Tuesday, December 24, 2019

The Statistical Method Used in the Analysis of the Two Markets, Classi Statistics Project

Essays on The Statistical Method Used in the Analysis of the Two Markets, Classification of the Variables Used in the Analysis Statistics Project The paper â€Å"The Statistical Method Used in the Analysis of the Two Markets, Classification of the Variables Used in the Analysis† is a  forceful version of statistics project on marketing. This paper discusses the differences and similarities between the friendly market characteristics and circle K. it uses descriptive data in explaining the market characteristics. Some of the major descriptive statistics elements used include;MeanMedianMaximumMinimumStandard deviationSkewnessKurtosisJarque-BeraProbabilitySumSum Sq. Dev1.1Nominal variables include;Sex that is;Malefemale1.2Ordinal, variableFriendlyNo one1.3Interval variableHurryBargain1.4Ratio scalesCashWorkQuickCommute circle1.5Descriptive statistics  BERGAINCASHCIRCLEKCOMMUTEDWELLFRIENDLYHURRYKNOWNEQUICKSEXWORK  Mean  2.842105  2.157895  0.631579  0.631579  1.631579  0.631579  1.526316  2.368421  1.894737  1.631579  1.684211  Median  3.000000  2.000000  1.000000  1.000000  2.000000à ‚  1.000000  1.000000  3.000000  2.000000  2.000000  1.000000  Maximum  3.000000  3.000000  1.000000  1.000000  2.000000  1.000000  3.000000  3.000000  3.000000  2.000000  3.000000  Minimum  2.000000  1.000000  0.000000  0.000000  1.000000  0.000000  1.000000  1.000000  0.000000  1.000000  1.000000  Std. Dev.  0.374634  0.764719  0.495595  0.495595  0.495595  0.495595  0.696692  0.830698  0.737468  0.495595  0.820070  Skewness-1.876388-0.263044-0.545545-0.545545-0.545545-0.545545  0.917354-0.764584-0.695391-0.545545  0.627845  Kurtosis  4.520833  1.837400  1.297619  1.297619  1.297619  1.297619  2.633256  1.951953  3.824315  1.297619  1.845180  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12.98038  1.289155  3.236790  3.236790  3.236790  3.236790  2.771351  2.720766  2.069235  3.236790  2.304041  Probability  0.001518  0.524884  0.198217  0.198217  0.198217  0.198217  0.250155  0.256563  0.355362  0.198217  0.315998  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Sum  54.00000  41.00000  12.00000  12.00000  31.00000  12.00000  29.00000  45.00000  36.00000  31.00000  32.00000  Sum Sq. Dev.  2.526316  10.52632  4.421053  4.421053  4.421053  4.421053  8.736842  12.42105  9.789474  4.421053  12.10526  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Observations  19  19  19  19  19  19  19  19  19  19  192.Customer characteristicsDo Friendly Market and Circle K have the same customers?Both the Friendly market and Circle K market have different customers as they comprise both male and female with the same age sex and group. From table 1.0 the probability of Circle customers going to shopping is 0.00151 and that of the friendly market is 0.198217 showing that the possibility or stack up the rate of friendly customers is more predictable compared to those of the Circle market.3.Demographic characteristicsWhat is the demographic profile associated with Friendly Market’s customers?The friendly markets are composed of both women and men. The mean of both sexes is 1.631579 giving a chance that both genders must have been in equal proportion. The standard deviation is 0.495595 showing the level of dispersion of the two groups of the markets.4. What is the demographic profile associated with Circle K’s customersThe demographic profile of the Circle K’ customers is mainly composed of both sexes at an equal level. The dwelling of the customers is from a middle background similar to those of friendly markets. Both work but at the different levels are presented on the above graphs.4.1. Customer lifestyleWhat is the lifestyle profile associated with Friendly Market’s customers?Individual lifestyle is reflected in the way an individual way of thinking, acting, and feeling. The buying patterns, the sp ending pattern and the nature of work one does. The customers of the friendly market are characterized by a high spending lifestyle comprising. The mean spending is 0.631579 which shows average lifestyle spending while the maximum and minimum are 1 .0 and 0.0 respectively while the median gives 1.0. This shows a high end spending patterns within friendly market customers.5.ConclusionThroughout the analysis, one common characteristic of both markets is that they are composed of high-end spending individuals which have common characteristics. This is well captured in the skewness of the data and the kurtosis. The demographic patterns are similar to the equal number of males and females purchasing the two markets product.

