Monday, September 30, 2019

Management Planning and Ethics

First American Guard Services Company provides unique security services to all our clients. To maximize on our services, the company operates round the clock to ensure all the customers’ requirements are met.   Our core values are innovations, competence and reliability.   The company strives to offer quality services, professional development and high ethical standards.   Our team is highly committed to understand customers’ expectations and solve all safety problems.   The services offered not only will they accommodate all the clients’ needs but also exceed their expectations. (Francesco, 2006) Organizational Structure First American Guard Services is made up of qualified and professional team.   The company is under the Chief executive officer, the Vice president of company operations and Vice president of marketing and Finance.   The Chief Executive Officer manages the whole company and holds the final word.   The VP is in charge of departmental operations and the second VP is in charge of marketing and finance. The planning Function of the Management To ensure the smooth flow of all the activities within the company, the company has decided to embark on management planning and ethics plans to harmonize all the plans laid out.   The management will streamline legal issues, ethics and corporate social responsibility and how it impacts the management and business planning.   All the issues will enhance proper communication, accountability and clarify the vision of all the plans.   The corporate social responsibility will broaden the perspectives of communications at the corporate level within the management so that sound policies can be made. The management consists of the CEO, and the two VPs (Francesco, 2006) Legal issues are vital if any organization must perform well.   The legal issues affect the management since they are responsible for laying out rules and regulations that staff members are expected to adhere to.   First American Guard Company’s management will evaluate all the processes to improve the performance of the management.   The Chief executive will lead the team by initiating workshops and seminars whereby they will be exposed to management courses.   The courses will enhance ethical standards and adhere to the law. (Francesco, 2006) Legal issues, ethical factors as well as corporate social responsible are interrelated since they affect performance of the management and ultimately output of the organization. (Francesco, 2006) Legally, there are rules stipulated by the law that businesses must follow.   The rules determine the types of decisions and plans made at the management level.   Some of the legal issues will determine the quality of services offered by First American, to ensure they meet the standards set by the law.   Despite all the innovations, that the management hopes to come up with, they must be within the law.   On the other hand, ethics are designed by the company, that is, code of ethics indicating the conduct and organizations expectations of all the employees.   The ethical infrastructure will support the effective implementation of ethical responsibility and corporate strategies.   (Francesco, 2006) The ethical training will be directed to the first American Guard service team, so that the members can make use of moral reasoning tools so that questions related to ethics and corporate activities are properly addressed.   The image of the management relies on the code of ethics.   Ethical standards set by the company are usually the crucial tools which enable the management carry out corporate, social and ethical responsibilities.   The function in essence is beyond legal requirements. (Francesco, 2006) The corporate social responsibility will however consider the international standard as well as the best practices. (Francesco, 2006) Conclusion According to many writers, the social responsibility of any business must have ethical responsibilities.   First American Guard Services Company has social responsibilities which will further be subdivided into ethical, legal and economic.   In addition, the ethical responsibilities of the company are parallel to the legal issues. (Francesco, 2006) The management function will therefore revolve around harmonizing all the issues concerned, to ensure all the business plans, implementation adhere to the management function.   This is because, all legal, social and ethical guidelines, determine the policies that the management will formulate and who the implementers will be. (Francesco, 2006) It is important to note that, most social responsibilities are not clear and are more or less an assortment of legal and moral responsibilities, vested interests and some moral ideals.   This package however, inhibits the managements to consider other ethical responsibilities of the company.   This means that if the company trades on ideals, corporate social responsibility myth diverts the attention from the duties of the management. (Francesco, 2006) References Francesco, P. (2006) Developing Corporate Social Responsibility, Edward Elgar   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Publishing.            

Sunday, September 29, 2019

Emily dickinsons nature poems Essay

Emily Dickinson’s use of nature imagery in her poetry incorporates elements of both romanticism and realism. These usually contrasting visions allow Dickinson to express a duplicity of perception, a duplicity which can be considered as a part of nature itself, as expressed through human consciousness. Although the overall impact of Dickinson’s nature imagery is romantic and reveals perception of nature as a mode of transcendence, the imagery and diction of Dickinson’s poems also establish a convincing realist tone, which separates her work from strictly transcendentalist nature-poets such as Emerson or Thoreau. It is not difficult to pinpoint individual poems by Dickinson where nature emerges as an obvious transcendent force. Her poem #214 â€Å"I Taste a Liquor Never Brewed† (Perkins, 990) utilizes an obvious metaphorical dynamic: the speaker of the poem is â€Å"drunk† on elements of nature: â€Å"Inebriate of Air — am I — / And Debauchee of Dew –† (Perkins, 990) and the exuberance of the speaker is meant to be both humorous and extreme. The poem strikes a comic tone, due to Dickinson’s belief that â€Å"the comic or humorous is no less serious than the tragic† (Eberwein 150) and in her mind, the â€Å"depths of human existence could never be climbed, would never be plumbed, without a humorous attenuation to the world† (Eberwein 150). The humor in poem #214 is meant to emerge from the irony of a speaker blatantly celebrating their drunkeness. Despite the poem’s comical overtones, the theme of the poem is, in fact, quite serious. The poem’s theme is that nature is a â€Å"gate† through which ecstacy is reached. The true irony of the poem is that liquor is superfluous to true ecstacy; all that is needed is nature itself. In this way, Dickinson is casting a criticism on her society’s reliance on â€Å"artificial† stimulants. Nature will endure where actual liquor runs dry: â€Å"When `Landlords` turn the drunken Bee/Out of the Foxgloves door –/When Butterflies — renounce their `drams` –/ I shall but drink the more! † (Perkins, 990) The seriousness of the poem’s theme is in the implied isolation of the speaker, who is acknowledged only by the â€Å"Seraphs† and â€Å"Saints† (Perkins, 990) who watch â€Å"the little Tippler / Leaning against the — Sun -† (Perkins, 990). It is impossible to escape the feeling that â€Å"Leaning against the — Sun† (Perkins, 990) is a dangerous position even fro an ecstatic poet; so while the poem demonstrates transcendence, it also expresses isolation and alienation. By contrast, Dickinson’s poem # 328, â€Å"A Bird came down the Walk –† (Perkins, 995) begins with a sense of alienation and rigid realistic description and opens toward the end to a transcendentalist vision of nature. The beginning line describe how a bid hopped on the speaker’s walk and â€Å"bit an Angleworm in halves† (Perkins, 995). The poet’s observation that the bird â€Å"ate the fellow, raw,† (Perkins, 995) suggests anything but a transcendental vision of nature. rather, the scene evokes a stark, biologically precise depiction of natural processes. Nevertheless, a duplicity of perception is hinted at in the following lines â€Å"And then he drank a Dew /From a convenient Grass –/ And then hopped sidewise to the Wall/ To let a Beetle pass –† (Perkins, 995) where the previously predatory scene gives way to one of â€Å"civility† and calm. The duplicity of perception is extended by the phrase â€Å"Like one in danger, Cautious† (Perkins, 995) which â€Å"may modify either the preceding â€Å"He stirred his Velvet Head† or the following â€Å"I offered him a Crumb,† hence either the bird or the speaker or both† (Eberwein 85) and, as such, admits an ambiguity into the poem’s diction which is foreshadowed by the imagery. This ambiguity is not quite resolved, but merely turned toward an image of transcendent nature in the poem’s closing lines: â€Å"Too silver for a seam –/Or Butterflies, off Banks of Noon/ Leap, plashless as they swim† (Perkins, 995). Whereas poem #214 began with a blatant expression of intoxicated transcendence and ended with an ambiguity of isolation and alienation, poem # 328 begins with a sense of alienation and even violence,but resolves in a harmonious, transcendental uplift of diction and imagery. Obviously, Dickinson aim in her poetry was to represent the duality of human perception and the duality of the natural world which can be resolved in aesthetic expression, but not by methods based solely on rationalism or realism. Works Cited Eberwein, Jane Donahue, ed. An Emily Dickinson Encyclopedia. Westport, CT: Greenwood Press, 1998. Perkins, George; Perkins, Barbara. The American Tradition in Literature 11th Edition 2007

