Saturday, November 30, 2019

The Matrix short analysis Essay Example For Students

The Matrix short analysis Essay My favourite film is The Matrix because it is a great all round film the special effects are absolutely brilliant but so is the plot, normally we either have the pleasure of great special effects or a plot, not both of them together, but this film has definitely pulled it off. The matrix is quite a complex film to understand, especially for people who have trouble understanding most films, but I found that if I thought about it, I got it alright. The film will put you into so many different situations quite suddenly which really makes you feel as though you are truly part of the film. We will write a custom essay on The Matrix short analysis specifically for you for only $16.38 $13.9/page Order now Ill start off by explaining what the films about, the matrix is a computer generated world, the world that we live in created by electronic monsters. Humans are merely batteries for them, but the world we live in is created to make us happy. Humans are grown in some sort of cells until ripe for power! The actual story to the matrix is that humans have created a world of technology that they cant control and the technology has taken over, wiping away the world, hence the computer generated one. Then we are introduced to neo (keanu reeves), a computer hacker in his spare time who soon realises that the fbi are interested in him. He is then taken by morpheus (Lawrence Fishbourne)n and is introduced to the Matrix and the technology surrounding it. Morpheus trains Neo with a variety of different training programmes to make him able to cope with the new found world. Neo soon finds out that Morpheus thinks that he is the one who can save the world and battle against the technology that has been created. Neo doesnt believe any of this, but begins to towards the end of the film. Im not going to try and explain any more of this film but I love a film with a good story line and the right amount of action which this film pulls off. The special effects used in this film are absolutely mind blowing. In one scene, and probably the most famous scene, Neo dodges bullets and you see it all in slow motion as the bullets fly past him, also the helicopter scene was absolutely amazing. It all looks real, thats the thing that got to me. Normally in a film, you can tell that its special effects and you dont think too much of it, apart from the usual oh they were good special effects. However, in The Matrix, the special effects are so good, you cant actually see any signs of special effects and if you didnt know they were special effects then you wouldnt know they were. There is also a good soundtrack to the film which adds to the films brilliance. I generally enjoy action films but this is a whole new genre of filming and special effects and a mind bending plot that really does make you wonder. Is the world as we know it controlled by machines, are we kept happy for something we dont know about, what is this world all about and also, is that spoon your holding really there or is it a figment of your imagination?

Tuesday, November 26, 2019

Free Essays on Aids In The African American Community

AIDS (Acquired Immune Deficiency Syndrome) is a condition thought to be caused by a virus in which the body’s white cells lose their ability to protect against infections. AIDS was first reported in the United States in 1981 and has since become a major worldwide epidemic. AIDS is caused by the Human Immunodeficiency Virus (HIV). HIV progressively destroys the body's ability to fight infections and certain cancers by killing or impairing cells of the immune system. Individuals diagnosed with AIDS are susceptible to life-threatening diseases called opportunistic infections, which are caused by microbes that usually do not cause illness in healthy people. More than 600,000 cases of AIDS have been reported in the United States since 1981, and as many as 900,000 Americans may be infected with HIV. The epidemic is growing most rapidly among minority populations and is a leading killer of African-Americans. According to the U.S. Centers for Disease Control (CDC) AIDS is six times higher in African-Americans than among whites. African-Americans make up 12% of the United States population, yet 47% of all AIDS cases are African-Americans. This is obviously a disproportional relationship. The CDC also says that whites make up 71% of America’s population; however, only 32% of all AIDS cases involve whites. The CDC also says that over 65% of all pediatric AIDS cases are black children. Without continued study and analysis of the current crisis, the epidemic will surely worsen. The population of African Americans living with AIDS has been increasing, due largely to the availability of more effective treatments but also due to the increasing impact of the epidemic on minorities in the U.S. Estimated AIDS prevalence among African Americans increased by 150% since 1993, compared to a 68% increase among whites. In 1998, the number of African Americans estimated to be living with AIDS surpassed that of whites for the first time. Advances in t... Free Essays on Aids In The African American Community Free Essays on Aids In The African American Community AIDS (Acquired Immune Deficiency Syndrome) is a condition thought to be caused by a virus in which the body’s white cells lose their ability to protect against infections. AIDS was first reported in the United States in 1981 and has since become a major worldwide epidemic. AIDS is caused by the Human Immunodeficiency Virus (HIV). HIV progressively destroys the body's ability to fight infections and certain cancers by killing or impairing cells of the immune system. Individuals diagnosed with AIDS are susceptible to life-threatening diseases called opportunistic infections, which are caused by microbes that usually do not cause illness in healthy people. More than 600,000 cases of AIDS have been reported in the United States since 1981, and as many as 900,000 Americans may be infected with HIV. The epidemic is growing most rapidly among minority populations and is a leading killer of African-Americans. According to the U.S. Centers for Disease Control (CDC) AIDS is six times higher in African-Americans than among whites. African-Americans make up 12% of the United States population, yet 47% of all AIDS cases are African-Americans. This is obviously a disproportional relationship. The CDC also says that whites make up 71% of America’s population; however, only 32% of all AIDS cases involve whites. The CDC also says that over 65% of all pediatric AIDS cases are black children. Without continued study and analysis of the current crisis, the epidemic will surely worsen. The population of African Americans living with AIDS has been increasing, due largely to the availability of more effective treatments but also due to the increasing impact of the epidemic on minorities in the U.S. Estimated AIDS prevalence among African Americans increased by 150% since 1993, compared to a 68% increase among whites. In 1998, the number of African Americans estimated to be living with AIDS surpassed that of whites for the first time. Advances in t...