Monday, December 16, 2019

Virgin Blue Free Essays

VIRGIN BLUE UNDERSTANDING EXTERNAL ENVIRONMENT 1. Attractiveness of the Industry 1a. Identify the industry, product segments and value chain The industry is the Australian airline industry (global). We will write a custom essay sample on Virgin Blue or any similar topic only for you Order Now Core activities cover providing travel services to leisure travellers in Australia and overseas, including flights, travel insurance, holiday packaged deals, and freight business. Products segments including ? Business travel? 57. 1% of industry revenue ? full-fare ? business government travellers ? growth of video conference (-) impact on growth unit value of sale/pax double leisure travel fare ? Leisure travel? 29. 4% of industry revenue ? low-fare ? leisure travellers ? price is an important factor and strong driver for growth ? high cost incurred for flight changes ? Freight and other? 13. 5% of industry revenue ? freight transport, time sensitive high value to weight item charges on excess baggages, late fee,etc†¦ 1b. What is the current life cycle of the industry? The Australian airline industry is at the mature stage of its life cycle. This is demonstrated by the low average growth rate of the production, and the low airline operating margins around 2 percent over the last five years. Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over this period. Yield management is critical to profitability due to high fixed costs involved in operating a flight, that is, the marginal cost of passenger on a flight is very low, so having a plane full, with as many full-fare passengers as possible, is important to maximise profitability. Over recent years, there has been consolidation, brand transformation in the industry and more services been introduced to attract higher yield customers. This is evidence of a low growth environment, wherein the industry is at the mature stage of its life cycle, the organisation focus is on efficiency, cost control, and market segment. 1c. What have been the key issues affecting historical industry growth? What was their impact? Key issues influencing historical industry growth using TEMPLES model FactorIssuesNature of Impact ————————————————- +/ =/ -) Technology? The growth of video conference- Negative has had a slightly negative impact on growth in this segmenting recent ————————————————- years Economy? Threat of the uncertainties of the global financial- Nega tive crisis, changing interest rate and fierce competition ————————————————- from low-cost carriers in its domestic market Market? the low density of population and the size of Aus+ Positive Air travel in Australia is somewhat of necessary ? Declining fair in the leisure travel segment due to- Negative Strong competition have combined with increasing costs to lower profitability over this period; fierce competition from low-cost carriers in its domestic ————————————————- markets Politics? Being restricted in the ability to expand overseas due – Negative to Singapore Airline’s right to veto the use of the Virgin ————————————————- Blue name internationally. SIA had the power to block ————————————————- Virgin Australis’s brand due to 49% stake in Virgin Atlantic ————————————————- hat SIA acquired in 1999 Law —— ——————————————- Environment? With a launch of the first real low-cost arline in+ Positive Australia, one class of ticket and minimal on-board, complementary service, there had been strong growth in the 2000s in market for travel for leisure, encourage ————————————————- Australians to take more holidays and air travels Society? low density of population and size of Australia+ Positive ————————————————- Air travel is somewhat necessary Overall+ Positive 1d. What are the key issues that will affect future industry growth? What are their likely impact and the overall assessment of the industry’s future growth? Future growth for the overall industry is assessed as positive (although it will be at a lower rate than historically growth) Key issues influencing future industry growth FactorIssuesNature of impactAssessment of (+/ =/ -)impact on future Industry growth ————————————————- (Low/Med/High) Technology? The growth of video conferenceNegativeLow as had a slightly negative impact on growth in this segmenting recent ————————————————- years Economy? Threat of the uncertainties of the global Negative Low Financial crisis, changing interest rate and fierce competition from low-cost carriers in ————————————————- its domestic market Markets? Threat of new entrances present theNegativeLow Possibility the firms will enter industry And diminish the industry return by passing along value to buyers in form of lower price and raising cost of competition the alliance with SIA was one of thePositiveMedium several that Virgin had formed in building ————————————————- its international network Politic? the alliance with SIA was one of PositiveMedium several that Virgin had formed in building its international network, allow Virgin to offer global flight coverge, epscially South-east asia and China, attractive to International business and leisure ——————————————— —- travellers Legal ————————————————- Environment? Along with alliance with SIA, there have beenPositiveMedium forged alliances with other international airlines such as Etihad, Air NZ, and US giant Delta Air Line to give business travellers an attractive overseas ————————————————- and flequent flyer network Society? the airline developed and preserved its PositiveMedium culture by spending a lot of resources on recruiting the right people to serve its leisure customers and providing a culture and conditions that retain good ————————————————- people Overall ImpactPositiveMedium In conclusion, the future industry growth is assessed as Low to Medium 1e. What have been the key issues affecting historical profitability? What was their impact? Industry revenue was estimated to be $14. 5 billion in 2012, with its main business being the transportation of passengers and freight on scheduled routes within Australia. Approximately 86% of the industry revenue is generated from airline ticket sales. The business travel segment is accounted for 57. 1% of industry revenue in 2012, while leisure travel segment is 29. 4% and freight and other are 13. 5%. Airline operating margins are relatively low, averaging around 2% over the last five years. Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over the period. Using Porter’s five forces model, we can review the factors affecting historical profitability, it can be concluded that industry’s rivalry has increased. This is the result of many factors including: ? Threat of new entrance is low due the barrier of entry high. Capital requirements required to enter the airline industry. High fixed cost in operating the fly. The power of suppliers has been high due to limited number of service options available in business travellers segments such as proving access to hundreds of destination and business lounges around the world, offering high quality catering and other on-board service like newspapers magazine in premium class cabins, car hire and hotel reservation services. ? The increasing power of buyers’ buyers due to the price sensitivity of consumers (low price) and the search for best deal available, as well as air travel in Australia is somewhat of a necessity, given the size of Autralian and the low density of population. The increasing impact of substitutes such as alternative services like video conference maintaining low-cost services ? Industry rivalry is high: Jetstar, QAL’s low cost airline, was introduced in 2004 in response to Virgin Blue’s success in the industry and the loss of market share away from Qantas’s full-fare service to the low-fare carrier; Jetstar is a low-cost carrier targeting low-fare leisure travellers; The airline industry growth is average and as it is easy for buyers to switch between the airline companies, depending on price. Thus rivalry is increased. Furthermore, the high fixed cost create opportunity for the airline companies to have price wars to compete each other, the great market share of Qantas will kill Virgin Australia at last. Porter’s competitive model Airline industry Potential New entrants Airline club loungesForeign carriers Priority ticketingRegional carriers Priority check-in High quality catering Newspaper ; magazine Hire car ; hotel reservationIndustry Rivalry Bargaining power of buyers Bargaining power of suppliers Qantas Jetstar Alternative services Business travellers Subsitute products ; services Video conferenceLeisure travellers Freight ; other, tour packages 1f. What are the key issues that will affect future industry profitability? What is their likely impact and the overall assessment of the industry’s future profitability? Attracting higher yielding corporate and government customers has been a key driver of improving the industry profitability. Yield management is critical to profitability due to high fixed costs involved in operating a flight – that is, the marginal cost of a passenger on a flight is very low, so having a plane full, with as many full-fare passengers as possible, is important to maximise profitability. Also, in order to improve profitability, the major competitors in the industry (Jetstar, Qantas, Virgin) have become vertically integrated. Strategic airline alliance been introduced. Qantas and Malaysia airline negotiated an agreement for access markets in Asia and code-sharing. SIA and Virgin formed an alliance, allowed SIA customers access to Virgin Australia’ s domestic airline airport’s lounges. This partnership, along with Virgins’ other alliance, would allow Virgin to offer global flight coverage, attractive to international business and leisure travellers. The key factors influencing the future profitability of the industry can be summarised as follows: ? Positive factors include ? Forming alliance has allowed Virgin to offer global flight coverage, attract more international business and leisure travellers ? introducing a premium – valued service ? develop new lounge – product enhancement ? introduce new uniform and new menu – product enhancement ? Negative factors include ? Strong competition in the industry between major companies as growth slow and more emphasis is placed on maintaining or increasing market share with price becoming a key factor. Potential entrance of other new low-cost carriers. The future profitability of the industry will continue to be medium. 1g. Who are the industry’s key competitors? What are their strengths and weaknesses? In 2012, the industry is dominated by two airlines, Qantas Airways Ltd and Virgin —————————†”——————- CompetitorValueStrengthWeaknessRelative ————————————————- Propositionproposition Qantas Airways Ltd? Fully integrated? Highest market? Less focus on? Strong ? Accounting for 65%shareleisure travellers share of industry? Dominates business evenue in 2012segment ? More services offered such as full service, ————————————————- low cost, regional Virgin ? Fully integrated? Second highest? No coverage? Strong ? Accounting for 17. 2 %? Strong presencein regional share of industryin leisure market revenue in 2012? Offer services in full service and low ————————————————- cost service Others? Accounting for 17. 8%? private charter ? group of small? Weak share of industrypassenger flights orcompanies revenue in 2012freight operation UNDERSTANDING EXTERNAL ENVIRONMENT 2. Summarise the strategic position of Virgin Blue 2a. Who are Virgin Blue’s key stakeholders, what are their objectives and are their objectives aligned with Virgin Blue’s strategic goals? As stated in the section on â€Å"Game change program- a new strategic direction for Virgin in Australia†, Virgin regard itself as number one position in the leisure segment and maintaining its low-cost focus. Its state strategic goals are as follows: ? Growing its share of the Australian business travel segment from 10% to 20% ? Establishing a ‘virtual’ global network through strategic airline alliances ? Ensuring capacity was closely aligned to profitability ? Maintaining a strong presence in the leisure market ? Enhancing its brand in Australia and overseas markets There are numerous stakeholders (individuals/groups that have interest in the business or corporate strategy of the organisation) in relation to Virgin Blue. An analysis of the objectives of each of these stakeholders and the alignment of these objectives with Virgin’s strategic goals as follow ————————————————- Who are theWhat do they seek to receive fromIs Virgin Blue delivering against their stakeholders? he organisation? expectation? John Borghetti? Launching â€Å"Game Change† program? Yes, the transformation of Virgin (CEO)with the vision to be the airline of has been well on the way and choice for Australian business and attract numbers of business leisure travellersleisure travelles ? Rein vent the company as a full-service? No, still not yet take over Qantas brand by altering its low-cost, no-frillsbusiness market model to take market share from Qantas ————————————————- in the higher-margin, business market Board including: Roger Linderman? new management team, formed to? Yes, its chase growth in business (General manager)take on Qantas, particularly in thesegment, but not yet take over Jane McKeoncompetition for business travellerQantas (running government’s relation team) Hope Antzoutlatos (head of domestic ; International network Operations) Will Owens (Heads of yield Management) Hans Hulsbosch? develop the airline’s economy ;? Yes, have been attractive to (Creative director)business class cabins to attract numbers of business travellers ————————————————- Business traveller segment Employees? Secure employment prospect? Yes, as its chase growth in the family based, teamwork,business segment, it has to ensure ————————————————- respect and funlow turnover and maintain culture Singapore Airline? SIA and Virgon form an airline? yes, the agreement between SIA alliance, allow the use of Virgin Ausand Virgin has allowed SIA customer Band overseas. Virgin able to build to use Virgin’s domestic network its international network, and alsowith just one ticket allow two allows SIA customer access to Virginairline gold member to access to Australia’s domestic networkVirgin’s domestic airline’s airport ————————————————- ounge 2b. What business strategy is Virgin Blue supposed to have been pursuing and has this in fact been the case? The five questions (5Qs) approach is used to understand Virgin Blue’s stated business strategy Business strategy usingExamples of how Virgin has been pursuing this stated ————————————————- 5Qs approachbusiness strategy ? D oes Virgin Blue want to growthVirgin blue wants to grow. We can see from their new vision profitability? â€Å"to be the airline choice for Australian business and leisure Travellers†. And its targeting to grow the share in business travel segment from 10% – 20%. The airline alliance strategy to establish it built its international alliance network in Asia as it is a critical market for Virgin ? What products/services will Virginleisure travel segment maintaing its low-cost; Virgin Blue Blue provide? began offering a premium economy fare, reinvent itself as a full service brand by altering its low-cost, no-frills model to take market share from Qantas in the higher margin, business market; developed its passenger lounges, introduced a loyalty reward scheme, ‘Velocity Rewards’, and offered the first Web check-in service in Australia. In what market will Virgin BlueGeographic market – Australia domestic airline, global flight operate? coverage after Virgin formed alloances with Singapre Airlines Customer market – business traveller, leisure traveller, freight and other include travel insurance, and formed a new venture with ZUJI, an online travel company. ? What generic strategy will VirginGeneric strategy – lo w cost leadership (no-frills models) adopt? -;Differentiation: take market share from Qantas in the igher margin, business market (full-service model). ? what is the position in the insutryVirgin Blue had grown through expanding its leisure travel does Virgin Blue plan to hold? segment, and growing low-fare passenger numbers to hold the number one position in the leisure segment and maintaining its low cost focus; By 2010, Virgin had about 10 per cent of business travellers and an approximate 30 per cent of all domestic air travellers; Growing its share of the Australian business travel segment from 10 per cent to 20 per cent. SWOT ANALYSIS Identify the capabilities of the organisation in the context of the competitive environment, using SWOT analysis ? Strength: Virgin Blue had grown through expanding its leisure travel segment, and growing low-fare passenger numbers to hold the number one position in the leisure segment and maintaining its low cost focus. _ Virgin had formed alliances with Singapore Airlines in building its international network _ Borghetti was a former QAL executive who was appointed CEO and MD of Virgin in 2010. He quickly established a new management team capable of taking on Qantas, particularly in the competition for business travellers, by recruiting some highly experienced ex-Qantas staff including: Roger Lindeman as General Manager Service Experience; Jane McKeon, to run Virgin’s government relations team; Hope Antzoulatos as head of domestic and international network operations; and Will Owens as head of yield management. ? Weakness: Qantas has 65% of industry revenue in 2012 but Virgin only has 17. % and no regional offered compete with Qantas; Qantas dominates the business segment. _ Unprofitable routes in New Zealand and to destinations including Fiji, Phuket and South Africa, high costs in maintaining its four brands, and confusion in the market between the brands. ? Opportunities: Acquire 20% of market share in market sector _ brand transformation reduce the cost of advertising and less confuse customer _ expand alliance with SIA to enter Asia market, broaden its offering by adding more services to enter the business segment and attract higher yield customers ? Threats: fierce competition from low-cost carries in its domestic market; Jetstar would have in capturing part of the leisure market _ Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over this period. EVALUATION OF STRATEGIC OPTION ? Competitive advantage Benefits:yes, to sustain growth and profitability Valued by customers_ maybe not as people perceived Qantas as leading provider for business segment _ have to be careful not losing loyalty customers External consistency Industry’s life cycle:Fits well – moves to more competituve environment TEMPLESto respond to the external environment particular social cultural factors and economy factors – fit well to maintain profit Profit well with the changes in external environment where more competitive from low cost Jetstar and profit due to pressure on price, to sustain growth profitability by capturing more market sharee in business se gment ? Internal consistency Revenue costrevenue increased by capturing more in business segment Cost reduced by consolidating into one brand Not implementmore difficult to complete in the industry because of competition Reputation riskculture issues Loyal customer * Consistent in term of growth and sustainability But not consistent with the current culture and balance low cost leisure and business segment ? Internal consistency Capabilities:experience management team from Qantas Capitalcan be quite costly to reposition itself and do it property Strong culture in family oriented can be quite difficult for business market How to cite Virgin Blue, Papers