Saturday, September 28, 2019

Alcohol a nectar of the Gods

Alcohol a nectar of the Gods The taste is pure satisfaction. It is advertised everywhere and sooner or later you are bound to try it. Just the smell of it can cause some lucky alcoholics to begin salivating at the mouth. Alcohol can lead to the wonderful world of addiction. If you are one of the selected few, you could become an alcoholic very quickly. Upon becoming an alcoholic, your life is bound to fall into place. Everyday will be packed with free time. Free time to drink all day and do as you please because you have most likely been fired from your job by now. If you are still working, just keep going in half tanked and hung over. The supervisors tend to really love this. Alcoholism can possibly make for tight funds. So drink cheap beer and get some rich, alcoholic friends to support your habit with. If you want to experience something totally euphoric, try driving under the influence. Driving gets much more interesting with blurred vision. If the cops catch you drinking and driving, they will haul you off to jail and lock you up in a cell for the remainder of the night. Its kind of like staying in a hotel if you think about it. If you have a chance to escape the law, put the pedal to the metal because they usually end up confiscating all your stash and a lot of beer money. My only tip is drive after each night out because you know what they say, practice makes perfect. Also, if you are a person who likes to change cars frequently, drinking and driving provides the perfect opportunity, because you bound to hit a telephone pole or two. Being an alcoholic is one sure way to get the women and be proud of yourself. Girls really get into the staggering and bad breath. Girls think it is really great when you need them to lean on, preventing you from falling to the floor. And if a girl smells alcohol on your breath you can bet they will be standing in line to make out with you that night. The glossy, red eyes from being drunk let girls know that you are really into them and think they are the most beautiful thing on the earth. Being drunk often brings words of wisdom and the best out of everyone. It is almost guaranteed that you will wake up in the morning and be so proud and pleased with everything you said and did the night before. Another great thing about drinking is when you fall asleep you will sleep better than when you were a baby. You know you ve reached the ultimate goal of any alcoholic when you like to drink alone just as much as with others. Drinking alone makes you so independent. Drunks set many good examples and hold moralistic values. It could be said that your typical drunk could be any model American. With so many great results from drinking, I can’t understand while anyone would hesitate to start. Drinking stimulates physical implications on the body. Waking up the next morning after a long night of drinking with a hangover is the perfect re ason to start drinking again. That pounding headache and nauseated feeling is enough to drive anyone to tip back a bottle of booze. Without another beer, it could be hours before you walk straight again. Repeated drinking episodes with hangovers will eventually lead to interesting internal defects. Topping the list would have to be dead brain cells, and a liver that refuses to work. You will know you fit into this category when you cant spell your name you are scheduling your dialysis. Alcohols effects over life are constant. From immediate results amplified through hangovers to lifetime disorders, it makes visiting the doctor a guessing game.When you feel your life is coming to end due to the effects of alcohol, do not fret, because you will have known you lived life to its fullest. The biggest legend of all would have to be the man that died of alcohol poisoning when he got up to see who was at his door. It was the Alcohol Anonymous group. He sure showed them. I hope that you now understand all the benefits tha t come from being an alcoholic. Please drink for the well-being of yourself, because beer isnt just for breakfast anymore.

Friday, September 27, 2019

Case Analysis of OD Letter Study Example | Topics and Well Written Essays - 250 words

Analysis of OD Letter - Case Study Example Is that true? I could sure use someone to bounce some ideas off. I’d appreciate any insights. Sorry to have missed your call but I was in Oklahoma City doing some work with one of my new field teams. And now that I’m back, your secretary said you were out of the area on company business. So this is what we get paid the big bucks for! I thought I’d zap this e-mail off instead of waiting for you to get back at headquarters. Your e-mail triggered some old memories. Excuse my rambling in what I will share with you. I’ll add the details when I see you. Please keep this confidential. Yes, you were right about me working with the XRS project team. I looked in my records and it was three years ago that I worked with XRS. I have been indirectly keeping in touch with how things are going there through one of my old contacts. Their project manager, John Everet, had been under a lot of pressure from his department head, Kate Pringle, to get the project moving at a faster pace. It seems that the team was not turning out any results, and John had been the team manager for over two years. Kate talked to me about the team. She seemed to think there was some friction among members andmaybe that John was causing some problems.†¨Anyway, Kate contacted me to see if I would go along on the team’s annual retreat and maybe help them with severalissues—mainly personnel stuff—and, me being an outsider, bring in a new perspective. Because the company requires an out- sider from another division to go along and help with the training on team retreats, John didn’t have much choice about me being there. He sure didn’t go out of his way to make me feel welcome. I decided it would be wise to go easy at first until I got the lay of the land, and retreats generally have gone pretty well. Most teams have gone away from the retreat thinking they have worked out some team issues. Well, this retreat broke the mold. Anyway, the three-day retreat was weird. The retreat

Thursday, September 26, 2019

MRI Essay Example | Topics and Well Written Essays - 2000 words

MRI - Essay Example Slice thickness, is one important parameter, which divides the body part being examined into sections of varying width or thickness. The result of examination depends on the slice thickness. If it happens to be a minute problem, then the slice thickness will be small, because a larger slice thickness might result in erasing small lesions or pathologies. MRI is mainly used to look into the brain and the nervous system of human body to figure out the inconsistencies using the functional magnetic resonance imaging, as these parts happen to be the most delicate parts of human body. Prasad (2005, 292) states that the 'MR images are in effect computer generated visual reconfigurations of physical data such as the relaxation times of hydrogen atoms that are found abundantly in the body.' More than two third of our body is made up of hydrogen atoms. Hydrogen exists in different forms in our body. For example water (H2O), consisting of two H atoms and one O, makes up about 70 percent of human body. In addition Hydrogen atoms are also present in the tissues and fat present in human body. When magnetic energy is sent into our body using radio frequencies, the hydrogen atoms absorb the magnetic rays and send out the same magnetic energy, depending upon the extent of magnetisation. As the nuclei of the hydrogen atoms happen to be in the form of small magnets, so when the magnetic fields change in their surroundings, they respond accordingly. This movement is recorded by the MRI equipment which in turn is analysed by the healthcare professionals to decipher the exact composition. As the experiments started off with an emphasis on nucleus, in early days MRI was known as Nuclear Magnetic Resonance (NMR). Since the process itself is stated to involve very small amount of energy, the normal biochemistry of human body is not affected. The key requirements for performing an MRI include; A strong magnetic field through the primary magnet, emanating out of the a magnetic which could be a permanent, resistive or a superconductive Gradient magnets for fine tuning the magnetic fields The scanning table on which the patient is allowed to lie Attached computers and film for taking the printout of the scan The individual who is to undergo MR imaging is allowed to comfortably lie on a sliding table. The table is then slid into a cylindrical structure which is surrounded by the magnets. Once everything is in position, the magnetic field is turned on; this creates a 2-dimensional image of the particular body part of the person on the computer screens. A coil is placed around the body part/ object which is under observation for MRI, exclusively to pick up the signals for the image. Well, just to make things easier a talk-back system is also in put in place so that after the start of clinging sound the patient doesn't feel uncomfortable, and if required he can communicate with the radiologist. The procedure may last for about 25-50 minutes depending upon the requirements and the complexity of the patient condition. There are in general two to six imaging sequences, each lasting for about 10-15 minutes. Since the process involves magnetic fields, it is therefore advised that anybody having m etallic implants in their bodies must inform the radiologist beforehand, so that adequate

Ethics in Scientific Journals Essay Example | Topics and Well Written Essays - 1250 words

Ethics in Scientific Journals - Essay Example Ethics is very important in scientific journals. It is very important to note that when reporting any scientific information, care should be exercised. Over the recent past, scientific journals have gained a lot of popularity. Currently, there are journals for scientific research, where scientific researchers would publish their reports, especially those that are either urgent or not large enough to make a book. There are occasions where scientific research is reported in the main media channels. It is very important to ensure that when reporting scientific information, correctness is maintained. This would ensure that any misleading information is eliminated; hence they do not reach the masses. Whether published in the scientific journals or main mass media, there would always be a review done to ensure that ethics, among other factors, are maintained in the report. Scientific reports, unlike other reports, are having a greater impact. Rollin (12) says that scientific reports are de pended upon by many professionals for application in various fields. The reports are always subjected to peer review because of the consequences with which they have when misinterpreted. Aristotle (23) says that scientific journals would be peer-reviewed before publication to ensure that any misleading information is completely eliminated. This scholar gives an example of a medical report. The world has witnessed the emergence of many new health complications that have necessitated research. Some of the existing stubborn diseases like HIV/AIDs have also called for scientific research to unravel the mystery behind them. When a report about such diseases is made, medics would always rely on them in their normal duties. This is an issue about someone’s life. If any information is given about them, then it would be putting the lives of many people at risk. This will not only be a criminal offense, but also a very unethical term. The same is the case with other professionals like engineering because the consequence would result in bodily harm. Unlike political reports that are always full of speculations, scientific reports would not always sustain any speculations. There are no rumors in a medical report. The report must be precise and without any form of doubt. If there is a need for further research because some parts of the research are not conclusive, it should be made clear so that this part needs further research. As such, any person using this material would know that the research is not conclusive in other sections. When applied, the person would know that the material is not conclusive and therefore would know the limits within which the report would be valid Scientist should therefore keenly review media reports about their studies and work to correct any misleading statements. It is a common phenomenon that journalists would be interested in reporting various facts about scientific research.

