Saturday, November 30, 2019

Privacy and Homeland Security

Introduction Privacy of individuals is an issue of concern. This confidentiality is guaranteed under the Privacy Act of 1974, 5 USC 552a. Provisions of privacy of citizens guarantee every individual that his or her personal identification information should not be collected without legal authority.Advertising We will write a custom research paper sample on Privacy and Homeland Security specifically for you for only $16.05 $11/page Learn More However, the Department of Homeland Security (DHS) along with policies and technology, are violating people’s right to privacy. The information collected about an individual by the federal government and its authorities should only be done with legal authorization. The Department of Homeland Security has gone ahead to maintain this information in a way that allows its access by unauthorized persons, groups, or institutions. In the common law, any person who is aggrieved by one who illegally intrudes into his o r her privacy discloses any personal information, or does false publication about people’s names can initiate a lawsuit. No one should be compelled to give his or her private information unless under the authority of the law in case of investigations. The Department of Homeland Security is charged with the responsibility of providing mechanisms to ensure security to all Americans. However, the need to ensure intelligence makes the department endeavor to collect personal information in diverse ways. As various agencies of the DHS collect information, privacy Acts require the department to provide that there is authority, purpose, routine, and disclosure regulation. There have been controversies about the way Homeland Security officers collect information from citizens. Various quarters have risen complains that the department collects Personally Identifiable Information (PII) without legal authority. The department has also been accused of illegal disclosure of personal inform ation. Therefore, this research proves that if privacy is subverted, with the DHS practices continuing to be under the umbrella of safety, civil rights will continue to diminish until they are non-existent. To support this thesis statement, the report will rely highly on the Privacy Act of 1974, the US Constitution, the Patriot Act, the National Defense Authorization Act, department policies and memorandums, scholarly journals and law reviews, E-Government Act of 2002, and the Federal Records Act among others. The findings will be useful in enhancing the application of contract laws since they reveal the instances when Personally Identifiable Information (PII) can be collected, revealed, or shared.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More Research Questions This paper seeks to address the following questions: Why is the Department of Homeland Security violating citizens†™ constitutional rights in exchange for protection? Should the willingness to provide personally identifiable information (PII) be voluntary or mandatory by law? Hypothesis Based on the above research questions that have been raised on matters of privacy and homeland security, the paper hypothesizes that the United States citizens are willing to give up their right to privacy in the name of security. The willingness to provide personally identifiable information (PII) should be made voluntary by amending various US Acts on confidentiality. Review of Literature There is a wide range of theoretical and conceptual literature on the issue of privacy and homeland security. The security of the federation of the United States of America is the most critical issue on matters of national interest. The conceptual framework derives its force from the fourth amendment, which gives people the right to be free of any unwarranted search as Marc reveals1. Also, the fourteenth amendment gives th em the right to due process. According to Jacob, â€Å"the Harvard Law Review of 1890 provided the theoretical basis of the right  to privacy†2, which has been cited by many books and courts. Several former presidents of the United States of America have been assassinated in the past. Moreover, the September 2001 attack on the World Trade Center by terrorists caught the country off guard. Since the September 11 attack, the homeland security has intensified its security plans, as addressed in the National Defense Authorization Act.  According to William, the need to ensure the privacy of citizens resulted in the â€Å"formation of the privacy office in the Department of Homeland Security†3. Under the Privacy Act of 1974, the Department of Homeland Security is charged with the responsibility of protecting the privacy of all Americans. However, transparency in the Department of Homeland Security is also guaranteed under various Acts. William notes that transparency re gulates the adoption of different privacy rules in planning matters of security4. It also ensures that the technology adopted by various institutions, including the Department of Homeland Security, adheres to privacy regulations. The need for transparency recommends the Department of Homeland Security take fair information Practice principles (FIPPs) in its endeavor to ensure the privacy of citizens. The federal laws should also regulate the purpose for which personally identifiable information is to be obtained. Officers of the departments are restricted by the Privacy Act of 1974 from obtaining Personally Identifiable Information from citizens without the right authorization. However, the issue of security threats in the US has forced many Americans to give out much of their personal and/or private information in the name of securing themselves. This Act has tampered with their civil liberty. Civil liberty violations and privacy issues are emerging. One of the significant problems in matters of privacy is authorization. Paul and Daniel affirm that officers from the homeland security agencies that collect PII must have the right legal authority to carry out the duty5. Article 2 (10) of the Montana constitution directs that unauthorized persons cannot obtain personally identifiable information from any citizen