Friday, November 22, 2019

All About Mettre - Irregular French Verb

All About Mettre - Irregular French Verb Mettre, which means to put, is one of the most common French verbs. It is irregular in conjugation and is found in a number of idiomatic expressions.Using mettreMettre means to put:  Ã‚  Ã‚  Jai mis les livres sur la table.  Ã‚  Ã‚  I put the books on the table.  Ã‚  Ã‚  Il faut mettre sa famille avant son travail.  Ã‚  Ã‚  You have to put your family before your work.  Ã‚  Ã‚  Mettez les mains en lair.  Ã‚  Ã‚  Put your hands in the air.  Ã‚  Ã‚  Il veut mettre de largent dans votre affaire.  Ã‚  Ã‚  He wants to put money into your business.Mettre has various other meanings as well.1. to put on  Ã‚  Ã‚  Tu dois mettre un pull.  Ã‚  Ã‚  You need to put on a sweater.2. to spend time on  Ã‚  Ã‚  Jai mis deux semaines le faire.  Ã‚  Ã‚  I spent two weeks doing it.3. to turn on, activate  Ã‚  Ã‚  Peux-tu mettre la radio  ?  Ã‚  Ã‚  Could you turn on the radio?4. to suppose  Ã‚  Ã‚  Mettons quil a raison....  Ã‚  Ã‚  Supposing / Lets just say that hes ri ght....Mettre noun infinitive means to put something up/out/on to do something:  Ã‚  Ã‚  Jai mis de leau bouillir.  Ã‚  Ã‚  I put some water on to boil.   Ã‚  Ã‚  Il doit mettre le linge sà ©cher.  Ã‚  Ã‚  He has to put (hang) the laundry up to dry.Se mettreSe mettre also has many different meanings.1. to put oneself  Ã‚  Ã‚  Mets-toi cà ´tà © de ton frà ¨re.  Ã‚  Ã‚  Put yourself next to your brother, Go sit/stand next to your brother.  Ã‚  Ã‚  Je dois me mettre lombre.  Ã‚  Ã‚  I have to get into the shade.(figurative)  Ã‚  Ã‚  Je ne sais pas oà ¹ me mettre.  Ã‚  Ã‚  I dont know where to look / what to do with myself.  Ã‚  Ã‚  se mettre dans une situation dà ©licate  Ã‚  Ã‚  to put/get oneself into a delicate situation2. to become (weather)  Ã‚  Ã‚  Il va se mettre au froid demain.  Ã‚  Ã‚  Its going to get/turn cold tomorrow.  Ã‚  Ã‚  Il sest mis au chaud.  Ã‚  Ã‚  It got hot.3. se mettre - to start, set to, take up  Ã‚  Ã‚  Il sest enfin mis au travail.  Ã‚  Ã‚  He finally started working.  Ã‚  Ã‚  Je vais me mettre la danse.  Ã‚  Ã‚  Im going to take up dancing.  Ã‚  Ã‚  Quand vas -tu te mettre à ©tudier  ?  Ã‚  Ã‚  When are you going to start / set about studying?Expressions with mettre  Ã‚  Ã‚  mettre lessai - to put to the test  Ã‚  Ã‚  mettre en relief - to accentuate, bring out, emphasize  Ã‚  Ã‚  Il y a mis le temps  ! - He took his sweet time about it!  Ã‚  Ã‚  se mettre au rà ©gime - to go on a diet  Ã‚  Ã‚  More expressions with mettreConjugationsPresent tense  Ã‚  Ã‚  je mets  Ã‚  Ã‚  tu  mets  Ã‚  Ã‚  il met  Ã‚  Ã‚  nous  mettons  Ã‚  Ã‚  vous  mettez  Ã‚  Ã‚  ils  mettentAll tenses

Wednesday, November 20, 2019

The Intel Pentium Issue Essay Example | Topics and Well Written Essays - 750 words

The Intel Pentium Issue - Essay Example However, the microprocessor's flow in calculating long divisions causes minor errors not usually noticeable to most computer users. For example, the accurate answer for a division equation should be 2.345678, but P5 will come up with the answer of 2.345699. (1) The error is very minor, come to think of it, and Intel testers have realized and reported this problem to the Intel managers even before the microprocessor was released in the market that year. However, there was no significant reaction from the Intel managers to resolve the issue because â€Å"no one would really notice the slight error.† Months after, math professor Thomas Nicely of Lynchburg College noticed an error during the calculation of â€Å"reciprocals of a large collection of prime numbers on his Pentium-based computer.† (2) The professor wrote to Intel but did not receive any response from them, which prompted him to post on the internet about the issue. It then became a global issue against the corp oration. Obviously, bylaws seven and nine of the IEEE code of ethics were broken in various ways. Bylaw nine states that every member of a corporation must, in all cases â€Å"avoid injuring others, their property, reputation, or employment by false or malicious action.† (3) Intel failed to act along this bylaw by deciding to release the flawed chip in the market despite previously knowing of its problem. Furthermore, Intel's decision to replace processors would have resolved a big chunk of the problem had they not insisted the customers to prove their eligibility for that. Intel should have taken into consideration that several of the Pentium-based computer users invested their hard-earned dollars for the device. It is very true that Intel would not intentionally desire harming the customers by the defective chip, however, even minor errors could affect the customers in several ways. For example, those who deal with numbers on a regular basis like brokers, economists, or eve n bankers would require accuracy in every number calculation that they do. Even professors like Thomas Nicely and drug companies who tests new drugs could be adversely affected by what Intel deemed as â€Å"slight error.† Additionally, bylaw seven states that every member of corporations must exhaust all means to â€Å"seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contribution of others.† (3) When Intel testers informed the managers of the problem, the response did not go along what is stated in bylaw seven. They refused to admit making the mistake because it would definitely cause their company to lose millions of dollars. It was a total act of dishonesty to hope that the users of the newly released chip would not notice the flaw. It appears as if the managers decided to disregard the issue until problems become obvious. Doing this placed several users of the Pentium-based computers at the ris k of putting their crucial work at the hands of a flawed device covered-up by dishonesty. Had Intel decided to act under the guideline provided by bylaw ten, the global issue against the company would not have happened. Bylaw ten states that â€Å"

Tuesday, November 19, 2019

Asian Art Museum Report Essay Example | Topics and Well Written Essays - 500 words

Asian Art Museum Report - Essay Example Only one of the bent trees has a single fruit with some two men standing at the trunk (Zhang, Sternberg, and Rayner 14). I personally chose the piece of art due to the artistic abilities of the painter especially considering the fact that he could paint a quality piece of art depicting an Asian religious aspect. The artist carefully and creatively chooses colors that resonate well with the culture and environment of the practice by Asian monks. Their color choice consists of red, white, blue, and green to create clarity and contrast that leads the viewers to understand what the image is all about and the implications of the image on the viewers. The artist also strikes a religious code in the viewers through their choice of the subject matter where they show religious men dressed in specific regalia of a definite color (Zhang, Sternberg, and Rayner 16). Besides the use of distinct colors, the artist has used a circular shape as outlining the edges of the painting. Circular shapes normally depict peace and tranquility. In addition to the use of shapes, another crucial aspect about composition plays out especially at the foreground and the middle ground where the artist keenly locates the men and other natural elements like trees at specific and adjacent positions to show the interdependence and functionality of all the elements depicted in the piece of art. This helps the viewers to figure out the significance of the natural environment to the sustainability of humanity (Zhang, Sternberg, and Rayner 22). All these attracted my attention and I believe they are a sure eye catcher for any prospective individual looking for Asian pieces of art. This is because throughout the painting, the artist has tried to maintain a smooth texture to indicate the nobble course for which the men are involved. I am particularly interested in the artist’s creativity in telling the story about the Chinese animal