Wednesday, September 25, 2019

Econometrics Essay Example | Topics and Well Written Essays - 1500 words

Econometrics - Essay Example Moreover, the scatter plots of income versus consumption and income versus investment are also plotted. The graphs show that the actual plots of all the variables except the government non-wage income show fluctuating trends with alternative peaks and troughs in the period of analysis. The correlograms of all the variables except the government non-wage income become zero from the third order ones. This shows that all the variable except the government non-wage income show fluctuating trends in the period of analysis. Government non-wage income show steady rising trend in the period of analysis. The correlogram of this variable is not gradually declining and remains the same. The scatter plots show that there is a significant positive correlation between income and consumption .Though a positive correlation can be seen income and investment, it is not so significant compared to the previous one. The OLS estimation for consumption shows perfect model fit. The coefficients for wage income and profit income are positive and significant. One percent rise in wage income leads to a significant rise of 19 percent consumption while one percent rise in wage income leads to a significant rise of 79 percent in consumption. The actual and fitted values of Consumption shows perfect fit as shown from the graphs in appendix 2. The 2SLS estimation shows that only wage income is significant in determining consumption .Here the coefficient for wage income has increased to 81.6 percent compared to the OLS estimation. At the same time profit income lost its significance here. The actual and fitted vales show perfect fit in this case also. For the estimation of investment with OLS, current and lagged values of profit income are positive and significant while lagged value of capital stock is significant and negative in determining investment. One percent rise in current and lagged

Tuesday, September 24, 2019

Business Systems Analysis and Decision Support Essay

Business Systems Analysis and Decision Support - Essay Example following three ways will go a long way in ensuring the development of a satisfactory MIS; Business System Planning (BSP), Critical success factor (CSF) and then we have the End/Means (E/M) Analysis (Lotfi & Pegels 1986 pg. 86-102). This is one and the most vital way of determining the requirements of an MIS in MagiCo operations and in any other multinational organization. This methodology is pre-formulated by IBM itself and therefore it is standard for any form of organization that intends to use its applications. This methodology goes a long way in first establishing and listing down all the priorities in terms of Information System of the organization. One of the ways it does this is by identifying the way data is maintained in the system. To arrive at this important requirement, the relevant parties will use data architecture supporting applications (Lotfi & Pegels 1986 pg. 86-102). This will go a long way in defining the classes of data by employing the use of different matrices. As a result, relationship is established within the organization and its processes as well as the data requirements. Because of this approach, MagiCo will be able to find and establish the requirements of its system in the broad c ategorical approaches. The approach as developed by John Rockart takes the dimension of identifying the key business goals and the strategies as are planned to be applied by each manager. These are combined with those of the overall business and a comparison is thereafter made. The business and the management goals are then evaluated and this results into the establishment of the Critical Success Factors that underlie these broad goals and objectives. The identification of the CSFs will mean that the irrelevant factors are eliminated forthwith leaving the analyst with the next step of the CSF analysis (Lotfi & Pegels 1986 pg. 86-102). This is the measure of the effectiveness of CSF an activity which will go ahead in defining the requirements of the

Monday, September 23, 2019

A9 Assignment Example | Topics and Well Written Essays - 750 words

A9 - Assignment Example They further suggest that the purpose of affirmative action is not to create reverse discrimination (Cosson, 2010). Affirmative action is now embraced by businesses in their hiring strategies and models. While it brings with it some disadvantages such as reverse discrimination, it also has a wide range of advantages. These include; diversity in the work place, increased moral commitment by companies and increased opportunities for minority groups. Therefore, the benefits that stream from affirmative action exceed the disadvantages. In the case between the male candidate and the agency, the agency was right in reaching its decision of hiring the female candidate. This is because the agency, in making its decision, embraced the fact that besides from creating increased opportunities for women who are qualified, diversity in the work place was also fostered. Diversity enables organizations to draw more insight from different employees especially in problem solving. In the above case, tw o major issues emerge. Firstly, affirmative action remains controversial and divisive. Secondly, it creates a whole range of merits and demerits. It is controversial and divisive because it tends to favor certain groups of persons such as women, and at the same time appear discriminative against others. Its advantages are increased opportunities for minority groups such as Hispanics, diversity in the work place, and an increased moral obligation to society by businesses (Cosson, 2010). However, on the other hand, affirmative action policies create room for stigmatization and reverse discrimination The main challenge with affirmative action is visibly the issue of discrimination. While affirmative action policies drum support for equality and diversity in the work place, the issue of discrimination remains unresolved. The writer clearly shows that the male candidate was obviously discriminated against in the form of gender, all in the name affirmative action. Discrimination

Sunday, September 22, 2019

Against the Machiavellian Principles of Politics Essay Example for Free

Against the Machiavellian Principles of Politics Essay According to Machiavelli, the affairs of the state reside in the power of the prince. It is the prince which determines, directs, and unifies the components of the state. The prince therefore should act to preserve, strengthen, and protect his position from danger, whether external or internal, without due moral consideration. In short, with the preservation of the state in mind, the prince should act with political diligence to promote it, regardless of the means. According to Machiavelli, â€Å"he who considers what ought to be done rather what is done will rather find himself in a state of ruin than preservation† (Machiavelli, 29). Political action free from any moral consideration is based from three assumptions: 1) Human nature is corrupt and selfish. It is impossible for the prince to satisfy all the needs of the people without injuring the welfare of others. The people is always eager to overthrow their government, to mock the instruments of the state, and to criticize the actions of the prince, whenever their interests (whether political or economic) are affected. According to Machiavelli, â€Å"Because this is to be asserted in general of men, that they are ungrateful, fickle, false, cowardly, covetous, and as long as you succeed they are yours entirely; they will offer you their blood, property, life and children, as is said above, when the need is far distant; but when it approaches they turn against you† (Machiavelli, 29); 2) Morality and religion only limit the actions of the prince. In fact, when fortune fades away, the prince may become unable to defend himself from disconcerting threats. It is therefore important, according to Machiavelli, for the prince to â€Å"guard himself as from a rock; and he should endeavour to show in his actions greatness, courage, gravity, and fortitude; and in his private dealings with his subjects let him show that his judgments are irrevocable, and maintain himself in such reputation that no one can hope either to deceive him or to get round him† (Machiavelli, 32). The prince should endeavour to show himself as the bearer of righteousness, fidelity, and religion, without endangering his own power. This impression is only used to preserve the power of the state. Only in this way can religion and morality be twisted for the benefit of the prince; 3) The success of a prince is never solely dependent on law, morality, or religion. Sometimes, political success is achieved by political deception, alteration of political favors, and in general by arms. It is therefore necessary for the prince to use these instruments to preserve the instruments of the state. It is this condition that the position of a prince who took the state by arms is much more endangered than that of a prince appointed by the people or the Church. To preserve his power, the prince must take moral considerations and religion as only instruments of that purpose. General Critique In order to provide a more comprehensive criticism against Machiavellian politics, there is a need to draw important propositions from different thinkers and theories. Some of the selected philosophers and social theorists are as follows: St. Thomas Aquinas, Immanuel Kant, Rousseau, and Montesquieu. According to Aquinas, morality and religion are necessary instruments for the governance of the state. In his book â€Å"De Regnum† (On Kinship), Aquinas argued that it is always necessary for the ruler to take the precedents of moral and religious obligations as a means to please Divine justice (Curtis, 431). For Aquinas, the foundation of the state is divine in orientation. It is founded by the grace of the Divine Being (who willed the creation of the state after man’s fall). A prince who disregards the religion and morality disregards the Creator. Aquinas here does not disregard the necessity of preserving the power of the state. What Aquinas emphasized is the excesses of unscrupulous rule – a condition which would be punished by God. For Aquinas, a good prince ‘will always be favored by God’ (and preserve his base of power). Rousseau argued that morality is borne out of the so-called ‘social contract. ’ The people gathered to appoint a ruler who would promote their interests. The ruler has the following obligations: 1) to protect the people from threats, 2) to maintain peace and order, 3) to promote solidarity and good governance, and 4) to relinquish power whenever the people chooses a new ruler. A ruler who fails to accomplish these tasks would lose his position. The state, however, would remain intact because the instrument of power resides not in the prince but in the people. According to Rousseau, a prince who put all the instruments of power in his hands is more likely to fall than a prince who measure his authority based on public will. Montesquieu offered a more critical and comprehensive understanding of the position of the prince. According to him, an unruly rebellion of the people is tantamount to political disobedience – a violation of the law of the land. This instance applies only if two conditions are met. First, the ruler does not show any violation of the law. And second, the people unlawfully breaks the social contract and sought to depose a good government. In short, according to Montesquieu, there is no need for a ruler to follow the Machiavellian principles because the law is the manifestation of social and moral obligation, the codec of ethics (Curtis, 613). Here, one may infer that the actions of the ruler should be based solely on this criterion. A ruler who follows the law would never fall in disgrace. Using Kant’s universal moral standards (in his book â€Å"Prolegomena†), one can create a set of moral standards which would be used in judging the actions of a ruler. First, one should determine whether the consequence and intensity of political actions. If a political decision disfranchises a significant portion of the population, such decision is illegitimate (not morally neutral). Second, one may determine the means by which decisions are carried out. Here, legality is an important factor. Third, one may determine whether the actions of the state are in congruent with accepted international standards of morality. Here, an external standard is added in order to ensure the moral efficacy of the state in all levels. The proper enforcement of these external standards is either left to the disposition of international agencies or to the efficacy of treaties. In short, internal political standards of morality are enforced by the state (the people serve as the watch guard of the state). Machiavellian concepts of political deception and moral neutrality have no standing in this type of political set-up. Works Cited Curtis, Michael. The Great Political Theories. New York: Avon Books, 1981. Machiavelli, Niccolo. The Prince. Trans. by W. K. Marriott. New York: Macmillan Publishing Company, 1995.

Friday, September 20, 2019

Internet Has Changed Peoples Lifestyle Marketing Essay

Internet Has Changed Peoples Lifestyle Marketing Essay Introduction The telephone took four decades to reach 50 million people The Internet has managed this within four years as digital technologies provide such efficient channels for business and consumer interaction transactions The Internet has changed people lifestyle; it became apart of people daily life. They use internet to replace their common activities such as E-mail instead of writing letter, MSN chat and Skype instead of using telephone, YouTube instead of watching TV. Therefore, many organisations tried to use Internet as a new way to reach their customers which called E-marketing. E-marketing is a new marketing strategy using to reach many consumers at low cost. It can be used to interact with customer 24hrs a day, 7days a week without any additional cost. Consumer can get information about products any times, any places. According to Seock and Norton (2007), consumer channel choices for shopping had been widened because of diffusion of the Internet: causing everything that happens to sales in electronic form or what it realized as online shopping. 84 per cent of global consumers have experience purchasing over the internet (Nielsen, 2008). Number of Thais internet usage rate is increasing everyday. There are many internet service providers offer high speed internet. Most of Thais are familiar with using internet in playing game, social network like Facebook, twitter but number of online purchasing is very low. Comparing between European and Western to Thai, the number of online purchasing is very different. Online purchasing is still very limited for Thais. They are not familiar with buying things online. Thai consumers love to see and touch and feel the product before making any purchasing decision. With brand name product, consumers seem to have a high involvement because its impossible for them to buy without seeing the real product. They also have very limited knowledge to buy thing online as they are afraid to share important information online such as their bank account, there personal data or their credit card number. At the same time, the number of Thai website that offers online service is very rare. Therefore there is opportunity to introduce this service for Thais. This research attempts at learning why Thais consumer do not want to buying brand name online. The aim of this research is to learn what Thai consumer perception toward buying brand name online is and what factors effect their decision making. What Thai consumers characteristic make a brand name online shopping. The area of this research will focus mainly on Thai consumers in Thailand. The research objective will be divided into five main areas: To investigate Thai consumer buying making decision toward online shopping. To investigate Thai consumers experience on shopping online. To investigate Thai consumers perception toward buying brand name online. To identify the most important factors in the buying decision making on online shopping in Thailand To investigate Thai consumer demographic characteristic who make online shopping. In research methodology, we will try to achieve the objective by using quantitative research through online questionnaire. The result of research will help researcher in order to achieve the objective that has been set and help us to determine Thai consumer behavior and perception toward buying online. Literature Review In this part, the researcher would like to divide into two parts: The first part will explain a character of consumer behavior towards high involvement such as buying brand name product, what factors effect them to buy online, and consumers perception toward brand. The second part will clarify the characteristic of online marketing in Thailand. Involvement Some products, such as high-performance car seem inherently involving because of their complexity, risk and cost, while others, such as toothpaste seem uninvolving by comparison because of their familiarity, low risk and low cost Laakasonen (1994) Therefore, buying brand name online is like a high-performance car because is too complex (untouchable product) and risky (fake product), this will make consumer spend more time in order to search information before making a decision. Moreover, a consumers level of involvement depends on their individual interests, value of products, needs, which attract or motivate them. Involvement is commonly defined as the consumers personal interest in buying or using an item from a given product field, an approach which nicely summarizes the personal, product and situational components of the relationship (Evan et al,. 2009). Factor Customer satisfaction seems to be a key major to influence consumer-buying decision. Customer satisfaction can be the most important reason for customers deciding to make a repeat purchase, and telling their friends about their satisfaction (Palmer 2000). If online shop can make customers believed that their shop has good quality product, secure, and friendly, this would help their shop gain more new customers. Not only online shops give customer a good quality product, but they should also give them equity. Oliver (1997) defined equity as a fairness, rightness or deservingness judgment that consumers make in reference to what others receive; it is also considered as an important determinant of satisfaction. With these product quality and equity, this would make customers satisfy and motivate them to make a repurchase. Brand Brand image seems to be an important for online market area because brand helps consumer make buying decision and it creates a credibility of online shop. Rio del B. et al. (2001) defined brand as the set of associations and behaviors on the part of a brands customers, channel membersà ¢Ã¢â€š ¬Ã‚ ¦ and that gives that brand a strong, sustainable, and differential advantage over competitors. In Thailand, the customers perception toward brand product equate to high price, which in turn dampens their willingness to make decision toward buying brand name online. Online market It seems to be that now the market channel has been classified into two main channels that are online channels and offline channels or we called traditional channels. Offline channels, consumers reduce of risk on shopping because they can have a physical interaction with products, when compared to online channels. According to Brown et al. (2003), Whilst shopping online allows the exchanging of value and productà ¢Ã¢â€š ¬Ã‚ ¦ by using computer as a medium of transaction transference. In Thailand, it seems to be that now Thai consumers still like to buy products from offline channel or in shopping mall due to online channel still do not have a good credibility. Thai online retailer should have to create credibility and trust to consumer in order to make them believe that Thai online channel is secure (Mict 2010). It seems to be that in Thailand, many of online retailers seem not to register for doing their business compare to Western country. Moreover, Thailand online payment still unsecure, this make Thai online consumers do not want to take risk on payment that is why they prefer to touch and see product before making buying decision. The key concerns that consumers have over the online purchasing trends are security of the privacy or financial which relatively unsecure once online payment has been made, such as credit card fraud (Harridge 2006). Moreover, Roman and Cuestas (2008) stated that security on online transaction is need to be strict as to gain trust i n the mind of shoppers regarding their online financial transaction made with the site will be safe form unauthorized access. Research Question This research has focused on four main research questions as follows: Who are online stores target customers in Thailand? What is the perception of Thai customers toward online shopping? What factors affect Thai consumers purchasing decisions? Which is the most important factor that influences Thai consumers purchasing brand name online? Research Method Research method helps online retailer know which strategies they should use to influence consumer buying decision. Research method can be classified into two types that are Quantitative research and Qualitative research. Both of them have different pros and cons, which researcher will discuss more in detail later on. Data can be collected in variety of ways, in different settings-field or lab-and from different sources. Choosing methodology is up to what paradigms the researcher adopts. There are two main paradigms or philosophies, which are positivist and phenomological (Collis and Hussey, 2003). The alternative terms for positivist are quantitative, objectivist, experimentalist, and traditionalist. The other terms for phenomenological are qualitative, subjectivist, humanistic, and interprevist. There are several data collection methods, each with their own advantage and disadvantages. The research method that researcher will use is Quantitative research, focusing on the survey method. Now, researcher should think about what types of questionnaire should be used, such as mail questionnaire, electronic questionnaire, and personal questionnaire. In this report, due to time limitation, it seems to be that the used of electronic questionnaire or online questionnaire will be more suitable and take less time, cost, and can expand very quickly in order to collect data than other quantitative research. After researcher has chosen a specific method, researcher will make a questionnaire by using pilot test in to make sure that all questions can be understand by respondent. If questionnaires have any errors or respondents hard to understand, researcher can improve before using to the target audiences. Researcher has specific target to make a research that is a Thai consumer age between 18 and 35 years old and compare between teenager (18-27) and middle age (28-35). A sample size that researcher expect to have is minimum 100 respondents, the questionnaire will be distributed through email and social networks to 200 respondent who have use internet. In order to make data collection, we will use both primary and secondary data. The secondary data will used on book, journal, article, and commercial online database provide from the website (Mintel, or Google Shcolar). Website offering information for a fee, almost every industry association, government agency, business publication, and news medium offers free information to those tenacious enough to find their website (Armstrong and Kotler 2009). The use of secondary provides a good start for research and define problem and objective. This helps researcher in order to find an objective for consumer buying decision and perception toward online brand name in Thailand. Secondary data helps researcher to better understand and indicated what has been missing form the current online business in Thailand. Moreover, it helps researcher to develop hypotheses and objective of the study. For primary data, a survey research has been chosen as a method of conducting a research, because survey was available to large number of population. As a time limitation, using questionnaire can help researcher save time and cost. After we already collect data from questionnaire, then we can identify that questionnaire is validity, reliability, and genalisability or not. Roadblock There might have some limitations when make a research, due to limit of time and budget cost. Moreover, the respondents are required to have a computer access to be able to take part in this research. Discussion To sum up, researcher believed that this research will help us to know more about Thai consumers behavior and perception toward online brand name store. The use of secondary data helps researcher can set a research question in order to collect a primary data. However, researcher has to select which research method would like to use in order to collect primary data. As a result, a good method in this report is Quantitative research by using questionnaire to collect primary data. By using questionnaire, it will help researcher to collect data and can analyses about Thai consumers. Due to time limitation of research, the used of questionnaire will helps us to save cost and time. The questionnaire has been sent to 200 via e-mail and social network in order to collect minimum 100 respondents. Researcher believed that the primary data that we collect can help to do finding and analyses on Thai consumers buying behavior and perception toward online brand name. Moreover, to learn more what f actor can influence Thai consumer in order to purchase brand name online.

Thursday, September 19, 2019

Comparing Atkins and Balance Energy Bars :: Health Nutrition Diet Exercise Essays

Comparing Atkins and Balance Energy Bars   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Many are fascinated by the various diets in society; people want to lose weight by finding a reliable method that will ensure results. Two common diets include the Atkins Diet and the Zone Diet. Both of these have energy bars that contain the nutrients need to meet the diets specific requirements. In the article â€Å"Glycemic and Insulinemic responses to energy bars of differing macronutrient composition in healthy adults,† by Steven Hetzler and Veonsoo Kim, a study was conducted that compared the different energy bars. The study looked at equal proportions of these bars to see their effects on glycemic and insulinemic levels. This paper will be focusing on the differences between the Atkins and Balance Energy Bars and the effect they have on glycemic and insulin.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Atkins Diet contains a low amount of carbohydrates, whereas the Zone Diet has the components of a 40% carbohydrate, 30% protein, and 30% fat breakdown. The energy bars associated with these diet influences the glycemic and insulin levels in the body. By having a reduction of glycemic and insulin levels in the body affects a diet. By having low glucose levels this will ultimately lead to weight loss. This happens either through the removal of carbohydrates or by substituting low glycemic index carbohydrates for higher ones. In doing this the higher level of insulin will be reduced, for example high blood cholesterol levels will go down.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To test the insulin and glycemic levels the energy bars contain the study had 20 healthy adult participants. They were split into groups receiving 1 of 5 test meals; 1 being low carbohydrates, 2) moderate carbohydrates, 3) high carbohydrates, 4) white bread, and 5) chicken breast. Chicken breast was the negative control since it contains no carbohydrates, whereas white bread was the positive control. Test meals 1) with the low carbohydrates, include the Atkins Energy Bar, and test meal 2) includes the Balance Energy Bar.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In order to see the levels of the glucose and insulin after consuming the bars blood samples were taken and analyzed. In this experiment the Atkins energy bar produced the lowest glucose results.

An Analysis of Shakespeares Sonnet 73 Essays -- Sonnet essays

An Analysis of Shakespeare's Sonnet 73      Ã‚   Sonnet 73 by William Shakespeare is widely read and studied. But what is Shakespeare   trying to say? Though it seems there will not be a simple answer, for a better understanding of Shakespeare's Sonnet 73, this essay offers an explication of the sonnet from The Norton Anthology of English Literature:      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   That time of year thou mayst in me behold   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   When yellow leaves, or none, or few, do hang   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Upon those boughs which shake against the cold,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Bare ruined choirs, where late the sweet birds sang.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In me thou seest the twilight of such day   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As after sunset fadeth in the west;   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Which by and by black night doth take away,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Death's second self that seals up all in rest.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In me thou seest the growing of such fire,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   That on the ashes of his youth doth lie,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the deathbed whereon it must expire,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Consumed with that it was nourished by.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This thou perceiv'st, which makes thy love more strong,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To love that well, which thou must leave ere long.  Ã‚   (879)      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This sonnet rhymed abab cdcd efef gg form. Most of his sonnets were written in the 1590s at the height of the vogue, but they were not published until 1609. The first 126 are addressed to a young man; the remainder (with the exception of the last two, which are conventional sonnets on Cupid) are addressed to an unknown "Dark Lady." Whether or not Shakespeare laid bare his heart in his sonnets, as many critics have contended, they are his most personal poems.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For understandi... ...ine 14). "Leave" in line 14 does not mean more than "leave behind."      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Shakespeare's Sonnet 73 well fills and fits the three quatrains and single couplet of the Elizabethan sonnet. We can be sure there is no doubt to believe that some of Shakespeare's sonnets, like Sonnet 73, were well known and he was surely placed at the head of the dramatists and high among the non-dramatic poets. As Bender and Squier claimed (75), in the sixteenth century, Shakespeare is England's greatest playwright and the best of the Elizabethan sonneteers.    Works Cited Abrams, M. H., et al., The Norton Anthology of English Literature. Vol. 1. New York: Norton, 1986. Bender, Robert M., and Charles L. Squier, eds. The Sonnet: An Anthology. New York: Washington Square P, 1987. McAuley, James. Versification: A Short Introduction. Michigan: Michigan UP, 1985.  

Wednesday, September 18, 2019

Are sports stars grossly overpaid? :: essays research papers

Sport has always entertained and influenced our lives. It creates dreams for children and goals for adults. However, many fans are oblivious to the millions they pocket each year. It is without doubt that our sports stars are grossly overpaid. Their annual earnings exceed those we make in a lifetime, even when compared to highly qualified professions. Despite the money factor, we sometimes question the values that are emphasized. Sports stars earn substantial incomes compared to an average Australian worker. The official benchmark of average Australian earnings is just above AUS$50,000. However, compared to Layton Hewitt, who receives millions in endorsements and prize money each year, this figure is diminutive. Another example is Venus Williams, 20, is the highest-paid woman athlete in the world. She has a contract with sportswear manufacturer Reebok International Inc. that pays her $40 million over five years. This may seem as a step forward for womankind but others view it as a business deal for more money than one will ever need. The disparity between hard working citizens and sporting legends leads us to question their contribution to society. Many ‘heroes’ are created and mostly because of sporting prowess. Yet, there are some things that are more significant that Olympic glory, contract negotiations and the score of the game. Professions that benefit mankind do not receive nearly as much attention or money but remain essential to society. Through a different perspective, it is becomes obvious that doctors and teachers are in fact underpaid. People who can hit or kick a ball are idolised while others who save lives struggle to gain recognition. What values are we teaching? Or more importantly, not teaching? Sports stars exhibit their talent through winning and rank. However, through success many values are taught. Values such as personal responsibility, integrity and respect for one’s self and others are replaced with greed, selfishness and ‘I win-you lose’ mentality. It is sad to think that sport and brilliant sport stars will become emblems of greed and selfishness.

Tuesday, September 17, 2019

Corrution the cancer of Indian society

The problem In our country is not the lack of knowledge or understanding about corrupt practices but the lack of courage to stand against such practices It Is very easy to target others including politicians but what about common man? WE HAVE to understand that the system is corrupt because we are also corrupt. First, we have to change ourselves then only we can expect change In others. This Is a very old method to point the fingers towards the wrongdoing of others. But no one is ready to check their own character. M really questioning the validity of self- referred right people. Before pointing fingers towards others, including politicians and other government employees, we should Introspect ourselves. I am seeing that everybody is ready to abuse the system but what about ourselves. Are we common people really different from those who are in politics and other sphere of life and running this country? No, that is the truth. We are no more different from those whom we are abusing cont inuously on different forum Including media.We are ready to talk about corruption till the time we want to abuse politics. For me doing anything ring is also a type of corruption and most of us in some way or other are involved in corrupt practices. It is quite possible that most readers will not agree with me on this because they are also in the same boat. Let us see whatever what I am saying is correct or not. We are ready to pay money in the form of bribe to get connections of different types such as gas, water, and electricity – all out of turn.There may be others In the society who are not able to pay such bribes to get such connections out of turn and even some time they have to Walt for longer period of time just because of people like us so called middle class who ant corruption to be eradicated from society. There are others In the middle class – especially small time businessmen like shopkeepers of different types, – and they may be earning more than w hat we are getting in the form of our monthly salary but they are not ready to pay income tax.There will be more than 10 million such shops in our country and most of them are not paying enough taxes as per law. People opposing FED in retail sector are actually supporting such shopkeepers. What is the need in the world for the parties to fight on such important issue of FED because of such tax evaders? They know very well how to evade Income tax and other taxes and they are at the same time running a market of black money. Whereas FED will bring a lot of money to the government in the form different taxes but it will ensure transparency too in the retail segment.So basic question remains are we really Interested to eradicate corruption from our society? If the answer is yes, then we have to start from ourselves rather than ask others to do. First, we have to change and then only we can expect the change in suit. Let us assume one person in each family take a vow to be not corrupt wh atever resistances will be there believe me that more than 50% corruption will eradicate at very such time. Gandhi]' had stressed that there is enough in the world for man's need but hopelessly not adequate for his greed.In India, it is the greed of a very few individuals that has threatened the teeming billion odd population of starvation, environmental degradation, uncontrolled rise in pollution and deteriorating environmental standards. Looking at Ago in the last 60 years, there is a visible difference. Ago through the sass right up to the late sass sustained itself admirably on solar energy. The ignite of labor saw every Goanna earn his bread through the day and sleep peacefully at night. The spring waters were pure, clean and rich in minerals, smoothening, invigorating and refreshing.Food supply may not have been plentiful but was adequate. The helpless and those ‘unfortunates' incapable of labor were looked after by the family, neighbors, friends or the societal form of institutions like the temple and church institutions or the likes of provider. No doubt then that although there was exploitation of the maunders by a handful of bathmats, by and large the incidences of robberies, rapes, murders and crimes were ender control thus affording Goons the tag of a ‘peaceful society'.Goons were appreciated as gentle, hardworking, talented and a faithful workforce. Goanna musicians, cooks, clerks, doctors, administrators, nannies, personal assistants, engineers and scientists became role models in all walks of life and made their mark in politics too. Goons strives hard to ensure the environment remained clean, green and salubrious. Do we have courage to take such a vow? I don't think so. If yes, for which chances are very less, then it will be really good for the country as a whole.

Monday, September 16, 2019

Mercury Footwear Questions Essay

1. Is Mercury an appropriate target for AGI? Why or why not? Yes, we do think so. In the case, we could find some characteristics of footwear industry: (1) It is a mature, highly competitive industry marked by low growth, but stable profit margin. (2) Performance of individual firms could be quite volatile for they need to anticipate and exploit fashion trend. (3) Except some global footwear brands, athletic and casual shoes market is still fragmented, which means each company could has its own market because of its characteristic. (4) In this market, it is important for the brand image, specialized engineering for performance and price. (5) Life cycle is short. (6) Inventory management and production lead times are critical for the success. (7) Main sale channels are department stores, independent specialty retailers, sporting goods stores, boutiques and wholesalers. (8) Most of the firms outsource the manufactures in China. Below are some characteristics for Mercury and AGI we need to focus on during the analysis: AGI Mercury Target Customer Target customers are urban and suburban family members aged 25 to 45. Youth market, mainly 15 to 25. History Among the first companies to offer fashionable walking, hiking and boating footwear. Its mother company decided to extend the brand by creating complementary line of apparel. Because of the poor performance, it was decided to sold. Style Logo is marked with prosperous, active and fashion-conscious lifestyle. Its main customers are not interest in its apparel. Financial performance Among the most profitable firms. Had poor performance after acquisition by WCF. Revenue contribution 42% of revenue from athletic shoes and balance from casual footwear. Revenue and operating income were 470.3 million and 60.4 million in 2006. Revenue and EBITDA were 431.1 million and 51.8 million.. Products Athletic shoes developed from high-performance footwear to athletic fashion wear. Four main segments: men’s and women’s athletic and casual footwear. Casual shoes focus on mainstream market. In order to emphasizing individual products, it began to monitor styles and images from global culture Focus on smaller portfolio of classic products with longer lifecycles and could maintain simple production and supply chains. Sales channels Mainly sold in department stores, specialty retailers, wholesalers and independent distributors. Small percentage is sold through website. Department stores, specialty stores, catalogs, discount retailers and internet. Inventory management Good at inventory management in the industry. Inventory management performance is worse than the average level. Outsource Outsource manufacture in China. Outsource main materials in foreign suppliers. Advantages &Disadvantages It takes small size as its competitive disadvantages. And it faced with some problems in the consolidation of manufacturers. Price cuts and promotion in apparel line hurts operating margins but helped to the growth in sales. Sales growth is lower than the average because of there is little discount in  price. We could learn that managers of AGI want to enlarge the scale of its company and gain larger market share because of the stable profit margin. And since the revenue is almost the same, it is a good choice to merge with Mercury, which means that revenue would be doubled after acquisition. And these two companies have some similar factors, such as : (1) They could use the same sale channels after acquisition, and internet channel could be enlarged. (2) They could combine manufacturers to get a powerful bargain in suppliers. (3) The product segments are almost the same, which means that there should be little work to do after acquisition in product adjustment. (4) Thanks to the profitable ability of AGI, it is much easier to make a better financial performance of Mercury. (5) It is good for them to increase the performance of inventory management if they merge together. (6) Although their target customers are different, especially in ages, which means that style and brand are different in the very beginning, this factor could turn into an advantage for the new company could have a fully segment of customers with a wider age ranges. Therefore, take into above factors into account; we think that Mercury should be an appropriate target for AGI. 2. Review the projections formulated by Liedtke. Are they appropriate? How would you recommend modifying them? In the case, we could find that Liedtke used historical averages to assume the overhead-to-revenue ratio. However, historical data is usually useless for future. Some studies found there is little evidence that firms grew fast continued to grow fast in the next period. And sometimes there are even negative correlations between growth rates in the two periods. Besides, smaller firms tend to be more volatile than others, which we could find the same characteristics in these two firms we are talking about. And just as we mentioned in the question 1, revenue may be doubled after  acquisition, it just fits the theory that it is difficult to maintain historical growth rates as firms double or triple in size. Therefore, based on the above analysis, we think that it is not reasonable to use historical data for future projections. And sometimes, analyst should be better than the historical growth. Considering that there are five main channels for analyst forecasts: firm-specific information, macroeconomic information, information revealed by competitors on future prospects, private information about the firm and public information other than earnings, we think Liedtke could find more information from above channles to get more accurate assumption. And since performance of Mercury is poorer than the average of the industry, it is better to use industry average level for the benchmarking of Mercury when predicting, instead of a discount rate of AGI for example. And from the comparison of 2007 to 2006, we can find Liedtke’s forecast need great input from AGI to support the development of Mercury, whether he has taken this into consideration? And he estimate debt/equity ratio remains the same as AGI, that is also unreasonable, for it is not possible to change that in short period. 3. Estimate the value of Mercury using a discounted cash flow approach and Liedtke’s base case projections. ï ¼Ë†1ï ¼â€°first of all, to calculate the cash flows from 2007 to 2011, Net Income – (Capital Expenditures – Depreciation) – Changes in non-cash Working Capital = Free Cash flow to Firm We can get the result. Free Cash flow -17,192 26,867 21,740 25,158 29,319 (2) then we need to calculate the terminal value. a. Cost of Capital For cost of capital, we know the debt ratio is 20%, and cost of debt is 6%, we need to find the cost of equity. We assume the cost of equity equal return on equity, we can calculate the historical return on equity from 2007- 2011 is as below, Return on equity 12.8% 14.1% 14.5% 14.8% 14.9% We take 14% as reference. Based on the formula: Cost of Capital =debt ratio *cost of debt +equity ratio * cost of equity, We can get the cost of Capital in 2012, 12.7% b. growth rate in future We can find during the period from 2007- 2011, the growth rate of net income is not stable, so we assume from 2012, Mercury enter into stable and slow development stage. And it is necessary to calculate the cash flow in 2012. From 2007- 2011, the growth rate ranged from 4.74%- 16.3%, we assume the growth in future will be not that high. We can find during the period from 2008- 2011, the reinvestment rate 15.57%- 37.1%, we just take a middle one 24.37%, by multi reinvestment rate and cost of capital (assume cost of capital =return on capital), to reach growth rate afterwards= 3.09%. c. based on the growth rate is 3.09%, we can get EBIT in 2012 is 39,930.. We have assumed ROC=WACC Terminal Value=EBIT n+1*(1-t)/cost of Capital, we can get Terminal Value in 2011 is 315,237. (3)Present value of cash flows: We have get the cash flows of 2007-2011 and terminal value in 2011, and the cost of capital is 12.7%, we can get the respective present value of them and reach the total present value 226,514, which is the estimate Firm value of Mercury. (4) Alternative method to calculate cost of capital, then value of Mercury: a. beta We have learnt from Exhibit 3 of peer companies information in this business, we can calculate cost of capital in alternative ways. Unlevered beta for business= Beta comparable firms/[1+(1-t)(D/E ratio comparable firms)] From information provided in Exhibit, we can get average Beta and D/E ratio, is 1.56, 24.9% respectively. Therefore Unlevered beta for business= 1.35 We know the D/E ratio and tax rate of Mercury, then get levered beta for Mercury =1.52 b. risk free rate and risk premium we assume risk free rate is 5%, and risk premium as the historically one 4.3%. The cost of equity will be 11.5%. Then the cost of capital will be 10.6%. c. expect g and terminal value in 2011 expect g and terminal value in 2011 will be 2.6% and 374,576 respectively. d. total present value of Mercury Total value of Mercury will be 247,479, which is the estimate Firm value of Mercury under the alternative method. In my opinion, the value calculated via alternative method will be more reliable. 4. Do you regard the value you obtained as conservative or aggressive? Why? I think my valuation is conservative, the reason is as follows: (1) Under the  basic method, the expected g is much lower than the average g from 2007-2011, even lower the lowest one within this period and the reinvested rate is lower than the average one from 2007-2011 and also not a high one in general business, and we can also found the EBIT Margin is lower than the average one in that business. (2) (3) Under alternative method, the expected g is much lower as 2.6%, the risk free rate is also a medium one, and the risk premium is a historical one, which is much higher than recent risk premium in USA. 5. How would you analyze possible synergies or other sources of value not reflected in Liedtke’s base case assumptions? We have conduct some simulation in the spreadsheet, we can find the present value of Mercury is very sensitive to cost of capital, under basic model if the cost of capital reduce to 10%, the value will rise up to 304,882. As for debt ratio and expect g, it is not so sensitive, but has some influence. To my surprise, the reinvestment rate is not sensitive to the outcome, I have not figure out the reason. Under the alternative model, beta, risk free rate and risk premium are all sensitive to the outcome, but not significant as capital in basic model. As for synergy, the management of inventory has not shown great synergic effect to the outcome, for from 2007 to 2011, inventory level has not reduced. I think if AGI can reduce the cost of capital, which will show the great synergic effect to the acquisition.

Sunday, September 15, 2019

Adult Life

What I feel the definition of being an adult means to be mature and responsible with your things that you have to do in life to life basics. Age doesn’t have anything to do with being mature or being in the adult section. It’s about self realization of you becoming mature. Some people when there maturing there starting college, or a new job, or even just going through with your life. When you are an adult you can make life judgments without any ones help from family or friends. You start identifying yourself of how independent you can be by your own. One important thing that you need to be an adult is responsibility.You would need responsibility towards your family, friend members, and yourself. As a member of society you would need to engage in the community you live in, so you know your whereabouts in the place you live at. You can have a social responsibility which means to volunteer and recycle to keep the place clean. If you’re a responsible friend you would help him or her to make a good decision before he realizes he make a bad mistake. Be there for hem whenever he needs help. A responsible adult will take care of their family and help support them when they need it. Your family should be an important thing in your life.Also you should be respectful of your mom and dad, brothers and sisters. A good father or mother for your child. Without responsibility you won’t be able to fulfill your duties of being a good parent. Without it you might forget to pick up dinner for your wife. Or you could be late to pick up your son from soccer practice. As an adult, you would need to be financially responsible to support yourself. You can’t expect to be taking care of a family if you can barely support yourself. It’s an adult’s responsibility to pay the bills of the house, and worry about the money to see if he has enough to support himself.But a responsible adult is usually good with money, so he won’t be low for the month. He would know how to save money, or not waste it on anything that is not necessary. And know when to use the money if they absolutely need it, or if it’s a requirement thing. Respect is also an important part of being an adult. For example if you got hired at a job, and you don’t like someone your goanna have to learn how to deal with them. Adults have to learn how to deal with one another in daily basics. They don’t let little things get in the way of there working environment.They don’t let there emotions get the best of them. They have self control which comes from being or becoming an adult. One of my role models for being an adult is my father. He is responsible by, he pays the bills, makes sure he has food in the table, and money in the bank. When things get bad or stressful he just keeps a calm mind and thinks of what the solutions are cause that’s what a responsible adult does. My dad is teaching me of responsibility not by tell ing me, but as me just watching him and seeing what he has to do to maintain us. I respect him for everything he has done too keep us in place. Adult Life What I feel the definition of being an adult means to be mature and responsible with your things that you have to do in life to life basics. Age doesn’t have anything to do with being mature or being in the adult section. It’s about self realization of you becoming mature. Some people when there maturing there starting college, or a new job, or even just going through with your life. When you are an adult you can make life judgments without any ones help from family or friends. You start identifying yourself of how independent you can be by your own. One important thing that you need to be an adult is responsibility.You would need responsibility towards your family, friend members, and yourself. As a member of society you would need to engage in the community you live in, so you know your whereabouts in the place you live at. You can have a social responsibility which means to volunteer and recycle to keep the place clean. If you’re a responsible friend you would help him or her to make a good decision before he realizes he make a bad mistake. Be there for hem whenever he needs help. A responsible adult will take care of their family and help support them when they need it. Your family should be an important thing in your life.Also you should be respectful of your mom and dad, brothers and sisters. A good father or mother for your child. Without responsibility you won’t be able to fulfill your duties of being a good parent. Without it you might forget to pick up dinner for your wife. Or you could be late to pick up your son from soccer practice. As an adult, you would need to be financially responsible to support yourself. You can’t expect to be taking care of a family if you can barely support yourself. It’s an adult’s responsibility to pay the bills of the house, and worry about the money to see if he has enough to support himself.But a responsible adult is usually good with money, so he won’t be low for the month. He would know how to save money, or not waste it on anything that is not necessary. And know when to use the money if they absolutely need it, or if it’s a requirement thing. Respect is also an important part of being an adult. For example if you got hired at a job, and you don’t like someone your goanna have to learn how to deal with them. Adults have to learn how to deal with one another in daily basics. They don’t let little things get in the way of there working environment.They don’t let there emotions get the best of them. They have self control which comes from being or becoming an adult. One of my role models for being an adult is my father. He is responsible by, he pays the bills, makes sure he has food in the table, and money in the bank. When things get bad or stressful he just keeps a calm mind and thinks of what the solutions are cause that’s what a responsible adult does. My dad is teaching me of responsibility not by tell ing me, but as me just watching him and seeing what he has to do to maintain us. I respect him for everything he has done too keep us in place.

Saturday, September 14, 2019

Design and Implementation of a Network Based Security Information System

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.Design of the network-based security information system 4. 1Method of data collection 2. System design – input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendati on ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. – A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.In this work â€Å"DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM† I will take a case study of â€Å"B’ OPS COMMUNICATION OF POLICE SHQ ENUGU† as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of th e executive and law enforcement management system.Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of s ome of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer society’s conference of 2002 st ated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome – Punishments. Also Hulsbury’s Law (adopted by the House of Lord’s in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the sec urity or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLEN’S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMESThere is a problem that exist in the crime reporting system in Nigeria and especially the B’OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ‘felony’ and ‘misdemeanor’.Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that w orks without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, plannin g and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The B’OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the B’OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (use d in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 – This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 – This is a form used to write down events that took place at course of operation suc h as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: B’OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.Another source of inter nal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the B’OPS COMMUNICATION also fellow’s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basi c information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the B’OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human en gagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the form’s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of informat ion for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding meth od here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B’ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processi ng. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime s tatistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before acces s to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and pr epared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work t o the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the B’ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B’ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = â€Å"N† Do while finish $ =†N† For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next IFor I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â₠¬Å"***† Locate R + 3, C: Print â€Å"1, Record Input ***† Locate R + 4, C: Print â€Å"2, File Maintenance ***† Locate R + 5, C: Print â€Å"3, Report Generation & Printing† Locate R + 6, C: Print â€Å"4, Statistical Presentation† Locate R + 7, C: Print â€Å"5, Exit † Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input â€Å"Your Choice Please (1-5):†, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = â€Å"EN† End selectLoop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â€Å"*Report Generation*† Locate R + 3, C: Print â€Å"1, Generate Monthly Report† Locate R + 4, C: Print â€Å"2, Generate Annual Report† L ocate R + 5, C: Print â€Å"3, Generate forecast Report† Locate R + 6, C: Print â€Å"4, Print Monthly Report† Locate R + 7, C: Print â€Å"5. Print Annual Report† Locate R + 8, C: Print â€Å"6. Print Forecast Report† Locate R + 9, C: Print â€Å"7. Exit †The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input â€Å"Your Choice Please (1-7)†, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = â€Å"EN† End select Loop End Sub Sub Annual RP ‘Annual RP. BAS ‘ Annual Statistics Printing Program Dum M $ (28) Cls Open â€Å"I†, $ 1, â€Å"Annualst. FIL† Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input â€Å"Output To Screen or Printer (P or S):†;K$ K$ = U Crime$ (K$) Loop Until K$ = â€Å"P† or K$ = â€Å"S† Cls Open â€Å"I†, $ 1, â€Å"Annu alst. FIL† If K$ = â€Å"S† ThenPrint â€Å"B† OPS Police Communication† Print â€Å"Annual Crime Statistics Report† Print: Print â€Å"For The Year;†: EN$ Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å"Jan† Locate 5, 44 : Print â€Å"Feb† Locate 5, 56 : Print â€Å"Mar† Locate 5, 68 : Print â€Å"Apr† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† Locate 6, 66 : Print â€Å"M† Locate 6, 72 : Print â€Å"F† R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print â€Å"May† Locate 5, 44 : Print â€Å"Jun† Locate 5, 56 : Print â€Å"Jul† Locate 5, 68 : Print â€Å"Aug† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key L ocate 5, 32 : Print â€Å"Sep† Locate 5, 44 : Print â€Å"Oct† Locate 5, 56 : Print â€Å"Nov† Locate 5, 68 : Print â€Å"Dec† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print â€Å"Total† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print â€Å"B’ OPS Police Communication† L Print â€Å"Annual Crime Statistics Report† L Print : L Print â€Å"For Each Division† EN$ L PrintL Print â€Å" SN† : Tab (3); â€Å"Offences†; Tab(31); â€Å"Jan†; Tab (39); â€Å"Feb† L Print Tab (47); â€Å"Mar†; Tab (55); â€Å"Apr†; Tab (63); â€Å"May†; L Print Tab (71); â€Å"Jun†; Tab (79); â€Å"Jul†; Tab (87); â€Å"Aug†; L Print Tab (95); â€Å"Sep† ; Tab (103); â€Å"Oct†; Tab (111); â€Å"Nov†; L Print Tab (119); â€Å"Dec†; Tab (127); â€Å"Total† Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) Cls OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN â€Å"O†, #2, â€Å"FORECAST. FIL† OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ‘ Store Values For Males In The A – Array Ready ‘ For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ‘ Estimate the figures for males for the ‘next three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ‘Store values for females in the A? Array ‘Ready for gaussian elim ination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ‘Three months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, â€Å" † ; C$; â€Å" †; F$; â€Å" †; Fm1; â€Å" †; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ‘Forecarp . Bas ‘Forecast Figure Printing Program Dm M$ (9) Cls Open â€Å"1† , # 1, â€Å"Forecast . Fil† `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input â€Å"Output to Screen (P or S) : â€Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = â€Å"P† Or K$ = â€Å"S† Cls Open â€Å"1† , #1, â€Å"Forecast. Fill† If K$ = ‘S† Then Print â€Å"B’ OPS Police Communication† Print : P rint â€Å"For The Year : YY$Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å" Jan† Locate 5, 44 : Print â€Å" Feb† Locate 5, 56 : Print â€Å"Mar† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT â€Å"B’ OPS POLICE COMMUNICATION† L Print : LPrint â€Å"For the Year : â€Å"; YY$ Lprint Lprint â€Å"SN†; TAB(3); â€Å"Oddwnxwa†; Tab(31); â⠂¬Å"Jan†; Tab(39); â€Å"Feb† Lprint Tab (47); â€Å"Mar† Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print â€Å"Press Any Key To Continue† Do A$ = INKEY$ Loop Until A$ < > â€Å" † END SUB ———————– FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = â€Å"N† Dowhile finish $ = â€Å"N† For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? â€Å"Main Menu† Locate R + 2, C:? â€Å"1. Record Input† Locate R + 3, C:? â€Å"2. File Maintenance† Locate R + 4, C:? â€Å"3. Report generation and Printing† Locate R + 5, C:? â€Å"4. Statistical Presentation†Locate R + 6, C:? â€Å"5. Exit† MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT â€Å"YOUR CHOICE PLEASE (1-5):† MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = â€Å"Y† End selected Locate 24, 10 Print â€Å"Press Any key To† â€Å"Continue† Do A $ = In keys Loop until A$ â€Å" â€Å" END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = â€Å"KEY† â€Å"Murder† â€Å"Suicide† â€Å"Wounding† â€Å"Assault† â€Å"Kidnapping† â€Å"Rape† â€Å"Armed Robbery† â€Å"Stealing† â€Å"Burglary† â€Å"Arson† â€Å"Narcotics† â€Å"Traffic Offeence† House Breaking â €Å"Store Breaking† Miscellaneous† STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = â€Å"y† DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = â€Å"y† Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT â€Å"DIV†; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP