Saturday, August 31, 2019

Introduction to Criminal Justice Essay

The federal criminal justice system comprise of federal courts, corrections, and law enforcement agencies. The United States Attorneys is the primary agency taking charge of cases involving the U. S. government as a party and in collecting debt owed to the federal government. The federal judiciary has a Supreme Court, appellate courts, and trial or district courts. Federal law enforcement agencies derive their authority from the U. S. Constitution and federal laws while the state law enforcement obtains authority from the state constitution and legislations. The difference in source of authority, which determines jurisdiction and role, determines whether a criminal case is a federal or state matter. Federal Criminal Justice System The criminal justice system in America today comprise of courts, corrections and law enforcement operating at the local, state and federal level (Samaha, 2006). These tiers of decision-making operate independently according to the scope of their jurisdictions. The discussion focuses on the federal level relative to the local and state levels. The U. S.  Department of Justice comprises the primary criminal investigative and law enforcement agency at the federal level. The Office of the United States Attorneys, which falls under the U. S. Department of Justice, comprise the principal litigators assigned to judicial districts, within which each Unite States Attorney exercise the role as the chief federal law enforcement officer for the United States. The United States Attorneys Office mainly prosecutes cases involving the United States as a party and collect debt owed to the U. S. ederal government as provided by Title 28, Section 547 of the U. S. Code. (United States Attorneys, 2009) The federal judiciary or court system emerged from Article III of U. S. Constitution. This has three tiers of decision-making. At the top is the U. S. Supreme Court comprised of the Chief Justice and eight associate justices handling cases involving important constitutional or federal questions of law that originated in the state or the feder al courts. In the middle is the appellate court, made-up of 94 judicial districts pooled into 12 regional circuits. The U. S. Court of Appeals in every circuit handles appealed cases coming from the district courts or federal administrative agencies as well as handles appeals of special cases. At the lower level is the trial court comprised of the district courts, with criminal and civil jurisdiction. The Court of International Trade and the U. S. Court of Federal Claims are special trial courts. (Samaha, 2006; â€Å"Understanding the federal courts,† 2009) Federal law enforcement agencies derive their authority from the U. S.  Constitution. Article 1, Section 8 provides the power of Congress to enact laws needed in executing governmental powers. The constitutional powers of Congress accords federal law enforcement agencies with the authority to operate. Whenever, Congress enacts a statute, it designates the federal agency responsible for enforcement of this law. The provisions of the enacted laws assigned for enforcement to federal agencies indicate the limit and scope of the authority of the federal agencies. (May et al. , 2008) The difference in the role of federal agents and state or local law enforcement officers lies in the jurisdiction and scope of authority. A federal agent has a wider jurisdiction but with a narrower scope of authority determined by federal statutes. Federal law emanates from the constitution that empowers the U. S. Congress to enact laws at the federal level. State or local law enforcement officers have narrower jurisdiction limited only to the boundaries of the state or locality but with broader scope of authority covering the enforcement of all laws applicable to the state or locality. State/local laws come from the state legislatures obtaining authority from the state constitution. (May et al. , 2008) Investigation or prosecution of a crime is a federal matter when the criminal act or issue are covered by federal law or the U. S. Constitution, the U. S. government is a party, special cases within the authority of the federal law justice system, and other cases within federal question jurisdiction. A crime is under state jurisdiction in cases violating the criminal laws of the state. The state holds broad jurisdiction of various cases but with the exception of those falling under the exclusive statutory jurisdiction of the federal courts. (May et al. , 2008) It makes sense to have dual criminal statutes in the federal and state systems covering the same offense. In case of common jurisdiction over an offense, such as discrimination in employment, the parties can opt to file in case in federal or state courts. There are also ways of distinguishing jurisdiction such as the diversity jurisdiction of the federal courts in cases involving residents of two different states over a controversy amounting to more than $75,000 dollars. (May et al. , 2008) The federal criminal justice system operates independently from state and local criminal justice by having its constitutional and federal statute determined jurisdiction. However, it has links with local and state criminal justice in hearing appeals of cases originating from the state courts on grounds of pertinent issues of law.

Friday, August 30, 2019

How to Face Resistance to Change

Resistance to change can be difficult to overcome even when it is not detrimental to those concerned. But the attempt must be made. The first step is to analyze the potential impact of change by considering how it will affect people in their jobs. The analysis should indicate which aspects of the proposed change may be supported generally or by specified individuals and which aspects may be resisted. So far as possible, the potentially hostile or negative reactions of people should be identified, taking into account all the possible reasons for resisting change listed above. It is necessary to try to understand the likely feelings and fears of those affected so that unnecessary worries can be relieved and, as far as possible, ambiguities can be resolved. In making this analysis, the individual introducing the change, who is sometimes called the ‘change agent’, should recognize that new ideas are likely to be suspect and should make ample provision for the discussion of reactions to proposals to ensure complete understanding of them. Involvement in the change process gives people the chance to raise and resolve their concerns and make suggestions about the form of the change and how it should be introduced. The aim is to get ‘ownership’ – a feeling amongst people that the change is something that they are happy to live with because they have been involved in its planning and introduction – it has become their change. Communications about the proposed change should be carefully prepared and worded so that unnecessary fears are allayed. All the available can be used, but face-to-face communications direct from managers to individuals or through a team briefing system are best.

The Rivalry Among Existing Firms: Strong

The Rivalry among existing firms: strong The office supply industry has a large number of players with a high diversity of rivals. Competition is very furies between them because the office supply industry is so divers in product and services they provide; they include high volume office supply, warehouse clubs, online retailers, copy and print businesses, discount retailers and local and regional contract stationers. The large number of competitors in this industry, along with a lack of product differences, with low switching coast for buyers and the ability of the buyers to shop around the internet for the best price.Had made this industry growth to become very slow. source http://360. datamonitor. com/Product? pid=4CA55D31-18F9-44E1-BB86-D1E5E5306887 Rivalry Figure 9: Drivers of degree of rivalry in the office services & supplies market in the United States, 2010 Players range in size and product diversity; they include high-volume office supply providers (e. g. Staples), warehous e clubs (e. g. Costco), copy and print businesses (e. g. FedEx Office), online retailers (e. g. Amazon. com), ink cartridge specialty stores, discount retailers, as well as several local and regional contract stationers. Related article: Evaluate External Corporate CommunicationsThe large number of players, along with low-cost switching for buyers, low product differentiation, easy expansion by utilizing the internet, and poor market growth in recent years, intensifies rivalry amongst incumbents. This is ameliorated somewhat by the diversity displayed in the product portfolio of some players, such as online retailers and discount retailers, who operate in other markets and are therefore not solely reliant on the revenues generated from the office services and supplies market.Relatively low storage costs and the non-specificity of players’ assets lowers barriers to exit and eases rivalry. Overall, rivalry is strong. FIVE FORCES ANALYSIS The office services & supplies market will be analyzed taking retailers of paper, storage, stationary, and office services, such as photocopying, printing and binding as players. The key buyers will be taken as businesses, and manufacturers of paper, storage, st ationary, and equipment for photocopying, printing and binding as the key suppliers. SummaryFigure 4: Forces driving competition in the office services & supplies market in the United States, 2010 The market is highly fragmented with players ranging from multinational high-volume office supply providers to local stationers. The abundance and diversity of buyers weakens buyer power, whilst low-cost switching, low product differentiation, and high price sensitivity strengthen it. Such factors, along with low brand loyalty and easy access to suppliers and distribution, also contribute to the high likelihood of new entrants.Suppliers are numerous, and low differentiation, along with some backwards integration by players who sell their own branded goods, weakens supplier power. The large number of players, along with low-cost switching for buyers, low product differentiation, easy expansion by utilizing the internet, and poor market growth in recent years, intensifies rivalry amongst inc umbents. Buyer power Figure 5: Drivers of buyer power in the office services & supplies market in the United States, 2010 Buyers are numerous and diverse.This, along with the importance of the products and services provided by players to buyers, weakens buyer power. Buyers can range in size from sole proprietors to multinational corporations and buyer power is boosted by larger buyers with greater financial muscle. Large businesses put office services and supplies out to tender bids while smaller businesses can negotiate discounts through trade associations. However, buyer power is sustained by low customer loyalty, low switching costs, low level product differentiation and high price sensitivity, giving customers a wide choice of retailers.The internet has made cost comparison easier, raising price transparency and increasing competition. Overall, buyer power is moderate. Supplier power Figure 6: Drivers of supplier power in the office services & supplies market in the United State s, 2010 Suppliers are numerous and diverse with a large array of goods. This scale of competition from low cost economies in the Asia-Pacific places restraints on other suppliers. Players tend to have several suppliers, and this, along with low switching costs, weakens supplier power, particularly in instances where larger players have greater negotiating power.On the other hand, suppliers can offer their products to a wide range of customers, and this serves to increase their supplier power. There are elements of integration within the industry as global players sell their own branded goods. For example, Staples own branded goods represented about 23% of their sales in 2009. The lower pricing of such activities undercuts the power of other suppliers. Overall, supplier power is moderate. New entrants Figure 7: Factors influencing the likelihood of new entrants in the office services & supplies market in the United States, 2010Most office supplies are commoditized products, which hav e little brand loyalty. This, along with low enduser switching costs, little government regulation, and easy access to suppliers and distribution channels, is conducive to the entry of new players into the market. Larger players benefit from scale economies that allow them to compete with high-volume office supply providers that lead the market. Larger players with greater financial muscle would be able to negotiate better contracts with suppliers and therefore achieve better profit margins.Entry can be achieved on a smaller scale by focusing on a specific product range (e. g. an ink cartridge specialty store) or by developing an online retail shop. Poor growth in recent years, with stagnant growth forecast for the 2010-2015 period, decreases the threat of new entrants into the market somewhat. Overall, the threat of new entrants is strong. Substitutes Figure 8: Factors influencing the threat of substitutes in the office services & supplies market in the United States, 2010Many mode rn companies are taking strategies to minimize costs and the environmental impact of their operations by moving towards a paperless office format: switching costs are not excessive, as most companies have already invested in appropriate ICT systems. This, therefore, constitutes a serious challenge to those operating primarily with paper-based office products. Storage and stationary may also be influenced by switching to a paperless office format. Office services such as photocopying, printing and binding may be substituted by electronic forms of communications.Overall, the threat of substitutes is moderate. Same source Office Depot, Inc. Table 10: Office Depot, Inc. : key facts Head office: 6600 North Military Trail, Boca Raton, Florida 33496, USA Telephone: 1 561 438 4800 Fax: 1 800 685 5010 Website: www. officedepot. com Financial year-end: January Ticker: ODP Stock exchange: New York Source: company website D A T A M O N I T O R Office Depot is engaged in the supply of office pro ducts and services. The company offers national branded and private labeled office products which includes business machines, computers and office furniture.Some of the private brands are Office Depot, Niceday, Foray, Ativa, Break Escapes, Worklife and Christopher Lowell. The company conducts its business through three business divisions: North American retail, North American business solutions and international. The North American retail division sells a range of branded and private branded merchandise including office supplies, business machines and computers, computer software, office furniture and other business related products and services. These products are sold through the company's chain of office supply stores in the US and Canada.The stores operated by the division also contain a copy, print and ship center which offers graphic designing, printing, reproduction, mailing, shipping, and other services. In 2008, Office Depot started PC support and network installation servi ces to provide in-home, in-office and in-store support for the technology needs of the customers. By the end of 2008, the company operated nearly 1,267 office supply stores in the US and Canada. Store replenishment is handled through cross dock facilities and the bulk merchandise is sorted and shipped within a day. By the end of 2008, the company operated 12 cross dock facilities.The North American business solutions division sells nationally branded and private brand office supplies, technology products, furniture and services through various channels: dedicated sales force; catalogs and internet sites. The division's direct business is tailored to service small and medium sized customers. These customers can order products from the catalogs through phone or through the company's websites. The North American business solutions division employs a dedicated sales force for the contract business which serves predominantly, medium sized to fortune 100 companies.The sales force LEADING COMPANIES United States – Office Services ; Supplies 0072 – 2115 – 2010 Â © Datamonitor. This profile is a licensed product and is not to be photocopied Page 29 offer customers allied services of providing information, business-tools and problem solving. In addition, the division undertakes government contracts through a multi-state contract available to local and state government agencies, school districts, higher education and non-profit organizations across the US.The division operated 20 distribution centers at the end of 2008 and it fills in the contract and direct business orders through inventory maintained in these distribution centers. The international division offers office products and services in 48 countries throughout North America, Europe, Asia and Central America. Office Depot offers its products through wholly-owned and majorityowned entities or other ventures in 38 countries. This division sells its products and services through direct mail c atalogs, contract sales forces, internet sites and retail stores. Office Depot operated 162 retail stores in France, Japan,Hungary, Israel, Sweden and South Korea, as of January 2009. In addition, the company operated 98 stores under licensing and merchandise arrangements in South Korea and Thailand. Office Depot participates in the joint venture Office Depot de Mexico which operates 186 stores in Mexico, Costa Rica, El Salvador, Guatemala, Honduras and Panama. This division established regional headquarters for Europe/ Middle East and Asia to support its operations in these geographies. The company offers its products in the international market through more than 35 websites which cater to various geographical locations.It offers products through catalogs in 14 countries. Office Depot operated 43 wholly owned and majority owned distribution centers by the end of 2008 for providing inventory to fill in the orders of its international division. Source http://www. community. officedep ot. com/envpolicyqa. asp Clarifying Q ; A | Who are Office Depot's Stakeholders? | | Office Depot is committed to working with its stakeholders – our suppliers, employees, customers, shareholders and the conservation science community – to promote and advance environmental stewardship.This said, Office Depot will maintain an open communication channel with other organizations that wish to contribute to our process of continual improvement – a communications channel and process in which contributions are considered within the framework of conservation science, so that we may continue to strengthen our environmental performance by internalizing appropriate, scientifically based improvements to our environmental policies and programs.Office Depot's work with the conservation science community reflects our desire for a collaborative, scientific approach to identifying and addressing the issues of environmental stewardship. | | | Why Does Office Depot engage its Stak eholders and what is Office Depot's approach to stakeholder involvement? | | Office Depot's approach is one of inclusion and consultation for the mutual benefit of the environment and our stakeholders.Office Depot actively promotes the responsible use of our natural resources by working with these stakeholders in the ongoing pursuit of improvements and innovation that promote and advance the principles of environmental stewardship in ways that: * Produce solutions with integrity and purpose; * Are responsible, transparent, accountable, realistic and actionable; * Produce results that are tangible, measurable and reportable; and, * Reward innovation and leadership. |

Thursday, August 29, 2019

Auntie Mame Essay Example | Topics and Well Written Essays - 1250 words

Auntie Mame - Essay Example Auntie Mame does not hide her lifestyle from Patrick, and she takes care of him with as much honesty and assurance, as she possibly can. Mame is appointed to raise Patrick by her brother as the legal guardian, but when Patrick arrives at her house, she is hosting a party for other people. She feels sorry about that, and she asks Norah, Patrick’s nanny, â€Å"But why didn’t you tell me you were coming today? I’d never have been giving this party† (10). After Auntie Mame laments on her mistake, she happily embraces and kisses him, giving him the reassurance that he is safe. Auntie Mame is also very proud to have Patrick around, as she goes around and introduces him to her guests. Her pride is apparent from her statement that â€Å"This is my brother’s son and now he’s going to be my little boy† (13). After Mame welcomes Patrick into her home, she apologizes for her mistake and promises him that they will talk more the following day. This relationship is an exemplary example of the importance of honesty, acceptance and assurance to a child. Mame does not want to hide anything from Patrick, and she readily admits that she has made a mistake for forgetting about his arrival and hosting a party. Her behavior also provides him with comfort and makes him feel cared for and safe. Auntie Mame and Patrick not only share a child-parent relationship, but also a youngster-mentor bond. For instance, Patrick looks up to her aunt to learn the difficult words that she uses in her conversations with other people. When Mame finds out that Patrick does not comprehend her words most of the time, she is happy to have the chance to teach him or engage in â€Å"molding a little new life† (19). She instructs Patrick to write all the words that he does not understand for later explanation. Patrick seems very excited about this learning process because he â€Å"immediately wrote down six new words which Auntie Mame said to scratch o ut and forget† (19). Patrick’s father stated in his will that he would like him to be sent to â€Å"conservative schools†, but Mame thinks that the schools are â€Å"dull†, â€Å"tiresome† and â€Å"tedious†, and she wants him to go to her friend’s new school since it is â€Å" Coeducational and completely revolutionary and all classes are held in the nude under ultraviolet rays† (20). Many parents or adult guardians give their children a strict education and make it an obligatory and tiresome process, but Mame tries to make education a fun and engaging process. This not only promotes Patrick’s willingness to learn new information, but it also increases his curiosity in learning about life’s experiences. Even though Mame faces many difficulties especially in regard to her financial problems, she does not give up taking care of Patrick. For instance, during the Great Depression, Mame’s investments fail, and s he can only have â€Å"two hundred dollars a month†, so she has to go to work in order to â€Å"keep Patrick in that wretched St. Boniface school† (40). Mame finds and engages in many jobs during this period, but none of them lasts long. For example, Mame becomes a copywriter at Vanity Fair and is fired due to inaccurate writing; she also works as a reader, but she loses the manuscript and gets fired. Mame keeps working and finding jobs to sustain her family until she meets and falls in love with Beau Burnside, who is a

Wednesday, August 28, 2019

Reducing Construction Accidents in the UK Dissertation

Reducing Construction Accidents in the UK - Dissertation Example Elizabeth Paton explores courses of action undertook by the UK to respond to high-profile injury cases recorded in the construction industry. The article cites recent accidents reported in construction sites within London’s financial district. Statistics included in the report include the demise of over 50% of construction workers because of falling, the hiring of inexperienced workers, communication barriers, and highly demanded equipment. Paton considers this combination a recipe for â€Å"fresh hazards† that the UK, along with construction unions need to check and decrease (Paton, 2015). In 2014, the UK’s HSE (Health and Safety Executive) published a document that outlined the state of health and safety in the construction sector. An overview of the injuries reported from this industry noted that that this sector made up for 5% of injured UK workers. Out of 31% of all serious accidents, only 10% were reported, and 6% of over-a-week old accidents injured contra cted construction site workers (HSE 2015). An inquiry conducted by the Secretary of State for Work and Pensions outlined approaches that could lower accidents in the UK’s construction sector. The inquiry’s report indicated that approaches that tackled the macro, mezzo, and micro aspects of accidents in the construction industry was necessary (HSE, 2013). This report is highly valuable for his project because it offers a systematic point of view of the precise way that strategies devised by the Secretary of State for Work and Pensions could lower accidents in the construction sector.

Tuesday, August 27, 2019

P and Q Inventory Management Systems Essay Example | Topics and Well Written Essays - 500 words

P and Q Inventory Management Systems - Essay Example The model also plays an important role in order to monitor the current ‘in-stock’ items and reduce the risk of ‘stock-out’ of the items (The McGraw-Hill Companies, 2011). The P system of inventory management possesses various similarities as well as dissimilarities to the Q system inventory model. The model is used to record the time in which the product or the item should be in stock and are ready to be employed. In this context, the monitoring and ordering processes are performed when the level of the items reduces to the minimum quantity. The items are ordered at certain intervals of time, for instance, in very specific day of a month or week. This process is often convenient while ordering a group of products at the same time (The McGraw-Hill Companies, 2011). According to the Q-system of inventory control, the order quantity of the items is fixed and the interval period of ordering depends on the level of reordering of the items. However, the reordering in the P-system is fixed and the quantity of ordering items varies in different review cycles. Continuous monitoring is speculated to be highly required in the Q-system of inventory control. On the other hand, the P-system of inventory control attempts to purchase inventory at a specified gap taking greater time for reviewing and recording the stocks in comparison to the Q system (Gopalakrishnan, 2004). Hence, the fundamental difference between the Q system and the P system can be identified as the treatment of highly demanded commodities (in case of Q system) and other goods (in case of P system). It has often been noted that inventory management not only reflects the efficiency of an organization in waste management or resource allocations but also exhibits its flexibility in dealing with alterations related to customer purchase behavior. As the process tends to operate to the coordination of

Monday, August 26, 2019

Recyclene Assignment Example | Topics and Well Written Essays - 250 words

Recyclene - Assignment Example Another visible aspect that reflects the values of the company is the animation used and the nature of art involved in the website. The use of screw-like artwork has an impression that the company is involved in processing mission. Consequently, the nature of the artwork combined with the color expresses the fact that the company is involved in recycling process and more so the purpose of this process is to preserve and conserve the environment (Karamanos, 2001). The statement made by the leaders of the company signifies that they are environment oriented rather than profit oriented in their businesses. Consequently, they play a big role in shaping the organizational culture by being dedicated to the environment rather than the returns or profits associated to the recycling process. The underlying propeller behind the company is to do good by creating conducive environment (Karamanos, 2001). 3. Could Recycline easily change its organizational culture if the green products market encounters a backlash? Explain your answer. How would management know if a permanent change in culture has occurred? Based on the scenario presented in the video, it is undisputable that the company is wholly dedicated towards conserving the environment. The company’s culture is inclined towards green environment. This means that no matter what the market behavior would be, the company may not change its organizational culture easily. The possible way through which the management can know if a permanent change in culture has occurred is when the amount of products being recycled are too much to be accommodated by the company. Alternatively, it can determine the existence of permanent change by determining the use and utilization of its products by the consumers (Karamanos,

Sunday, August 25, 2019

Why the Pros out weigh the Cons of legalizing marijuana Essay

Why the Pros out weigh the Cons of legalizing marijuana - Essay Example Herein will contain the reasons why the legalization of marijuana should take place, taxes placed on it for the purpose of debt relief and the medicinal value of the plant. It is imperative that the United States pass legislation to legalize the use of marijuana, as there are many people that use the drug for recreational reasons, and those who use it for medicinal reasons as well. According to a survey conducted by the National Survey on Drug Use and Health in 2009, 16.7 million Americans over the age of 12 had used marijuana at least one time in the month before this survey was conducted. That is roughly 5% of the population in the U.S. that were honest enough to admit to marijuana use. Given that so many people use the drug, if legalization were to take place, the taxation of it alone would critically help the United States’ debt problems. Often marijuana is labeled as a ‘gateway’ drug, meaning that it is the beginning drug for people to pursue other more dange rous drugs, like cocaine or heroin. This is a false assumption, and this report will seek to prove that as well. Marijuana has been used for centuries by varying indigenous peoples throughout Europe and Asia. It is thought to be first used as an intoxicant around 1000 B.C. in India. In China, it was used to make cloth and medicine, and considered to be in use in other parts of the world prior to 500 A.D. (National Commission of Marijuana and Drug Abuse, 2010). Among the many religions that use marijuana for religious purposes, the most commonly known are the Rastafarians. They use the drug to â€Å"enhance their consciousness of the relationship between God, Creation and the individual soul.† (Marijuana Legalization Organization, [MLO] 2006). Among other religions, the Quakers, Judeo-Christian, and Shinto use marijuana for religious reasons (MLO, 2006). Marijuana should be legalized, taxed and restricted to certain age groups for use in the United States, as the reasons for l egalization far outweigh the reasons not to legalize. Methodology In order to find out the medicinal value and the reasons for taxation of marijuana, I employed a Google search, and found a multitude of articles, journals and other written outlets both for and against legalization. Marijuana has been found to relieve pain and is a safe and effective treatment of peripheral neuropathy, which is a common occurrence in HIV/AIDS patents. Caused by nerve damage, this type of pain often cannot be effectively treated with standard narcotic pain medicines, but marijuana was shown to give these sufferers relief. It has also been shown to help those suffering from hepatitis C virus to curb the nausea associated with the traditional treatments. It is also being used for sufferers of multiple sclerosis and diabetes (Kampia, 2007). Although there are many medicinal purposes for the plant, legalization and taxation of it would be of enormous benefit to the United States Economy. The costs to the United States and taxpayers are enormous to keep marijuana illegal. There are no certain numbers available due to the variability of costs of factors. Some of those factors are: Cost of law enforcement officers Cost of prosecution and defense of offenders Cost of incarceration of convicted offenders Cost of social services and foster care for children of offenders (MLO, 2006). Given these costs, which are few in the plethora of available issues concerning keeping marijuana illegal, the costs of growing the plant and taxing it are hugely different and beneficial. According to MLO (2006) estimates, the U.S. spends anywhere from $7 to $12 billion each year on drug control programs. These do no include misdemeanor cases, but it is important to note that these numbers to not allow for the expenditures on marijuana alone, as it is all

Saturday, August 24, 2019

Nextguard Technologies Research Proposal Example | Topics and Well Written Essays - 2250 words

Nextguard Technologies - Research Proposal Example However, user credentials are required for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada and New York. As all applications are hosted on the Phoenix site, they should be configured on HTTPS and must use a VPN tunnel for exchanging data with the other 4 sites. Moreover, for adding an extra layer of security, MAC addresses should be linked with WAN IP addresses requesting access to one of the hosted applications. Access Control policy should be drafted that will address access to whom and why. A responsible, Accountable, Consulted and Informed (RACI) chart should be developed, as it will define roles and responsibilities for each user permitted to access web based applications. 2 Blowfish Encryption Algorithm for NextGuard As per computer desktop encyclopedia Blowfish encryption algorithm is defined as â€Å"A secret key cryptography method that uses a variable length key from 32 to 448 bits long. It uses the block cipher method, which breaks the text into 64-bit blocks before encrypting them. Written by Bruce Schneier, as a free replacement for DES or IDEA, it is considered very fast and secure† and as per network dictionary, it is defined as â€Å"Blow?sh is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable use†. Blowfish is an encryption algorithm that was invented by Bruce Schneier in 1993 (Pachghare, 2009). It is constructed on a variable length key ranging from 32 buts to 448 bits that is considered to be perfect for both local and international use along with a solid enc ryption algorithm. After its recognition to be relatively solid encryption algorithm, it is gradually gaining acceptance. Some of the core features of blowfish algorithm include (Pachghare, 2009): Blowfish has a block cipher of block consisted of 64 bit The length of the key can be up to 448 bits BladeCenter web interface: MM Control, Login Profiles page. (n.d.) On 32 bit microprocessor architecture, data encryption is supported at a rate of 18 clock cycles on every byte that is much quicker than DES and IDEA encryption. It is still free to use and is not patented Memory requirements for blowfish are less than 5 kilobytes of memory The semantics are simplified and is relatively easy to deploy The design requirements for a blowfish encryption algorithm incorporates robust, simple to code, compact, easily modifiable and flat key space features (Anderson, 1994). Likewise, flat key space facilitates random strings to be considered as a possible key from a required length. Moreover, it d eploys data in massive byte size blocks and incorporates 32 bits blocks where applicable (Anderson, 1994). Key ranges, as mentioned earlier are from 32 to 448 bits and operations are common that are supported by microprocessors such as XOR, table lookup etc. furthermore, pre-computable sub keys are applicable with variable iterative numbers. These sub keys are massive and must be pre-calculated prior to encryption or decryption process carries out. In an example below, let’s assume that P is pre-calculated array consisting of 18, 32 bit sub keys from P1, P2†¦ till P 18. In addition, there are S boxes (32 Bit) indicated by S with entries equal to 256 each (John Rittinghouse & Hancock, 2003). S1, 0, S1, 1†¦S1, 255; S2, 0, S2, 1†¦.S2, 255; S3, 0, S3, 1†¦

Friday, August 23, 2019

Into the Cold War Assignment Example | Topics and Well Written Essays - 250 words

Into the Cold War - Assignment Example In addition, he suggested that the United State show a non-proactive resistance that could even lead to the breakdown of the Soviet Union (Miscamble and George 39). In other places in the United States where had started to spread, the Truman doctrine was adapted. Truman requested for help from Turkey and Greece and promised to contain the spread of communism in Europe via the assistance of any country with the economic and the military help in case their stability received any threats firm the Soviet Union. The Truman doctrine is the ground of the president’s foreign policy. Truman argued that the cold war was a selection between oppression and freedom and that the people of the united states were forced to support the free individuals and leave their own choice and decision to avoid getting involved in the European issues . It is thus clear that the Truman Doctrine was not just a strategy of containment but also an American challenge to the ambitions of the Soviet Union (Miscamble and George

Thursday, August 22, 2019

Spinach Contamination Essay Example | Topics and Well Written Essays - 750 words

Spinach Contamination - Essay Example This achieved by using strong rationality and sensibility in making of decisions. Should be attentive to the problem and collect information from several sources, reasonable in making decisions by applying ethical values and appropriate legal principles in alleviating the contamination problem. Moreover, should be intelligent and responsible in the decisions. Facts on resolving this problem are that the health of consumers is at stake. Also, the people’s perception that not all bagged foods need to be cooked under high heat is false. It is assumed that people will continue to consume the fresh spinach as before. The problem to be resolved is that to eradicate the main source of bagged fresh spinach cause E. Coli bacterium. Search narrows; Response to new information makes it easier to presume that the sink for E. coli bacterium is found in Greens garden. This is evidenced by the data shown by Centers for Disease Control and Prevention (CDC) and the State of California to isolate the cause of the break. I would take samples of the spinach for testing and quarantine the remaining crops. Actions to take regarding the spinach products like spinach with dairy products and whole leaf packaged spinach marketed through Tossed Fresh is that all to be withdrawn from the market, isolated and tested. If confirmed that they harbor E. coli they are incinerated. This shows how I fell responsible for this problem and make decisions that are good for everyone. Actions taken with regard to other crops produced is that all will undergo scrutiny for the presence of E. coli inoculums and other disease-causing pathogens. After which they would seek clearance from the US food testing agency to be declared fit for consumption. Seeking of extensive information on proper methods of controlling the spread of E. Coli from reliable sources thus justifies my extensive corrective actions.

Improving Management Essay Example for Free

Improving Management Essay It has been established that Company Q is a small grocery chain that has recently decided to close two of their stores in heavily populated areas due to profit loss and high crime statistics. The necessity to close two stores is a significant economic failure for both the community and the stake holders involved in the franchise. Company Q has demonstrated that improvements need to be made to restore their reputation within the community and gain the confidence it needs to succeed among the share holders of the company. Since Company Q has closed these two stores, the loss of employment by members of the community has been recognized along with the need for citizens to travel further outside of the community for groceries. This takes tax revenue away from the city and has also resulted in two vacant buildings. In a community already plagued with crime, this adds to the potential of additional crime. In order to salvage Company Q’s reputation with the community and restore trust with the shareholders, significant changes will need to be made. Based on the closure of two stores, the social responsibility that Company Q exudes is very poor and concerted effort will need to be displayed in order to prove they are a socially responsible company. Part B For several years, customers of Company Q have requested that Company Q offer a more health conscience and organic variety of foods. Due to the recent closure of two stores, it is noted that there are now funds available to provide this request at the remaining open franchises. Company Q recognizes that in order to regain the customer’s trust, they need to be accommodating to the desires and needs of their customers. The first recommendation is to continue to provide the healthier, organic food varieties being requested. This action recognizes the customer’s desires and validates that Company Q is listening and wants to be accommodating.  Money that is no longer being utilized to manage the two stores that are closed can now be allocated to the high margin items at the stores that remain open. Company Q has been asked by the local food bank to donate day-old products instead of throwing it away. Company Q has denied this request citing worries about fraud and possibilities of employees stealing and stating that they were actually donating it. Our first recommendation is to rescind this policy and work with your local food bank to be able to obtain this otherwise wasted food. The reputation with the community is already fragile after the closure of two nearby stores. In order to build trust with the community and the shareholders of Company Q, simply providing the requested healthier, organic food will not be enough. Extra effort being demonstrated by Company Q will need to be recognized. The next recommendation would be to create an Action Committee within each of Company Q’s open stores. This Action Committee will work together to create a system that  monitors the amount of high margin items being purchased from the distributor and then being sold to the customer. The products that can be donated to the local food bank will be recorded. These records will be maintained by the Action Committee and preferably a member of the managerial staff. The donated product can be considered a tax write off at year end. Since there is a committee monitoring what is coming in and what is being donated out, it will help minimize the potential of fraud or possible theft by employees. This Action Committee can then determine which products are being sold on a consistent basis and which products are being donated. The purchasing of high margin items from the distributors can be adjusted so that more popular items are being sold and fewer items are being donated. This action will demonstrate to the community that Company Q cares about the citizens and they want to be an active part of the community. It also can instill trust with Company Q’s employees that they are not the reason the business wasn’t donating to the local food bank, and that they believe their employees are trusting and have integrity. A final recommendation would be for Company Q to establish their own volunteer program consisting of members of management. If additional employees of Company Q desire to be part of the volunteer committee, it is completely on a volunteer basis. This volunteer team will periodically represent Company Q at local events. They can volunteer time at the food bank, local homeless shelters, charitable events and so forth. The team can organize events to paint over graffiti in the part of town where they previously closed two of their stores. The presence of Company Q in the community can help restore trust that was lost when two stores were closed and the community suffered. The stockholders in Company Q will also see a significant change in the community’s perspective of their company. Based on these three recommendations, we believe that Company Q will exemplify the social responsibility expected by a company this size and that has such a presence in this populated community. Upon request, additional recommendations can be made to ensure Company Q sustains and improves upon its reputation with the public.

Wednesday, August 21, 2019

McWill SCDMA Wireless Access Technology Computer Science Essay

McWill SCDMA Wireless Access Technology Computer Science Essay McWiLL is the most advanced broadband wireless solution provided by Beijing Xinwei Telecommunications Technology. The technology is based on SCDMA, and is known as Multicarrier Wireless information Local Loop (McWiLL). McWiLL combines SCDMAs traditional use in narrow-band voice and introduces a mobile broadband data service that ties into an IP-based core network. It is based on CS-OFDMA adaptive modulation, and uses dynamic channel allocation and smart antennas to enhance its throughput. SCDMA is a wireless access technology developed by Beijing Xinwei Telecom Technology Co., Ltd. The SCDMA air interface is a national wireless access standard in China. The SCDMA products contains a full suite of advanced wireless communication and networking technologies, such as smart antennas. The key technologies of SCDMA form the foundation of TD-SCDMA, an ITU Standard for 3G Wireless Communications. Earlier SCDMA products are narrowband products focusing on fixed and mobile voice applications. A new generation of SCDMA products are broadband products, Multicarrier Wireless Internet Local Loop (McWiLL), focusing on fixed and mobile voice and high speed data application. McWiLL has been deployed in several Chinese cities, including Guangzhou and Qingdao, where its been used for video, voice and data communication. McWiLL successfully served for 2008 Beijing Olympic Regatta, providing the high-definition, real-time mobile video services. Internationally it has been deployed in more than fifteen countries, such as USA, Cameroon, Nigeria, Ukraine, Malawi, and Mozambique. McWiLL is a TDD-based wireless access platform that combines SCDMA (synchronous CDMA), CS-OFDM (code spreading orthogonal frequency division multiple access), MIMO and smart antennas, as well as other wireless techniques such as adaptive modulation (up to QAM64), dynamic channel allocation and make-before-break handoff, to offer a high-speed data and voice services. All these features are designed to work with any IP core network and provide up to 15Mbps of data rate using 5MHz of spectrum. http://oksunpeng.blogspot.com/ In a way, McWiLL tries to incorporate all of todays wireless networking techniques into a single platform which is very possibly why it is almost impossible for a normal human to understand. McWiLL Base Station supports the following features: (a) Support up to 15Mbps net throughput with 5MHz bandwidth; (b) Support fixed and mobile, voice and data services; (c) Support up to 163dB link budget; (d) Support Make-before-Break handoff and L2 tunnel; (e) Support QoS and GoS features; (f) Support Over-the-Air upgrade; (g) Support low power consumption (150 Watt); (e) Support VLAN, PPPoE and penetration of private networks http://oksunpeng.blogspot.com/2009/03/what-is-mcwill.html McWill(Multi-carrier Wireless Information Local Loop) is a mobile broadband access system based on SCDMA technology platform. McWiLL Technology Smart Antennas Dynamic Channel Assignment Code Spread OFDMA (CS-OFDMA) Time Division Duplex (TDD) Efficient VoIP Technology Make-before-Break Baton Handoff Adaptive Modulation QoS GoS Security Fraud Protection McWiLL System Features Main Services ¼Ã… ¡Fixed, portable, mobile voice and data communications. Main Features ¼Ã… ¡BTS with 5MHz can support up to 15Mbps net throughput, each sector can support more than 300 simultaneous sessions, supporting high-speed mobility, handoff and roaming, N=1 frequency planning, and low latency. Product Characteristics: Support up to 100KM/H mobile speed Terminals are backward compatible Support efficient voice communications and low-bandwidth data. Support N=11 deployment. Products available in the following frequencies: 336-344MHz, 400-430MHz, 698-746MHz,1785MHz-1805MHz, 2150-2180MHz, 2525-2560MHz, 3300-3400MHz Characteristics of Chinese Rural Areas Challenges ¼Ã… ¡ Low subscriber density, large separation of villages, far away from urban areas Complicated environment (mountainous and hilly terrain) Poor facility (backhaul, power supply, etc.) Low income Current wireline/wireless communication systems cannot meet these challenges Low ARPU Less than $4/month in most areas Busty traffic High traffic especially in Chinese traditional holidays Asymmetric traffic More incoming calls than outgoing calls Little usage of value added services Unique Advantages of Deploying McWiLL Large coverage enables fewer cell sites which are expensive in developing countries, leading to much lower Capex and Opex. N=1 deployment enables a wide area network with as little as 5MHz spectrum, leading to much lower upfront investment on spectrum which is usually quite expensive. Products with a wide range of frequency allow an operator to choose the most cost effective spectrum to operate. Lower terminal cost and adequate data rates allow an operator to minimize the Opex and lower the entry barriers for a subscriber. Most McWiLL terminals can support both voice and data services. GSM/McWiLL dual mode handsets/PDAs allow an end user to enjoy 3G beyond performance of McWiLL data and cost effective voice without sacrificing easy access advantages of GSM. Summary of McWiLL Advantages Large coverage (up to 60Km) Smart antenna,400MHz frequency band Low cost Already large volume, cost effective architecture, SCDMA ASIC chipset, no royalty fees, low RD cost, low manufacture cost, multiple vendors due to SCDMA Alliance High capacity BTS capacity 24Mbps/10MHz ¼Ã…’supporting up to 8,000 voice subscribers One system fits all Via flexible configuration, one system can meet the requirements of different user groups (high-end and low-end), services (voice and data), and time (current and future). Product maturity and reliability 10 years RD, large scale deployment, redundancy architecture, long time operational networks, an experienced team of installation and customer support. Easy to install and maintenance Terminal zero install, easy-to-use tools for customer self debugging, remote access trouble shooting tools for support personnel. Abstract In this presentation, we will first give an introduction of popular wireless multiplex technologies such as WCDMA and OFDMA and then present our McWiLL technology which is an optimal integration of WCDMA and OFDMA technologies to effectively address the technical challenges of wireless broadband access, such as capacity, coverage, multipath fading, and intercell interference. In other words, McWiLL effectively avoids the major drawbacks of WCDMA and OFDMA and draws their advantages of both technologies. Unlike voice centric WCDMA or data centric OFDMA (WiMax), the McWiLL wireless broadband access system can efficiently combines both voice and data applications. Finally, we will provide brief introduction of McWiLL product roadmap and application. McWiLL Fits Chinese Rural Markets à ¢Ã¢â€š ¬Ã‚ ¢ Smart antenna and 400MHz frequency band allows the McWiLL systems to have large NLOS coverage (up to 60KM). à ¢Ã¢â€š ¬Ã‚ ¢ Multicarrier BTS can support up to 8,000 voice subscribers having sufficiently high capacity to support bursty traffic in rural applications. à ¢Ã¢â€š ¬Ã‚ ¢ Cost effective architecture and SCDMA ASICs allow the McWiLL products to have sufficiently low cost per line ($60-80 overall cost per line including both terminal and infrastructure). à ¢Ã¢â€š ¬Ã‚ ¢ Zero install of McWiLL terminals and rich tools for self and remote troubleshooting make it very easy to deploy the McWiLL systems in rural areas. à ¢Ã¢â€š ¬Ã‚ ¢ 10 years RD, redundancy architecture and large-scale deployment (>2 million subscribers) make the McWiLL products mature and reliable enough to deploy in remote rural areas. à ¢Ã¢â€š ¬Ã‚ ¢ Integrated voice and data solutions can allow the McWiLL systems to meet both current and future service requirements of rural customers. My opinion Multicarrier Wireless Internet Local Loop (McWill) is developed by Beijing Xinwei Telecom Technology Co., Ltd. It is a wireless access technology which can cover for the very large area, its coverage can up to 60KM. Therefore it is very suitable for china because it is a big country. Its been used for video, voice and data communication and successfully served for 2008 Beijing Olympic. Even though McWill is very popular but it cannot be use for every country for example, Singapore. Singapore is a small country if using the technology of McWill, there will be a lot of wasted.

Tuesday, August 20, 2019

Failure of the Student Loan Market

Failure of the Student Loan Market A college degree is more than the culmination of learning processes. It is a credential that functions as a good, but in a unique way because it allows the holder to compete more powerfully in the labor market. At the same time, accessing this good requires specific financial instruments in the form of grants, financial aid, awards, federal benefits, and of course, loans. The student loan market, as this essay will show, is a market failure. The supply of college degrees is insufficient compared to the supply of loans for college and costs; there is an information asymmetry with these financial products because many seeking to buy them are not aware of the risks (e.g., the lack of consumer protection, the likelihood that they will not graduate); further, the more loans are sold, the more the value of the good people use them to get (i.e., a college or graduate degree) will decline. All of these factors point to the student loan market as a market failure. Short of dramatic remedies t hat might make education inaccessible for all but the 1%, one of the best policy-related solutions to this dismal problem might be to make holding a loan less painful for those who are trying to repay it. Why is the student loan market an issue, and why does it exist in the first place? The ways that Americans finance their postsecondary education hold insight into the answers. As college costs have risen far faster than the rate of inflation (Lieber, 2009), and as the middle class’ buying power has declined, most people have been unable to finance their educations out of their own pockets. For generations, many college students in America have taken on loans to finance college and postgraduate education due not just to the assumption that this will have a positive return on investment (ROI), but also because of the perception that student loan repayment offers a generous tax deduction. However, as college costs skyrocket (Abel & Deitz, 2014) and jobs evaporate to the point where increasing numbers of people question its value (Taylor et al., 2011), more people are asking questions about student loans and who really benefits. Muddying the water still further is the role of 26 U.S. Code  § 221, which stipulates the details that govern the student loan interest deduction, including its maximum deduction and the modest cost-of-living increase that may increase this maximum, in addition to details regarding definitions and the roles of dependents in calculating this deduction (Cornell Law School Legal Information Institute, 2017). In general, an individual is eligible for this deduction if, and only if, he or she took out a qualifying educational loan, if they paid interest on the loan (as opposed to fees, principal only, or another arrangement), and if the individual’s modified adjusted gross income (MAGI) is no more than $80,000 if filing as an individual or $160,000 if filing as a married couple (Aranoff, 2015; Internal Revenue Service, 2017). However, these deductions may seem overly modest, given that as of 2013, the average college graduate was leaving school with more than $35,000 of debt (Ellis, 2013). Increasing numbers of people are taking out enormous sums to finance college or graduate school, and fewer are able to pay these off in time, leading to cascading economic problems when they are unable to buy homes, when they put off having children, or in many cases, simply default on the loans. Information asymmetry is also a critical component of this market and of its failure. Especially for those who are first in their family to attend college, or who otherwise have no personal experience with higher education and its marketing techniques, the appeals of predatory for-profit schools are almost irresistible. These high-pressure schools use sales techniques to get students to agree to attend, helping them apply for loans but failing to give them adequate information about the risks involved (to say nothing of the low value of a for-profit degree). The people selling the loan products have information that the purchasers do not. In some larger theoretical or symbolic sense, the very information asymmetry is something that people want to overcome through their pursuit of a college degree. Regardless, the student loan crisis is widely considered to be more highly concentrated among those attending two-year schools. Economists have noted that there is a serious potential for an economic crisis to occur if many default on student loans, though the lack of collateralization, as was prevalent in the housing bubble, may contain the damage – but may also nonetheless cause severe declines in middle-class purchasing power (Looney & Yannelis, 2015). The authors of one study stated, â€Å"†¦it is interesting to compare the default out-comes of borrowers who took out subprime mortgages compared with those who took out student loans to attend for-profit colleges. Both types of borrowers tend to have poorer-quality credit records, and the returns to their investments were dependent on macroeconomic factors beyond their control—house prices in the case of subprime mortgages and wage growth in the case of student loans† (Looney & Yannelis, 2015, p. 81). This passage hints at the interconnected nature of mortgages and student loans, including the ways that student loan borrowers are disadvantaged by the situation and by the informational asymmetry. The repayment systems for student loans, meanwhile, also represent market failures in a strong way. A 2008 paper explored the ways in which various proposed loan forgiveness programs effectively constituted a secondary tax (Dynarski, 2008, pp. 19–20). The author concluded that even though college costs rise and student loan borrowers remain in debt for a very large amount of time, the degree itself is still worthwhile. However, â€Å"†¦ there is a mismatch in the timing of the arrival of the benefits of college and its costs, with payments due when earnings are lowest and most variable. Ironically, this mismatch is the very motivation for providing student loans in the first place† (Dynarski, 2008, p. 26). The market failure is apparent from the way that this mismatch occurs, and the ways in which information asymmetry surrounds much of the loan buying process. Dynarski also offers a discussion of the ways that the federal repayment programs such as Pay as You Earn and Income Based Repayment, as well as hypothetical programs such as Pay It Forward (state-based, income-based programs that allow low earners to pay very little while high earners pay much more) constitute taxation, which segues into the larger policy discussion: The student loan interest deduction and the ways in which it can be remedied to better address this market failure. Because of the widespread perception that student loan debt is good debt, and because of the ways that this tax code provision is built on some complex assumptions about supply and demand, it is clear that there is a market failure. The deduction assumes that the supply of college graduates will be smaller than the supply. It assumes that the cost of living will only increase modestly, and critically, it does not calculate the increases in college costs or the ways that they far outpace inflation. In other words, it assumes that the demand for college loans will outpace the supply of people taking them out and repaying, when the opposite is true. It also assumes that the economic demand for college graduates will be higher than the supply, to the point where incentivizing people to get an education is necessary to get highly skilled workers. However, the economy is no longer in need of these credentials, or perhaps college has become so watered-down that people with degrees are seldom finding the kinds of jobs they dreamed of. In any case, many people with college or even advanced degrees are not experiencing the return on investment that they had anticipated. At present, the student loan interest deduction is generally capped at $2,500 annually (Internal Revenue Service, 2017). For those who are repaying very significant loans, including for graduate school, professional school, or simply for attending high-cost, predatory schools, this deduction does not make a significant difference. More people than one may initially believe struggle with student loans of $100,000 or more (Kantrowitz, 2012), so the tiny tax deduction is often laughable. Especially because of the market failure that has itself promoted the situation, the government should intervene to increase the tax deduction. The mismatch between the good and its benefits facilitates the market failure of the student loan interest deduction (Dynarski, 2008, p. 26). Even for those who have a modest amount of student loans and for whom the interest deduction would be significant, an informational asymmetry means that many who qualify for this deduction do not even take it, since around 19% are not even aware of what deductions they might quality for (Student Loan Hero, 2016). Revising the system so that, for example, student loan interest and principal are both deductible, could reduce the failure of the market. Improving information about student loans, as well as how to take advantage of the tax deduction, could also go a long way towards reducing the information asymmetry that dominates the market. The failure of the labor market to adequately absorb college graduates, especially with wages that cause their debts to decrease over time, combined with the informational asymmetry that disadvantages some people more than others, means that there is a serious issue; one potential remedy would be to improve the student loan interest deduction. The student loan system is a market failure, and the tax deduction has also failed to live up to promises because of the temporal mismatch. It has failed to account for the realities of college costs, the realities of the labor market, and the realities of economic life for young people. The policy is a market failure and needs to be changed. Some ways to improve it could be to increase the maximum deduction, to increase the MAGI ceiling at which the deduction is phased out, or to implement widespread loan forgiveness since doing so might add more liquidity to the consumer economy, which would in turn help the economy to grow. Forcing colleges and universities to guarantee student loans could also be another solution to the problem of student debt, ensuring that widespread debt default has less of an effect on the overall economy than it did during the housing bubble.   References Abel, J. R., & Deitz, R. (2014). Do the Benefits of College Still Outweigh the Costs? Current Issues in Economics and Finance, 20(3), 1–12. https://doi.org/DOI: , Aranoff, A. (2015). Student Loan Interest Deduction: What You Need to Know | HuffPost. Retrieved October 17, 2017, from https://www.huffingtonpost.com/aryea-aranoff/student-loan-interest-ded_b_7486888.html Cornell Law School Legal Information Institute. (2017). 26 U.S. Code  § 221 Interest on education loans | US Law | LII / Legal Information Institute. Retrieved October 16, 2017, from https://www.law.cornell.edu/uscode/text/26/221 Dynarski, S. M. (2008). An Economist’s Perspective on Student Loans in the United States (No. 5579). Munich. Ellis, B. (2013). Class of 2013 grads average $35,200 in loans, credit card debt. Retrieved November 1, 2017, from http://money.cnn.com/2013/05/17/pf/college/student-debt/ Internal Revenue Service. (2017). Topic No. 456 Student Loan Interest Deduction. Retrieved October 15, 2017, from https://www.irs.gov/taxtopics/tc450/tc456 Kantrowitz, M. (2012). Who Graduates College with Six-Figure Student Loan Debt†¯? Washington. Lieber, R. (2009, September 5). Why College Costs Rise, Even in a Recession. The New York Times, p. B1. Looney, A., & Yannelis, C. (2015). A crisis in student loans?: How changes in the characteristics of borrowers and in the institutions they attended contributed to rising loan defaults. Brookings Papers on Economic Activity, (Fall), 1–89. https://doi.org/10.1353/eca.2015.0003 Student Loan Hero. (2016). 19% of Americans Don’t Know What Student Loan Tax Benefits They Can Claim. Retrieved November 1, 2017, from https://studentloanhero.com/press/19-percent-americans-dont-know-student-loan-tax-benefits/ Taylor, P., Parker, K., Fry, R., Cohn, D., Wang, W., Velasco, G., & Dockterman, D. Is College Worth It†¯? (2011).

Monday, August 19, 2019

Auschwitz :: Essays Papers

Auschwitz Imagine that a man is lying in his bed asleep. He hears a noise downstairs, and gets up to see what the commotion is. Upon going downstairs, he spots ten soldiers, who grab him and throw him into the back of a truck with twenty more people. When the man asks what is going on, he discovers that the truck is heading towards Auschwitz. This situation happened many times years ago, and is known as the Holocaust. Many Jews and other groups were sent to Auschwitz and this report will explain the dark details that occurred there. Auschwitz was the largest German concentration camp and is located close to a Polish town Oshwiecim in Galcia. This camp was set up on April 27, 1940 and could handle its first prisoners by June 14. Auschwitz housed many groups ranging from Jews and Poles, to Soviet war prisoners and Gypsies (wysiwyg://179/http://www.eb.com:180/cgi-b...&hits=10&pt=t&sort=relevance& firsthit=off). The leading commander of this camp was Heinrich Himmler, who was the chief of the Schutzstaffel, Nazi guards, and the secret police. Under Himmler’s direction he was able to create two more camps similar to the original Auschwitz camp. The way that he set up the operations was to have the prisoners sent by rail to the camps, upon arriving at the camps they were then divided into three different groups. One group was sent to the gas chambers within hours of their arrival. The second group was sent to serve as slaves in industrial factories. The third group was sent to different places to underg o medical experiments (http://www.nizkor.org). The first group that were sent to the gas chambers underwent many events before finally being exterminated. When they arrived at Auschwitz, their fate was to be gassed at a smaller camp called Birkenau. At this camp there were many ways that the prisoners could be killed. There were a total of four gas chambers and four crematoria. The gas chambers appeared as showers to the prisoners and the crematoria was used to incinerate their bodies. First, the prisoners would be given a bar of soap and they would be told to go wash in the showers. Then the Germans would ventilate a gas called Zyclon-B into the bath houses. The chemical was invented by a pest control company and could kill the prisoners in a short period of time.

Sunday, August 18, 2019

Supremacy :: essays research papers

THE NATURAL DESIRE FOR THE SUPREMACY OF ONE â€Å"The frogs, grieved at having no established Ruler, sent ambassadors to Jupiter entreating for a King. Perceiving their simplicity, he cast down a huge log into the lake. The Frogs were terrified at the splash occasioned by its fall and hid themselves in the depths of the pool. But as soon as they realized that the huge log was motionless, they swam again to the top of the water, dismissed their fears, climbed up, and began squatting on it in contempt. After some time they began to think themselves ill-treated in the appointment of so inert a Ruler, and sent a second deputation to Jupiter to pray that he would set over them another sovereign. He then gave them an Eel to govern them. When the Frogs discovered his easy good nature, they sent yet a third time to Jupiter to beg him to choose for them still another King. Jupiter, displeased with all their complaints, sent a Heron, who preyed upon the Frogs day by day till there were none left to croak upon the lake.†   Ã‚  Ã‚  Ã‚  Ã‚  Aesop’s fable tells of a problem that has existed throughout history, the need for supremacy. Someone always has to be the best, the leader, the ultimate judge, and without this ranking, the people are never satisfied. There is a need for humans to classify others into the general categories of inferior and superior and the ultimate superior is necessary. This tendency has led many nations to create a form of rule with only one leader which although can at times be beneficial is always a waiting disaster. This has been a tendency through out history that has led to the downfall of many civilizations and is also a basis in religion and can be seen in many aspects of today’s society.   Ã‚  Ã‚  Ã‚  Ã‚  Before civilization began, humans existed as nomadic wonderers. People looked nothing like the people of today and they spent their existence surviving. Not only did they look different, they lived differently as well. Very little would be recognizable to the people of today and their way of life was altogether different than the human way of life today. However, supremacy still existed in these nomadic tribes. Evidences have been found, showing there to be a chief or key person who looked over the tribe and served as the ruler. This shows that from the beginning of time people have had this desire to rule or be ruled over.

Saturday, August 17, 2019

Employee Rights and Property Searches Essay

Mopak Corporation performed a search for drugs and guns on the employees and contract workers vehicles with the assistance of a private security company and drug detection dogs. In the search, guns were found, but not drugs, in several vehicles. At the completion of the search, five employees along with ten contract workers whose vehicles where the weapons were found were terminated, due to the corporation’s belief that the employees violated the company policy. The terminated workers immediately sued Mopak for wrongful termination. Though mostly in the United States employees are â€Å"at-will† employees, the arguments for wrongful termination the employees from Mopak can make in their suit is that Mopak performed an unreasonable search of their vehicles, violating their expectation of privacy. The search was made without a warrant and violated their Fourth Amendment Rights. (Lawyer. com, 2013) The contract workers are bound by contracts that may have an at-will clause in it, in which case they, like the regular employees, can be terminated at-will. Even though when there is a contract, written or oral, it’s based on a promise of job security, but with an at-will clause, contract workers may either leave a contract job or be terminated from a contract job at-will. †Employers often, and legitimately, ask employees to sign contracts or agreements that document and enforce the terms of at will employment, usually in company policy manuals. † (Lawyersandsettlements. com, 2013, para. ) The arguments that Mopak Corporation will make in response to the wrongful termination suit are that in the employees’ policy manual, handbooks or contracts reflect that the employee and/or contract workers must agree to random vehicle searches, random drug testing, and an at will clause for employment; that when signed by the employees and/or contract workers, it becomes binding, implied, or implied-in-fact contracts. In the 1988 decision of landmark case Foley vs. Interactive Data Corp. it brought to light that employees enter into implied-in-fact contracts with the acceptance of great merit reviews, promotions, raises, and with verbal assurances of job security. I believe the Mopak Corporation would win. I do not believe that a corporation with so much to lose would perform an illegal search of employee’s vehicles. They must have in the company’s policy manual that such an act would be permissible once the employees and contract workers sign that they have rea d and agreed to the terms and condition of the policy and/or contracts.

Friday, August 16, 2019

Illegal Immigration, good or bad?

Illegal immigration has been going on for hundreds of years already. But, over the years it has been increasing dramatically. Illegal immigrants have been poured across the border to grab agricultural jobs during the worker shortages precipitated by World War II. The ranchers and farmers along the border prospered from the influx of cheap labor and they did everything in their power to keep illegal aliens from being deported Today, however, we find that immigration is not seen as a positive for our country, but rather it is unquestionably considered a problem today in America.Some may believe that the threat of illegal immigrants is based on unsound fears. But in my opinion most illegal immigrants come here to live a better life than they lived in the country they lived in before. Most suffer where they used to live, therefore, they decide to move somewhere where they think the economy is better and they will have a better opportunity to get a job, and live a better life.Many believe that its unfair that low-income immigrants receive public benefits such as Supplemental Assistance Nutrition Program (SNAP) at lower rate than low-income born citizens. Many people say that immigrants use more public benefits than the native born. This has created a lot of serious and unfair burden for citizens. All illegal immigrants enter a country they’re not from thinking that if they don’t they won’t be able to give their kids a better life and better education opportunities. There are currently almost 12 million illegal immigrants in America.

Virgin Mobile Case Analysis

Virgin Mobile has strategically shaped its marketing mix to appropriately target the younger demographic. First, lets look at it’s the product element. The younger demographic is more open to new things like text messaging, downloading information from their phones, ring tones, faceplates, graphics, having access to popular entertainment on their phone, etc. For younger people, phones are less of a tool and more of a fashion accessory or personal statement. To appeal to these needs, Virgin Mobile created â€Å"VirginXtras,† which involve the delivery of popular content, features, and entertainment. They signed an exclusive, multi-year content and marketing agreement with MTV networks to deliver music, games, and other such content to Virgin Mobile subscribers. Consumers have access to branded accessories and phones, graphics, ring tones, text alerts, and voice mail. In addition to the MTV-branded content, Virgin Mobile also included the following VirginXtras: text messaging, online real-time billion, rescue ring (a prearranged â€Å"escape† call such as to avoid a bad date), wake up calls, fun audio clips, a hit list of top 10 songs in which subscribers can listen to and vote for, a music messenger that allows subscribers to shoot a message to their friends so that they listen to a song, and a movie application that provides descriptions, show times, and ticket purchases in advance. All of these features appeal to the youth market, and generate additional usage and loyalty. Next lets look at the elements of placement and distribution. Virgin Mobile adopted a channel strategy that was more closely aligned to its target-market segment. They decided to distribute their products in channels where youth shop, which means places like Target, Sam Goody, music stores, and Best Buy. These are the stores that kids usually buy consumer electronic products, such as CD players and MP3 players. Virgin Mobile decided to package their products in similar consumer electronics packaging so it would be familiar to these consumers. They created a clear, see through package where consumers can examine the phone without a salesperson helping them and purchase it like they would any other consumer electronics product they would normally buy. Virgin made a contract with the handset manufacturer Kyocera from which it buys different phone models with different features and functions. The first two basic models were bundled with interchangeable faceplates that would be decorated with eye-catching colors and patterns, bundled into a bright red starter pack. This starter pack would be easily visible on large point-of-sale displays, and available at all of the popular retailers that the younger demographic shops at. The younger demographic doesn’t want to be hassled with sales people and extra obstacles in purchasing a phone. They want fashionable, accessible, easily located, and conveniently located products. That is the exact aim Virgin Mobile was going for in its placement and distribution strategy. Another important element of the marketing mix is promotion. Virgin mobile had a much tighter focus and narrower target market than that of their competitors. This meant that they could target the youth demographic in a more direct, efficient, and less-cluttered way. As generally noted, the younger generation is more responsive to advertisement that is up-to-date, modern, fun, and relates to the â€Å"young and hip† attitude of their generation. Since younger consumers often view their phone as a personal statement, it was important for Virgin Mobile to reach this personal and youthful side. They devised an advertising that the company described as â€Å"quirky, offbeat, and completely different. The ads featured teens and made use of strange, quirky metaphors. They named their phone models â€Å"Party Animal† and â€Å"Super Model† to relate to pop culture and the younger generation’s lifestyle. Virgin Mobile used this unique promotional strategy to stand out from the rest of crowd and truly make a statement to the younger demographic with ads that are not boring and â€Å"run-of-the-mill. † They were a lot more unique, creative, and entertaining—all attributes that younger consumers value. Furthermore, the company worked with popular youth magazines to publish â€Å"advertorial† pieces. Virgin Mobile also executed numerous high-profile street marketing events that featured paid performers—dancers and gymnasts dressed in red from head to toe—who engaged in various stunts. Perhaps the most famous and attention grabbing promotional stint was for the launch of the Virgin Mobile USA service. The cast of The Full Monty—a popular Broadway show—appeared with Sir Richard Branson (Virgin founder) dangling from a building in NYC Time Square wearing nothing but a large Virgin Mobile red phone. It is events and promotional stints like these that truly reach out the younger aged consumers—bold, exciting, modern, and fun. Virgin Mobile Case Analysis Virgin Mobile has strategically shaped its marketing mix to appropriately target the younger demographic. First, lets look at it’s the product element. The younger demographic is more open to new things like text messaging, downloading information from their phones, ring tones, faceplates, graphics, having access to popular entertainment on their phone, etc. For younger people, phones are less of a tool and more of a fashion accessory or personal statement. To appeal to these needs, Virgin Mobile created â€Å"VirginXtras,† which involve the delivery of popular content, features, and entertainment. They signed an exclusive, multi-year content and marketing agreement with MTV networks to deliver music, games, and other such content to Virgin Mobile subscribers. Consumers have access to branded accessories and phones, graphics, ring tones, text alerts, and voice mail. In addition to the MTV-branded content, Virgin Mobile also included the following VirginXtras: text messaging, online real-time billion, rescue ring (a prearranged â€Å"escape† call such as to avoid a bad date), wake up calls, fun audio clips, a hit list of top 10 songs in which subscribers can listen to and vote for, a music messenger that allows subscribers to shoot a message to their friends so that they listen to a song, and a movie application that provides descriptions, show times, and ticket purchases in advance. All of these features appeal to the youth market, and generate additional usage and loyalty. Next lets look at the elements of placement and distribution. Virgin Mobile adopted a channel strategy that was more closely aligned to its target-market segment. They decided to distribute their products in channels where youth shop, which means places like Target, Sam Goody, music stores, and Best Buy. These are the stores that kids usually buy consumer electronic products, such as CD players and MP3 players. Virgin Mobile decided to package their products in similar consumer electronics packaging so it would be familiar to these consumers. They created a clear, see through package where consumers can examine the phone without a salesperson helping them and purchase it like they would any other consumer electronics product they would normally buy. Virgin made a contract with the handset manufacturer Kyocera from which it buys different phone models with different features and functions. The first two basic models were bundled with interchangeable faceplates that would be decorated with eye-catching colors and patterns, bundled into a bright red starter pack. This starter pack would be easily visible on large point-of-sale displays, and available at all of the popular retailers that the younger demographic shops at. The younger demographic doesn’t want to be hassled with sales people and extra obstacles in purchasing a phone. They want fashionable, accessible, easily located, and conveniently located products. That is the exact aim Virgin Mobile was going for in its placement and distribution strategy. Another important element of the marketing mix is promotion. Virgin mobile had a much tighter focus and narrower target market than that of their competitors. This meant that they could target the youth demographic in a more direct, efficient, and less-cluttered way. As generally noted, the younger generation is more responsive to advertisement that is up-to-date, modern, fun, and relates to the â€Å"young and hip† attitude of their generation. Since younger consumers often view their phone as a personal statement, it was important for Virgin Mobile to reach this personal and youthful side. They devised an advertising that the company described as â€Å"quirky, offbeat, and completely different. The ads featured teens and made use of strange, quirky metaphors. They named their phone models â€Å"Party Animal† and â€Å"Super Model† to relate to pop culture and the younger generation’s lifestyle. Virgin Mobile used this unique promotional strategy to stand out from the rest of crowd and truly make a statement to the younger demographic with ads that are not boring and â€Å"run-of-the-mill. † They were a lot more unique, creative, and entertaining—all attributes that younger consumers value. Furthermore, the company worked with popular youth magazines to publish â€Å"advertorial† pieces. Virgin Mobile also executed numerous high-profile street marketing events that featured paid performers—dancers and gymnasts dressed in red from head to toe—who engaged in various stunts. Perhaps the most famous and attention grabbing promotional stint was for the launch of the Virgin Mobile USA service. The cast of The Full Monty—a popular Broadway show—appeared with Sir Richard Branson (Virgin founder) dangling from a building in NYC Time Square wearing nothing but a large Virgin Mobile red phone. It is events and promotional stints like these that truly reach out the younger aged consumers—bold, exciting, modern, and fun.

Thursday, August 15, 2019

How Do I Develop a Personal Code of Ethics

How do I develop a personal code of ethics? Developing your own personal code of ethics is one of the most important things you can do for yourself. A personal code of ethics puts into writing those ideas and philosophies that are the essence of your life and allows you to say I will do this because I believe this. A code of ethics is a document, which you can look to each day not only as a reminder of what you believe in but also as an encouragement to carry on with your daily walk.The main question most people have is â€Å"how do I develop a personal code of ethics? † The answer really is quite simple, but it will take a little work and thought on your part. First, take stock of your life. Take the time to write down who you are. This is a reflection of who you believe yourself to be. Think of it this way. If you asked a friend to describe you, what would they say? An example of this would be someone saying to you that you are helpful or that you are kind. List all the trai ts that anyone has ever pointed out to you.Second, think about what you believe. Make a list of all of your ethical beliefs. Don’t worry about why you believe them just write down as many of your personal beliefs as you can think of. These are the beliefs that carry you through your everyday life and define your decision-making process. Third, think about the places you work, rest, and play and how you relate to all the people you come in contact with. Are there things that you would like to change about these relationships that would involve listing them in a code of ethics?I am not only talking about any obvious things like any misdealing with customers or family members. I am talking about the little things as well, such as gossip, etc. Fourth, now that you have your beliefs written down, think about why you believe them. This is essential because it sets up how important each of your beliefs are to you. The source of all ethical beliefs is the Bible. So if you have any fa vorite verses, now would be the time to list them next to each of your beliefs that is shaped by a biblical truth.Now that you have all the information about who you are and why you believe what you do, it is time to write and develop a personal code of ethics. This is not as hard as you think it might be, but it will take you a little time to think about what you want to include and not include. The first part of your personal code of ethics is the purpose for your personal code of ethics. Are you writing it to regulate your behavior or to inspire you to greater heights? Whatever your reason, this is where you will develop the philosophy behind your code of ethics.The only requirement is that the purpose, as well as the code of ethics, be tailored to your needs. The second part of your personal code of ethics is what I like to call the â€Å"I will† section of your personal code of ethics. God, in the Bible, set up His â€Å"I will’s† which are based on who He is. This is the same thing you need to do. Go through the list of how people see you and look to see if any match up to what you believe. This is the aspirations section of your document. All the traits that you now exhibit as well as those you wish to develop should be included.The third part of your code of ethics is the rules or beliefs you expect yourself to follow when dealing with other people. These are all the â€Å"why’s† listed in the information gathering part of the process of writing a personal code of ethics. In this section, you might want to list some Bible verses that help you to see the importance of applying your personal code of ethics to your life. Once you are done writing the first draft, look it over and refine it as necessary and as changes come in your life. Remember you are writing the code of ethics and it will be up to you to follow it.

Wednesday, August 14, 2019

Apple and employee motivation Essay

Ideally, Apple wants to have a workplace that fosters creativity from all the employees. Apple combines extrinsic and intrinsic motivation in order to empower their employees to be innovative. There are numerous methods Apple employs to motivate its employees. Once, Apple rewarded its executives by giving them a recognition bonus of 3 to 5 percent of their base salary. This motivating incentive occurred despite the fact that they recently missed their target on a project. This implies that Apple upper management empathized with the group’s efforts. Another motivating incentive is the discount on products that all Apple employees receive. Employees who work at corporate Apple can receive a free iPhone or iPod Shuffle. Giving products to employees rather than money can be a better an effective motivator because many Apple employees are simply motivated to see the end results of their efforts. It is also typically cheaper to give the employees products rather than a raise. Recently, Apple has given employees more vacation days due to the company’s strong performance in product sales. These are all extrinsic examples of how Apple motivates its employees. Employee motivation also stems from the corporate culture. Most Apple employees are heavily committed to their work and can be described enjoying monotonous encoding. Perhaps it is even insightful to look at what intrinsic forces were driving Steve Jobs. Jobs’ Stanford commencement speech indicates that he knew he had a limited time on Earth and this motivated him to follow his heart and pursue his passion. His ultimate motivation for creating innovative products was not based around profit but what would he would personally want to have.

Tuesday, August 13, 2019

Domain Name System Security Extensions Essay Example | Topics and Well Written Essays - 2000 words

Domain Name System Security Extensions - Essay Example It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence. When you spend some time on the Internet either sending an e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS is an extremely important part of the internet but totally to the user. The DNS structure forms one of the principals and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-e-commerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, farmers, denial-of-service attacks, spammers or any kind of scammer. DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. This is what was required back in January 1, 1983 when machines on the ARPANET were needed to change to the TCP/IP protocol. What's required today is DNSSEC, which help defend against various attack against DNS servers, be it enterprise servers or the root DNS servers that control the Internet and have double fruitfully been attacked. DNSSEC offers source authentication of DNS data, data reliability and genuine denial of existence, as per the project's website. Various problems have subdued widespread deployment, including issues with scalability and well-suitability with diverse DNS servers. It is generally believed that making the DNS safe is critically vital for securing the entire Internet; however implementation of DNSSEC particularly has been held back by the difficulty of working out a backward-compatible set that can scale to the range of the Internet, avoiding "zone enumeration" where necessary, positioning DNSSEC implementations over a wide range of DNS servers and clients, disparity among major players over who ought to own the Top Level Domains such as .com, .net and .org root keys and finally conquering the perceived complication of DNSSEC and DNSSEC operation. A number of these problems are in the course of being determined, and deployments in a range of domains have started to take place.

Monday, August 12, 2019

Evaluate Project Risk Management in the construction of London Essay

Evaluate Project Risk Management in the construction of London Heathrow Airports Terminal 5 - Essay Example My thanks will be extended also to my family including Dad, Mom and -----, my youngest brother for their kind and invaluable support during the whole project. The London Heathrow Terminal 5 has emerged to be the largest airport and the most complex construction projects undertaken in the airline industry. The aim of the project was to augment the capacity by 50% along with offering the visitors an impressive gateway into the city and the United Kingdom. With a budget of over  £4.3bn, the airport facility includes a an airport terminus, a building housing a satellite, underground tunnels, diversions on the river and a road connecting the airport to M25 (Sharon, 2008).This paper attempts to study and evaluate the Risk Management strategy and theories involved in the construction of London Heathrow Airport’s Terminal 5, (Sharon, 2008) and critic these theories. The approach used to mitigate risks for the t5 of the Heathrow Airport was based on the principles of team construction and had to incorporate many changes until project completion, (Sharon, 2008). BAA had anticipated a high level of design progress and development at all stages of the ambitious project which could easily squeeze modern technical solutions and modifications in safety, space requirements or amenities. It would have been unrealistic to freeze the complete design solution of the project during the design phase (Latham, 1994). BAA decided absorb all risks. This helped BAA manage the activities with the help of partners who worked as integrated teams along with the contractors. This was implemented under the T5 Agreement, (Ferroussat, 2005). The procedure to try and identify risks that are present within a project is known as management of risks. The risks that are posing challenges during the implementation of a project are effectively managed, (Mind Tools, 2009). Risk Management activity is mainly concerned with a proper analysis of the different operations, identification

Sunday, August 11, 2019

Black Holes Essay Example | Topics and Well Written Essays - 1750 words

Black Holes - Essay Example Based on this concept of black hole, scientists have tried to describe unseen surface of the black hole as ‘event sphere’ that at a conflict, does not allow any particle or object to return and thus scientists explain event sphere as the point of no return. The scientists named black hole as black because of its properties that mainly include absorbing everything that comes into its reach resulting in everything disappearing, thus black. Quantum physics and mechanics have contributed significantly in understanding of black holes that indicate that although black holes absorb everything that comes in its reach, however, there have been observations of a very weak emission from the black holes that has a temperature, which is inversely proportional to the mass of the black hole (Taylor & Wheeler, 2000). Scientists believe that every galaxy has these black holes at their cores, which absorb all the left-out energies of these galaxies and thus they are denser and heavier than even the sun, which is a theoretical assumption and thus, has been criticised by many experts in the field who even do not believe in the existence of black holes. However, scientists who believe in black holes indicate that with their characteristic of absorbing everything, the black hole creates a spinning disk that confine nearby particles in the space. Few scientists have been successful in observing this accumulation-spinning disk on radio, x-ray, and gamma ray bands since emissions of black holes often become very warm and thus, come on the x-ray bands (Susskind & Lindesay, 2004). With these observations, a huge number of scientists have now proofs of real black hole at the core of Milky Way galaxy that is heavier than the four million solar masses, and it is assumed that this black hole has maintained its gravitational field and absorbing everything that comes in its vicinity. Due to this ability of black

The Internal Control Environment Research Proposal

The Internal Control Environment - Research Proposal Example Risk assessment is the component which enables the management to assess and analyze the risk associated with the accomplishment of objectives (Biegelman para.12). As in TPC, the elements of risk assessment includes an analysis of all three divisions and realizing the sources which could probably lead to control failure. For this purpose, TPC must set an internal control objective and then figure out the causes which would lead to deviations from the objective. Risk assessment is the component which enables the management to assess and analyze the risk associated with the accomplishment of objectives (Biegelman para.12). As in TPC, the elements of risk assessment includes an analysis of all three divisions and realizing the sources which could probably lead to control failure. For this purpose, TPC must set an internal control objective and then figure out the causes which would lead to deviations from the objective. The third component includes control activities or policies to create and implement strategies throughout the organization that ensures that objectives of internal control and minimization of risk would be achieved (Biegelman para.12). The major elements of this component are verification, performance reviews and separation of responsibilities etc. At TPC, this component involves implementing strategies and policies at headquarter as well as the three separate divisions. These policies might include a thorough system of performance measurement as well as control procedures (Committee of Sponsoring Organizations). The fourth component of internal control refers to management information and communication which entails communicating with employees on the internal control objectives as well as procedures and to instigate their efforts in meeting the goals (Biegelman para.12). TPC needs to enhance communication and information system among all the three divisions so as to ensure that the objective is communicated all over the organization.   The fifth and last component of internal control refers to monitoring which involves overseeing the whole internal control process and procedure to know if the process is carried out as planned and proceeding towards the desired objectives. The TPC’s management, as well as independent auditors, could keep a check over the proceeding of the control procedure in the organization and achievement of internal control objectives (Biegelman para.12).  Ã‚  Ã‚