Saturday, November 16, 2019

Steps in Medical Billing Process Essay Example for Free

Steps in Medical Billing Process Essay There are several steps to the medical billing process step one to ten are as follows: Preregister patients, Establish financial responsibility for visits, Check in the patients, Check out the patients, Review coding compliance, Check billing compliance, Prepare and transmit claims, Monitor payer adjudication, Generate patient statements and finally Follow up patients payments and handle collections. Preregister patients is when you schedule and update appointments and collect insurance information for the patients. When you are scheduling appointments for new patient you need to get basic information and insurance information and reason for appointment. Establishing Financial Responsibility is an important step where you must determine what services are covered under the patients insurance and what service they are responsible for this also help if a preauthorization is need and ensures that are information is done and billed correctly. Check in Patients This is when you collect all necessary information from the patient such as copies for insurance cards. This is also, where you can collect copays and make sure the patient’s information is correct and updated if need be. Check out Patients This is where you record the proper medical codes for the visit. This is also where you provide information if the patient has made a payment or how much they owe and to make sure it is coded properly so the patient will be charged correctly. If payment or copays have been made then a receipt is given. Review Coding Compliance This is where guidelines must be follow when coding the visit. This must be checked for errors and the visit and the code should be connected so the payer understands the charges. Check Billing Compliance Each charge, or fee, for a visit is related to a specific procedure code. The provider’s fees for services are listed on the medical practice’s fee schedule. Most medical practices have standard fee schedules listing their usual fees. Even through there is separate codes for each fee not all are necessarily billable Prepare and Transmit Claims This is where the claims are prepared and submit in a timely manner listing the diagnosis, procedures, and charges for the payer. Most are sent electronically and each practice, as a policy as to when claims are filed be it daily, every other day etc. Monitor Payer Adjudication is where the where the health plans decide rather to pay the whole bill, part of the bill or deny the bill altogether. It is important for them to get their money as soon as possible, this is also where any discrepancies are address, and an appeal is then file if there are any discrepancies found. Generate Patients Statements This is where payments are listed from the payer, and what is still owed and what the patient is being billed it is them mailed to the patient. The date of service and any balances , and services provided are all listed on the statement. Follow up patients payments and collections this is where patients payments are monitored and checked and if they are behind they are sent a notice and if still no response collection procedures maybe started.

Thursday, November 14, 2019

The Effects of Poverty on the People of Yemen Essay -- American Histor

The United States Military Combined Joint Task Force – Horn of Africa (HOA) is a geographical region that encompasses the countries of Djibouti, Sudan, Ethiopia, Eritrea, Somalia, Kenya, and neighboring Yemen. Each country in the region houses many culturally unique distinctions to include groups, which comprise the HOA area of operation. Specifically one of these culturally unique groups originates out of Yemen. The country of Yemen, according to a 2004 census, has reached almost 20 million people (UNDP, 2010). Over 45% of the population lives on less than $2.00 U.S. a day (UNDP, 2010). The poverty-stricken people in Yemen have shaped a cultural group that in essence contains the majority of the Country’s population. The purpose of this thesis is to illustrate the current Yemen culture shaped by the effects of poverty on the people of Yemen. These effects span a wide array of problematic issues predicated on three major topics. The effects of poverty on the people of Yemen include severe health problems spanning a majority of the region, the decay of the Country’s political infrastructure, and the growing support of terrorist organizations in the region. The dilemmas in Yemen did not solely originate internally. Yemen is host to some 91,587 (as of 2007) refugees from Somalia (CIA, 2011). The wake of events perpetuated by the effects of poverty on the people of Yemen, left unchecked, will continue to erode with significant and lasting negative effects on the entire HOA Area of Responsibility (AOR) to include local, regional, and U.S. interests. Yemen has historically has been plagued with severe health problems spanning a majority of the region. The inhabitants of the region are dependent on the Country’s ... ...on, the decay of the Country’s political infrastructure, and the growing support of terrorist organizations in the region, are all systematic results of the effects of poverty. In conclusion Yemen must combat its health problem with both preemptive and reactive measures. Yemen must find common ground amongst its various political factions and unify politically to develop a truly governing nation. Yemen must also irradiate all terrorist factions in the region in order to prevent future recruitment into terrorist organizations. These measures are necessary to ensure that the effects of poverty on the people of Yemen are mitigated and minimal. This can only be achieved through the continuation of outside financial, medical, and political assistance from its neighboring countries in the region as well as the support of counter-terrorist organizations worldwide. The Effects of Poverty on the People of Yemen Essay -- American Histor The United States Military Combined Joint Task Force – Horn of Africa (HOA) is a geographical region that encompasses the countries of Djibouti, Sudan, Ethiopia, Eritrea, Somalia, Kenya, and neighboring Yemen. Each country in the region houses many culturally unique distinctions to include groups, which comprise the HOA area of operation. Specifically one of these culturally unique groups originates out of Yemen. The country of Yemen, according to a 2004 census, has reached almost 20 million people (UNDP, 2010). Over 45% of the population lives on less than $2.00 U.S. a day (UNDP, 2010). The poverty-stricken people in Yemen have shaped a cultural group that in essence contains the majority of the Country’s population. The purpose of this thesis is to illustrate the current Yemen culture shaped by the effects of poverty on the people of Yemen. These effects span a wide array of problematic issues predicated on three major topics. The effects of poverty on the people of Yemen include severe health problems spanning a majority of the region, the decay of the Country’s political infrastructure, and the growing support of terrorist organizations in the region. The dilemmas in Yemen did not solely originate internally. Yemen is host to some 91,587 (as of 2007) refugees from Somalia (CIA, 2011). The wake of events perpetuated by the effects of poverty on the people of Yemen, left unchecked, will continue to erode with significant and lasting negative effects on the entire HOA Area of Responsibility (AOR) to include local, regional, and U.S. interests. Yemen has historically has been plagued with severe health problems spanning a majority of the region. The inhabitants of the region are dependent on the Country’s ... ...on, the decay of the Country’s political infrastructure, and the growing support of terrorist organizations in the region, are all systematic results of the effects of poverty. In conclusion Yemen must combat its health problem with both preemptive and reactive measures. Yemen must find common ground amongst its various political factions and unify politically to develop a truly governing nation. Yemen must also irradiate all terrorist factions in the region in order to prevent future recruitment into terrorist organizations. These measures are necessary to ensure that the effects of poverty on the people of Yemen are mitigated and minimal. This can only be achieved through the continuation of outside financial, medical, and political assistance from its neighboring countries in the region as well as the support of counter-terrorist organizations worldwide.

Saturday, November 9, 2019

A Survey of Information Technologies in Logistics Management

A Survey of Information Technologies in Logistics Management Anil Gurung University of Texas at Arlington Department of Information Systems and Operations Management, College of Business Administration Office: Room 630 Business Building Box 19437 701 S West St. Arlington, Texas 76019-0437 Voice: 817. 272. 3528 Email: [email  protected] edu ABSTRACT This paper analyzes the impact of information technologies (IT) on logistics by conducting a survey of literatures on academic logistics journals and practitioner journals.The literature survey and practice find that third party logistic providers have better opportunity to leverage IT since they need to have interoperable IT systems with their customers. The business philosophy of Just-In-Time (JIT) has also contributed to the impact of IT in logistics. Further, information technologies are identified that has benefited the logistics. Future directions of logistics are discussed. INTRODUCTION The proliferation of information technologie s (IT) and the internet technologies have provided impetus and challenges to the logistics.New technologies present new means to manage the flow of information. IT as a productivity tool can be utilized to both increase the capability and decrease the cost at the same time (Closs et al. , 1997). It has been widely accepted that firms can achieve competitive advantage by cost reduction or differentiation with the proper implementation of IT (Porter & Millar, 1985). Enabled by IT the logistics has become a source of competitive advantage for many firms. Two streams of research are identified that highlights the role of IT in logistics.First stream relates to just-in-time logistics information system (Anderson & Quinn, 1986; Bookbinder & Dilts, 1989; Das & Handfield, 1997; Gomes & Mentzer, 1988; Perry, 1988; Schwarz & Weng, 2000; Spencer, M. S. et al. , 1994; Spencer, M. S. et al. , 1996; Takahashi & Nakamura, 2000; Titone, 1996; Wafa & Yasin, 1996). The other stream is the third party logistics (Lewis & Talalayevsky, 2000; Peters et al. , 1998; Sauvage, 2003; Sink & Langley, 1997; Vaidyanathan, 2005). Importance of IT in logistics has grown to some extent by business philosophy of Just-InTime (JIT) by firms.With the emphasis of firms on JIT, the impact of logistics has grown as it is increasingly recognized as a source of consistent, low lead time, damage free deliveries (Bardi et al. , 1994). In pursuit of competitive advantages, firms outsource their functions which are noncore competencies so that they can focus on their core competencies. A recent survey found that 83 percent of the surveyed Fortune 500 companies reported having at least one contract with a third-party logistics provider (Lieb & Bentz, 2004).Over the years, the use of third-party logistics has been increasing. Similar survey of Fortune 500 companies taken in 1991 had only 38 percent of the respondents reporting the use of third-party logistics provider (Lieb, 1992). The 618 third party logis tic operators attempt to harness the capability of information technology to provide superior services to their customers. The objective of this paper is to study how IT has impacted logistics. To this end, literature review of both leading academic and practitioner logistic journals is conducted.The next section will report the framework of logistics. The following section will analyze the IT enablers in logistics. Then, the implications of ecommerce are discussed followed by a section on future directions for logistics. REVIEW OF THE LITERATURE A classification scheme logistics functions provides a meaningful way to study how IT has impacted the various functions of logistics. Previous research in logistics have categorized the use of information systems in logistics in different ways.A system of logistics functions can be divided into following five broad areas (Bowersox, 1974): facility location, transportation, inventory, communication and material movement. Based on the proble m areas that application addresses, seven areas of logistics has been identified as facility location, inventory control, order entry, vehicle scheduling, warehouse layout planning, freight rate retrieval, and product and shipment tracing (Ballou, 1976). Another survey identified five categories as facility location, inventory control, transportation, production scheduling, and total physical distribution (House, 1978).These categories treated each category as individual entities rather than a whole system. Noting this shortcoming, Stenger (1986) proposed another classification consisting of transaction systems, short-term scheduling and inventory replenishment systems, flow planning systems, and network planning and design systems. Expanding on the framework developed by Bowersox, Novack et al (1992) divided logistics function into two categories. The first category refers to physical activities that are required various utilities of customer need.These will include inventory, tran sportation and customer service operations. The second category refers to flow of information or transaction activities that follow or initiate the physical activities. The physical and information flows in logistics function is well-depicted in Figure 1 that shows the categorization of logistics functions as described by Vaidyanathan (2005). As shown in the figure, information flows between logistics function are managed, coordinated and supported by various logistics technologies. 619Inventory and Logistics Management: – Freight Consolidation – Freight Distribution – Shipment Planning – Traffic Management – Inventory Management – Carrier Selection – Order Entry/ Management Information Flow Customer Service: – Freight Payments – Auditing – Order Management – Fulfillment – Help Desk – Carrier Selection – Rate Negotiation Information Flow Warehousing: – Packaging – Product Making – Labeling – Warehousing Material Flow Transportation: – Fleet Management – Cross Docking – Product Return Figure 1: Categorization of Logistics Functions (adapted from Vaidyanathan 2005)IT enablers in Logistics The literature in logistics is full of instances where information technology has been touted as a means to enhance logistics competitiveness (Bowersox, 1974; Closs et al. , 1997; Rabinovich et al. , 1999; Stenger, 1986). Yet there has been few empirical studies that relates logistics information capabilities to logistics competence (Closs et al. , 1997). A popular framework in information systems discipline put forward by Gorry & Morton (1989) place logistics decisions as structured and varying from operational to strategic.The role of logistics information systems as operational and strategic enablers in different areas of the firm’s supply chain has been stated in the literature (Langley et al. , 1988). There has been a shi ft of IT from being an enabler of operational and material handling functions to being an enabler of decision-making and activityplanning functions within the supply chain (La Londe & Auker, 1973). Logistics Information System Logistics Information System (LIS) is the application component of logistics information technology. An effective LIS facilitates the proper information flow between inventory, 20 Information Flow warehousing and transportation to realize the high level of customer service. The ability to optimize the logistics cost and service levels is affected by the LIS of the firm and its partners. Firms that provide better logistics services at a lower cost can have competitive advantage over its competitors (Bardi et al. , 1994). Two classes of LIS has been recognized in the literature (Closs et al. , 1997). Logistics operating systems (LOS) refer to transactional applications such as order entry, order processing, warehousing, and transportation.Logistics planning syst ems (LPS) refer to coordinating applications such as forecasting, inventory management, and distribution requirements planning. EDI Electronic Data Interchange (EDI) has successfully enhanced the communication between firms which is essential for logistics. This technology requires firms to have common data formatting and transmission standards or protocols. Such technologies have been employed by companies to coordinate their value chain activities including logistics. Early applications of EDI has been on transmitting vehicle location information by railways to their customers.Other types of logistics information carried by EDI are purchase orders/releases and changes, advanced shipping notices, bills of lading, and invoices. Timely and accurate information is crucial in decision making about complex logistics problems. Japan Airlines (JAL) adopted EDI to manage their complex value chain logistics required for their operations, including procurement and just-in-time delivery of ai rcraft fuel, repair and maintenance aircraft parts, food catering and other customer requirements (Chatfield & Bjorn-Andersen, 1997).The competitive advantage gained by companies employing EDI is cited in the literature. Firms utilizing EDI were better able to fulfill greater number of services to their customers (Rogers et al. , 1992). Bar coding Bar coding is one of the most IT enablers to date and has made significant impact in the practice. Starting in 1960’s some of the earliest implementation of bar codes were in rail road cars. Nowadays it is rampant in anything that needs to be identified and tracked. The different type of bar codes are available, known as symbologies, for different purposes.In practice, most firms prefer to use industry standards rather than proprietary standards for most of their bar codes on their products. By following industry standards, bar codes reduce the complications inherent in the use of multiple standards and thus provides a strong founda tion for integrating the corporate logistics and the supply chain (Closs & Kefeng, 2000). Real-time communications capability The logistics IT capability of real-time communications is essential for maintaining the flow of information.As noted by Dudley & Lasserre (1989), one of the important roles of logistics IT is to substitute information for inventory. To make real-time tracking of goods, logistic information systems of business partners should have real-time communications capability. The business partners require an integrated messaging architecture which exchanges business data while customizing business flows and format transformation. Real-time communications also allows for schedule plans to change in dynamic routing and scheduling system when the vehicles are 621 already out on the road.Any last minute changes in routing and scheduling system or constant tracking has been possible only with real-time communications ability of the respective systems. RFID RFID helps to id entify, track and locate items automatically. The use of Radio Frequency Identification (RFID) is expected to increase rapidly in coming years. Often referred to as the next step in the evolution of bar-coding, RFID is growing rapidly in the automatic data capture and identification market (Srivastava, 2004). RFID is not a new technology, in fact, its use dates back to 1940’s but only now it is starting to make a significant impact within the supply chain.The growth in use of RFID will be enhanced to some extent by mandates from large retailers such as Wal-Mart and Target, and the US Department of Defense, who require their suppliers to adopt this technology within the next few years (Asif & Mandviwalla, 2005). Among the companies that are piloting RFID in their supply chain management prominent ones are WalMart, Procter & Gamble, Coca-cola and Gillette. Although the biggest driver in the popularity of RFID has been supply chain, companies are experimenting in other applicati ons as well.Other applications are theft detection, asset tracking, mobile payments, in-process inventory tracking and luggage tracking. Dell, Seagate, Boeing and Ford are among other companies that are using RFID to track their in-process inventory in manufacturing. An RFID system includes transponders or tags that can identify items ; antennas that allows tags to be interrogated and to respond; and software that controls the RFID equipment, manages the data and interfaces with enterprise applications. RFID has lots of potential to improve the efficiency in the supply chain and reduce waste.For example, efficiency would result from automatic update of inventory system when products with RFID tags are unloaded from trucks into stores. The advantages of RFID over bar coding are as follows: RFID tags can provide longer read distances; store more data; require no direct line of sight between tag and reader; and can collect data from multiple sources simultaneously (Asif & Mandviwalla, 2005). There are some technical and business challenges to overcome before RFID can be ubiquitous. Technical issues include problems of interference, security and accuracy while business issues relate to costs and lack of standards.Another significant business challenge in adopting RFID faced by managers is to work out a business case for the executive board. Early adopters of these technologies are marred by problems such as possible adverse consumer outbursts to perceived invasion of privacy, reliability of the RFID system, and issues related to health, safety and IT integration. IMPLICATION OF ECOMMERCE ON LOGISTICS The growth of ecommerce pose opportunities and challenges for logistics. As internet retailing increases the companies are accepting orders from their clientele across the borders.In many instances the location of clients are not covered by any existing distribution system of the companies. On such occasions the companies have no resort but to turn towards third party logistics operators for physical flow of goods. As for the information flow, the companies need to have capabilities for ecommerce applications. The group of technologies and processes for coordinating logistics information flow has been named e-logistics. An important web 622 technology that facilitates the exchange of business data among logistics business partners across different platforms is extra markup language (XML).For example, UPS is exploiting the power of the web services to streamline its information flows for logistics activities such as RFQ, shipping and tracking. Changing Trends in Logistics Consultants are beginning to take an active part in helping out the shippers select third party logistics operators. Shippers hire consultants to help them align business processes with supply chain strategies. The newly coined term â€Å"4PL† for consultants stands for dominant role that consultants will be taking in managing the resources, the technology and the process es in the supply chain.It is yet to be seen whether the shippers will let the consultants manage all the logistics processes. Instead of handing over the authority to manage the logistics processes to the consulting firms, shippers may choose to develop alliance with the third party logistics operators and maintain the supply chain themselves. The key thing that will allow coordination between shipper firms and the third party logistics will be information technology and management skills to run the supply chain effectively. This implies that firms should also have proper logistic technologies in place to enjoy the full benefits of use of third party logistics.FUTURE RESEARCH DIRECTIONS The research directions that are available for researchers in logistics are numerous. Before companies implement new logistic information technologies such as RFID it is important to assess the viability of adopting the technology. What would be the expected benefits? What is the ROI? Researchers can come up with various econometric models to predict the outcomes of adopting logistics technologies. Modeling techniques can be used to assess the scenarios that would be beneficial for adopting new technologies.As companies are entering into ecommerce, better coordinating techniques are required to streamline logistics activities for transactions taking place on the internet. Collaborative technologies for supporting e-logistics would greatly enhance the future logistics. Multi-agent systems (MAS) provide an interesting avenue of research that is applicable for supporting logistics technologies on the internet. Intelligent software agents can be used to assess the bids offered by multiple third-party logistics operators. To support global ecommerce the companies need to have different options for global logistics.The best way to traverse the geographical distribution is through technology. What are the communication channels and technologies that would benefit the company in terms of monitoring and coordination logistics functions? More empirical evidence will be preferred to establish the direct link between organizational performance and logistics information systems. Researchers can seek to examine the complex relationships between logistics technologies and performance from different paradigms and theories. The perspective of organizational learning can be used to evaluate the performance gained by employing logistics information systems. 23 CONCLUSION The objective of this paper was to observe the impact of information technology on the logistics functions. A literature review of the academic and practitioners journals was conducted. The information technologies that have been used to support logistics functions were discussed. It is evident that academic researchers are aware of new technologies in practice such as RFID. Development in technologies offer sources of competitive advantage for companies. Adoption of new technologies provide challenge and o pportunities for the companies.Proper business case and calculation of ROI needs to be done to assess the expected benefits from new technologies. Changing trends in business in terms of ecommerce open new markets for firms for all sizes to expand their market share. Strategic use of information resource would bear results of competitive advantage and thus leading to success stories. The best practices in logistic information technologies need to be adopted by firms in alignment of their strategic goals. Future trends in logistics may prompt companies to rethink their logistics strategies.Firms may choose to use third party logistics in order to focus on their core competencies. However, firms need to have logistics information systems in place that is compatible with the third party operators in order to fully benefit from their services. REFERENCES Anderson, D. L. & Quinn, R. J. 1986, â€Å"The Role of Transportation in Long Supply Line Just-InTime Logistics Channels â€Å", Jou rnal of Business Logistics, vol. 7, no. 1, pp. 68-88. Asif, Z. & Mandviwalla, M. 2005, â€Å"Integrating the Supply Chain with RFID: a Technical and Business Analysis†, Communications of the AIS, vol. 15, pp. 393-427. Ballou, R. H. 976, â€Å"Computer Methods in Transportation-Distribution†, Transportation Journal, vol. 16, no. 2, pp. 72-85. Bardi, E. J. , Raghunathan, T. S. & Bagchi, P. K. 1994, â€Å"Logistics information systems: The strategic role of top management†, Journal of Business Logistics, vol. 15, no. 1, pp. 7185. Bookbinder, J. H. & Dilts, D. M. 1989, â€Å"Logistics Information Systems in a Just-In-Time Environment â€Å", Journal of Business Logistics, vol. 10, no. 1, pp. 50-67. Bowersox, D. J. 1974, Logistics Management: A Systems Integration of Physical Distribution Management and Materials Management, Macmillan Publishing, New York, NY.Chatfield, A. T. & Bjorn-Andersen, N. 1997, â€Å"The impact of IOS-enabled business process change on bus iness outcomes: Transformation of the Value Chain of Japan Airlines†, Journal of Management Information Systems, vol. 14, no. 1, pp. 13-40. Closs, D. J. & Kefeng, X. 2000, â€Å"Logistics information technology practice in manufacturing and merchandising firms† An international benchmarking study versus world class logistics firms†, International Journal of Physical Distribution & Logistics Management, vol. 30, no. 10, pp. 869-86. 624 Closs, D. J. , Goldsby, T.J. & Clinton, S. R. 1997, â€Å"Information technology influences on world class logistics capability†, International Journal of Physical Distribution & Logistics Management, vol. 27, no. 1, pp. 4-17. Das, A. & Handfield, R. B. 1997, â€Å"Just-in-time and logistics in global sourcing: An empirical study†, International Journal of Physical Distribution & Logistics Management, vol. 27, no. 3/4, pp. 244-59. Dudley, L. & Lasserre, P. 1989, â€Å"Information as a Substitute for Inventories â€Å" , European Economic Review, vol. 33, no. 1, pp. 67-88. Gomes, R. & Mentzer, J. T. 988, â€Å"A Systems Approach to the Investigation of Just-In-Time â€Å", Journal of Business Logistics, vol. 9, no. 2, pp. 71-88. Gorry, G. A. & Morton, M. S. S. 1989, â€Å"A Framework for Management Information Systems†, Sloan Management Review, vol. 30, no. 3, pp. 49-61. House, R. G. 1978, â€Å"Computer Models in Distribution Management†, Journal of Business Logistics, vol. 1, no. 1, pp. 129-52. La Londe, B. J. & Auker, K. 1973, â€Å"A Survey of Computer Applications and Practices in Transportation and Distribution†, International Journal of Physical Distribution, vol. 3, no. 5, pp. 92-301. Langley, C. J. , Carlisle, D. P. , Probst, S. B. , Biggs, D. F. & Cail, R. E. 1988, â€Å"Microcomputers as a Logistics Information Strategy†, International Journal of Physical Distribution and Materials Management, vol. 18, no. 6, pp. 11-7. Lewis, I. & Talalayevsky, A. 2000, â⠂¬Å"Third-Party Logistics: Leveraging Information Technology â€Å", Journal of Business Logistics, vol. 21, no. 2, pp. 173-85. Lieb, R. C. 1992, â€Å"The use of third-party logistics services by large American manufacturers†, Journal of Business Logistics, vol. 13, no. 2, pp. 29-42. Lieb, R. C. & Bentz, B. A. 004, â€Å"The Use of Third-Party Logistics Services by Large American Manufacturers: The 2003 Survey†, Transportation Journal, vol. 43, no. 3, pp. 24-33. Novack, R. A. , Rinehart, L. M. & Wells, M. V. 1992, â€Å"Rethinking concept foundations in logistics management†, Journal of Business Logistics, vol. 13, no. 2, pp. 233-67. Perry, J. H. 1988, â€Å"Firm Behavior and Operating Performance in Just-In-Time Logistics Channels â€Å", Journal of Business Logistics, vol. 9, no. 1, pp. 19-33. Peters, M. J. , Lieb, R. C. & Randall, H. L. 1998, â€Å"The use of third-party logistics services by European industry†, Transport Logistics, vol. , no. 3, p p. 167-79. Porter, M. E. & Millar, V. E. 1985, â€Å"How information gives you competitive advantage†, Harvard Business Review, vol. 63, no. 4, pp. 149-60. Rabinovich, E. , Windle, R. , Dresner, M. & Corsi, T. 1999, â€Å"Outsourcing of integrated logistics functions†, International Journal of Physical Distribution & Logistics Management, vol. 29, no. 6, pp. 353-73. Rogers, D. S. , Daugherty, P. J. & Stank, T. P. 1992, â€Å"Enhancing service responsiveness: the strategic potential of EDI†, International Journal of Physical Distribution & Logistics Management, vol. 22, no. 8, pp. 15-20.Sauvage, T. 2003, â€Å"The relationship between technology and logistics third-party providers†, International Journal of Physical Distribution & Logistics Management, vol. 33, no. 3, pp. 236-53. Schwarz, L. B. & Weng, Z. K. 2000, â€Å"The Design of a JIT Supply Chain: The Effect of Leadtime Uncertainty on Safety Stock â€Å", Journal of Business Logistics, vol. 21, no. 2, pp. 231-52. 625 Sink, H. L. & Langley, J. C. J. 1997, â€Å"A managerial framework for the acquisition of third-party logistics services†, Journal of Business Logistics, vol. 18, p. 163. Spencer, M. S. , Dale, S. R. & Patricia, J.D. 1994, â€Å"JIT Systems and External Logistics Suppliers†, International Journal of Operations & Production Management, vol. 14, no. 6, pp. 6074. Spencer, M. S. , Daugherty, P. J. & Rogers, D. S. 1996, â€Å"Logistics support for JIF implementation†, International Journal of Production Research, vol. 34, no. 3, pp. 701-14. Srivastava, B. 2004, â€Å"Radio frequency ID technology: The next revolution in SCM†, Business Horizons, vol. 47, no. 6, pp. 60-8. Stenger, A. J. 1986, â€Å"Information Systems in Logistics Management: Past, Present, and Future†, Transportation Journal, vol. 26, no. 1, pp. 5-82. Takahashi, K. & Nakamura, N. 2000, â€Å"Reactive logistics in a JIT environment†, Production Planning & Contro l, vol. 11, no. 1, pp. 20-31. Titone, R. 1996, â€Å"Moving Beyond JIT to Logistics Planning†, IIE Solutions, vol. 28, no. 2, pp. 22-4. Vaidyanathan, G. 2005, â€Å"A Framework for Evaluating Third-Party Logistics†, Communications of the ACM, vol. 48, no. 1, pp. 89-94. Wafa, M. A. & Yasin, M. M. 1996, â€Å"The impact of supplier proximity on JIT success: an informational perspective†, International Journal of Physical Distribution & Logistics Management, vol. 26, no. 4, pp. 23-34. 626

Thursday, November 7, 2019

Companys reputation Essays

Companys reputation Essays Companys reputation Essay Companys reputation Essay Filmmaker Morgan Spurlock undergoes one of the countless tests he subjected himself to while filming his first feature, Super Size Me. During the film, which examines the obesity epidemic overcoming America, Spurlock took the fast track to becoming an obese American and ate nothing but McDonalds for 30 days straight with dramatic results. 5 Events reported in the media, such as incidents involving food-borne illnesses or food tampering, whether or not accurate, can cause damage to the Companys reputation and swiftly affect sales and profitability. Incidents like these are very detrimental to a company because it is so damaging to the companys brand name and reputation. The affect on sales is immediately felt, even if the incident is are accurate or not, the risk is very real. Company Overview Wendys A fast food chain based in Dublin, Ohio founded by Dave Thomas and Robert Barney, in 1969. It was named after Daves daughter, Melinda, who had the nickname, Wendy. There are 6,600 restaurants worldwide. 7 Wendys is famous for its chili, frosty, and square hamburgers. One of their most famous campaigns featured actress Clara Peller inWheres the Beef? This phrase entered into American Pop Culture. (Interesting note: Clara Peller was fired from Wendys because she did a Prego commercial saying she finally found the beef. ) Clara was replaced by the founder Dave Thomas as their spokesman until his death in 2002. Internationally Wendys has 718 stores located from Aruba, Guam, Japan, to the United Kingdom. Competition has forced them out of certain areas. They did own Tim Hortons and Baja Fresh until their sales in 2005, 2006. The Company intends to expand into the breakfast day part, where competitive conditions are challenging, the Wendys brand is not well known and markets may prove difficult to penetrate. They plan to expand breakfast to more than 50% of its restaurants by late 2008. As a result of the foregoing, breakfast sales and profits there from may take longer to reach expected levels or may never do so. 8 McDonalds McDonalds was founded by Raymond Albert Kroc in 1955 with brothers Dick and Mac McDonald. Ray mortgaged everything moved west to sell multi-mixers at the age of 54 In 1965 McDonalds had its initial public offering. A hundred shares of stock valued at $2,250 would have been worth $3. 3 million on December 31, 2006. McDonalds operates approximately 550,000 restaurants in the U. S. generating $365 billion in annual sales and employs 465,000 people. They also operate in more than 100 countries worldwide. McDonalds owned Chipotle and Donatos pizza until they were sold in 2004, 2005. They currently operate Boston Market. McDonalds serves breakfast, lunch and dinner and has even created niche menu items like gourmet coffee to compete with Starbucks. McDonalds has an aggressive strategy they call the, Plan to Win. It outlines how to grow the company, generate revenues, and keep McDonalds an industry leader. Lets take a look at some numbers. Ratios Capital Solvency Total Debt Ratio: Total Liabilities/Total Assets This is a ratio that is good measure to compare companies without getting too complicated, a feel for the companies. As an investor it helps me determine a companys level of risk. Compared to the industry both companies have a better debt ratio, however, I did notice one trend (see common size balance sheet, below). Wendys assets have been declining because of financing and restructuring. In 2005 and 2006 they sold off Tim Hortons and Baja Fresh. Long term assets, Good will, property and Equipment have all decreased. In reality, almost all their assets have decreased since 2002. The only things that did not decrease were cash and accounts receivable, which make sense due to sale of Tim Hortons and Baja Fresh. Since Wendys is trying to find a buyer Id say the company is trying to trim off all the fat from the company by closing unprofitable stores and selling its interests to look more attractive. Wendys better hope they find a buyer because they are not setting themselves up for the long run. McDonalds, on the other hand, is very consistent. Liabilities have steadily been decreasing relative to assets causing their ratio to go lower. McDonalds has better managed their assets and liabilities and continued growth. Total Debt to Equity ratio- Total Liabilities/Shareholders Equity This ratio is important to an investor because it reveals the extent to which management is willing to fund its operations with debt, rather than using equity. A higher ratio also means there is more risk of loans not being paid and then investors might have to put more money into the company themselves. Wendys total liabilities have been increasing relative to equity. McDonalds liabilities have been decreasing relative to equity. Each company places in the middle to upper quartile against the industry. During 2006 Wendys announced a restructuring program to eliminate approximately $100 million of costs, including $80 million from its reported continuing operations. Although some of the savings from this effort were realized in 2006, most of the savings will be realized in 2007. 9 Wendys is trying to increase shareholders equity by doing a buyback: The Company repurchased 26. 2 million shares in 2006 for $1. 0 billion, including 22. 4 million shares for $804. 4 million in a modified Dutch Auction tender offer in the fourth quarter. 10 McDonalds is, again, very consistent. This is what I want to see. While this ratio is not very alarming in that both are doing fairly well, the bigger question is if Wendys is doing the buyback to improve financial ratios like P/E or Earnings Per Share to look more attractive to a buyer. If they are then the buyback is detrimental to shareholders in the long run. Liquidity Current Ratio This is considered to be the standard measurement of a business financial health. Is a company able to meet its current obligations by measuring if it has enough assets to cover its liabilities? Both companies place in between the lower and middle quartile against the industry. At first glance it looks as though Wendys is doing a good job. Current Assets are increasing relative to current liabilities; however, we know this was due to the sale of Baja Fresh and Tim Hortons. Current Assets are great due to the sacrifice of long term assets.

Monday, November 4, 2019

Application of Criminological Theory

This paper will focus on the application of criminological theory in the following scenario: As the vice principal in charge of discipline at a prestigious school, I need to determine what actions to take in dealing with a deviant eighth grade male student. This student comes from a disadvantaged socioeconomic background and has now been caught in a physical altercation with another student. My direct supervisor, the principal, believes it is in the student’s best interest to remain at our school.As I am in charge of discipline, I will suggest several possible courses of action, incorporating criminological theories, to be used either singly or in tandem. The first course of action would be to speak to both of the students involved in the altercation and in turn, their parents. Although it is not an excuse, it is possible that there was some instigation preceding the altercation. Speaking with both students may paint a picture as to the nature of what transpired and how it could have been avoided. In any case, both students will be reprimanded as we have a zero tolerance policy for such acts here at the school. To properly understand the deviant student, let’s call him David, it will be necessary to find out more about his background, social and family ties, peer influences, general demeanor, and any goals or hopes he has. I cannot simply classify David as a juvenile delinquent or a future criminal. To label him may do more harm than good. Labeling Theory The labeling theory asserts that once an individual has deviated from the social norms of society, they are labeled as a delinquent or a criminal, and begin to behave as such (Encyclopedia Britannica, 2011).In other words, if David is continuously labeled by the school, his peers, and society in general as a juvenile delinquent then he will begin to believe it himself. His self-esteem and self-worth will go down and he will begin viewing himself as a juvenile delinquent. Once David has accepted his label, he will begin to engage in more and more deviant acts. So it is important here that I am sensitive to his situation and avoid putting a label on him for one discretionary act. Social Disorganization Theory We know that David comes from a disadvantaged socioeconomic background.It is likely that he lives in an environment where social ties are poor and delinquent peer groups are abundant. Such communities have a higher crime rate and a higher rate of delinquency, as explained by their weak social bonds. Socially organized and tight-knit communities are more likely to supervise and control teenage peer groups where socially disorganized communities are not (McCord, 1992). External factors such as lack of supervision and a weak social bond may be contributing to David’s delinquency. Unfortunately, the school can do little in the way of helping him and his family out of their community. However, creating a social bond of sorts here at the school may help David move from a perhaps delinquent peer group to one more conscientious of social norms and societal laws. I would suggest trying to get David involved in a sport or another social club at the school. Again, finding out what he is interested in is an important part of helping him. We want David to feel socially accepted and increase his self-esteem. Learning Theories Learning theories suggest that antisocial, deviant, and criminal behavior is not instilled in an individual, but learned through interactions with their environment and peers. Because of their individual circumstances, some people learn and practice behaviors that the larger society condemns. Not surprisingly, children growing up in neighborhoods rife with crime often end up committing crime themselves† (Barkan, 2009). It is essential that David associate with peers that follow and respect societies rules. The theory of differential association attributes an individual’s attitudes and views of crime and deviance to that of their immediate social groups.In other words, if David’s peer group is deviant, he will be deviant as well. Another explanation for that follows the theory of differential identification; David may feel the need to â€Å"fit in† and be accepted as a member of a group. By acting like the group he has chosen to fit in to; dressing like they do, speaking the way they speak, and engaging in the same deviant activities they engage in, he gains their approval and is accepted as part of the group. In the same manner, David is learning deviant behavior because he is exposed to it on a regular basis.He may see violence and deviance as a social norm (and therefore acceptable) because in his immediate environment it is a normal occurrence. Finally, through differential reinforcement, this learned behavior is reinforced through reward or praise from his peer group. Perhaps he see’s frequent violence in which the person committing the violence is never reprimanded. If David believes he can commit these acts with little fear of reprimand or with the encouragement of his peer group, he is more likely to do so and not even feel like he has done anything wrong.School is a place with many rules and many types of interactions with different people. Clearly what is acceptable in David’s home environment and peer group is not acceptable here. It is important that he understand what is right and wrong in this setting and furthermore, in society. I will likely suggest that David speak with the school’s psychologist to determine how much learned deviant behavior he has experienced. This will also give him an opportunity to bond with someone who respects social norms and laws. Control TheoriesUnlike other criminological theories, control theories set out to learn not why individuals commit crime, but why they do not commit crime (Akers Sellers, 2004). David’s meeting with the school psychologist will also shed some light on where he measures using some of the control theories. The containment theory introduces the possibility that there are internal and external influences that guide an individual away from committing crime. Internally, that individual’s positive self-image and tolerance for frustration help sway them from becoming deviant.On the other side, external influences like positive role models and a close family bond will do the same (Barkan, 2009). Travis Hirshi’s social bonding theory had several explanations for the behavior of juveniles. These explanations included supported research that found that â€Å"youth’s who were strongly attached to their parents were less likely to commit criminal acts† and â€Å"youths who maintained weak and distant relationships with people tended toward delinquency† (Evans, n. d. ) One final addition to control theories, although there are several more, is the coercive control and social support theory.This theory, in short, states that an individual is coerced into crime either through fear or through other means, such as poverty. Whether that individual has strong social support from family, their community, and social institutions such as school, has a large impact on the likelihood that the individual with commit crime. While each of these control theories introduce several ideas about why individual’s may or may not commit crime, one similarity is present throughout. The presence of a strong social bond with friends, family, and community encourages a crime free existence. To encourage David to head down the right path, so to speak, we need to fortify his social bonds. Life-Course Theories Life-course theories focus on what factors occur during different stages of one’s life that may promote delinquency or crime. These factors include: socioeconomic status, poor and inconsistent parenting, weak social bonds, poor school performance, and delinquent peers. (Barkan, 2009). The recurring theme across the life-course theories is that it is weak social bonds, poor parenting, and the influence of delinquent peers that determine an individual’s susceptibility to deviant behavior.Strain, or stress, result from an individual’s perceived inadequacies making them even more susceptible. Such strain can be caused by any number of the causal factors of delinquency listed above. A young and impressionable individual such as David may experience strain because of his socioeconomic status, his difficulty at the school, or many other reasons. The more strain one experiences, the more likely they are to display deviant behavior. Conclusion I fully support the principal’s decision to keep David at the school as it truly is in his best interest.My final disciplinary decision regarding the physical altercation between David and the other student will include several days of in-school suspension where both boys will be able to serve out their punishment while still completing school assignments, separated from the rest of the students of course. I am compelled to reach out to David and give him every opportunity to reform. I will be speaking with the teacher who made the initial complaint regarding David to explain to them that he is in need of a positive role model and positive reinforcement.A visit with the school’s psychologist will also be made. Not only will this give David an outlet to perhaps discuss his problems, it will also expose him to another positive influence and someone who can help him cope with any anger issues he may have. Introducing David to positive and close social bonds is already decreasing the chance that he will engage in more deviant behavior. Suggestions will be made that he engage in a sport or other social clubs at the school. This will encourage David to interact with a less deviant peer group.There will also be a meeting between David and myself. I will explain to David that his current behaviors are unacceptable here at school and any further infractions will be dealt with swift and more severe punishments. Once that has been discussed, I would like to find out more about what goals David has. In doing so, I can help motivate him to obtain these goals. My intention is to make it clear to him that I am there to help with any issues he has and that he can feel comfortable coming to me, or any other school staff, if he needs to.In closing, the main goal here is to help David by introducing positive role models, making him feel socially accepted to increase his self-esteem, strengthen his social bonds, and encourage him to interact with people in a more positive way. If nowhere else, a school should foster these values to reduce a child’s likelihood of delinquency. ? References Akers, R. , Sellers, C. (2004). Student Study Guide for Criminological Theories: Introduction, Evaluation, and Application (4th ed. ). Los Angeles, CA: Roxbury Publishing Company.

Saturday, November 2, 2019

I did attachment. For all my decument. I want you to do for me just Essay - 1

I did attachment. For all my decument. I want you to do for me just part (1) And part (2) - Essay Example 1. work collaboratively with other campus personnel to develop, implement, evaluate, and revise a comprehensive campus professional development plan that addresses staff needs and aligns professional development with identified goals. 4. implement effective, appropriate, and legal strategies for the recruitment, screening, selection, assignment, induction, development, evaluation, promotion, discipline, and dismissal of campus staff. In the space below, reflect on your responses on the survey. Review your perception of importance of the principal standards, and identify or consider those that you answered with a 3, 2 or 1. If you answered 1 or 2 for some, explain why you do not consider these important. For the second column, frequency of practice, review your responses and consider those responses that received a 2, 1 or 0, and explain why you think these are not practiced. The perception on the survey about the school is quite important given that through appropriate leadership of all the stakeholders of the school ranging from parents, students and the management of the school the principle is able to steer the school forward. The principle is able to integrate all the factors with the school community to shape the culture of the campus. From the survey, the perception of this is very important receiving a 4 except in parameter number 3 where he does not always but use information where appropriate. In parameter number 6, the principle again rewards only when necessary given he is a good custodian of the school resources. The principal has effective communication skills and collaboration skills as well while he also tries as much as possible to always stay away from politics whether internal or external. Integrity and fairness is not given room at all cost with ethics and law upheld to ensure such virtues are well