organization and its impact the environment and at the same time, improves performance. There are several kinds of EMS standards but the recognized ones are the BS 7750 British standards, The EMAS which is a European Regulation and the ISO 14001 standard which is voluntary (Sheldon 1997 pg 128). As at December 2005, 111,162 ISO 14001 certificates had been issued in 138 countries to different organisations ranging from heavy manufacturing industries to hotels and local authorities (R. DEFRA (2005) defines ISO 14001 as the international standard for EMS which specifies the features and requirements necessary for organisations systematically identify, evaluate, manage and improve the environmental impacts of their activities, products and services. ISO 14001 was developed and is managed by the International Organization for Standardization (ISO) which is a non-governmental organisation and is supported by other guidelines which are ISO 14004, 19011 and 14031 but the 14001 series is the only ISO that requires certification (Arimura et al 2008). DESIGN OF ISO 14001 Sambasivan Fei (2007) states that ISO 14001 has no legal requirements that it should be adopted but voluntary which is an effective tool for proactive organisations as it acts as a benchmark to improve environmental performance thereby meeting legislation requirements and also reassuring stakeholders and regulators. Sheldon (1997) notes that a key principle for designing ISO 14001 was to reach a consensus with all interested parties on a voluntary basis. Welford (1996 pg 63) states that ISO 14001 is a specification standard that requires the adoption and maintenance of an EMS and has been documented in such a way to ensure conformity can be verified and this can be done through self declaration or by an independent third party certifier. It is designed in such a way that it can be applied to any organisation worldwide and generally provides a framework that a firm can base an EMS and it is voluntary in the sense that any organisation would adopt ISO 14001 only if its potential benef its outweighs its cost and competitiveness is not lost as the organisation reduces pollution in the best way they see fit (Delmas 2000, Bansal and Hunter 2003). Bansal and Hunter (2003) notes that ISO 14001 is the preferred EMS because of its legitimacy and easy recognition by external stakeholders as it is externally certified which requires an audit process to ensure that the EMS meets its set targets. They further added that it has a flexible process that focuses on the processes carried out by the organisation rather than environmental performance. STRENGTHS The strength of ISO 14001 as a generic and voluntary standard that can be adopted by all organisations is as follows: Because it is generic, organisations can adopt it in such a way that is best for the organisation to improve environmental performance and can therefore be built around the organisational culture and structure as Sambasiran Fei (2007) writes that the true value and benefits of ISO 14001 is gotten when it follows the companys strategic direction. Organisations have reported financial benefits from adopting ISO 14001 e.g. in the UK, Akzo Nobel chemicals reduced annual consumption of energy by 18% while National Power made  £26,000 profit from better waste management (Sheldon 1997). Birds wall ice-cream factory in Gloucester invested  £115,000 on certification and started saving  £250,000 per year from waste reduction and energy conservation (ENDS 1997). USB, a large financial institution with branches worldwide, implemented ISO 14001 in the branch in Sweden and stated that it is a useful tool as environmental objectives and operational procedures were integrated into business units and culture therefore producing an efficient EMS for the organisation (Hillary 2000 pg 75). Because it is voluntary, proactive industries use it to boast business by improved procedures and at the same time environmental performance and meet regulatory requirements. Rondenelli Vastag (2000) states that the with the voluntary approach, organisations can develop an EMS that is appropriate to activities, location and level of risk which in turn leads to requirements of certification for suppliers and contractors as Ford motors and IBM have done. In their study of Alumax Mt Holly which is an aluminium plant in South Carolina USA and the implementation of ISO 14001 led to improved environmental awareness, enhanced plant reputation, improved recycling and waste reduction and overall, it improved the attitude of staff toward environmental protection and even though it had good environmental practices, ISO 14001 strengthened and improved efficiency of production. ENDS (2006) reports that roll Royce is giving training and support to 6 of its supplier so that they can be ISO 14001 ce rtified Because it can be adopted by all organisations from large manufacturing industries with 50,000 employees to SMEs with 20 employees in all sectors, heavy industries with high environmental pollution can implement ISO 14001 to meet legislation, reduce environmental impacts and prepare for emergencies in case of accidents. Hotels in Hong Kong like the Grand Stanford Intercontinental Hong Kong and Hotel Nikko are ISO 14001 certified to build positive image, improve environmental performance and for economic benefits (Hillary 2000). WEAKNESS The weakness that ISO 14001 is a generic and voluntary standard that can be adopted by all organisations is as follows: Because it is generic, the organisation and implement ISO 14001 in a way that it sees fit and most organisations get the ISO 14001 certification without changing their organisational culture which is a vital success to the implementation of an EMS as Balzarova et al(2006) looks at a case study of a steel fabrication company who had been certified but lost it because focus was on certification rather than improving environmental performance and employees were not involved in the management process. Re-implementing ISO 14001 the organisational culture had to change and Malmborg (2003) concluded that most organisations do not see an EMS as a tool but a substitute for human actions which leads to problems. There is difficulty in the interpretation of the organisations environmental aspects as Hilary (2000 pg 44) confirms in her study of local authorities in New Zealand found it difficult to identify indirect effects such as purchasing policy, contractor and supplier management e.t.c. Because it is voluntary, most organisations adopt ISO 14001 thinking it would miraculously improve their environmental system without top management commitment from an early stage. Researchers have criticised ISO 14001 stating that it does not consider SMEs and developing countries. The cost of implementing ISO 14001 has flawed the fact that it can be adopted by all organizations as the average cost of certification is $10,000-$128,000 and maintenance cost is between $5,000-$10,000 per year depending on the size (Bansal and Hunter 2003). This makes it difficult for SMEs to implement and they contribute about 70% of environmental pollution (Hillary 2000). CONCLUSION The design of ISO 14001 has weak sets of direction compared to BS7750 and EMAS because it sets environmental goals and are continuously improved but ISO 14001 does not and this is as a result of businesses in the US scared of potential litigation (ENDS 1997, Streger 2000). Because of lack of resources, and knowledge, the priority of environmental impact is reduced

Tuesday, August 20, 2019

Asia Pacific Economic Cooperation Economics Essay

Asia Pacific Economic Cooperation Economics Essay Economic integration can be defined as the commercial policy of discriminatively reducing or eliminating barriers only among the nations joining together. The aim of economic integration is to reduce costs for both consumers and producers as well as to increase trade between the countries taking part in the agreement. There are various levels of economic integration which is free trade area (FTA), preferential trade agreements (PTA), customs unions, common market, economic union and also duty free zone. Economic integration was starting by the European Union. European Union was founded by the Treaty of Rome where it signed in March 1957 by six countries which is Germany, Italy, France, Belgium, Netherlands and Luxembourg and came into being on January 1, 1958. The establishment of common external tariff of the six countries in 1958. Free trade in industrial goods, within EU and common price for agricultural good was achieved in 1968 and then restriction on the free movement of labor and capital was reduced in 1970. In 1993, all remaining restrictions on flow of goods, services and resources, becoming largest trade block in the world will be removed. European Free Trade Associations (EFTA) was formed by seven nations which are United Kingdom, Austria, Denmark, Portugal, Norway, Sweden and Switzerland. In 1967, EFTA achieved free trade in industrial goods but only a few special provisions were made to reduce barriers on trade in agricultural products. However in 1991, membership evolved in EFTA includes Austria, Finland, Iceland, Norway, Liechtenstein, Sweden and Switzerland. On January 1994, European Free Trade Associations joined European Union to form European Economic Area (EEA). North American Free Trade Agreement (NAFTA) was formed by United States, Canada and Mexico and this agreement will eventually lead to free trade in goods and services over entire North American Area. It also phased out many other barriers to trade and reduced barrier to cross- border investments among the three member nations. NAFTA also have benefits the United States by increasing competition in product and resource markets and also lowering prices of many commodities to US consumers. Association of Southeast Asian Nations (ASEAN was established in 8 August 1967 through Declaration of Bangkok and now known as the ASEAN Declaration.  [1]  . Originally, ASEAN consists of five countries in Southeast Asia region, namely Malaysia, Thailand, Indonesia, Philippines and Singapore. However, now, it known as ASEAN 10 which is the membership expanded to ten countries includes Brunei, Vietnam, Kampuchea, Laos and Myanmar. The goal of the ASEAN is covering cooperation in economic, social, cultural, technical, educational, and so on. In addition, these organizations also promote regional peace and stability with respect and abide by the laws of justice and otherwise comply with the principles of the Charter of the United Nations (UN). The objective of establishing ASEAN is the first is to accelerate economic growth, social and cultural, second is inculcate and reap the benefits of regional development, the third provides training and research facility, the fourth increase t he standard of living (agriculture, industry, trade) and the final objective is to form a close relationships and profitable . Asia-Pacific Economic Cooperation (APEC) is a semi-official organization which was formed through the first conference in November 1989, in Canberra, Australia. Now, APEC has 21 members which contributes Australia, Brunei Darussalam, Chile, Canada, Hong Kong, Indonesia, China, Peopleà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s Republic of China Japan, Republic of Korea, Malaysia, Mexico, Papua New Guinea, New Zealand, Peru, The Russian Federation, Singapore, Philippines, Chinese Taipei, United States of America, Thailand and Viet Nam. APEC has grown to be an important intermediate in promoting open trade and economic cooperation in the region. The main objective of APEC is to accelerate the growth of economies in the Asian-Pacific region and foster a spirit of cooperation among member countries. One of its objectives is to maintain the organization and Development Division Asian-Pacific region for the benefit of the people and thus, contribute to world economic Development Division. And the n ext objective is to reduce trade barriers in goods and services between member countries in line with the principles of GATT without disturbing the economic interests of others. ADVANTAGES OF ECONOMIC INTEGRATION Advantages of the establishment ASEAN and APEC are to increase the flow of employment and expertise between developed countries with developing country. Through cooperation between Asian, expertise or skilled labor can be absorbed into the State to help them improve productivity. Besides that, this relationship can also help Malaysia in producing highly knowledgeable labor force. This is because, people in Malaysia will have the opportunity to study abroad, and especially in developed countries like the United States, Australia, Germany, Japan and Russia. So this opportunity will lead Malaysians to continue their studies at a higher level and the state can produce a high productivity by using their skills and expertise. Thus, the output produced in the State will be higher quality and more consumers can use it. In addition, skilled labor can also be absorbed into the State to assist the State in increase crop productivity. Skilled labor in Malaysia is still not enough to improve the nations economy, especially in the construction sector.  [2]  Table 1.1 below shows that skilled labor in Malaysia is still not enough to improve the construction sector in the country. Therefore, the government encourages the entry of skilled workers, and through the Asean cooperation skilled labor migration can be done. So, this skilled manpower will help the government improve the productivity of State, besides being able to produce high quality output and can be exported to other countries. In other words the amount of aggregate merchandise exports to ASEAN grew faster than the average regional output. ASEANs total merchandise exports between 1988 and 1994 increased ranging between U.S $ 100 to U.S $ 200 billion.  [3]  While exports in Malaysia in 1980 were 52 percent and in 1994 the export volume ha s increased to 64 percent. Table 1.1 below shows the ratio of Asean trade and commerce in Malaysia ratio increased from 1980 to 1994. DISADVANTAGES OF ECONOMIC INTEGRATION The disadvantages of ASEAN establishment are causing the loss of sovereignty of a State. Generally sovereignty is the supreme power held by an institution in the political community to make a decision on matters relating to the administration and politics. The first philosopher to give its opinion on sovereignty is John Bodin (1530-1596) in his book Six Books Concerning the State asserts sovereignty is the supreme power that is in a state of the union supreme power over citizens and the people of the region. According to him the supreme power is owned by the king or ruler of a sovereign power (absolute). Sovereignty is related to national security.  [4]  The world now has the wave of change in the dimensions of economic and socio-political environment, especially in the process of globalization. Generally the expression of globalization no difference between the terms of a neo-colonialism à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¹Ã…“colonizes in the new concept. People who are weak in the mental and spiritual will easily fall in the midst of destruction. Humans will not have longer the values of modesty and personal lives. Eventually it will lead to the demise of civilization of a nation.

Monday, August 19, 2019

The Absolute True Diary of a Part-Time Indian Essay -- Literary Analys

  Ã¢â‚¬Å"I’m never going to act like my mother!† These words are increasingly common and yet unavoidable. Why is it that as children, we are able to point out every flaw in our parents, but as we grow up, we recognize that we are repeating the same mistakes we observed? The answer is generational curses: un-cleansed iniquities that increase in strength from one generation to the next, affecting the members of that family and all who come into relationship with that family (Hickey 13). Marilyn Hickey, a Christian author, explains how this biblically rooted cycle is never ending when she says, â€Å"Each generation adds to the overall iniquity, further weakening the resistance of the next generation to sin† (21, 22). In other words, if your parents mess up you are now susceptible to making the same mistakes, and are most likely going to pass those mistakes to your children. In The Absolute True Diary of a Part-Time Indian, Sherman Alexie shows the beauty of hope i n the presence of a generational curse. Even though the elders are the ones who produce the curses, they are also the ones who attempt to break Junior from their bond forming mistakes. The curses that Arnold’s elders imprint on him lead him to break out of his cultural bonds and improve himself as a developing young man. Mr. P bestows the curse of hopelessness to Arnold, which inspires him to break free from the bonds of his ancestors. Even though his students see him as worthless, Mr. P is humble, poor, hurt by the ones he is trying to save, an educator, and merciful, which leads to the betterment of Junior. Going back to biblical references, the readers can see that these adjectives also line up perfectly with the personality of Jesus: the higher power capable of breaking generation... ...ibe. As Mr. P, Grandma, and Mary share a small piece of their lives with Arnold, they show him how hopelessness, insecurity, and disregard to curses can make people's lives miserable. Even though everyone in society recognizes this, they cannot break free because they do not have the opportunity of a higher power to break them from their generational curses. As Junior observes all of this, he decides to be the one who breaks free by using the hardships of the curses presented to him as a motivation. He is a symbol of hope in the midst of a generational curse. Works Cited Alexie, Sherman. The Absolute True Diary of a Part-Time Indian. New York: Hachette Book Group, 2007. Print. Hickey, Marilyn. Breaking Generational Curses. Tulsa: Harrison House, Inc., 2000. Print. Moore, Beth. So Long Insecurity. Illinois: Tyndale House Publishers, Inc., 2010. Print.

Sunday, August 18, 2019

Plagiarism and the Internet :: Cheating School Education Essays

Plagiarism and the Internet Premarital sexual activity and drug and alcohol use are high in the list of problems in schools and universities today. Equally as severe is plagiarism, the act of taking credit for another person words or ideas. Plagiarism is a major problem in educational institutions. There are reasons for this action, the  ¡Ãƒ easy ¡ÃƒÅ" way out of writing assignments and projects. However, there are also ways to remedy the situation. Thus, plagiarism is a problem, but it is possible through education to substantially lower its use. Students rationalize entirely too much when it comes to essays and other assignments. Whether it is poor time management or lack of incentive, plagiarism is always wrong. Not only is taking another person ¦Ãƒ s thoughts not moral, but it is punishable by law. It is a serious offense. Pupils plagiarize because it is virtually effortless. With the Internet both available everywhere and used as a daily necessity, there is a plethora of information at one ¦Ãƒ s fingertips. Also, students find that plagiarism is not addressed as a serious problem because it is often undetected, much less punished. These reasons encompass the motives behind plagiarism. The situation isn ¦Ãƒ t entirely hopeless, however. Education is the key to decreasing the thirty-six percent of college students who confess to plagiarizing papers and other such materials (Paradigms 1). One way to educate is to inform students of the Copyright Act and of the Digital Millennium Copyright Act. The former states that fair uses are not an infringement of copyright (Loren 4). A fair use refers to uses such as reports, essays, and research in which a source is properly cited. The Digital Millenium Copyright Act provides for copyright owners who believe that their material on the Internet is breaching their rights (Loren 4). Both of these laws have severe consequences. If educators familiarized their students with these, then plagiarism would decrease inversely with the understanding of the severity of the act. Teachers must make this effort, just as students must make their own effort to do their own work. Also, teachers ought to enforce discipline when it co mes to a violation like plagiarism and create an association between plagiarism and punishment, not plagiarism and indifference. This is how plagiarism should be dealt with in the classroom. An omnipresent situation in schools today is plagiarism.

All Quiet On The Western Front :: essays research papers

All Quiet on the Western Front, directed by Delbert Mann, is based on the novel written by Erich Maria Remarque. It tells the story of a German schoolboy, Paul Baumer, and a group of his classmates, who journey from fantasies of heroic glory to the real horror of actual soldiering. Their journey is a coming of age tale that centers on the consternation of war and emphasizes the moral, spiritual, emotional, and physical deterioration suffered by the young soldiers. Paul Baumer is a 19-year-old volunteer to the German army during World War I. He and his classmates charge fresh out of high school into military service, hounded by the nationalist ranting of a feverish schoolmaster, Kantorek. Though not all of them want to enlist, they do so in order to save face. Their first stop is boot camp, where life is still laughter and games. â€Å"Where are all the medals?† asks one. â€Å"Just wait a month and I’ll have them,† comes the boisterous response. This is their last vestige of boyhood. War slowly begins to strip away the ideals these boy-men once cherished. Their respect for authority is torn away by their disillusionment with their schoolteacher, Kantorek who pushed them to join. This is followed by their brief encounter with Corporal Himmelstoss at boot camp. The contemptible tactics that their superior officer Himmelstoss perpetrates in the name of discipline finally shatters their respect for authority. As the boys, fresh from boot camp, march toward the front for the first time, each one looks over his shoulder at the departing transport truck. They realize that they have now cast aside their lives as schoolboys and they feel the numbing reality of their uncertain futures. After their first two days of fighting, they return to their bunker, where they find neither safety nor comfort. A grizzled veteran, Kat, suggests these ‘fresh-faced boys’ should return to the classroom. The war steals their spiritual belief in the sanctity of human life with every man that they kill. This is best illustrated by Paul’s journey from anguish to rationalization of the killing of Gerard Duval; the printer turned enemy who leaps into the shell-hole already occupied by Paul. Paul struggles with the concept of killing a â€Å"brother†, not the enemy. He weeps despondently as war destroys his emotional being. War destroys Paul and his friends. Those who physically survive the bombing, the bullets and bayonets are annihilated by physical attacks on their sanity.

Saturday, August 17, 2019

Showing Off (Short Essay)

Essay by Mariss Kaminskis Showing off. Showing off is a way to tell people about something good you own or are capable of, for example, do a backflip. In the story, to my way of thinking, Clara did not show off. But since the teacher said i can write about showing off, i will write about it. Showing off can be seen everywhere and about everything, for example, sports or even lawn mowing. Most people show off to impress someone or just to show how cool and awesome you are.It’s almost like bragging but in this case you can really do it not just tell people what you can do. If you want to tell about something amazing you own you can actually show that thing to that person. For example- I have a TV with a 42 inch diagonal. If you come over I can show you. The most common field where you see showing off is sports. Hockey players show off, football players show off, basketball players show off, all kinds of athletes show off. Mostly they show off their skills.Let’s take a pop ular football player –Cristiano Ronaldo. He just adores showing off his dribbling skills on the pitch. Most popular basketball player – LeBron James. He just loves to shoot the ball in the basket without missing for a long time. Popular hockey player – Pavel Datsyuk. Probably the most skilled player ever. He can’t live without his skill moves to get pass defenders. So showing off is just a way to look awesome. I don’t like those people who show off or brag. But I do own a TV with a 42 inch diagonal†¦ I really do!

Friday, August 16, 2019

Food Preservation Essay

Men have preserved their foods from ancient times in order to keep the results of harvesting for winter months, for resale, for storage, and for transporting from sea to inland, overseas, or cross-country. To do so, they generally used nature’s methods, which are drying, parching and fermenting. Parching is the most natural method, but for many thousands of years, others have also been used. Direct fermentation of liquids, usually by the introduction of yeast, has not only preserved liquids but also enhanced their quality, the same of course applying to salting. Smoking has preserved, and sometimes improved both fish and meat. Hickory wood is generally used for the fires, and natural juices are contained by a slight coating of wood creosote. It was not until recently that the causes of rottenness were understood, these being the reactions of bacteria, molds, yeasts and micro-organisms. Some fermentation and molds are, of course, necessary in the production of food and drink; molds, for example, being used in cheese-making. But the real ‘breakthrough’ in preservation against the causes of rottenness came, when it was learnt how to deal with the micro-organisms present in all foods and drinks, and which react chemically over a period to produce unpalatable or poisonous food or drink. There are three basic methods. Firstly, food may be preserved by cooling or freezing, to a very low temperature when long-term preservation is required. This was originally done by packing in a mixture of salt and ice; today, cold storage is big business and refrigeration is a highly-developed science. ‘Dehydration’ may be bracketed with this method, as the principle involved is the same, namely to suspend the operation of bacteria which requires normal temperatures for chemical reaction. This is why reconstituted eggs cannot against dehydrated, and melted ice-cream refrozen. The second method of destruction is by heat-processes, which destroy all the bacteria present in food and drink. This process is used before canning foods in hermetically-sealed containers, great care being taken not to allow the foods or drink s to become re-infested after cooling and before canning. The third method is to preserve by the addition of chemicals, which control or destroy bacteria. This is merely a follow-up of the old systems of salting, smoking and candling. Eventually, the method of ‘cold sterilization’ is expected to supersede most of the others; this amounts to exposing the food-stuffs to ionizing radiation. Today more than mere food-preservation is sought by the consumer, and for this reason, processes are becoming more and more sophisticated. Quality, economy and convenience are sought by modern man — especially modern woman — convenience is important, the ‘ready-cooked’ meal is popular, while, in Western, or ‘Westernized’ communities, goods do not sell easily if they lack color, a good appearance, natural flavor, the right texture, and are free from defects.

Thursday, August 15, 2019

Senior Year – Memory Book

The final year of high school has now come. When my parent's told me that high school would fly by, they weren't kidding. I never put much thought into the fact that high school is a mere four years of my life. In the grand scheme of things, it's hardly any time at all. Although It really did fly by, I have enough memories to last a lifetime. I remember walking through the doors on my very first day of school as a freshman. I walked into room 315 and sat down in my first period class. It was world history and Mrs.. Francis was my teacher. I sat down, scared out of my mind, and waited for the bell to ring.That first bell tone signified the beginning of my high school career. My schedule was extremely easy first semester. I had Foods, Business Management, Consumer De, Lunch, Gym, Warrior Warehouse, English and Algebra 2. I had some incredible teachers, which included Mrs.. Tradeoff, Mr.. Gross, Mrs.. Burr, Mrs.. Chart and Mr.. Mere. I have had so much fun and I loved having each of the m. When second semester rolled around, It wasn't so easy. I only had four real classes, but a few of them were tough. My schedule went along the lines of Foods, Government, College Com H, Lunch, CICS, Warrior Warehouse, Gym, and Algebra 2.This year I was lucky enough to have Mrs.. Tradeoff, Mr.. Burr, Mrs.. Myers, Mr.. Hosking's and Mr.. Myrrh. They have been one amazing group of teachers. I learned so much from each and every one of them and I could not thank them enough. The beginning of my senior year, I was asked to be in the warrior warehouse Instead of having a study hall. Mr.. V called me down to his office and I remember being so scared because I never even knew where his office was. He then asked me to be In there and I said yes. I was thrilled because I have always thought I was a great leader and knew that I had a full Job to take on.It was my responsibility to make ere I did not let anyone steal and when a problem occurred I let Mr.. V know Immediately. It was such an ho nor that he asked me to be In there and let alone ask me again for the rest of the year. High school has been an emotional roller coaster for me. Eve stayed up until two a. M. Working on assignments, crying over boys, and deciding what to wear for picture day. I have met and lost friends throughout my four-year Journey, and I have changed more than I ever thought I would. However, the most important part of high school has been learning who I am. As clichà ©Ã‚ © as it may sound, high school is the place whereI found myself. Eve flourished with my strengths and struggled with my weaknesses. Though it was difficult at times, and I wanted to give up often, It was all worth It. High school has been full of crazy events, From the SST. Baldric's day rallies to the four and a half hour ACT, it has been one memorable journey. T Off It seems like only yesterday I was reading Romeo and Juliet in Mr.. Rebecca English class. Now, I am Just months away from graduating and starting my life. My g randpa once told me that I would spend four years trying to get out of high school, and the rest of my life trying to get back in.He was exactly right. I thought high school would be a drag and I would never get out. Being Just months away from graduating, I wish I could start all over. Although it has been an incredibly dramatic and emotional Journey for me, I don't regret a single moment of my high school career. I have had the chance to meet some amazing students and teachers. I have coasted through classes, and I have been pushed to my limit. I learned that learning has no boundaries and the things I learn in school will definitely come into play later in life. I Just wish I had taken a second to stop and look around. High school really did fly by.

Wednesday, August 14, 2019

Design and Implementation of a Network Based Security Information System

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.Design of the network-based security information system 4. 1Method of data collection 2. System design – input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendati on ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. – A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.In this work â€Å"DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM† I will take a case study of â€Å"B’ OPS COMMUNICATION OF POLICE SHQ ENUGU† as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of th e executive and law enforcement management system.Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of s ome of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer society’s conference of 2002 st ated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome – Punishments. Also Hulsbury’s Law (adopted by the House of Lord’s in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the sec urity or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLEN’S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMESThere is a problem that exist in the crime reporting system in Nigeria and especially the B’OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ‘felony’ and ‘misdemeanor’.Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that w orks without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, plannin g and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The B’OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the B’OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (use d in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 – This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 – This is a form used to write down events that took place at course of operation suc h as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: B’OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.Another source of inter nal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the B’OPS COMMUNICATION also fellow’s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basi c information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the B’OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human en gagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the form’s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of informat ion for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding meth od here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B’ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processi ng. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime s tatistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before acces s to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and pr epared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work t o the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the B’ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B’ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = â€Å"N† Do while finish $ =†N† For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next IFor I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â₠¬Å"***† Locate R + 3, C: Print â€Å"1, Record Input ***† Locate R + 4, C: Print â€Å"2, File Maintenance ***† Locate R + 5, C: Print â€Å"3, Report Generation & Printing† Locate R + 6, C: Print â€Å"4, Statistical Presentation† Locate R + 7, C: Print â€Å"5, Exit † Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input â€Å"Your Choice Please (1-5):†, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = â€Å"EN† End selectLoop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â€Å"*Report Generation*† Locate R + 3, C: Print â€Å"1, Generate Monthly Report† Locate R + 4, C: Print â€Å"2, Generate Annual Report† L ocate R + 5, C: Print â€Å"3, Generate forecast Report† Locate R + 6, C: Print â€Å"4, Print Monthly Report† Locate R + 7, C: Print â€Å"5. Print Annual Report† Locate R + 8, C: Print â€Å"6. Print Forecast Report† Locate R + 9, C: Print â€Å"7. Exit †The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input â€Å"Your Choice Please (1-7)†, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = â€Å"EN† End select Loop End Sub Sub Annual RP ‘Annual RP. BAS ‘ Annual Statistics Printing Program Dum M $ (28) Cls Open â€Å"I†, $ 1, â€Å"Annualst. FIL† Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input â€Å"Output To Screen or Printer (P or S):†;K$ K$ = U Crime$ (K$) Loop Until K$ = â€Å"P† or K$ = â€Å"S† Cls Open â€Å"I†, $ 1, â€Å"Annu alst. FIL† If K$ = â€Å"S† ThenPrint â€Å"B† OPS Police Communication† Print â€Å"Annual Crime Statistics Report† Print: Print â€Å"For The Year;†: EN$ Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å"Jan† Locate 5, 44 : Print â€Å"Feb† Locate 5, 56 : Print â€Å"Mar† Locate 5, 68 : Print â€Å"Apr† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† Locate 6, 66 : Print â€Å"M† Locate 6, 72 : Print â€Å"F† R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print â€Å"May† Locate 5, 44 : Print â€Å"Jun† Locate 5, 56 : Print â€Å"Jul† Locate 5, 68 : Print â€Å"Aug† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key L ocate 5, 32 : Print â€Å"Sep† Locate 5, 44 : Print â€Å"Oct† Locate 5, 56 : Print â€Å"Nov† Locate 5, 68 : Print â€Å"Dec† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print â€Å"Total† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print â€Å"B’ OPS Police Communication† L Print â€Å"Annual Crime Statistics Report† L Print : L Print â€Å"For Each Division† EN$ L PrintL Print â€Å" SN† : Tab (3); â€Å"Offences†; Tab(31); â€Å"Jan†; Tab (39); â€Å"Feb† L Print Tab (47); â€Å"Mar†; Tab (55); â€Å"Apr†; Tab (63); â€Å"May†; L Print Tab (71); â€Å"Jun†; Tab (79); â€Å"Jul†; Tab (87); â€Å"Aug†; L Print Tab (95); â€Å"Sep† ; Tab (103); â€Å"Oct†; Tab (111); â€Å"Nov†; L Print Tab (119); â€Å"Dec†; Tab (127); â€Å"Total† Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) Cls OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN â€Å"O†, #2, â€Å"FORECAST. FIL† OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ‘ Store Values For Males In The A – Array Ready ‘ For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ‘ Estimate the figures for males for the ‘next three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ‘Store values for females in the A? Array ‘Ready for gaussian elim ination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ‘Three months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, â€Å" † ; C$; â€Å" †; F$; â€Å" †; Fm1; â€Å" †; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ‘Forecarp . Bas ‘Forecast Figure Printing Program Dm M$ (9) Cls Open â€Å"1† , # 1, â€Å"Forecast . Fil† `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input â€Å"Output to Screen (P or S) : â€Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = â€Å"P† Or K$ = â€Å"S† Cls Open â€Å"1† , #1, â€Å"Forecast. Fill† If K$ = ‘S† Then Print â€Å"B’ OPS Police Communication† Print : P rint â€Å"For The Year : YY$Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å" Jan† Locate 5, 44 : Print â€Å" Feb† Locate 5, 56 : Print â€Å"Mar† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT â€Å"B’ OPS POLICE COMMUNICATION† L Print : LPrint â€Å"For the Year : â€Å"; YY$ Lprint Lprint â€Å"SN†; TAB(3); â€Å"Oddwnxwa†; Tab(31); â⠂¬Å"Jan†; Tab(39); â€Å"Feb† Lprint Tab (47); â€Å"Mar† Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print â€Å"Press Any Key To Continue† Do A$ = INKEY$ Loop Until A$ < > â€Å" † END SUB ———————– FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = â€Å"N† Dowhile finish $ = â€Å"N† For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? â€Å"Main Menu† Locate R + 2, C:? â€Å"1. Record Input† Locate R + 3, C:? â€Å"2. File Maintenance† Locate R + 4, C:? â€Å"3. Report generation and Printing† Locate R + 5, C:? â€Å"4. Statistical Presentation†Locate R + 6, C:? â€Å"5. Exit† MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT â€Å"YOUR CHOICE PLEASE (1-5):† MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = â€Å"Y† End selected Locate 24, 10 Print â€Å"Press Any key To† â€Å"Continue† Do A $ = In keys Loop until A$ â€Å" â€Å" END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = â€Å"KEY† â€Å"Murder† â€Å"Suicide† â€Å"Wounding† â€Å"Assault† â€Å"Kidnapping† â€Å"Rape† â€Å"Armed Robbery† â€Å"Stealing† â€Å"Burglary† â€Å"Arson† â€Å"Narcotics† â€Å"Traffic Offeence† House Breaking â €Å"Store Breaking† Miscellaneous† STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = â€Å"y† DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = â€Å"y† Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT â€Å"DIV†; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP