Wednesday, October 30, 2019

Employee Rights and Responsibilities Research Paper

Employee Rights and Responsibilities - Research Paper Example Based on specific guidelines, granting â€Å"time off† with pay is a statutory right of every employee (Lawpack Publishing Limited, 2010). Aside from statutory rights, some contractual rights of employees were also presented in the Harding case. Contractual rights are rights contained in the contract of employment and which were agreed upon by the employer and the employee. Right to employee privacy. This is the right which the employees of Harding Space think is being violated by management. They felt bad having a surveillance camera monitor them and now even their calls will be monitored. Right to know the reasons for monitoring the staff. Employees have a right to know that there is monitoring, what is being monitored and why it is being done. Harding must explain to its employees why there is a need for it. One reason which they can give why the calls are being monitored is because of the highly confidential nature of their business which involves large aerospace contracts of the government. Right to join or not to join a labor union. In the last part of the case, the company spokesman mentioned about how grateful he is that they do not have a union because a disgruntled employee may decide to join the union, if it exists. In the case presented, the employees of Harding have a right to form a union. If they do so, the management might have a problem with the issue of monitoring employees because of the possibility that the union might fight against it. Question 9 There are several rights of privacy that employees have while on the job. Right to his personal possessions. The employee has the right to his personal belongings including his briefcase or handbag (FindLaw, 2011). Right to personal storage lockers. The personal storage lockers should only be accessible to the employee (FindLaw, 2011). Since Harding has already set up TV cameras in the workplace, they should be guided by law that they are not allowed to put cameras in private areas such as c omfort rooms or locker rooms. Right to personally-addressed mail. An employer cannot open a privately addressed mail to his employee because it is considered an intrusion to the rights of privacy of the employee. The case did not show any violation of this right. Right to telephone conversations and voice mails. This right is sometimes subject to monitoring restrictions as shown in the case of Harding Space. â€Å"The federal Electronic Communications Privacy Act (ECPA) places some limitations on an employer's right to monitor its employees' telephone usage at work. Under the Act, an employer usually may not monitor an employee's personal phone calls, even those made from telephones on work premises† (FindLaw, 2009). In the Harding’s case, management was concerned about the personal calls being made by its employees that is why they issued a memo asking their employees to eliminate personal calls. I don’t think that Harding can impose a â€Å"total ban† o n personal calls because that is a right of the employee. What Harding can do is to make a memo stating a certain limit to personal calls. I suggest that if long distance personal calls

Monday, October 28, 2019

White Privilege Essay Example for Free

White Privilege Essay In Peggy McIntosh’s article â€Å"White Privilege: Unpacking the Invisible backpack† we see detailed examples of how white people are extremely privileged in ways that people of other races may never understand. Even though sometimes we do not realize this is happening it has been seen to be true in many things throughout history and in the world today. One of the parts of this article that caught my eye and made me think a bit was the list of 26 white privileges that McIntosh wrote about in her article. This list was very eye opening and made me think what I could put towards myself on this list. Even though I was born in a little different time that McIntosh was I was relatively aware that as a white male I was born with a number of privileges that came with not only the color of my skin but also by my gender, however this list did make me realize and understand some of the advantages of my skin that I often times look over. A good example that I could use before, I can’t say it is so easy now, is number 17 I can criticize our government and talk about how much I fear its policies and behavior without being seen as a cultural outsider. Before the election of Obama I could easily criticize my government and no one would really give me a second look about it, but I do have to say that now if I criticize my government I get called a racist, so now I kind of see better how those of a different race felt when they criticized our government and got called out about it. One thing for sure that I do have to say about this article is I could definitely tell that this article was written a good time ago. Many of the things stated in the list I felt were a little outdated especially the points that were talking about seeing mainly people of the white race in media or advertisements. Yes there was a point in time where this was very true but I feel like the world is doing a much better job at representing more than just one race when it comes to advertisements or media. In jean-Paul Sartre’s â€Å"Anti-Semite and the Jew we learn a lot about how he personally feels about Anti-Semites and what his description of an Anti-Semite is. Anti-Semitism is basically the hatred of someone who is Jewish. Sartre believes that is the Jew did not exist that the anti-Semite would invent him so they would have someone to hate. Anti-Semitism is something that was based more with the Nazi’s and Hitler. In my opinion I don’t really see it as much now but I can read plenty about it any many different books. In Sartre’s story he basically states that the anti-Semite had to have someone who he can feel superior to, which is why he states that is the Jew did not exist the anti-Semite would create him. He states that if by some miracle all of the Jews were exterminated as the anti- Semite wishes that the anti-Semite would be all alone, he would lose his sense of rights over the country because there would no longer be anyone to contest them. He states that the anti-Semite is in the unhappy position of having a vital need for the Jew he wishes to destroy. The anti- Semite is someone who needs a particular person to hate in order to feel superior to someone, and if all of the people that he hated were suddenly gone then he would no longer feel superior to anyone because he would then have no one to hate. In turn the anti-Semite would then have to create another thing to hate in order to bring back the feeling of superiority. This also was another one of those reading that you could tell was written a long time ago, because of the fact that we no longer see these things near as much as we see saw them in the past. Yes people do still tent to look down on Jews but it is still a particular group of people and not based on a race that has a significant hatred for another race. The anti-Semite can be looked at as a man that fears only himself and has to use that fear to create fear in the eyes of other in order to make he feel stronger and less powerless. How does Racism affect my life? I try not to let racism affect my life, in my everyday life I talk to and deal with all different kinds of races. Now I will say that as a white male I may have had a few doors open to me that other races might not have had, but on the other hand I chose to walk through the doors of the opportunities I had in order to better myself. People say that whites have had a lot more opportunity and a lot more doors open to them but I really don’t believe that it is as much true now as it was many years ago. I believe that we as a society try to make certain things out to be less opportunistic than they really are so we have something to talk, complain and or fight about, but in all actuality we all have certain doors open to us it is just a matter of whether we chose to step through the right door or not. People say that those of other races have had less opportunity than those who are white but let’s take a look into what is available now that benefits more of those in other races than the whites. There are major colleges that are race oriented, there are many scholarships for schools that are race based and only that race can receive that scholarship. As a white male yes I do have a lot of opportunities to gain work or gain money for school through scholarships but there is not one thing have seen that is specific to whites only when it comes to education. Now don’t get me wrong I know many years ago only whites could go to school here in the U. S. and it took some time to let other races into school but things have changed since then. So I would have to say that now, compared to if I was born many years ago, I do not believe racism or race plays a big factor in my life.

Saturday, October 26, 2019

Support of Slavery by the Christian Church Essay -- Slavery Essays

Support of Slavery by the Christian Church The belief in some higher presence, other than our own, has existed since man can recollect. Religion was established from this belief, and it can survive and flourish because of this belief. Christianity, one of several forms of religion that exist today, began sometime during the middle of the first century. Christians believe in a higher presence that they call "God." This belief in God is based on faith, not fact; faith is "unquestioning belief that does not require proof or evidence." (Webster's New World College Dictionary, 1996, p. 487). The belief in God exists primarily for two reasons: It answers the question of why we exist, and it is used to exert moral control over society (religion). The reasons for believing in God hold no true validity. Answering the question of man's existence is irrelevant; it simply cannot be answered. No one knows when life first began on Earth, nor in what form this life took. We simply exist; as far as we know, we always have existed, and we always will exist. (Wallace, 1994). The church claims God is the reason we exist, and this gives the church cause for exerting unnecessary moral control over society. All societies must have a set of rules, or laws, by which they are governed, to prevent anarchy. We must have some form of government, but our laws must come from the people up, not from God down. The government provides necessary control over society; morals should be left to the individual. The church has always failed to realize this. To suppress individuality is to suppress freedom, and never in our nation's short history was the power of the church and the suppression of freedom more evident than during the era of slavery. Had the chur... ... published in 1857) Lewis, P. (1973). Slavery and anarchy. Radical abolitionism: Anarchy and the government of god in anti-slavery thought (pp.18-54). Ithica: Cornell University Press. Mathews, D. (1980). Religion and slavery: The case of the American south. In C. Bolt & S. Drescher (eds.), Anti-slavery, religion, & reform (pp. 207-230). Hamden, CT: Archon Books. Ritchie, B. (1968). The mind and heart of frederick douglass: Excerpts from speeches of the great negro orator. (pp. 37-63). New York: Thomas Y. Crowell. Ross, F. (1969). Slavery ordained by god. New York: Negro Universities Press. (Original work published in 1859) The holy bible: King james version. (1965). Chicago: Good Counsel. Wallace, F. (1994). The neo-tech dicovery. (p. 32). Neo-Tech Worldwide. Webster's new world college dictionary. (1996). (p. 487). New York: MacMillan USA.