Sunday, December 8, 2019

Acid test ratio vs current ratio free essay sample

The Current ratio and the Acid-test ratio, both fall under the category of financial ratios.   These two ratios examine the capability of an organization to pay those creditors, whose debts are below the stipulated period of twelve months.   Such short-term debts usually consist of 30 or 60 days credit period.   Indeed under the two ratios the Current Liabilities are considered as the debt to be covered by the assets considered on the numerator of the ratio. The higher these ratios, the better are the financial position of the firm.   However, a number of factors have to be considered by both ratios before remarking on the financial position of the company.   For instance, one has to consider the nature of the business and the effect of seasonal variations before giving drastic conclusions.   In fact, such ratios are frequently examined by analyzing the financial position of the same organization over time or in relation to the industry average in which the firm operates. We will write a custom essay sample on Acid test ratio vs current ratio or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The main difference that lies between these ratios is the analyses of the liquidity of the current assets taken.   Under the current ratio, all the current assets of the firm are considered in the formula.   However, the acid-test ratio examines the assets that can be easily converted into cash in relation to the current liabilities of the firm.   As a result, the stock value, which is the least liquid asset, is deducted from the current assets in this ratio. Under these ratios, the short-term assets are divided by the current liabilities in order to see by how many times can such assets cover these liabilities.   For instance, if at the financial year ended 31st December 2006 a firm had a total current assets of $200,000, and the current liabilities added up to $100,000, the current ratio would be calculated as follows: This result indicates that the current assets of the firm can meet by two times as much the present current obligations of the organization.   The same principle applies for the acid-test ratio with the exception that stock is removed from the current assets as already stated in the previous paragraph.

Saturday, November 30, 2019

Information security in Small Scale Enterprises

Introduction Scientific innovations and inventions have led to technological advances; the technology has increasingly been adopted in businesses in different areas/processes; however, there are numerous threats brought by the use of technology.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The affordability of computer and computer software has facilitated the use of technology in small-scale business; some of the most used technological advancements within an organization are information sharing systems, enterprise reporting programs, the Internet, and e-commerce. Employing technology in small-scale businesses opens them to myriad of problems; information security is the greatest threat (Wallace, Lin Cefaratti, 2011). This paper discusses how to secure small-scale business from technology related threats. Best information security syst em To have an elaborate information security within an organization, the management needs to develop a security policy; a security policy defines the use and accessibility of information in a company. When making a security policy, it should not be seen as an end user policy, however it should be ongoing and protection adhered to at every stage. An effective security policy provides five important services to the organizations, the services are: Access It offers the users a chance to receive and transmit data within the system while adhering to proper machine and data handling. Confidentiality The policy should respect privacy of information whether individual privacy or corporate privacy. Authentication The system should be efficient in transmitting of information that messages can be traced back with certainty.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Integrity The system should ensure tha t the message sent has not been changed or modified when in transit. No- repudiation The system should ensure that it keeps proper records of the sender and receiver of message, the time of the transmission and the information kept cannot be altered (Yayla Hu, 2011). The process should have a five working principle that the organization should look into, they are: Physical security and lock down all the technological assets When a small-scale business has embarked on securing its information, the initial stage is to regulate physical access of computer hardware like server, personal computers, and other networking and telecommunications equipment. The prevention is from human resources of the company and external users; access should be limited to those people with permission to access the machines. Some of the most common methods of physical security include lock and key, the use of passwords when opening the security rooms, use of fingerprints to limit the access to the computer systems rooms and the use of alarm systems to alert incase of trespass (Hulitt Vaughn, 2010). Physical security is not adequate in itself since the machines will have to be used at one point, a policy that elaborates on the best ,machine and data handling best practices should be implemented and staffs trained accordingly; such a training will assist the staffs have a clear understanding of why they need to protect information within their organization. Process and procedures security setups With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure regardless of who has an access to the system.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The control of the Internet and i ntranet should be prioritized; creating firewalls that limit incoming and outgoing traffic will assist in monitoring and controlling the use of the tools. Fireworks is one of the most known effective methods of controlling internet and internet system, it is able to keep off unwanted messages within the system; however the system does not protect a system form virus and spywares. Since firewalls allow viruses and spywares to operate in the system, then a company should have an effective antivirus and antispyware software; the software should be up-to date and updated through the system without offering some dangers to the system. People with a certain negative intention develop viruses and thus strong anti-virus software should be maintained; the system adopted should be strong enough that can detect virus programs and block them from accessing the system. Small-scale businesses should not shy off from investing in expensive but effective security systems, since the market has some ant viruses that cannot be fully relied upon. Website management and protection One area that small-scale businesses communicate with the outside world is through their websites. It is through the sites that they offer some information and access right of outsiders to their company information. To ensure that data is secure a company must establish ways to protect information that is contained in its website; the approach is seen as an internal and external approach. Internal in the fact that the information offered should be limited and the one meant for public consumption and external in that it protects external users from accessing some information about the company. The kind of data that it posts over the internet should be vetted; information has many users for various reasons, any information posted should target a certain user and the behavior as a result should be speculated. If information is likely to hurt the organization, then it is better not offered, some users of inf ormation for the loss of a company include competitors and people will ill motives. There should be a specific class of people mandated with the role of uploading information in the website; the power to upload information should not be vested in one person, however a team of web-managers should be developed.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The web master should have the exclusive rights to upload information only after the team has deliberated and seen the move as appropriate. This will require restriction to servers and main computer room (the approach to restriction has been discussed earlier). Another important yet ignored task of web management team is withdraw of information and alteration of information posted in the website. The same staff should be mandated with the task of withdrawing any information that may have gotten to their website either through malice or through mistake before it has tarnished the name of a company (Wibowo Batra, 2010). Using genuine and up-to date software and hardware Technological advancement has made it possible to have some systems that are secure and those that can handle some basic information threats. For example having software that have timeouts when not used can assist a company to secure information that could be accessed when a system is running. In the market, there is the option of buying software/hardware then install security measures and other systems that come with an inbuilt security system. Systems that come with security set-ups are referred to as managed security services or software-as-a-service (SaaS); they come with a warranty that they will secure information for a certain period if used effectively. Small-scale businesses should use such systems since they offer more security and fallback in case they collapse. Alternatively, the developers of the systems are mostly large companies with the resources of developing an effective system; this small-scale business will relatively pay low for quality service (Veiga Eloff, 2007). Upgrading company’s software is another thing that can assist a company keeps away people from accessing some crucial information; for example, an operating system like Windows keeps updating its software to offer better services and protection against some threats. Technology is changing day by day and th us a company should maintain a strong information and technology team that can keep the company with the pace of computer world (CAIN, 2010). Hacking can be prevented by ensuring that software’s adopted by a company are complex in their design but user friendly; hackers have use other software that run parallel to the original software to get information about a company; however using genuine and well developed software can keep them away. This will assist a company to keep away hackers. Many are the times that a system is hacked by information and technology people who have worked with the system and thus know how it operates. To prevent this there should be a responsibility oath enforceable in court taken by information and technology experts leaving and getting into an organization. Secondly, there should be not one center of power; no one should fully understand a system in operation. Checks and balances should be set (Aggeliki, Spyros, Costas Stefanos, 2010). Have data back-up systems To the extremes, information can be lost due to some unavoidable situation; small-scale businesses should have backup systems that will assist them retrieve back information that has been lost. The backup systems are kept in a different station other than the place of operation. Incase data as lost, and then they are used as a fallback. Technology has today reached to a level that lost data can be recovered by use of data recovery tools, though they would require a prior registration; a company should invest in such kind of technologies (Batra, 2007). Employee’s awareness and internal processes control One of the potential areas that information security issues can emerge from is staffs with malice or some who are innocent or ignorant. Managers should ensure that they have programs that train their staffs on the need to have high information security. Other than training, the management should have policies that facilitate the adherence of security of informat ion (Puhakainen Siponen, 2010).. Some of the operations that employees put in the system may be dangerous to the system; there are times that flash disks have been used to transfer information form the company to other places, or employees downloading software’s or installing some software in company computers. This leads to threat of information. To prevent employees from using external gadgets to get information, the management should block the use of USB cable networks, or if they must be used, the crucial information may be formatted to be read-only such that employees will not be able to get the information. Some systems that can be used to manage the access and transfer of information from computer within an organization; they include Windows Registry software which limits the access and transfer of information without authentication (Peltier, 2002). When an employee want to download or install some programs in the system; there should be proper approval and the need f or the proposed software be defined. When the system has been installed, the management should vet and scrutinize it for any threats it is likely to bring to the company. The Information and technology department should be guided by integrity and have the capacity that it can make the system work with optimal security. They have the expertise of creating security policies like the use of passwords and limiting access to computers at individual level. Alternatively, they should register computers under the name of the user thus incase of anything done using the computer, they can trace back. This approach is a psychological or threatening approach where employees will shy off from misusing their computers in the fear that they will be detected and punished if there is a leakage of information via their computers. This increases reliability and employees fee more accountable of the information they have (Asai Hakizabera, 2010). When a small-scale company has decided to implement a se curity policy, some procedure and processes that it must consider are: Know your attackers Before the best strategy has been rolled out, the most important issue to realize is to know the possible sources of information threats; when the attackers are known, as well as they operated, then the company can be in a better position be able to maintain high security system. The approach to security that the company should take is dictated by the tread of the approach and the intent that the information hackers have (Kantardzic, 2002). Determine the pain thresholds With the nature and the tread of the attackers, the system that will be used should be there to frustrate the attackers; determining how long the attackers can go is of importance since the company will develop the strategy that frustrates attackers and probably limits their attempt in the future (Hennie, Lynette Tjaart, 2010). Research of the best method With an understanding of the situation and the attackers to burr from th e system, a company needs to develop alternatives available for the task. The alternatives may be commercial software or sometimes need to restructure the internal controls within the organization. In whichever the situation, a company should aim at implementing the best security approach at its disposal. Some of the potential areas that need to be looked into are Social engineering, internal information control policies, and the vulnerability of the system and the integrity of a company’s employees (Hill, 2009). Rolling out, controlling, monitoring and reinforcing When the best approach has been recognized, then the company should come-up with a rolling out plan, it should be appreciated that developing security systems is like any other change within an organization that need to be strategically planned. The involvement of management in controlling and monitoring is called for (Dhillon, 2007). Conclusion Technology has brought numerous advantages in small-scale businesses; however, it exposes them to information security threats. Data and information held by a company is an intangible asset, thus should be secured and protected; however, some companies have had their private information lost or accessed by unauthorized users. Information management team has the role of establishing an effective information security strategy that looks into internal and external information threats. References Aggeliki T., Spyros, K., Costas, L. Stefanos, G. (2010). A security standards’ framework to facilitate best practices’ awareness and conformity. Information Management Computer Security, 18(5), 350-365. Asai, T. Hakizabera, A. (2010). Human-related problems of information security in East African cross-cultural environments. Information Management Computer Security, 18(5), 328-338. Batra, M. (2007). The dark side of international business. Competition Forum, 5, 306-314. CAIN, A. A. (2010). Information Security a Top Priority. Internal Auditor, 6 7(1), 17. Dhillon, G. (2007). Principles of Information Systems Security: text and cases. NY: John Wiley Sons. Hennie, K., Lynette, D. Tjaart, S. (2010). A vocabulary test to assess information security awareness. Information Management Computer Security, 18(5), 316-327. Hill, C.W. (2009). Global business today. New York, NY: McGraw-Hill. Hulitt, E., Vaughn, R. (2010). Information system security compliance to FISMA standard: a quantitative measure. Telecommunication Systems, 45(2-3), 139-152. Kantardzic, M. (2002). Data mining: Concepts, models, methods and algorithms. New York: J. Wiley. Peltier, R. (2002). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL: Auerbach publications. Puhakainen, P., Siponen, M. (2010). Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 767-A4. Wallace, L., Lin, H., Cefaratti, M. (2011 ). Information Security and Sarbanes-Oxley Compliance: An Exploratory Study. Journal of Information Systems, 25(1), 185-211. Wibowo, K., Batra, M.(2010). Information Insecurity in the Globalization Era: Threats, Governance, and Survivability. Competition Forum, 8(1), 111-120. Veiga, A.D. Eloff, J.H. (2007). An information security governance framework. Information Systems Management, 24, 361 – 372. Yayla, A., Hu, Q. (2011). The impact of information security events on the stock value of firms: the effect of contingency factors. Journal of Information Technology, 26(1), 60-77. This research paper on Information security in Small Scale Enterprises was written and submitted by user Lady Deathstrike to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Free Essays on Animal Cruelty

Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killed† [Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ... Free Essays on Animal Cruelty Free Essays on Animal Cruelty Rabbits immobilized in wooden stocks with ulcers in their eyes; baby seals being clubbed over the head, and the infamous shock treatment. Broach the subject with an individual and odds are that they have witnessed footage of one or all of the aforementioned practices and are appalled by the cruelty. Appalled yes, willing to stand up and voice their thoughts... not often. There is one significant reason for this unwillingness by some to stand up for the rights of our fellow inhabitants of this planet, personal convenience. We are systematically cutting down the last forest that provides their shelter to farm cattle; we dump toxic chemicals and sewage into the waters in which they live; we wear the tusks of the last few of their species on our arms, and we pour cosmetic products into their eyes, rectums or vaginas to determine the harmful effects they might cause on humans, even though the physiological differentiation between humans and the animals they use is durastic. On a daily bas is most people do not see their own degree of unintentional support towards this global dilemma, but when compiled on paper one must question how mankind can, with conscience, commit these acts which shame us as human beings. Animals possess the same kinds of feelings and emotions as human beings, and without anesthesia, they are subjected to the pain as well. Mankind often fails to give animals the respect and rights they deserve, they are treated as lifeless, unfeeling scientific specimens and items that we may manipulate at our own convenience and for vanity's sake. Laboratory research involving animals is cruel and merciless treatment of helpless creatures. No law requires that cosmetics and household products be tested on animals. Nevertheless, by six o'clock this evening, hundreds of animals will have had their eyes, skin or gastrointestinal systems unnecessarily burned or destroyed (Sequoia, 27). Two of the most famous animal tests are the Draize, or ... Free Essays on Animal Cruelty Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killed† [Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ...

Friday, November 22, 2019

Cover Critique #1 with Mark Ecob

Cover Critique #1 with Mark Ecob Cover Critique #1 with Mark Ecob We are very excited to bring you the highlights from our first  Reedsy Live Chat, which as promised will be a regular feature in the coming months.  Every live chat features one professional from the Reedsy marketplace hosting an interactive session that includes among other things free advice on topics like editing, book design, and marketing.We started things off with our first Cover Critique, a big thanks to the terrific Mark Ecob for an informative session.Mark runs his own design studio  and specialises in book cover design. He has worked with large publishing houses like  Penguin, Little, Brown and Amazon, as well as independents such as Faber and Icon. Since 2012 he has been Associate Art Director for Unbound, the London based crowd-funding publisher.  His work has been recognised three times by the Design Art Directors Association (DAD), and exhibited at the Hay Literary Festival 2012.For those of you who missed it, we've compiled a brief recap. However, we strongl y recommend you watch the videos. And if you want to take part in our next Cover Critique, with Jake Clark, remember to send your covers in advance to covers@reedsy.com.Cover Critique  with Mark Ecob - Part 1Just click on the image below to watch the video!

Thursday, November 21, 2019

Ethically Bound and Legally Speaking -Discussion Essay

Ethically Bound and Legally Speaking -Discussion - Essay Example The medical team did what they could to save the life of the patient. The patient emerged from surgery alive but was clearly going to have a very low quality of life if he lived long. Hours after the surgery, the patient developed complications and was clearly experiencing excruciating pain in different parts of his body. I realized that the patient was not going to live long. His condition deteriorated by the minute in spite of the efforts that the medical team were applying. Meanwhile the costs associated with his care continued to soar even as his quality of life dwindled and level of pain increased. The temptation to turn off the life support machines was high if not to save the patient from the pain he was suffering then to save his family from incurring additional costs for his care. He was going to die shortly; within a few days or weeks at the most anyway. I was torn between applying the principles of beneficence and nonmaleficence. The principle of nonmaleficence dictates that clinicians should do no harm to their patients (Aveyard, 2004). On the other hand, the principle of beneficence dictates that clinicians act in the best interest of the patient such as by taking action to prevent physical harm or pain (Aveyard, 2004). By switching off the life support machines, I would save the patient the agony he was going through as a result of his injuries and low quality of life. On the other hand, I would seem to have done the patient harm by switching off the machines. In the end, I decided to go by the latter. We opted to do the best we could to make the patient feel less pain even as he approached his death naturally. I believe the stand that I took was appropriate especially considering my strong belief in the sanctity of life. The alternative action would have been to switch off the machines and save the patient from having to endure so much pain. This perhaps

Tuesday, November 19, 2019

Area studies 2 Essay Example | Topics and Well Written Essays - 1000 words

Area studies 2 - Essay Example 3). As such, different countries impose disparate legal ramifications for people caught in drug trafficking. For a lot of countries in the Asian pacific region, the ultimate sanction of imposing the death penalty for drug-related crimes has been revealed. Amnesty International reported that capital punishment is the legal recourse for drug-trafficking and drug-related crimes, in sixteen Asian Pacific countries, to wit: â€Å"Bangladesh, Brunei, China, India, Indonesia, North Korea, South Korea, Laos, Malaysia, Myanmar, Pakistan, Singapore, Sri Lanka, Taiwan, Thailand, and Viet Nam† (Asia-Pacific: Death sentences for drug-related crimes rise in region 1). The current discourse aims to explore drug trafficking in China, by examining relevant statistics, its impact on the people, and any further proposed recommendations resulting from the findings. trafficked in China is in Myanmar (Yong-An). As disclosed, â€Å"the Myanmar-Yunnan-Guangdong route is a traditional and preferred drug trafficking route. Some of the drugs that come into Southern China are consumed directly there, or may be trafficked onward to interior provinces† (Yong-An 4). The alarming fact is that despite the wide-known fact that drug-related crimes would be punishable by death in the country, statistics still revealed rampant increases in abusers as reported by the National Narcotics Control Commission, from 150,000 in 1991 to 1,545,000 in 2010, or a 930% increase (Yong-An). Likewise, the number of deaths or executions in China could not be effectively monitored or accurately determined due to the secrecy stance maintained by the state (Gallahue, Gunawan and Rahman). The authors revealed that â€Å"China continues to execute more people than any other country. According to the China Law Yearbook, as reported by the Anti-Death Penalty Asia Network (ADPAN), China has a nearly 100 per cent

Saturday, November 16, 2019

Control Mechanisms - the Disney Company Essay Example for Free

Control Mechanisms the Disney Company Essay Control Mechanisms The Disney Company Bonita Johnson, Christi Cavanaugh, Gloria Aguilar, Hillary McCabe, Jeffrey Harriman MGT 330 January 9, 2012 Susan Mills Control Mechanisms The Disney Company In more than eight decades The Disney Company continues to be one of the largest media and entertainment corporations in the world. Founded on October 16, 1923 by brothers Walt and Roy Disney as a small animation studio, today The Walt Disney Company is one the largest Hollywood studios and owns 11 theme parks, two water parks, and several television networks including the American Broadcasting Company (ABC). The name Walt Disney has and always will be preeminent in the realm of family entertainment. Additionally, The Disney Company continues proudly to provide quality entertainment for all family members across American and around the world. The Walt Disney Company did not become one of the largest entertainment corporations in world without developing secure control mechanisms. The Disney Company has earned its reputation by tight control and although control pervades the company, Disney’s control mechanisms are not considered heavy-handed or condescending. This paper will examine that although The Disney Company enforces strict control mechanisms within its organization, it is also an organization independent in its thinking and approaches. The Walt Disney Company has always, and continues to use control mechanisms to help regulate policy and procedures which contribute toward effectively achieving organizational goals (The Walt Disney Company, 2008). The Disney Company has been widely successful both nationally and internationally for over 70 years primarily through successful implementation of control mechanisms throughout all aspects of the organization (The Walt Disney Company, 2008). The four types of control mechanisms that best serve The Disney Company would be budgetary, financial, management audit, and bureaucratic. The bureaucratic control function is the lifeline of Disney’s corporate structure because it provides the company’s ethical standards, mission statement, and organizational structure. Moreover, bureaucratic control is a constructive system used to influence subordinates and structure reward systems. Budgetary control is a method used by The Disney Company to bring their vision to life. Budgetary control is detailed, step-by-step documentation of a company’s accomplishments or deficiencies by contrasting data. The Disney Company has implemented many ways of using budgetary control before building or acquiring any new real estate. Management audit controls are equally important to The Disney Company particularly if expansion is in their future. The Disney Company uses both an internal and external audit system. Through management audits The Disney Company has a set checks and balances system to ensure all assets are properly maintain and nothing is compromised (The Walt Disney Company, 2008). Financial controls are just as vital as budgetary controls with a company such as Disney. The marketing strategies that Disney employs help to produce revenue for the company thereby stabilizing assets and liabilities. Financial controls also help to make it possible for Disney to build more parks and resorts in the future. These four control mechanisms enforced by The Disney Company helps provide the company with a format in sustaining the company in a profitable direction. Equally important, these four components of Disney’s control mechanisms are the key in keeping the organization focused, and diverting away from any unethical misconduct from their employees.

Thursday, November 14, 2019

Gummo: A Review :: essays research papers

Gummo: A Review   Ã‚  Ã‚  Ã‚  Ã‚  Pieces of a puzzle slowly fitting together, to reveal a picture. This is an accurate description of how the film, Gummo by Harmony Korine pans out. Through a series of quite disturbing yet visually stimulating vignettes, Korine somehow relays a tragic story. Essentially, the film is a collection of random events that are assimilated into a larger scheme of things. For the most part, the film emphasizes on showing us things that we know are very real and actually happen, but are terribly hard for the average person to confront.   Ã‚  Ã‚  Ã‚  Ã‚  The tone is unveiled from the very beginning, while a dim and dark outlook are forecast. As it is set in the dilapidated, small town of Xenia, Ohio, the severity of the living conditions there is visible from start to finish. A few of the senseless, haphazard events that are captured, consist of - countless, brutal feline slayings, teens euthanizing the helpless, bed-ridden elderly, and drunken, redneck furniture wrestling. Somehow, in a twisted pattern, these scenes converge to depict the pure horror of living in this place.   Ã‚  Ã‚  Ã‚  Ã‚  In respect to the cast of this film, Chloe Sevigny is reasonably the only name that people are likely to recognize. There are a handful of other obscure actors as well as some non-actors that appear in the film, for various reasons. In the process of being introduced to each person through certain circumstances, it is difficult to determine which ones are the actors and which are not. From some of the sequences presented, it seems tough to draw the line between harsh reality and exploitation.   Ã‚  Ã‚  Ã‚  Ã‚  Contrary to the town that this film takes place in (Xenia, Ohio), it was shot on location in Nashville, Tennesee. Nashville provides an appropriate backdrop for the setting that was trying to be portrayed. Korine shoots the film with raw textures, giving it a real, almost too real deliverance. The camera work at times is almost hard to watch. Throughout the film - the images have a natural, gritty appearance.

Monday, November 11, 2019

Sir Robert Peel and American Policing

Sir Robert Peel and American Policing Kristi Pursley CJA/214 August 15, 2011 Don Redden Sir Robert Peel and American Policing The history of policing dates back several thousand years ago when there was no order or peace and inhumane acts upon citizens was the norm with religious, political, or military police acting as the law. Policing was unstable and unorganized. Citizens took the law into their own hands and served as judge, jury, and executioner. There was not such a thing as being â€Å"innocent until proven guilty. If the community believed an individual was guilty of a crime then the community would handle the offense themselves. American policing stems from the English heritage; crime prevention and control, preventive patrol, and the quasi-military organizational method became the policing structure. The English colonists brought a criminal justice system as part of their cultural baggage (Walker & Katz,  2008,  p. 24). In addition, American policing also used other f eatures from the British system. A member of England’s elite social and political class fought to improve the structure of the law enforcement for more than 30 years. History expresses itself and acknowledges this member as the â€Å"father† of modern policing, otherwise known as Sir Robert Peel (Walker & Katz, 2008, p. 25). After the collapse of the England law enforcement in the early nineteenth century, Sir Robert Peel took a stand to control order and organization in the law enforcement system. He fought for many years for this and finally convinced the English Parliament to create the London Metropolitan Police in 1829. The officers became known as â€Å"Bobbies† in honor of Sir Robert Peel. The London Police Department set in motion three new elements that became the structure for modern policing; mission, strategy, and organizational structure. The mission was to prevent crime before it started rather than to respond after the crime has already taken place, known as crime prevention. The strategy was to have officers continually patrolling the fixed â€Å"beats† and allow them to be noticed to deter crime, also known as preventive patrol. The organizational structure came from the London military introducing, uniforms, rank designations, and the authorian system of command and discipline, otherwise known as Quasi-military style. Although Sir Robert Peel was not an officer of the law, he directed London’s police department with â€Å"Peel’s Nine Principals. † These principals were to act as the basis to control the police force in England and help to restore peace to the citizens. Peel believed it was better to try to prevent crimes and reform criminals. Peel’s Nine Principals read as follows: 1) The basic mission for which the  police  exist is to prevent crime and disorder. 2) The ability of  the police  to perform their duties is dependent upon public approval of police actions. ) Police must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. 4) The degree of co-operation of the public that can be secured diminishes proportionately to the necessity of the use of physical force. 5) Police seek and preserve public favor not by catering to public opinion but by constantly demonstratin g absolute impartial service to the law. 6) Police use physical force to the extent necessary to secure observance of the law or to restore order only when the exercise of persuasion, advice and warning is found to be insufficient. ) Police, at all times, should maintain a relationship with the public that gives reality to the historic tradition that the police are the public and the public are the police; the police being only members of the public who are paid to give full-time attention to duties which are incumbent on every citizen in the interests of community welfare and existence. 8) Police should always direct their action strictly towards their functions and never appear to usurp the powers of the judiciary. ) The test of police efficiency is the absence of crime and disorder, not the visible evidence of police action in dealing with it (Bloy, 2011). The United States admired Sir Robert Peel’s principals of policing and therefore adopted it to incorporate into their legal justice system of law enforcement. The government tried to incorporate Sir Robert Peel’s Principals into different cities with no luck or gratitude. In 1838, Boston became the first city to incorporate these principals and have the first organized policing in the United States. In 1845, New York City followed suit. Soon thereafter, Philadelphia followed suit but it did not follow the principals, destroying different forms of policing. Finally, Philadelphia collaborated their policing style to be organized and uphold order by way of Sir Robert Peel’s Nine Principals. Sir Robert Peel, known as the ‘father’ of modern policing, set the foundation for organization and structure in modern day policing in London. The United States followed behind shortly thereafter to enlist a police force for order, organization, and service. Peel set up â€Å"Peel’s Nine Principals† which the United States still abides by to this day. The ‘father’ of policing has helped our government to overcome harsh judgment, corruption, and harsh actions, and has made it possible for citizens of this society to bond with local law enforcement. This has allowed our law enforcement to handle situations appropriately and incorporate bigger agencies to handle more diverse problems throughout the country. References Dr. Bloy, M. (2011, January 6). The Peel Web. Retrieved August 9, 2011 from www. historyhome. co. uk. Walker, S. , & Katz, C. M. (2008). The Police in America  (6th Ed. ). New York, New York: McGraw-Hill.

Saturday, November 9, 2019

A Brief Comparison of Psychoanalytic and Person-Centered Therapy

Within the field of counseling and therapy there are endless theoretical stances, each of which develop different perspectives on humanity and establish varying counselor roles. Consideration of the implications of these various orientations is essential in the process of choosing the appropriate therapy for an individual. As an illustration, examine the stark contrast between psychoanalytic therapy and person-centered therapy. The core of any theoretical approach in psychology lies in the unique interpretation of human nature.Sigmund Freud; founder of the psychoanalytic movement, had an extremely deterministic view of the human experience (Corey, 2009). According to Freud; a combination of unconscious, irrational motivations and instinctual drives that lie outside of one’s conscious control serve as the basis for one’s personality (Corey, 2009). These irrational forces include Eros; the innate â€Å"life instinct† responsible for sexual energy and our desire to survive, and Thatanos; the innate â€Å"death instinct† responsible for aggression (Burger, 2008).In addition, Freud placed a heavy emphasis on the role of childhood experiences and sexuality in personality development. Psychoanalytic theory asserts that most of the conflict experienced in adulthood is a result of repressed unconscious material from childhood (Burger, 2008). The psychoanalytic view of human nature is quite contrary to the humanistic outlook. Carl Rogers; founder of the humanistic psychology movement, developed a more optimistic view of human nature.This approach asserts that at the core of each individual lies a â€Å"positive center†, which is composed of trustworthiness and capability (Corey, 2009). Person-centered therapy is centered on the belief that people have an innate â€Å"actualizing tendency† which drives an individual to strive for growth and personal fulfillment (Corey, 2009). Although past experiences are not ignored in therapy; t he emphasis on growth, development, and competence proposes that traumatic past experiences can be overcome by finding meaning and purpose in one’s life (Corey, 2009).Given their varying interpretations of human nature and psyche, person-centered therapists and psychoanalytic therapists establish very different roles in their practice. Because the goal of psychoanalytic therapy is to bring repressed unconscious material to light, the therapist utilizes a â€Å"blank-screen approach† (Corey, 2009). Although they initially establish some rapport with the client; psychoanalytic therapists assume an anonymous stance for the majority of therapy by behaving in a neutral, impersonal manner (Corey, 2009).The goal of this approach is to foster transference; in which clients project repressed emotions onto the impartial therapist (Corey, 2009). The main role of a psychoanalytic therapist is that of an interpreter. Therapy employs various techniques intended to evoke unconscious memories such as transference, dream-analysis, projection tests, and free association (Burger, 2008). These repressed memories are often ambiguous and puzzling to the client; thus therapists provide guidance in understanding and confronting the meaning of this material (Burger, 2008).In contrast, the goal of person-centered therapy is to create a nurturing environment which fosters the client’s actualizing tendencies and growth (Corey, 2009). The relationship between therapist and client is equal, meaning that the therapist can hold no dominant role (Corey, 2009). Rather than advising and interpreting, the therapist simply serves as a model for the patient. In order to be appropriate models, three characteristics are required of person-centered therapists (Corey, 2009).Firstly, they must have congruency in their own lives by being genuine and honest with themselves. Person-centered therapists must also accept their clients with â€Å"unconditional positive regard† (Cor ey, 2009). This vital concept assumes that therapists can accept their clients without any judgment, and deeply care for people beyond the obligations of their occupation. Lastly, therapists must have a true empathetic understanding of their clients. Person-centered therapists should be able to relate to their client’s feelings and experiences as if they were their own (Corey, 2009).Cumulatively these three qualities create an open relationship in which the client is free to express themselves and grow as an individual. Due to the intrinsic differences between psychoanalytic and person-centered therapy, it is necessary to examine their strengths and weaknesses in application. Freudian psychoanalytic therapy has been modified greatly over time due to many flaws in the therapeutic process. The most notable of these shortcomings is the intense emphasis on childhood experience in personality development (Burger, 2008).Critics claim that psychoanalytic therapy ignores the signific ant role of post-developmental and current life circumstances on mental health. In addition, the therapeutic process in lengthy and costly; limiting its application to those in well-off socioeconomic standing (Corey, 2009). There are however many beneficial uses of contemporary psychoanalytic therapy. Some argue that because all people are affected by childhood experiences, therapy can be applicable cross culturally; assuming therapists possess a multicultural awareness (Corey, 2009).In addition, brief psychoanalytic therapy is a promising new therapeutic approach that aims to limit the time and cost of psychoanalytic therapy while maintaining the focus on the inner psyche; thereby broadening its availability (Corey, 2009). Person-centered therapy is currently a more widely utilized form of therapy, but it is not without weaknesses. Critics argue that from a multicultural perspective, the internal locus of evaluation stressed in therapy may not be fitting for some collectivist cultu res; who value the opinions and standards of other group members over their own (Corey, 2009).Others contend that the non-directive stance of the therapist may not be sufficient for those seeking guidance from therapy. Although some aspects of therapy may be flawed, humanistic psychology has been responsible for some major breakthroughs in the field of human resources internationally. Humanistic psychologists have traveled to over 30 countries worldwide in order to assist different cultures in their adoption and modification of humanistic theory and therapy; in hopes of promoting global communication and understanding (Corey, 2009).Those who promote person-centered therapy also assert that the key therapeutic conditions of empathy, understanding, and honest caring are essential in promoting growth universally (Corey, 2009). References Burger, J. M. (2008). Personality. (8th ed. ). Belmont, CA: Wadsworth, Cengage Learning. Corey, G. (2013). Theory and Practice of Counseling and Psych otherapy. (9th ed. ). Belmont, CA: Brooks/Cole, Cengage Learning.

Thursday, November 7, 2019

The Health and Pollution Risks of Charcoal Grilling

The Health and Pollution Risks of Charcoal Grilling Cooking with grills can be problematic for two reasons. First, both charcoal and wood burn â€Å"dirty,† producing not only hydrocarbons but also tiny soot particles that pollute the air and can aggravate heart and lung problems. Secondly, the grilling of meat can form two kinds of potentially carcinogenic compounds in the cooked meat: polycyclic aromatic hydrocarbons (PAHs) and heterocyclic amines (HCAs). Charcoal Grilling May Pose Cancer Risks According to the American Cancer Society, PAHs form when fat from meat drips onto the charcoal. They then rise with the smoke and can get deposited on the food. They can also form directly on the food as it is charred. The hotter the temperature and the longer the meat cooks, the more HCAs are formed. HCAs can also form on broiled and pan-fried beef, pork, fowl, and fish. In fact, National Cancer Institute researchers have identified 17 different HCAs that result from cooking â€Å"muscle meats,† HCAs that may pose human cancer risks. Studies have also shown an increased risk of colorectal, pancreatic, and breast cancers associated with high intakes of well done, fried, or barbequed meats. Cooking With Charcoal Grills Adds to Air Pollution According to the Texas Commission on Environmental Air Quality, Texans who like to say that they â€Å"live and breathe barbecue† may be doing just that to the detriment of their health. A 2003 study by scientists from Rice University found that microscopic bits of polyunsaturated fatty acids released into the atmosphere from cooking meat on backyard barbecues were helping to pollute the air in Houston. The city at times registers air quality levels that rank it one of the more polluted urban areas in the United State. Emissions from barbecues, however, are certainly dwarfed by those generated by motor vehicles and industry. Both briquettes and lump charcoal create air pollution. The production of lump charcoal, made from charred wood to add flavor, creates other environmental hazards. Their production contributes to deforestation and adds to the greenhouse gases in the atmosphere. Charcoal briquettes do have the benefit of being made partly from sawdust, which is a good use of waste wood. Popular brands, however, may also contain coal dust, starch, sodium nitrate, limestone, and borax. Canada Considers Charcoal Hazardous In Canada, charcoal is now a restricted product under the Hazardous Products Act. According to the Canadian Department of Justice, charcoal briquettes in bags that are advertised, imported to, or sold in Canada must display a label warning of the potential hazards of the product. No such requirements presently exist in the United States. Avoid Health Risks by Using Natural Charcoal Consumers can avoid exposure to these potentially harmful additives by sticking with so-called natural charcoal brands. Look for charcoal made of 100 percent hardwood and containing no coal, oil, limestone, or petroleum products. Third-party certification programs, like the Forest Stewardship Council, can help choose products that are harvested in a sustainable fashion. Edited by Frederic Beaudry.

Tuesday, November 5, 2019

Members of the House of Representatives

Members of the House of Representatives There are 435 members of the House of Representatives. Federal law, passed on Aug. 8, 1911, determines how many members are in the House of Representatives. That measure raised the number of representatives to 435 from 391 because of population growth in the United States.   The first House of Representatives in 1789 had only 65 members. The number of seats in the House was expanded to 105 members after the 1790 Census, and then to 142 members after the 1800 headcount. The law that set the current number of seats at 435 took effect in 1913. But it isnt the reason the number of representatives has been stuck there. Why There Are 435 Members   Theres really nothing special about that number. Congress regularly increased the number of seats in the House based on the nations population growth from 1790 to 1913, and 435 is the most recent count. The number of seats in the House has not been increased in more than a century, though, even though every 10 years the census shows the population of the United States grows. Why the Number of House Members Hasnt Changed Since 1913 There are still 435 members of the House of Representatives a century later because of the  Permanent Apportionment Act of 1929, which set that number in stone. The Permanent Apportionment Act of 1929 was the result of a battle between rural and urban areas of the United States following the 1920 Census. The formula for distributing seats in the House based on population favored urbanized states and penalized smaller rural states at the time, and Congress could not agree on a reapportionment plan. After the 1910 census, when the House grew from 391 members to 433 (two more were added later when Arizona and New Mexico became states), the growth stopped. That’s because the 1920 census indicated that the majority of Americans were concentrating in cities, and nativists, worried about of the power of foreigners, blocked efforts to give them more representatives, wrote Dalton Conley, a professor of sociology, medicine and public policy at New York University, and Jacqueline Stevens, a professor of political science at Northwestern University. So, instead, Congress passed the Permanent Apportionment Act of 1929 and sealed the number of House members at the level established after the 1910 census, 435. Number of House Members Per State Unlike the U.S. Senate, which consists of two members from each state, the geographic makeup of the House is determined by the population of each state. The only stipulation spelled out in the U.S. Constitution comes in Article I, Section 2, which guarantees each state, territory or district at least one representative. The Constitution also states that there can be no more than one representative in the House for every 30,000 citizens. The number of representatives each state gets in the House of Representatives is based on population. That process, known as reapportionment, occurs every 10 years after the decennial population count conducted by the U.S. Census Bureau. U.S. Rep. William B. Bankhead of Alabama, an opponent of the legislation, called the Permanent Apportionment Act of 1929 an abdication and surrender of vital fundamental powers. One of the functions of Congress, which created the census, was to adjust the number of seats in Congress to reflect the number of people living in the United States, he said. Arguments for Expanding the Number of House Members Advocates  for increasing the number of seats in the House say such a move would increase the quality of representation by reducing the number of constituents each lawmaker represents. Each House member now represents about 700,000 people. The group ThirtyThousand.org argues that the framers of the Constitution and the Bill of Rights never intended for the population of each congressional district to exceed 50,000 or 60,000. The principle of proportionally equitable representation has been abandoned, the group argues. Another argument for increasing the size of the House is that is would diminish the influence of lobbyists. That line of reasoning assumes that lawmakers would be more closely connected to their constituents and therefore less likely to listen to special interests. Arguments Against Expanding the Number of House Members Advocates for shrinking the size of the House of Representatives often argue that the quality of legislating improves because House members would get to know each other on a more personal level. They also cite the cost of paying for salaries, benefits, and travel for not only the lawmakers but their staffs.

Saturday, November 2, 2019

Health Information Systems Research Paper Example | Topics and Well Written Essays - 1250 words

Health Information Systems - Research Paper Example fore is on the fact that despite the proliferation of information system retrieval technologies such as memory chips and CDs, It is still unclear as to whether Physicians use such data retroviral technologies objectively or not. Thus a framework was developed based on certain criteria and all the earlier studies were thane evaluated according to the criteria set into the framework developed by the authors. Some of the criteria include frequency of use, purpose of use, user satisfaction, searching utility, searching failure etc. A total sample of 47 articles was chosen from which further classification was made in order to develop the framework under study. This study basically therefore attempted to develop a framework by performing the review of the already performed studies on the subject. Authors searched the data relating to the medical informatics from 1996 to 1998 with special emphasis on those studies which involved the Physicians. The most obvious rational for the study was therefore to review the earlier studies and compare them according to the set criteria for further exploration and as to how earlier studies actually contributed towards the development of comprehensive set of knowledge and understanding regarding the use of information retrieval technologies by the Physicians. As discussed, that this study is based on the review of already published studies to formulate a framework for assessment purposes. Authors checked the citations of the studies as well as the bibliographies of 49 studies. Most of the material has been taken from the earlier published material and studies from databases such as MEDLINE and LISA. The basic criteria for selection of the articles was based on the fact that whether any such study presented the classification of the information retrieval technologies or whether such technologies were used by the Physicians as well as students. Based on the designed framework, authors looked for the defined criteria in these studies