Thursday, October 24, 2019

Biology unit 1&2 chapter 3 answers Essay

There must be a higher concentration of wastes in the dialysis tube than in the surroundings. Wastes must therefore be constantly removed from the surroundings to maintain a concentration gradient. b) What special features does it have? If the surrounding solution was not changed, the concentration gradient would become smaller and smaller until diffusion would no longer occur and the same amount of wastes would leave the dialysis tubing as wound enter it. 2. 3. When epithelial cells such as human cheek cells, are studied under a microscope, they are mounted on a slide to which a drop of ‘normal’ saline (salt) solution, rather than tap water, has been added. Explain why this is the best method for preparing these cells. If the person drank the sea water, cells in digestive system would be surrounded by a hypotonic solution and would lose water. Cells would become dehydrated and cease to function. 4. Under what natural conditions might plant cells become plasmolysis? There will be a net movement of water into the Amoeba in freshwater environment. 5. Two cells have the same internal concentration of sugar solution. They are both placed in distilled water. Even though both cells expand over time, one expands faster than the other. What are some reasons for this observation? The disease will cause severe diarrhea. Human body will be infected with bacterium when drinking contaminated water, and sticks to the intestinal lining. . Intestinal cells start secreting sodium and chloride ions into the intestinal fluid. This upsets the balance of fluids, causing a net movement of water out of the intestinal cells into the surrounding fluid which is then excreted with faces, causing diarrhea. Dehydration of body cells may eventually kill infected people. 6. After eating a packet of slated potato chips your lips often feel dry. Explain why? Blood glucose levels are measured in mill moles of glucose per liter of blood (mmol/L). The normal level is around 5 mmol/L. A 5% solution of glucose is roughly equivalent to the normal level of glucose in the blood. If this concentration drastically increases (20%), body cells may be in danger of losing water by osmosis. Increased thirst and excessive urination are two of the symptoms of diabetes, a condition in which the amount of blood sugar rises to unacceptable levels. 7. A student places a living cell into a drop of liquid contains less than 5% sugar. a) Make a hypothesis to explain what caused the change in sugar concentration outside the living cell. It is hypothesis a living cell being placed into a drop of liquid contains less than 5% sugar can cause the sugar concentration outside the living cell. 8. A particle that has been drawn into a cell by phagocytosis is not truly inside the cell. Explain the statement. If salt levels rise, water tends to move from the root tissue in citrus trees to the surroundings by osmosis. There is a lack of water for photosynthesis, causing smaller yields of citrus fruit.

Wednesday, October 23, 2019

Consultation with Hostile Corporations -Case Essay

Lily’s Consultation with Hostile Corporations Summary Lily Advisors, a consulting firm based in Maryland, Washington DC, working with multi-disciplined teams for discrete projects, had a consulting agreement with Green Acres School System in Northern Virginia to resolve some issues arising from the construction of two new high schools. Unseasonable rains, contractor delays, weather issues, disagreements between architects and the school board were some factors contributing to the delays. With his extensive roles and experience, the school board hired Merv, President of Lily’s Advisors, to advise them about how to proceed under their tense circumstances Merv investigated the situation and submitted a confidential document, on the First High School this was in February 1999. The performances to date of Meyerhoff, the main contractor and Stewart and Sons, the architectural firm, were critically evaluated. The major findings were that Stewart and Sons failed to control the scheduling properly and that it was making an unusually large profit for its administrative function. Merv was familiar with Stewart & Sons and was able to write about their methods of execution. The school board asked Stewart and Sons to renegotiate because of the findings of the report, but gave them the impression that it was based on the construction delays. The content of the report remained undisclosed. After two months of very difficult negotiation, all groups signed an amended contract on June 30, 1999. All major issues were settled and they were able to proceed to the construction of the second high school. The new amended contract had further delays as the groups found that the excessive compromising that was done was becoming irksome. The school board had thought Stewart and Sons was very uncompromising and aggressive. Disagreements continued between the school board and the construction and architectural firms during the next eight months. At this point, Stewart and Sons decided to hire Lily as a consultant. Stewart had worked with Lily before. They met and Merv disclosed that he had submitted an evaluation of the contract to the school board in a document, after making a proposal on September 24, 2000. The negative aspects of the report were never revealed. Sam Shapiro, the architect’s lawyer, contacted Merv about the document submitted and the potential conflict of interest which could arise but Merv denied any conflict of interest. Shapiro and the representatives from Stewart gave Merv a contract to sign for his services on November 8, 2000. The situation further deteriorated during the next 4 months and the school board sued Stewart and Sons. The lawyers representing Stewart and Sons saw the confidential document, as was required by the law. This outraged Stewart and Sons as they viewed the document as impugning the company’s integrity and honesty. Stewart and Sons viewed it as a case of conflict of interest and not one with just the potential. Merv believed otherwise. He explained that he recognized a potential conflict of interest and devised measures to prevent it. Merv was convinced of his flawless strategy and believed he had insulated the teams sufficiently to avoid this and, in any case, the construction of the second school was a new project. Stewart and Sons informed him that they would not pay the $102,500 that was due on the contract. After contemplating the amount of money to be spent on the case, he decided to proceed to prove otherwise.

Tuesday, October 22, 2019

Hydraulics Pneumatics Essays

Hydraulics Pneumatics Essays Hydraulics Pneumatics Essay Hydraulics Pneumatics Essay HYDRAULICS IN MISSILES Nowadays, the electro-hydraulic actuator plays an important role in some modern tactical missiles. High power, great robustness and high tracking precision are the most significant demands for the missile actuator. Therefore an advanced method of active disturbance rejection control (ADRC) is presented aiming at the dynamics of the system are highly nonlinear and have large extent of model uncertainties, such as tremendous changes in load. Firstly, a novel ADRC controller is designed for estimating and compensating disturbance based on the mathematical model of missile electro-hydraulic actuator. Then, the influence of rudder load on the system performance is analyzed in this paper. Simulation results show that the ADRC control approach can decrease the tracking error and enhance the robustness of missile electro-hydraulic actuator system when the rudder load changed tremendously. But the phenomenon of Anti-Control has disadvantageous effect on the transition period of actuator loop and evenly causes the system divergence. HYDRAULIC SUSPENSION IN BOGIES The application of oil-hydraulic actuators for active suspension of railway vehicles has been examined experimentally by using a 3-DOF half-vehicle model. The LQG control law was adopted, in which state variables were estimated from measurable ones on the actual railway vehicle. The results show the possibility that the controllable frequency range extends with the oil-hydraulic actuator. The addition of bogie acceleration measurement to body related measurement provides a significant advantage for the performance. When actual body weight becomes lighter than that of the controller design value, the control performance and the stability deteriorate. Therefore, it is recommended to use the empty car body weight for design of the active suspension controller. The control effect can reach to the maximum vibration isolation level by shortening the sampling period to 2 ms PNEUMATIC GREASE GUN A grease gun is a common workshop and garage tool used for lubrication. The purpose of the grease gun is to apply lubricant through an aperture to a specific point, usually on agrease fitting. The channels behind the grease nipple lead to where the lubrication is needed. The aperture may be of a type that fits closely with a receiving aperture on any number of mechanical devices. The close fitting of the apertures ensures that lubricant is applied only where needed. There are three types of grease gun: A grease gun (pneumatic) 1. Hand-powered, where the grease is forced from the aperture by back-pressure built up by hand cranking the trigger mechanism of the gun, which applies pressure to a spring mechanism behind the lubricant, thus forcing grease through the aperture. 2. Hand-powered, where there is no trigger mechanism, and the grease is forced through the aperture by the back-pressure built up by pushing on the butt of the grease gun, which slides a piston through the body of the tool, pumping grease out of the aperture. . Air-powered (pneumatic), where compressed air is directed to the gun by hoses, the air pressure serving to force the grease through the aperture. Russell Gray, inventor of the air-powered grease gun, founded Graco based on this invention The grease gun is charged or loaded with any of the various types of lubricants, but usually a thicker heavier type of grease is used. It was a close resemblance to contemporary hand-power ed grease guns that gave the nickname to the World War II-era M3 submachine gun. PNEUMATICS IN AIRCRAFT Bleed air in gas turbine engines is compressed air taken from within the engine, after the compressor stage(s) and before the fuel is injected in the burners. While in theory bleed air could be drawn in any gas turbine engine, its usage is generally restricted to jet engines used in aircraft. Bleed air is valuable in an aircraft for two properties: high temperature and high pressure (typical values are 200-250Â °C and 275 kPa (40 PSI), for regulated bleed air exiting the engine pylon for use throughout the aircraft). 1] This compressed air can be used within the aircraft in many different ways, from de-icing, to pressurizing the cabin, to pneumatic actuators. However, bleed air is quite hot and when being used in the cabin or other low temperature areas, it must first be cooled or even refrigerated by the aircrafts environmental control system (ECS). Newer aircraft rely more on electricity, reducing the need for compressed air. Since most gas turbine engines use multiple compressor stages, some newer engines have the bleed air inlet between compressor stages to reduce the temperature of the compressed air.

Monday, October 21, 2019

Germany and History essays

Germany and History essays World War II started when Adolf Hitler wanted to expand his authority and strengthen German forces. It feels like a good idea for the reason that Hitler wants to protect German-speaking people but he disobeyed the Versailles Treaty and his actions of acquiring those countries were too harsh. Great Britain and France did not have a choice but to attack Germany, the atmosphere all over the world became furious and was ready to face another battle such as World War I. During that time, our region was not ready for another struggle for the reason that we were still in the process of recovering from the loss of our nation during the Great Depression. There were several casualties died, buildings destroyed, but in the beginning of World War II, everything changed. During the war, the economy of the region rose since several jobs offered to men and women. Men asked to work as soldiers while women worked in the factories to build equipments for use in combat. Discrimination rose when the war broke where non-white segregated from whites. Adolf Hitler was an aggressive man; he wants people to adore him in order to rule the world. He successfully convinced people to follow him on his several activities especially in expanding the land area of Germany but then our regions opinion about this is that his plan was not to secure the people and protect them but instead he planned to secure and protect himself. The activities that he made were more on a personal satisfaction. Benito Mussolini was engaged in a Socialists Party but later on became the ruler of Italy where he invaded Ethiopia and other countries. Both men were hungry for power. Soon, the combat operations have ended when the peace treaty initiated but in Germany, it later signed in 1990. The regions have changed and new beginnings formed. Political issues and other difficulties rose but with a proposed long-term solution. The strongest ally during the war were Great Britain a...

Sunday, October 20, 2019

Critiquing is not Editing

Critiquing is not Editing â€Å"Critiquing† is not â€Å"Editing† â€Å"Critiquing† is not â€Å"Editing† By Maeve Maddox A reader writes about a problem she is having with a friend who is critiquing her manuscripts. . . . whenever I use personification, alliteration, or any sort of figurative language, [the friend] edits it out. We have two very different styles, and I’m wondering if she is right in editing my work so drastically that it changes the style, or if my style is really far too â€Å"flowery†, as she puts it. Critiquing is not the same as editing. If the friend is â€Å"editing drastically,† the result is no longer a critique but a rewrite. The chief purpose of a fiction critique is to enable the writer to improve a manuscript by getting rid of unnecessary exposition, character inconsistencies or pointless dialogue. Thoughtful critiques from other writers can help the writer focus on essentials. What exactly is the writer’s purpose? Who is the protagonist? What does the protagonist want? Does each chapter advance the plot? I belong to a writing critique group. Everyone in it has a different style and different preferred genres. We also have various pet peeves relating to grammar, spelling and idiom. However, individual style is something we are very careful about respecting. For one thing, different genres call for different language. For another, every writer must develop a distinctive voice. A writer’s voice may include some flowery language. We respect style, but that’s not to say that we avoid commenting on language we feel is inappropriate or over the top. We make suggestions, but we don’t presume to edit unless we are asked to. It’s always up to the author to accept or reject any comments or objections. To the writer being critiqued I say: Its your voice. Its helpful to have others read our work and comment on structure, story line, believabilitythat kind of thing. We do not profit from readers who want to rewrite our work to their own specifications. Critiques should be honest in pointing out plot weaknesses, omissions, and other flaws, but they shouldn’t attempt to recast the author’s work according to the reader’s vision. In submitting your work for critique it’s a good idea to be specific about the type of feedback you want. If your reader’s comments are consistently hypercritical and make you feel bad, get another reader. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:Creative Writing 101Best Websites to Learn English7 Sound Techniques for Effective Writing

Saturday, October 19, 2019

Weak Legal Environments in Asia Essay Example | Topics and Well Written Essays - 2000 words

Weak Legal Environments in Asia - Essay Example While in 1977 the economic crisis was triggered by the Thai baht, this time the crisis began on Wall Street. Many South Koreans are of the opinion that their economy is vulnerable to western market panic and destabilization because it is more transparent and open to foreign capital than its neighbors3. This is the reason that countries like Japan and China have not been as seriously affected by the global crunch as South Korea has been. However the reason behind South Korea being affected is that the Korean banks have huge foreign debts unlike the neighboring nations and as the global credit market dried up, the banks were in trouble as they needed dollars to repay the maturing foreign currency loans. What added to the pressure was that the foreign banks refused to roll over the existing loans. Before the 1997 crisis occurred in the Asian countries, the corporate sector in Korea showed very high debt-equity ratios and low profitability and they were still expected to yield high profitability.4 Such crises do not occur overnight and in Korea even ten years before the actual meltdown took place, the return on capital fell short of the oppurtunity cost. Profitability declined even after control of firm-specific and industry-specific factors and the macro-economic conditions. The rate of return on assets (ROA) was much lower in Korea than in other countries. The corporate governance in Korea was very weak as the system failed to provide sufficient monitoring and discipline. The larger firms did not face exit threats and the Korean laws protected incumbent controlling shareholders.5 Because of the Korean family structure, in the chaebols or the business groups, ownership is heavily concentrated to the extent that an individual has almost total control over all the firms within the group.

Friday, October 18, 2019

Society and Culture Aims and Objectives Essay Example | Topics and Well Written Essays - 1000 words

Society and Culture Aims and Objectives - Essay Example This could be said to be the capacity of the human beings to affect choices between alternatives, and to exercise and to impose those choices on society. It is normally contrasted to common forces, which are causes involving only spontaneous processes. Human agencies envisages the apparent claims that humans do, in fact, make decisions and endorse them on How humans come to make decisions, by free choice or other processes, is another issue.(Agency(Philosophy) 2008). Individualized human behaviour is a complex and intricate process of the human mind and behaviour, although aspects of group behaviours patterns could be predicted with reasonable degree of certainly and accuracy. The mental buildup and behaviourism of criminal thoughts and actions could offer analysis on its workings. It has earlier been explained that structure deals with the grouping, or collective mass of homogenous or, even heterogeneous matters to form a social structure or arrangement. In the criminal settings, a prison, or a penitentiary may serve to act as a social structure, group or setting. Even in terms of psychiatry, which relies heavily on sociology and social behaviourism, crime could be explained in terms of perverse or anti-social connotations. More than a desire to accumulate wealth, or money, criminal minds works to wreck revenge or retribution on the establishment since they may, at some time, have suffered deprivations at its hands. Again, the structure of the criminal mind, or the process of criminalised society is an offshoot of the social structure, which forms the basis of this paper. Centralization of wealth: Thus, it is seen that social structures creates avenues for disillusionment for people in terms of wealthy cliques, class differences and other subgroups. This in turn, may centralize wealth or potential for wealth in the hands of a select few to the exclusion of the toiling masses. The disparities in the social groups give rise to disillusionment, frustration, poverty and resultant criminal behaviour. Nevertheless, one could argue that criminals are present e vent in the wealthy groups, so where does the nexus between social groups and crime, organized or otherwise, arise When we consider that a wealthy criminal is governed not by class considerations but his intentions to negate society, to dominate and control it, to the exclusions of others, including legally elected Governments of countries. In the case of India, in parts of Northern provinces, people pay taxes to the local Mafiosi's and not to government, since they are well aware that the government cannot protect their lives or properties, but the Mafias could. These organized criminal groups or

Incarceration Type and Family Intervention as Determinants of Essay

Incarceration Type and Family Intervention as Determinants of Recidivism in Juvenile Delinquency - Essay Example The risk of facing harsher punishment through possible incarceration in adult prisons blossomed as a way to deter juveniles from engaging in violent crimes. Supporters of juvenile incarceration in adult prisons therefore rely on its supposed deterrent value. Despite the growing concern about juvenile violence, many opponents of the current system have continually pointed out that the risks involved in imposing adult penalties to juvenile offenders far outweigh the presumed benefits. Convicted juveniles are placed in adult correctional centers in the hope that the harsher environment would better rehabilitate them. The opposite seems to be the case. Many opponents of adult incarceration, for example, believe that it does not deter juvenile violence at all. This theory has is supported by several studies. Allard (2002), for example, found that adult correctional centers actually had a negative effect on juvenile delinquents. Compared to their counterparts who were retained in juvenile centers, transferred juvenile offenders released from adult correctional centers have been found to have a higher tendency for repeated criminal behavior. (Allard 2002) In the same study, recidivism was shown to be noticeably more significant among juvenile offenders who had been incarcerated in adult prisons. Such findings are diametrically opposed to the theory that adult punishment would lead to more effective rehabilitation for juvenile delinquents. This stand is further supported more recent work which revealed that the mental states of juveniles being sent to adult prisons did not significantly differ from those being sent to juvenile centers. This finding debunks the notion that juveniles sent to adult prisons are different from the regular juvenile delinquent, a wayward youth whose behavior already warrants harsher measures. Beyer's (2006) study of 50 juvenile delinquents that he had encountered in the course of several years as a psychologist rejected the notion of harsh punishment as the catch-all solution for juvenile crime. His study, instead, forwarded the conclusion that while juveniles sent to adult prisons have almost negligible differences from those retained in juvenile centers, the juveniles which are produced at such prisons come out harder and more prone to recidivism. We may thus logically entertain the existence of a relationship between incarceration type and recidivism or repeated criminal behavior. The truth of this statement would have weighty implications both on the juvenile criminal system as well as the legal policies that are currently being implemented in addressing juvenile violence and crime. Aside from asking ourselves whether harsher punishments are truly effective in curbing juvenile crime, we also encounter questions about alternative mechanisms. Grisso (1996), for one, points out the manifest challenges being faced today in the field of juvenile justice. New ways to discourage juvenile delinquency must be adequately examined. More importantly, Grisso (1996) offers the position that harsher prison conditions for juvenile offenders through incarceration in adult correctional facilities may actually be doing more harm than good. Social

Thursday, October 17, 2019

Whistleblowing and Deviance Essay Example | Topics and Well Written Essays - 1000 words

Whistleblowing and Deviance - Essay Example However, deviance and its definition differ with cultures. For example, somebody going against culturally defined gender roles may be deviant in some cultures, but not in the United States. Types of Deviance The rule-breaking behavior can be understood in three forms: Good behavior. This is the type of deviance that may break the social norms but intends something good to happen. For example, Dr. David Kelly had talked to a few BBC journalists, off-the-record, about the issues between the Blair government and Saddam Hussain’s weapons of mass destruction, but his words were portrayed in a very wrong way, which resulted in such a critical situation that finally dragged him to commit suicide. He killed himself as a result of whistleblowing (Henderson, 2003) Odd behavior. Many behaviors are considered as not normal while they are also not criminal. Such odd behavior includes behaving awkwardly in public places, wearing outlandish dresses, piercing one’s eyes and lips, etcet era. Bad behavior. This is the criminal behavior that is apt to break the societal and country’s laws, and the behavior is totally unacceptable for the society. ... n 1939 by Edwin Sutherland, a renowned criminologist and sociologist, during a speech when he was addressing the American Sociological Society (Schlegel & Weisburd, 1994, p.3). The organization itself is the actor in deviant behavior, where the white collar crime is committed by businessmen of the organization. In organizational deviance, the organization is responsible for the crime, and has to face penalties for it. According to Karri & Associates (2006), organizational deviance include crimes like bankruptcy fraud, computer crime, identity theft, pension fund crime, occupational crime, securities fraud, and medical fraud. However, organizational deviance is more inclined toward unethical behavior shown by its employees. When this deviance becomes a characteristic of the entire organization rather than of a single individual, it becomes a crime. In other words, when the deviant behavior is overlooked by employees, and is even supported by higher authorities, it becomes organization al deviance, or in other words, white collar crime. Case Study How Deviance Occurred? Individual deviance was being carried on by the employee, Bradley Birkenfeld; and, since it was supported by the whole organization, it became organizational deviance. Deviance occurred because the whole of the organization was working with an intention to help wealthy Americans evade taxes. Bradley Birkenfeld also found out that the organization was not in compliance with U.S. tax laws. When the organization’s authorities came to know about it, they fired him and did not issues him the financial statement for his dismissal, due to which he whistleblew to the IRS and SEC about UBS’s activities. This is how deviance occurred. Since Bradley Birkenfeld did not show his own complicity in the entire case,

The industrial revolution in Japan Essay Example | Topics and Well Written Essays - 2000 words

The industrial revolution in Japan - Essay Example Many parallels can be drawn between the industrialization in Japan and that of other countries especially USA and countries from Europe aside from the fact the Japan’s industrial revolution came years after that of USA and European countries like Britain, which was the initiator (Spielvogel 613). Industrial revolution in Western Europe was a result of revolutionary force from below, led by merchants based in the urban centers who were calling for the destruction of the old social order and creation of a current one that would generate new institutions based on urbanization and commercial context of the region. In contrast, leaders who had gained power through the manipulation of the feudalistic social regime spearheaded Japanese industrial revolution (Levine 105). The call for the modernization of Japan the came from above, led by those who were eager to bring change to the older regime, but not through radical overthrow of existing rulers. The difference in sources of economi c power between preindustrial merchant classes of England and France and that of Japan mirrored the theme of urbanism in the respective countries. From around 15th century, the urban merchants of these European countries made the cities the center of their rebellion against the feudalistic rulers. In Japan, anti-Tokugawa political force was inherent in the expanding population but not in the revolutionary sense of being anti-feudal as seen in the European countries. Those who wanted change were willing to achieve it through taking up of political offices as a means of gaining these advantages but not through a revolution in the social structure (Levine 105). To understand the performance of Japanese economy before, during and after industrial revolution, it is important to note that the country’s economic growth experienced a distinctive rhythmic growth during the period of 1887-1969. Lonien agrees that the Japanese economic growth since the beginning of industrial revolution to the end of the Second World War was cyclical (24). It is during this period that Japan joined the world’s major economic powers especially those from the west as far as it’s per capita and labor productivity is concerned. This economic growth took place through a growth phase that recognized by the Japanese economic development literature as upswings of long swings. Mosk recognizes this period as taking place in the following periods: 1887-1897, 1911-1919, 1930-1938 and 1953-1969. This are the periods that coincides with the time when Japanese economy experienced the most intensive growth rate (Mosk 6). Mosk notes that a long swing represents a growth pattern in the gross domestic product of the country in which the rate of output growth rises, reaches a peak, declines, reaches a trough and then begins to rise once again. Every long swing in this cycle involves two phases, an upswing phase that heralds the long swing and a downswing that that ends the cycle. Compar ative to average growth over the complete long swing, growth rates during the upswing surpass the long swings average and growth rate during the down swing is less than that of the long-swing average. It is this analysis that provides historians with a mechanism to determine Japanese economic growth during the industrial revolution period (6). According to these upswings of long swings analysis, the first long swing in Japanese economic

Wednesday, October 16, 2019

Whistleblowing and Deviance Essay Example | Topics and Well Written Essays - 1000 words

Whistleblowing and Deviance - Essay Example However, deviance and its definition differ with cultures. For example, somebody going against culturally defined gender roles may be deviant in some cultures, but not in the United States. Types of Deviance The rule-breaking behavior can be understood in three forms: Good behavior. This is the type of deviance that may break the social norms but intends something good to happen. For example, Dr. David Kelly had talked to a few BBC journalists, off-the-record, about the issues between the Blair government and Saddam Hussain’s weapons of mass destruction, but his words were portrayed in a very wrong way, which resulted in such a critical situation that finally dragged him to commit suicide. He killed himself as a result of whistleblowing (Henderson, 2003) Odd behavior. Many behaviors are considered as not normal while they are also not criminal. Such odd behavior includes behaving awkwardly in public places, wearing outlandish dresses, piercing one’s eyes and lips, etcet era. Bad behavior. This is the criminal behavior that is apt to break the societal and country’s laws, and the behavior is totally unacceptable for the society. ... n 1939 by Edwin Sutherland, a renowned criminologist and sociologist, during a speech when he was addressing the American Sociological Society (Schlegel & Weisburd, 1994, p.3). The organization itself is the actor in deviant behavior, where the white collar crime is committed by businessmen of the organization. In organizational deviance, the organization is responsible for the crime, and has to face penalties for it. According to Karri & Associates (2006), organizational deviance include crimes like bankruptcy fraud, computer crime, identity theft, pension fund crime, occupational crime, securities fraud, and medical fraud. However, organizational deviance is more inclined toward unethical behavior shown by its employees. When this deviance becomes a characteristic of the entire organization rather than of a single individual, it becomes a crime. In other words, when the deviant behavior is overlooked by employees, and is even supported by higher authorities, it becomes organization al deviance, or in other words, white collar crime. Case Study How Deviance Occurred? Individual deviance was being carried on by the employee, Bradley Birkenfeld; and, since it was supported by the whole organization, it became organizational deviance. Deviance occurred because the whole of the organization was working with an intention to help wealthy Americans evade taxes. Bradley Birkenfeld also found out that the organization was not in compliance with U.S. tax laws. When the organization’s authorities came to know about it, they fired him and did not issues him the financial statement for his dismissal, due to which he whistleblew to the IRS and SEC about UBS’s activities. This is how deviance occurred. Since Bradley Birkenfeld did not show his own complicity in the entire case,

Tuesday, October 15, 2019

Arabic Culture Essay Example | Topics and Well Written Essays - 500 words - 1

Arabic Culture - Essay Example Religious beliefs and traditions give ample freedom to the males in Muslim culture so that they can control or regulate the freedom of the Arabic women. â€Å"Koran says girls must stay home and that it is right to beat women if they disobey their husbands† (Chu). In other words, Koran undoubtedly gives the authority to men over women in Arabic culture. It is difficult for the Arabic females to engage in all types of activities as their men counterparts do. Driving is prohibited for Saudi women even though it is allowed in other Arabic states. â€Å"A Saudi woman sentenced to be lashed 10 times for defying the countrys ban on female drivers. The woman, named as Shaima Jastaina and believed to be in her 30s, was found guilty of driving without permission in Jeddah in July, 2011†(Jones). Even though the Saudi King interfered in the matter and removed the punishment of Shaima Jastaina, the above incident revealed the extent of oppression faced by women in Saudi Arabia and in other Arabic countries. No Arab women, especially the Saudi women, can go out without covering their entire body. It should be noted that in countries like America or Britain, women have the right to wear any clothes they like. In fact women in western countries cover their body less, compared to their male counterparts. Women in western countries take part in kind of social activities just like men whereas in Arabic culture, it is difficult for the women to enjoy such freedom. It should be noted that Arabic men can marry more than one girl and keep more than one wife at the same time. However, Arabic women do not have the right to keep more than one husbands at the same time. In other words, in Arabic culture, all the customs and norms were formulated to safeguard the interests of the male community whereas in other cultures, the interests of both the males and females are respected in equal measures. To conclude, the status of

Monday, October 14, 2019

Supply chain manager Essay Example for Free

Supply chain manager Essay Week 1 (Chapter 1) Logistics and the Supply Chain Course Outline Economic Impacts of Logistics Logistics: What is it The Increased Importance of Logistics Activities in the Logistics Channel As your first step in getting started with this course, please introduce yourself in the Student Profiles. Please share who you are, where you work, what your comfort level with the on-line technology is, and what is your reason for taking this program? Attach a photo if you are able. Week 2 (Chapter 2) Logistics and Information Technology General Types of Information Management Systems Electronic Commerce and Logistics Electronic Data Interchange Enterprise Resource Planning Week 3 (Chapter 3) Logistics Systems Controls Financial and Accounting Controls Worker Productivity Product Recalls Controlling Returned and Salvaged Goods Pilferage and Theft Maintaining Channel and Supply-Chain Integrity Week 4 (Chapter 4) Managerial Issues in Logistics Theft and Pilferage Logistics Social Responsibility Managing Reverse Logistics Lessening the Impact of Terrorism on Logistics Systems Week 5 (Chapter 5) The Supply-Chain Concept Key Attributes of Supply-Chain Management Barriers to Supply-Chain Management Supply Chain Management and Integration Summary Case Study One: Read Case 5-1 â€Å"Johnson Toy Company†. Answer questions 1 to 8 (See assignment instructions posted). Your answers are to be submitted to the submissions icon before the end of the week. Week 6 (Chapter 6) Procurement Purchasing for Resale Procuring Services E-Procurement Quality Programs Purchasing Ethics Week 7 (Chapter 7) Demand Management, Order Management and Customer Service Order Management The Role of Logistics in Establishing Customer Service Levels Measuring and Controlling Customer Service Meeting Customer Service Demands Case Study Two: Read Case 7-1 â€Å"Handy Andy, Inc.†. Answer questions 1 to 8 (See assignment instructions posted). Your answers are to be submitted to the submissions icon before the end of the week. Week 8 (Chapter 8) Inventory Management Inventory Classifications Inventory Related Costs When to Order How Much to Reorder Inventory Flows Special Concerns to Inventory Management EOQ Mathematical Questions (See handout for assigned question). Your answers are to be submitted to the submissions icon before the end of the week. Week 9 (Chapter 9) Your copy of the take home test is located in the Lecture Tab for lecture 9. Distribution Centre, Warehouse and Plant Location Logistics Acronyms (See Acronyms Attachment) General Factors Influencing Facility Locations Finding the Lowest Cost Location Facility Relocation and Facility Closing Take Home Test Due: Your answers are to be submitted to the submissions icon before the end of the week. Week 10 (Chapter 10) Warehousing Management Public, Private and Contract Warehousing Design Considerations in Warehousing Warehousing Operations Week 11 (Chapter 11) Protective Packaging and Materials Handling Product Characteristics Packaging Unit Loads in Materials Handling Materials Handling Week 12 (Chapter 12) Transportation Small-Volume Shippers Large Bulk Shippers Project Cargo Oversized Moves Hazardous Materials Transportation Regulation and Deregulation Week 13 (Chapter 13 and 14) Transportation Management Rate Determination and Negotiation Rate Regulatory Bodies Documentation Loss and Damage Dumurrage and Detention Transportation of Hazardous Materials Consolidating Small Quality Case Study Three: Read Case 14-1 â€Å"Nurnberg Augsburg Maschinenwerke†. Answer questions 1 to 8 (See assignment instructions posted). Your answers are to be submitted to the submissions icon before the end of the week.

Sunday, October 13, 2019

The Department of Homeland Security: Technology

The Department of Homeland Security: Technology The statement: The Department of Homeland Security has complete responsibility for all U.S. homeland security related critical infrastructure (CI) matters is not entirely accurate; originally, matters of national security were the sole responsibility of the federal government (Homeland Security, 2003, p. 7). Today, national critical infrastructure protection is a joint effort among the federal government, public and private sectors. The Department of Homeland Security was established to protect and secure the homeland from both domestic and foreign threats. According to the Homeland Security Act of 2002, the development of a plan which will ensure the security of critical infrastructure is the responsibility of the DHS (Homeland Security, 2009). Likewise, the DHS is also responsible for recommending the measures necessary to protect the key resources and critical infrastructure of the United States (Homeland Security, 2009, p. 2). The mission of DHS is one that involves the protection of infrastructure and critical facilities and networks (Homeland Security, 2010, p. 33). The DHS is responsible for the identification and assessment of all components which make up critical infrastructure. In addition to mitigating potential vulnerabilities; improving the resilience of critical infrastructure, is also a top priority of the DHS. This includes but is not limited to: stand-alone facilities and interdependent systems and networks within and across critical infrastructure sectors (Homeland Security, 2010, p. 34). The DHS serves as the leader and facilitator for those agencies who share responsibility for protecting the nations critical infrastructures (Homeland Security, 2010, p. 31). Those agencies include territorial, tribal, local and state governments, as well as the private sector and other agencies not associated with the government (Homeland Security, 2003). Conversely, when a disaster occurs these agencies are the first line of defense for national critical infrastructures. Even though the DHS is responsible for leading critical infrastructure efforts, coordination of security measures within local and state governments and critical sector industry leaders are the responsibility of federal lead departments and agencies (Homeland Security, 2003). Similarly, it is the responsibility of state and local governments to provide protection to critical infrastructures that are located within their jurisdictions (Homeland Security, 2003, p. 10). If and when a catastrophic event should occur which exhaust the capabilities of local and state governments, it is up to the federal government to coordinate a response (Homeland Security, 2003). A majority of our nations critical infrastructures are privately owned or operated, which means that the private sector are initially responsible for providing protection against threats to their facilities (Homeland Security, 2003). When the threat becomes more than the private sector can handle then the government will step in to assist and ensure that our nations critical infrastructures and assets are protected (Homeland Security, 2003, p. 11). Likewise, the federal government will be there to provide support for an environment in which the private sector can better carry out its specific responsibilities (Homeland Security, 2003, p. 11). The chemical sector is one of the most vulnerable critical infrastructures to natural disaster and terrorist attacks, that being said the DHS is working with the EPA to enhance security at chemical facilities (Homeland Security, 2003). In addition, special attention is being paid to those facilities which house large quantities of hazardous chemicals (Homeland Security, 2003, p. 78). Studies conducted by the DHS and private sector are currently underway to identify and understand physical vulnerabilities within the telecommunications infrastructure and their associated risks (Homeland Security, 2003, p. 61). Even though the private sector must occasionally seek assistance from the DHS, there are times when the federal government must rely on the private sector to lend a hand in emergency response and recovery. An example of the federal government calling on the private sector for assistance was the anthrax scare of 2001. A large Washington D.C. construction corporation was contracted to oversee the abatement and restoration of the Brentwood Post office in Washington D.C. and the Trenton Post office facility in New Jersey. One must also understand that quite a few of our nations critical infrastructures cross international borders (Homeland Security, 2003, p. 35). Therefore the federal government has partnered with the neighboring countries to provide security for our interconnected infrastructures (Homeland Security, 2003, p. 35). The United States partnership with Canada is is a vital asset to national critical infrastructure, efforts are being made to provide protection for international interconnected infrastructures. An example of this partnership is the Alaskan Canadian hightway. In order to transport goods and supplies to Alaska we must travel cross Canadian territory. It is evident that matters of critical infrastrucutre involves not only the DHS but the public and private sectors as well. The DHS would not be able to carry out their responsibilites without the assistance of local and state agencies, the private sector and vice versa. The U.S. government has made great strides in developing techniques and strategies to harden U.S. critical infrastructures which will make them more resistant to terrorist attack and natural disasters. One of the U.S. governments goals is to establish a strong partnership that spans across all levels of government, in addition to the private sector and the American people (Homeland Security, 2009). The Protected Critical Infrastructure Information Program is just one of many steps taken by the U.S. government to harden critical infrastructure. This program provides protection to security-related critical infrastructure information (Homeland Security, 2009, p. 5). By breaking down each critical infrastructure sector it is easier to understand how the U.S. government has been successful in hardening each critical infrastructure. The agriculture and food sector is one of the most vulnerable critical infrastructures, that being said, efforts to harden this sector are an ongoing challenge (Mark Sauter James Carafano, 2005). The U.S. government has revised its measures by providing more protection through the hiring of more health inspectors, and adding more reporting requirements (Sauter Carafano, 2005, p. 291). Contamination of our nations water supply is often a topic of concern; efforts are being made by the Environmental Protection Agency as well as the Department of Homeland Security to conduct a vulnerability and threat assessment (Sauter Carafano, 2005). These assessments will improve not only site security at high threat locations it will also enhance monitoring and sharing of information (Sauter Carafano, 2005, p. 292). With regards to the critical infrastructure of public health the U.S. government has implemented measures to harden biomedical surveillance (Sauter Carafano, 2005). This is extremely important because of the risks of a biological attack. There have also been improvements in hardening security of emergency stockpiles of medical supplies (Sauter Carafano, 2005, p. 294). In order to improve the physical security of medical structures the U.S. government has provided incentives to the private sector (Sauter Carafano, 2005, p. 294). In response to hardening the critical infrastructure of emergency services the U.S. government has established measures to harden interoperable and redundant communication networks (Sauter Carafano, 2005, p. 295). The U.S. government has instituted a tougher national emergency preparedness exercise program which teaches better security and promotes consistent protection planning and response protocols (Sauter Carafano, 2005, p. 295). Since the defense industrial base critical infrastructure sector is owned by a majority of the private sector the U.S. government has implemented new measures to include critical infrastructure protection requirements in contract processes (Sauter Carafano, 2005, p. 296). Likewise, security is being strengthened in the defense related commercial production and distribution processes (Sauter Carafano, 2005, p. 296). The telecommunications critical infrastructure has been assessed by the U.S. government, and in return a program has been designed to identify where the most vulnerable areas are in the communication architecture and then address the security issue (Sauter Carafano, 2005). Conversely, there have also been efforts made in the energy critical infrastructure sector to enhance resilience of the energy facilities (Sauter Carafano, 2005, p. 298). Facility equipment is being repaired and replaced and there have also been improvements in restoration and recovery of services (Sauter Carafano, 2005, p. 298). Significant improvements have been made to harden the transportation critical infrastructure sector; for example, security initiatives have been established to provide commercial airliners with protection from shoulder fired missiles (Sauter Carafano, 2005, p. 299). There have also been new developments in screening technology which help identify potential threats to transportation as well as aiding the postal service sector in identifying suspicious mail (Sauter Carafano, 2005, pp. 301-302). Despite the many efforts being made to harden critical infrastructure, there are still several weaknesses in the U.S. governments strategy. Lets face it, the only other thing that is more costly than hardening critical infrastructure is the disruption or potential loss of operations in those critical infrastructures. It is clear that trying to harden all critical infrastructures is too daunting of a task and is not cost effective. The U.S. government needs to focus on those areas of the United States where our critical infrastructures are most vulnerable (e.g. New York City, Los Angeles, Washington D.C. etc.). The federal government also needs to look at the protection of our nations water ways. Information security systems need to be deployed to guard the locks on the Mississippi and St. Lawrence seaways (Bruce Don David Mussington). By employing an information security system it will enable the monitoring of vessels and ships while in locks or approaching locks (Don Mussington). To provide another level of security, river marshals could be deployed to accompany dangerous shipments through the locks (Don Mussington). Many people dont realize that a large majority of our nations goods are transported through inland waterways, which is why it is important that more attention be paid to the transportation sector.

Saturday, October 12, 2019

What is Courage? Essay -- Definition Courage Corageous Essays

What is Courage? What is courage? Is it the ability to prove yourself in war? Or the strength it takes to decide you will not fight? Is courage being yourself when you’re different from everyone else? Is it doing something that even your own father thinks you can’t do? Is courage synonymous with honor? Is it speaking up, even if doing so puts you in danger? Risking death for the person most precious to you? Or risking death for strangers? Is courage facing your fears, no matter how big or small they might be? Is it forging forward into a new life when you still miss the old one? Is courage all of these things? None of them? The following text set is designed to help ninth grade students create and examine their own definitions of courage. In addition to asking, â€Å"What is courage?† it also lends itself to the question, â€Å"Where do our conceptions of courage come from?† Courage is the focus of this text set because it is a theme that is prevalent in American society. To be courageous is considered a positive quality, but the examples of courage most often seen in the news and in history books are often narrowly defined. Students need to think more deeply about what courage really is, and to get inside the minds of so-called â€Å"courageous† people and learn about their motivations and their fears. Students will be asked to consider a wide variety of characters and situations, all of them potentially courageous, but more in depth focus will be placed on three specific categories. The first is courage during war or revolution, beyond the stereotypical portrayal of th e one-dimensional â€Å"war hero.† The second is the courage to be different from your peers or to voice your opinion even if it’s not a popular one. T... ...are designed to help them with this difficult task. By reading and thinking about a variety of possibilities of what courage is, students can both expand and come to a better understanding of their own beliefs on the subject. Through class discussions and writing activities, they can also share these beliefs with others. Works Cited Brozo, William G. and Ronald V. Schmelzer. â€Å"Wildmen, warriors, and lovers: Reaching boys through archetypal literature.† Journal of Adolescent and Adult Literacy 41 (1997): 4-12). Feinberg, Barbara. â€Å"Reflections on the ‘Problem Novel.’† American Educator Winter 2004-2005. 13 Apr. 2005. . Wolf, Shelby A. Interpreting Literature with Children. Mahwah: Lawrence Erlbaum Associates, Publishers: 2004.

Friday, October 11, 2019

Work Related Learning By Blended Learning Education Essay

Today, it is widely accepted by universities and employers that those pupils who gain work experience and maximize their acquisition from it are lending strongly both to their surveies and to their employability. This faculty will supply you with the chance to critically measure your working patterns in footings of direction manner ; leading ; alteration ; and working relationships and associate these to your ain experiences with a position to informing your personal development and your future calling.1.1 Module purposesThe purposes of the faculty are to enable pupils to: – addition maximal personal development benefit from their work experience through a series of brooding and peer acquisition activities ; – measure their work experience in footings of their subject particular cognition to widen their apprehension of the concern universe application of their schoolroom surveies.2.0 Learning results of the faculty2.1 Knowledge and UnderstandingSuccessful pupils will typically: critically assess direction manners and leading and how this affects the person in the workplace ; analyse barriers to and effectual patterns in constructing working relationships ; apply theoretical accounts of brooding pattern for personal development ; appreciate alteration, its beginnings and impact.2.1 Skills and PropertiesSuccessful pupils will typically be able to: reflect critically on ain acquisition and accomplishments in relation to personal and calling development ; demonstrate good developed societal and movable interpersonal accomplishments. critically observe direction manners and leading with a position to informing ain hereafter pattern.3.0 What learning methods are used on this faculty?The faculty is delivered through seminars delivered locally and through a one-hour hebdomadal presentation supported by Powerpoint slides and explanatory notes, posted up on StudyNet. The talks introduce you to theoretical tools and constructs together with practical direction illustrations. You are expected to develop your apprehension of both theory and pattern by independent reading and self contemplation utilizing the broad scope of e-book and electronic diary resources referred to in the talk and seminar support notes. These resources can be accessed through your StudyNet portal. Seminars will take topographic point locally each hebdomad associating to a unit of acquisition. In progress of each seminar, pupils will utilize the information provided in this faculty usher and subsequent updates to place the relevant unit and seminar stuff and prepare replies in progress to the inquiries scheduled for treatment on the twenty-four hours. Students will work through the electronically available readings developing their ain responses to the seminar treatment inquiry by using the theoretical cognition and practical apprehension they have gained through survey of employment patterns, relevant talks and readings. When they arrive at the seminar, the local coach will ease their treatment of the seminar inquiry. It is expected that different ways of replying each inquiry will go apparent. Through this experience, pupils are expected to intensify their apprehension of the cardinal function played by arguments and dissensions in the procedure measuring issues. Students are active participants and subscribers to the faculty and its success. They are required to go familiar with the content of the chief texts and to research and read around the topic as the faculty progresses. Seminar readying is an indispensable portion of the acquisition procedure and pupils should anticipate to pass several hours in readying for each hebdomad. They are required to pull on cognition of their work experience and from other concern subjects whilst developing their apprehension through researching administrations, industries and instance surveies of emerging factors. As the faculty develops, through their active engagement, pupils should derive some consciousness of how the pupils and staff may be viewed as a acquisition system and develop self-reflective accomplishment set.Faculty agendaThe faculty is divided into 11 units of acquisition ( hebdomad 12 should be used for contemplation and alteration ) . For each unit of larning the followers will be supplied: Materials aˆÂ ¦aˆÂ ¦aˆÂ ¦these will be a series of electronically available readings with narrative adhering the readings together in chase of the acquisition results, selected chapters from e-books with associating narrative. Presentation aˆÂ ¦aˆÂ ¦..this will represent up to one hr of ‘lecture ‘ which will probably utilize PowerPoint slides with a voice over. These may be enhanced by the usage of picture cartridge holders, intelligence infusions and web based stuff Seminar aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.this will include a series of seminar subjects which you are required to fix to reply in the seminar. The local coach will move as a facilitator and advisor to the seminar. Activity aˆÂ ¦aˆÂ ¦aˆÂ ¦..this is extra to the seminar and will be used to look into for pupil cognition and apprehension. Detailss of these will be linked to each larning unit and will be released each hebdomad. It will be used to look into pupil cognition and apprehension.Module agenda – Unit of measurements of LearningPresentations in the signifier of talks will give an overview of a learning unit. Seminars will research subjects in greater deepness and concentrate on the subjects given below. This will include ; reenforcing cardinal constructs and theories ; comparing different positions and reexamining theoretical and empirical stuff that may be applied to your work topographic point experience. The accent in seminars is on pupil engagement and the treatment will be based on the readying and reading that has been undertaken by pupils. All talks and learning stuffs will be on StudyNet. Any notices, proclamations or alterations of agreements will be posted on StudyNet and hence the site must be checked on a regular footing.5.0 Weekly programmeThe faculty unit subjects are listed below. Module units: Introduction Contemplation Administrations – Structures, Forms and Processes Management and Leadership Teams Organizational Change Pull offing Change Pull offing Conflict Coaching Giving and Receiving Feedback Career Development The hebdomadal Learning Materials ; Presentations ; Seminars ; and Activities will be produced in due class.5.0 Assessment DetailssThe intent of the appraisal for this faculty is to prove whether, and to what extent, you have reached the acquisition results for the faculty. It is of import that you know early what the appraisal diet is and what is expected of you. Assessment standards stipulate what it is that you will be assessed against, and what, in general footings, you will necessitate to show in your assessed work in order to accomplish the specified classs. The appraisal for this faculty is 100 % coursework-based. It consists of two pieces of coursework ; an separately prepared study ( 70 % ) and an individually presentation ( 30 % ) .a ) Assignment 1 – Report ( 70 % )Individually, you are asked to fix a written study of 3,500 words showing an consciousness of the cognition, accomplishments and experience envisaged of a recent alumnus from this programme to come in an country of graduate employment. The research and self-reflection required to fix the study will back up you in your future calling planning and determinations and the passage to future chances after your undergraduate surveies. The overall purpose of the assignment is to supply you with the chance to: demonstrate consciousness of the different types of alumnus chances i.e. alumnus preparation strategies, professional callings, chances with Small and Medium size Enterprises ( SME ) etc ; provide grounds of how to research these chances i.e. resources available and contemplation on the usage of these ; develop an consciousness of the accomplishments, cognition and experiences Graduate Employers are looking for and how these are altering ; show the function of ego consciousness and contemplation in Career Development activities ; fix a CV /covering missive as a generic calling direction tool to take you frontward during your calling ; develop a clear Career Development Plan as a consequence of sing your current cognition, accomplishments and experiences against the demands you have researched. You will have farther information sketching the demands of the assignment along with back uping resources, one time the faculty starts. There will be hebdomadal online treatment on the appraisal as the subjects of the faculty are explored ( and linked to the appraisal ) . The study should include the undermentioned subdivisions: Section 1 – Occupational Research ( about 50- 60 % of word count ) . The first subdivision of the study should be as a factual contemplation of the findings from the business or country of graduate employment you have chosen to research. This should be written in the 3rd individual and include full â€Å" Harvard referencing † to all beginnings of information used ( inside informations of how to cite all types of resources is available on the Academic Skills Unit site in the ASU Guide to Harvard Referencing – see StudyNet ) . The undermentioned headers should be used this subdivision: Footings of mention – What are you puting out to research and study on i.e. Graduate chances in the Tourism sector Methodology – How did you near transporting out your research? What beginnings of information did you utilize? Include both secondary resources i.e. studies, web sites, employment statistics, company literature ; and primary research ; talking with current alumnuss, reaching employers. ( Note: You are required to finish and subject the Graduate Employment Resources checklist as an appendices to back up this subdivision ) Main Findings – this should include the cardinal information sing this business or country of employment in footings of: General Employment trends in this sector / business: the employment market by and large in this country, recent developments, predicted future tendencies. Opportunities for recent alumnuss – what administrations are enrolling alumnuss in this country of employment? What types of function would a recent alumnus be making? Where are they advertised? The accomplishments / cognition and experience required – a drumhead based on research of a lower limit of 6 different administrations of the cardinal accomplishments / cognition and experience expected from an applier at this phase in their calling How are graduates selected in the administrations you have researched? – what are the enlisting and choice methods being used? How are you expected to show your accomplishments / cognition / experience? Graduate Employment Resources checklist – you are asked to finish this papers ( available on faculty site ) , to show that you have reflected on the value of the different resources used during your research. This will be utile for you when you do farther research related to your calling planning in the hereafter. You should finish this at the terminal of your research and before get downing subdivision 2 Section 2 – Personal analysis, CV / Covering missive readying, â€Å" spread analysis † , and Career Action program – this subdivision is where you look at your current accomplishments, cognition and experience against those highlighted by your research in subdivision 1. This portion of the study should be written in the first individual as it is a personal contemplation. The suggested headers to be used in this subdivision are: Personal analysis – a general reappraisal of your current accomplishments, cognition and experience, foregrounding in peculiar those that came up in your research. CV & A ; Covering missive – Preparation of a CV and covering missive to use for a alumnus degree place in the country of your research, based on your current state of affairs. Gap Analysis – this subdivision is where you look at your ain personal analysis against the demands identified in your research. The purpose is to foreground countries to concentrate your personal development about. Reflect on the undermentioned countries: what countries do you miss grounds in? where do you necessitate farther illustrations / grounds in your applications? Where do you experience weak in your overall application? Career Action Plan – Once you have identified the countries you need to concentrate on, you are asked to fix a Career action program which addresses both the personal development and specific calling related activities you will set about to take you frontward. This should be written out in full i.e. a paragraph on each country in the first individual, and you should explicate the actions and what you hope to derive from them. This should include the cognition, accomplishments and experiences you need to foster develop i.e. commercial consciousness ; and specific activities to back up you through the choice procedure i.e. interview accomplishments, doing presentations etc. Both through your ain research, and utilizing the information heard during the talk Sessionss about resources and support available, you should come up with clear actions with timescales. You should demo the resources you will utilize to travel the country of development forward and the timescales you will fi nish these in. A drumhead papers should be attached as an appendix. Conclusion – written in the first individual, a brief contemplation on how you feel holding completed the overall exercising, and how you intend to utilize the Career Action Plan. Section 3 – Mentions and bibliography – see Academic Skills Unit Report Writing guide notes and Harvard citing papers for counsel. Both are available on StudyNet.

Thursday, October 10, 2019

Apple, IT and. The Specter of Sweatshop Labor Essay

Apple INC               Apple Company has been in business for more than 40 years designing, manufacturing and market mobile communication and media devices and portable digital music players (Hitchcock, 2011). Apple markets a number of software and a number of networking solutions. Apple is the definition of new and advanced technology. They deal with a range products from music player; IPad, mobile devices; IPhone computers; Mac, television and business and personal software. Their products are distinctive and mostly preferred by an enormous number of customers. Their market base extends globally. Apple products are unique and are identified with their brand name and a picture of an apple fruit. Apple offers support for their products that operate on their internally designed software. Their products are well equipped with modern technology and designed to meet clients’ expectations and needs.               In the modern world, technology dictates our day to day lives. A few decades ago, mobile phones were owned by specific few and mostly used for business. Today mobile phones are used for both personal and business activities. Phones are a sense of direction, communication and a friend to humanity. Apple products have a distinctive nature and a stratified class not owned by many.               IPhone, a product of Apple, is a phone preferred by many abroad and locally. The nature of the phone is designed to operate and meets people daily needs. iPhone is beautifully made mobile device that combines a number of functions. iPhone functions as a communication platform, a digital music player and for internet communication. iPhone features range from communication platform, the internet net work platform, and entertainment. iPhone has a multi-touch user interface, web browsing, PC based email platform and is integrated with other window based computers. iPhone serves as an entertainment platform, integrated with iTunes libraries where one can download music, video clips, software and other application. The phone has different versions with various and advanced technology ranging from iPhone 1 to the recent Apple design iPhone 5 the latest version of iPhone. Apple offers support when it comes to iPhone with their online accessories compatible with thepho ne. The phone is a remarkable piece and appealing to the eye.               Another distinctive product of Apple is the iPad. IPad is a product characterized by entertainment and internet communication. Some of the features of iPad include; music player, a platform for downloading music, video clips and software, web browsing and an email platform. Just like iPhone, iPad is also compatible with window based computers and also Mac range of computers; products of Apple. Ipad has touch user interface and ability to download music, photos, and video clips. Ipad enables people to connect with their applications in more friendly way. The device is both used for running personal errands and business activities. The friendliness of the device enables people of all age ease in using the device. Children prefer ipad since its compatibility with different variety of games, online and offline. Ipad has different versions with their latest fourth-generation iPad mini.                Apple products have distinctive nature of the ‘I’ before their products is their original trademark and other features not found in many related technological devices, a beautiful structure friendly to humanity with their portability feature and remarkable service constituted with support system by the Company.                  The two key external factors affecting Apple Company are increasing completion from companies offering mobile, computer, tablets and television devices and international legal disputes. For many years, Apple has been the leading innovator when it comes to technological devices followed closely with their leading competitors. Microsoft has been the leading competitor of Apple for many years and set up their devices accordingly. Microsoft, the designers of widows based platforms, are the biggest rivals Apple when it comes to computers and tablets applications. Microsoft latest design of Windows 8 is increasingly threatening Apple domination of tablets application. Windows 8 comes with a designed app store a feature which was only evident in Apple line of tablets. This real completion for Apple and might turn out to be a catastrophe for Apple company. Widows’ app store offer varieties that are bad for business for Apple INC.                  Windows phones were also a big competition for Apple Company but recently Google has set up and surpassed widows. Google Android operating systems and Android line of phones are now the main competitors for Apple iPhone and operating systems. The market base for Android products is threatening Apple market base for iPhones and operating systems. Google recent development, of purchasing Motorola, is a big problem for Apple because of Google huge manufacturer of mobile devices. Another development of Google threatening Apple is their new design of home theater systems of Televisions partnering with Sony and Samsung Companies.               The second critical external factor affecting Apple Company is continued international legal disputes around the world. Apple being the leading innovators for their line of products makes them be the hunted and not the hunters. One of their going international legal disputes is the ongoing co-wireless licensing patent lawsuit. Co-wireless licensing patent an ally of Microsoft is suing Apple for wireless patents. If the lawsuit were to go through, this would be a huge blow for Apple since most of their products operate on a wireless network.                Apple is also facing another international legal dispute following claims that Apple purchased iPad trademark illegally. With their distinctive feature of their products starting with an ‘i’, this lawsuit could turn out to be a catastrophe for the company disrupting the flow of Apple tablet market share. These legal disputes are bad for business for the Apple Company and if they were to go through it could mark the end of the leading innovators Apple INC.                  Stakeholders in an organization include customers, employees, the entire community, suppliers and the business partners. Customers and the community are the key stakeholders in the success of an organization. Satisfied customers and the whole community lead to real business. Primary stakeholders affect an organization mostly financially. Primary stakeholders include shareholders, employees, and suppliers.                Primary stakeholders contribute to an organization’s environmental risks that impact negatively on financial performance of an organization. For example, the lawsuit affecting Apple INC, are environmental risks facing the company as a result of the Company’s management decisions and employees contributions.                Managing risks are also caused by executives of the company whole and poorly having in my mind that stakeholders are on their side contributing to financial problems. Management of an organization are the building blocks of a company and how they operate or run business affect the firm directly and reflect on the finances of the Company. Apple Company operates under a strict management and a no-nonsense leader.                  Inadequate participation of employees may contribute to poor financial performances. Pressure from the employees is evident on how a firm performs (Henriques and Sadorsky, 2007). Steve Jobs exact pressure on his employees and many consider him a tough leader; as Apple continues to record profits in their financial reports.                Another factor that affects financial performance of an organization is the structure and working of an organization. Apples leadership under Steve Jobs who was very strict when it comes to the Company’s performance and does not take any incompetence from the employees lightly. Apple Company has a well-structured supply chain management that coordinates its suppliers, the operations of the organization and the customers. This coordination by Apple and its business partners ensures smooth operations in the Company eliminating possibility of registering loses.                Labor practices are a controversial corporate social responsibility concern associated with Apple. Apple has been accused of overworking its’ employees following recent speculations from two supplier shops in China known as Foxconn and Inventec. Media recorded that; workers in these Companies are forced to work long hours and are underpaid. In addition, they are forced to live on the premises of these Companies where they have to pay rent and other expenses from the little they earn from the Company. This has raised debates over Chinese labor regulations and whether it is entirely Apple’s fault of Foxconn fault. Apple continues to defend their reputation by claims that they uphold acceptable working standards (Ericka, 2008). References Morphy, Ericka (January 31, 2008), â€Å"Apple, IT and. The Specter of Sweatshop Labor,† Mac New World Christina Hitchcock, (Oct,11,2011). â€Å"Apple, Inc. Mission Statement, Business Description, and (n.d.).† Retrieved from http://christinaahitchcock.com/?p=102Brayden King (Mar, 4, 2013).â€Å"Managing the Reputational and Market Risks of Social Activism† Retrieved from http://insight.kellogg.northwestern.edu/article/managing_the_reputational_and_market_risks_of_social_activism/Peter, muller. (Apr 8, 2012). â€Å"External Factors. affecting AppleInc† Retrieved fromwww.youtube.com/watch?v=2sOdHonN8jQ Source document

Ethics and Behaviour in War-related Activity Essay

The use of military force, whether within a country or against a foreign target, is guided by two prominent principles. Jus ad bellum (right toward war) helps in determining whether the situation justifies a military response or whether there exist non-violent alternatives. Jus in bello governs the execution of military operations at whose heart are discrimination and proportionality. Military attacks should be aimed at the right targets and civilian deaths should be avoided as much as possible. The weapons or force used in the attack should also be proportionate to the threat, so that it would be unethical to destroy a whole city if the aim was to eliminate a dozen terrorists hiding in one building (Cook, 2001). Many wars, and particularly the ongoing ‘War Against Terror’ have seriously challenged the principles of warfare, forcing the U. S. troops to use what has been described as excessive force against suspected enemy combatants and many civilians. This paper sheds light on conditions which justify such behaviour in war. Justification for aggressive behaviour in the War Against Terror Acts of terrorism are perpetrated by individuals or groups who hold hard-line ethnic, cultural, or religious positions, and who obey no national or international war agreements or principles. Terrorists largely target civilians and civilian structures with the aim of causing indiscriminate harm and violence. Combat troops participating in the war against anti-US hardliners in Iraq and Afghanistan have been accused of flouting ethics of war for engaging in activities which have been regarded as too aggressive and unethical. It is important to note that members of terrorist cells or groups are not state agents and are mostly non-uniformed, making it difficult to distinguish them from civilians. In order to enjoy the protection ideally accorded to civilians, the combatants hide among civilians. When U. S. troops capture a suspect, they are forced to use force to get information from the suspect as they have no other way of telling whether the suspect is actually a terrorist or not. In societies where combatants or terrorists hide among civilians and hurt the same civilians, and others elsewhere, use of force is justified â€Å"primarily to remove dangerous people from society (domestic or international)†¦and to send a message to other potential criminals that such behavior will not be tolerated† (Litchenberg, 2001). The aim of the war on terror is not much to apprehend and try perpetrators in law courts as to directly eliminate as many terrorists as possible (Cook, 2001). The fact that there have not been any other major terrorist attacks in the U. S. since 2001 suggests that the country has made some achievements in deterring such attacks, thereby justifying the means used. Terrorist operations are funded from many sources, among them legitimate governments. While many of the sponsoring organizations are known, there exists the serious difficulty of proving in a court of law that these individuals, groups and governments actually fund and harbour terrorists. When such suspects are captured, military topguns appreciate the difficulty of proving the association between such people and terrorists in a court of law yet know that releasing the suspects allows them to support more terrorist activities in future. Such situations necessitate the indefinite incarceration of suspects in such places as the Abu Ghraib and the Guantanamo Bay where the military, and not the US law reigns supreme. Although such confinement may be deemed unethical, it justifies the end of ensuring that the suspects are not released to sponsor more crimes against innocent civilians. Conclusion. The U. S. campaign against terrorists in Afghanistan and Iraq has been unlike many wars before. The U. S. and her allies are engaged, not in retaliatory military action but in pre-emptive military crusade. The circumstances surrounding the war have driven the combat troops to take actions which have been regarded as unethical. However, careful analysis of the situation in the two countries, and the behaviour and operations of the terrorists reveals that the troops have no option but to take the same actions if they hope to win the war against terrorists. That terrorists follow no ethical codes strengthens the argument for such behaviour among the anti-terrorist troops. References Cook, M. (2001). Ethical Issues in Counterterrorism Warfare. US Army War College. Retrieved March 26, 2010, from http://ethics. sandiego. edu/Resources/PhilForum/Terrorism/Cook. html Litchenberg, J. (2001). The Ethics of Retaliation. Philosophy & Public Policy Quarterly, Vol. 21, No. 4: pp 4-8.

Wednesday, October 9, 2019

A Critical Review of the Use of Dogs in the US Army During the WWII Essay

A Critical Review of the Use of Dogs in the US Army During the WWII - Essay Example In the past, the main of role of trained dogs was that that of sentries or patrols. But in modern warfare, dogs had been used the most tactfully. Though in post modern warfare, dogs’ role has mostly been replaced by modern technology, they played a crucial role in the US Army during the Second World War (Blumenstock pars. 2). After the attack on Pearl Harbor Navy Base in December 7, 1941, the US Army led a campaign to inspire the pet-owners to donate their dogs to the army-training camps. The US Army named this campaign as â€Å"Dogs for Defense†. In order to inspire the owner, they further claimed that the dogs would be trained to be accustomed into civil life after the war. Indeed, it was the beginning of the dog-squad in the US military. Subsequently, martial dog training programs were adopted and, in the meantime, a number of dog-training centers were established to facilitate the programs around the country (MWD History, pars. 2). Some of the dog-training centers w ere Gulfport, Fort Carson, Rimini, San Carlos, Fort Washington, Fort Riley, Fort Belvoir, Fort Robinson, Nebraska Camp, Beltsville, etc. During the Second World War, the US Army used dog to perform a number of risky as well as routine jobs. According to the types of breed and performance, the dogs were to be sled dogs, sentry, scouts, mine-detecting dogs, wire-layer, pack-pullers, and messenger dogs. The military training of a dog used to take 8-12 week to be fully trained. By late 1944, the Army selected about seven breeds of dogs to receive the highest performances in war-fields. Among these breeds were German Shepherd, Doberman Pinscher, Collie, Belgian Sheep dog, Eskimo, Alaskan Malamute, Siberian Husky, etc. During the Second World War, the German Shepherd was the most preferred choice in the army because of its courage, strong sense of responsibility, keen nose, strength, adaptability and trainability. Doberman Pinscher was second to German Shepherd in terms of strength, nervo us power, speed, sensing power, and tractability. Collie and Belgian Sheep dogs were mainly used as messengers for their loyalty, alertness, endurance and agility. Muscular and sturdy breeds were generally used for pack-pull and wire-laying jobs. Alaskan Malamute, Eskimo and Siberian Husky belonged to this group. Among these three breeds, Siberian Husky was the most desired type because of their speed and endurance. During the war, the US dog-squad’s performance was surprising (Blumenstock pars. 2-4). Due to their high sensibility, loyalty and alertness, the military dogs were the preferred options for the soldiers in many war fields. There were many fields where dogs were more skillful performers than the soldiers. During the WWII, the war-theater-wise performance of the US military dogs was great. The dogs showed great performances mainly in two theaters: the pacific theater and the European theater. In 1944, under the command of William W. Putney, the â€Å"3rd Marine War Dog Platoon† played a crucial role in the liberation of Guam from the Japanese occupation. According to the MWD, approved and led by the US Congress, â€Å"Twenty-five of Lieutenant Putney's war dogs gave their lives in the liberation of Guam and were buried there in a War Dog Cemetery with name markers† (MWD History, pars. 2). In the war-field of Guam, the Doberman Pincers breed showed a great performance in guarding and scouting along the frontline of the war. Evading the enemies’ eye, they successfully worked as messengers between the US camps. Several of the success stories are as following: In February 17, 1945, a war-dog called Bruce saved two wounded soldiers from the attack of three Japanese infantrymen. During the nocturnal

Tuesday, October 8, 2019

E-Business and Value Chains Essay Example | Topics and Well Written Essays - 2000 words

E-Business and Value Chains - Essay Example Thus, according to Post & Anderson (2003), e-business is a general term that encompasses business that is done using electronic means and it is increasingly being regarded as a valuable tool for organisations in conducting their business during the contemporary period. As such, this report seeks to critically analyse the extent to which the internet has impacted on the operations of PC World Business through implementation of e-business strategy such as e-marketing. The report focuses on impacts of e-marketing on PC World Business and attempts to address the following issues: 1. How has the organisation’s business changed with the development of the internet? 2. What new opportunities have been there for the organisation to create additional customer value? 3. Assessment of the strengths and weaknesses of the organisation’s current use of ICT tools to support the organisations overall business offering. 4. Suggestions about e-business strategy improvements and alternative ICT tools which could be used to create greater customer value or to help differentiate the organisation from competitors. 1.0 Changes made by the internet to PC World Business According to its official website, (http://www.pcwb.co.uk/, ND) PC World Business was founded in 1991 and it is a computer organisation which is based in the UK and it deals with selling different types of PCs including notebooks, laptops, printers and desktops. The organisation offers a lot of products that are related to information and communication and the use of the internet has significantly contributed to its performance as going to be discussed below. The internet has immensely contributed to the way PC World Business collects, stores and processes information which has significantly impacted on its e-commerce activities. The internet has greatly improved employee performance as well as the company’s marketing strategies used to reach the customers. Through the use of the internet, it can be noted that the customers now have the ability to evaluate products offered while marketers on the other hand are also aware of the impact of new information and communication technology on the way they carry out their business (Robinson, 1997). The internet therefore has a dual impact which is beneficial to both the customers and the organisation. The use of the internet at PC World Business has greatly improved the performance of the employees and the organisation as a whole. Research has shown that that the sales for PC World in 2004/5 were ?1,695 million but they have increased to more than ?2, 000 in 2008 owing to developments in their e-marketing strategies (http://www.pcworld.com/, N.D). Information gathering about the customers has been made relatively easy and it can be processed at a faster speed in order to meet their needs and this is regarded as a basic tenet of marketing. Traditionally, the organisation has been conducting its business using postal services to do all business but due to technological advancements especially as a result of the advent of the internet, it is now possible to conduct any business online where customers can place their orders online at any given time and it is possible to access feedback for 24 hours a day. The organisation now uses a specially designed website which enables the marketers to interact directly with the customers given that a two way communication channel is enhanced and it is also easy to get feedback from the customers. The internet has made it possible for the marketers to obtain first hand information from the customers about their needs hence it