in the United States.Advertising We will write a custom research paper sample on Privacy and Homeland Security specifically for you for only $16.05 $11/page Learn More Officers from various defense bureaus must be authorized to obtain private information. Not all officers are allowed to collect personally identifiable information. However, many of them from multiple agencies within the DHS misuse their powers to violate the privacy rights by fostering relationships with the business sector and local law enforcement, as well as, using technology to invade people’s personal lives. They do not obtain executive order befo re carrying out duties related to matters of privacy. The Privacy Act 5 USC 552a protects every citizen under investigation by the homeland security by ensuring that all information that such security officers may obtain from him or her is used only for the legally authorized purpose. Besides, homeland security is restricted by the same Act to get only the necessary and related information. Elizabeth asserts that the need to ensure security and intelligence information should not be a reason to push people into giving out all their details6. Homeland security regulations on how to obtain information are spelled out in the Privacy Act of 1974, for example, the Privacy Act 1974, 5 USC, 552a (e) (3). All investigative bodies and agencies that seek intelligence information from various individuals are required by law to provide such individuals with the Privacy Act Statement. Collection of PII from an individual without his or her consent and/or the provision of the Privacy Act Statemen t is considered illegal. In fact, even when the homeland security wants to collect information for other purposes other than for storage, the Privacy Act statement must be issued to the respondent. The need to obtain such documents like the Privacy Act Statement has made many security agencies associate the regulations with obstacles towards speedy and free access to intelligence information. According to Jacob, many quarters of homeland security argue that homeland security officers should be allowed to access personal information from any individual without warning or consent7. The debate behind this school of thought is that as the security officers prepare the documents and/or issue them to the alleged criminals, the criminals are able to escape or adjust the information, hence tampering with the justice process. Privacy Acts have, therefore, been associated with obstruction of intelligence in the federation.  Another essential aspect of matters of privacy and homeland securit y is the storage of PII by the authorities in the name of security. The privacy Act regulates the disclosure of personal information by homeland security to other individuals or organizations.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to William, personally identifiable information is supposed to be guarded in the best way possible to ensure that no unauthorized person is able to access it and that no wrong reasons, for instance, giving up some of the Americans’ rights in order to be safe and/or prevent another 9/118. Storage and routine management of information are also regulated by the Privacy Act. Not every person who works in homeland security can be trusted with private information. The persons on whom privacy information can be disclosed is also regulated by statutes such as Shine the Light Law (2005) SB 27 and CA Civil Code 1798.83). Such persons are adjusted based on whether they are within the homeland security department and/or the purpose for which they intend to use the information. The purpose of collecting personally identifiable information is also regulated by the Privacy Act of 1974. Authorization statements that are issued to various security officers are not issued without a c rucial purpose. Before authorization to obtain private information is issued by the homeland security, the Department of Homeland Security ensures that it can be able to cite factual leads that warrant investigation of a particular individual. The purpose for which personally identifiable information is obtained must also be made known to the Americans from whom the information is obtained. According to William, â€Å"Article 1, 1 CA SB 1386 of the California law provides that privacy is one of the inalienable rights†9. Therefore, information obtained must not be used for other purposes other than that which was disclosed to the person at the point of receiving it. The Act also regulates that PII information stored in the homeland security database should be deleted immediately after its use is over. However, one would wonder why the issue of security in the US should be used as a basis to lure Americans into unveiling that which they should keep sealed. Paul and Daniel affir m that proper disclosure of personally identifiable information should be carried out to avoid releasing it to unauthorized persons10. The ‘Shine the Light’ Law (2005) SB 27, CA Civil Code 1798.83 regulates the disclosure of any private information. Disclosure of personally identifiable information is another issue with privacy and homeland security. Should disclosure of PII be voluntary or mandatory? The Privacy Act of 1974 directs that private information should be obtained in a deliberate manner. However, the Act gives exceptions that disclosure can be mandatory. A duty to provide information is imposed by the federal statute. Elizabeth asserts that compulsory disclosure of information can also be warranted by an order from the executive11. In addition, the US Constitution and the Patriot Acts also warrant for mandatory disclosure of information by an individual. Moreover, persons who are required by various statutes to disclose information are liable for punishment by law if they fail to provide such information. Persons who refuse to offer information that is much required by homeland security are denied some of the privileges and benefits guaranteed by the US constitution. I  t is out of such clauses in the Privacy Act that the human rights organizations and human rights activists in America have raised protests. The claim is that obtaining information from any individual through forceful means contravenes the bill of rights. Elizabeth asserts that proper use of the privacy statutes will be of importance to the contract law12. It will be possible to prevent intrusion of solitude and misuse of powers to intrude into Americans’ private details in the name of heightening their security. Article 2 (10) of the Montana constitution guarantees the right to personal privacy. Privacy laws will ensure that no agency will be allowed to force its way to another in terms of electronics or even physically. It will also be illegal for homeland sec urity to disclose a private fact. Currently, there have been arguments around disclosure of truthful facts about a person. Methodology The research will adopt a descriptive survey method. The study will rely on first-hand data that will be collected through direct interviews on a representative sample of security officers, legal officers, and citizens. An example of 100 security officers from the Department of Homeland Security (DHS), 50 judicial officers practicing in various states of the United States, and 100 citizens of the United States will be used. 250 people will be taken as a good representative sample from the whole population involved in matters of privacy and homeland security. The interviews will be conducted by issuing a questionnaire with both closed and open-ended questions. The resultant data will then be coded and presented in the form of tables and analyzed in graphs. Data Presentation Table 1.0 Ways in which Homeland Security interferes with privacy in America Stakeholders in privacy and homeland security/Factor of privacy Security officers (out of 100) Percentage Legal officers (out of 50) Percentage Citizens (out of 100) Percentage Unauthorized access to PII 54 54% 40 80% 88 88% Unexplained Purpose of PII 88 88% 46 92% 90 90% Illegal disclosure of PII 40 40% 24 48% 30 30% Mandatory provision of PII 60 60% 45 90% 88% 88% Graph 1.0 Table 1.0 Ways in which Homeland Security interferes with privacy in America Analysis Table 1.0 indicates various ways in which homeland security interferes with privacy in the name of securing the Americans’ life. From table 1.0, security officers rated access to personally identifiable information without legal authorization at 54%, 80% by licensed practitioners, and 88% by ordinary citizens. The indication is that security officers who thought that the privacy of individuals was interfered with were the least while most of the citizens believed that unauthorized way of obtaining PII prof oundly interfered with their privacy. In the same way, 80% of legal practitioners were for the same idea. A staggering 88% of the citizens who are the primary victims of a violation of privacy thought that the police threatened their security without authorization in the name of securing them. The implication is that homeland security officers do not obtain legal authority in most cases before intruding into individuals’ privacy by collecting personally identifiable information. Graph 1.0 also shows that homeland security violates privacy laws by carrying out unexplained purpose searches. Both table 1.0 and figure 1.0 indicate that 88% of the homeland security officers, 92% of the legal officers, and 90% of the ordinary citizens responded that security officers did not explain the purpose of the personally identifiable information that they obtained from the citizens. An average of 90% of the population sample that the research adopted believed that homeland security violated the Privacy Act of 1974 by obtaining Personally Identifiable Information without explaining its purpose to the suspects. All respondents rated violation of privacy through unexplained investigations above average. Graph 1.0 further shows that 88% of security officers who carry out the investigations did not find importance in explaining the reason for inquiries to the suspect as William reveals13. Therefore, they violated the terms of the Privacy Act. A higher 90% of the ordinary citizens affirmed that homeland security officers violated their right to privacy through unexplained searches where they were required to provide personally identifiable information. From graph 1.0, the highest score of 92% was obtained from legal practitioners who responded that they had witnessed violation of privacy laws from officers who did not explain the purpose of investigation to the victims. able 1.0 also indicates that 40% of homeland security officers, 48% of legal officers, and 30% of the ord inary citizens believed that privacy rights in America were being violated by homeland security by disclosure of personally identifiable information. Graph 1.0 shows that all the ratings of privacy violation by homeland security through exposure were below average. In fact, the ordinary civilians rated it at a staggering 30%, with security officers rating it as low as 40% while lawyers rated it at 48%. The average rating of violation of privacy through disclosure was at 39%. We can interpret that violation of privacy rights through disclosure of PII was below average in America. From table 1.0, it is clear that 60% of the homeland security officers responded that privacy rights of American might have been violated in cases of mandatory provision of PII. 90% of the legal practitioners thought that the privacy of individuals was violated through the fundamental ways of obtaining PII. 88% of the civilians also responded that violation of privacy was enhanced through effective methods o f obtaining personally identifiable information. An average of 79% of the population believed that the mandatory provision of PII was one of the prominent ways of violating privacy in America. It is therefore clear from graph 1.0 that the privacy rights of American citizens are being violated through the mandatory provision of PII, which is provided for in the 1974 Privacy Act. The claim is that the violation is legal since it is provided for by the Privacy Act itself. It is therefore recommended that the Act be amended to abolish mandatory provision of PII, failure to which civilians will be punished by law. Table 2.0 Exchanging privacy with protection Opinion/stakeholder Yes Percentage No Percentage Indifferent Percentage Security officers (out of 100) 4 4% 92 92% 4 4% Legal officers (out of 50) 40 40% 50 50% 10 10% Ordinary citizens (out of 100) 20 20% 76 76% 4 4% Graph 2.0 Privacy and security: not interchangeable Table 2.0 and graph 2.0 verify the claims of whether security matters should be used as a basis of tampering with people’s privacy. From graph 2.0, we see that 4% of security officers, 40% of legal officers, and 20% of civilians (an average of 51%) believed that privacy should not be exchanged with security. Intimacy does not hinder the security apparatus from obtaining intelligence information. Therefore, Americans should not give out their details in exchange for security. This may be attributed to the fact that unless the security apparatus obtains authorization to obtain PII, they should not investigate a suspect. The time taken to get approval does not interfere with the quality of evidence that the intelligence can gather, hence refuting the claim that lack of some private details obstructs security intelligence. Approval by an average of 51% of the population can be interpreted that privacy laws do not obstruct the process of obtaining intelligence security information. Therefore, officers should not just abuse their ma ndates by interfering with the privacy of people by seeking unnecessary personal details. Moreover, graph 2.0 shows that 92% of security officers, 50% of legal practitioners, and 76% of civilians were opposed to the idea of obstruction of security by privacy laws. An average of 43% of the population did not believe that privacy hinders security. We can deduce that there was no considerable obstruction of security by privacy laws since the rating under this question was below average. Another 4% of security officers, 10% of legal officers, and 4% of civilians were indifferent of the issue of privacy and homeland security. This was an average of 5% of the population. Conclusion The research was set to investigate the issue of privacy and homeland security. The research hypothesized that the DHS uses and/or abuses policies and technology to invade peoples’ private lives and personal privacy. Through primary research, the researchers realized that there was considerable truth in this hypothesis since the above average population in America affirmed this idea. As such, the willingness to provide personally identifiable information (PII) should be made voluntary by the amendment of various Acts on privacy. The research also upheld the hypothesis since the analysis of data indicated that the current Privacy Act of 1974 allowed violation of privacy under the disguise of mandatory provision of information. The fact that an officer had authorization allowed him or her to use punishment and deprivation of rights and privileges to obtain PII from a civilian. The research, therefore, concludes that the Act should be amended to embrace full privacy under the first amendment and the 19th amendment of the American law, which positions privacy as an inalienable human right. References Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013). Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013). Marc Blitz, The Fourth Amendment Future of Public Surveillance: Remote Recording and other searches in Public Space, 21 American University L. Rev. 63 (2013). Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally Identifiable Information, 86 New York University L. Rev. 1814 (2011). William Mitchell, National Security: Part I: Five Questions on National Security Law: Responses to the Five Questions, 38 Wm. Mitchell L. Rev. 1564 (2012). William Prosser, Privacy, 48 California L. Rev. 383 (1960). Footnotes 1 Marc Blitz, The Fourth Amendment Future of Public Surveillance: Remote Recording and other searches in Public Space, 21 American University L. Rev. 63 (2013) 2 Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013), 2010 3 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 4 Ibid, 383 5 Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally I dentifiable Information, 86 New York University L. Rev. 1814 (2011), 1814 6 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013), 1437 7 Jacob Strahilevitz, Toward A Positive Theory of Privacy Law, 126 Harvard L. Rev. 2010 (2013), 2010 8 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 9 William Prosser, Privacy, 48 California L. Rev. 383 (1960), 383 10 Paul Schwartz, and Daniel Solove, The PII Problem: Privacy and A New Concept of Personally Identifiable Information, 86 New York University L. Rev. 1814 (2011), 1814 11 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013) 12 Elizabeth Uzelae, Reviving the Privacy Protection Act of 1980, 107 Northwestern University L. Rev. 1437 (2013), 1437 13 William Mitchell, National Security: Part I: Five Questions on National Security Law: Responses to the Five Questions, 38 Wm. Mitchell L. Rev. 1564 (2012) This research paper on Privacy and Homeland Security was written and submitted by user GhostRider to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Analysis Of Tata Motors Essays

Analysis Of Tata Motors Essays Analysis Of Tata Motors Essay Analysis Of Tata Motors Essay They are the no. Vehicle manufacturers (especially cars and trucks) of India and have impressive export records as well. In terms of size, they are much smaller compared to This dissertation is dedicated to Strategic Analysis techniques of Data Motors. The strategic valuations like Michael Porters Diamond Model, STOW Analysis, Balanced Score Carding, etc. Are of great interest to both internal and external investors. The Data Group was founded in 1 868 when India was under British Empire. The group formed their textile business in 1874 and Steel manufacturing in 1907. In 1945, Data Sons Limited started the automotive business with manufacturing steam locomotive boilers after purchasing the shops of East Indian Railways from Government of India, which was under the British Government in that year. After purchasing these shops, the Data Sons decided to establish Data Engineering and Locomotive Company Limited (TELLS Limited) and establish the primary manufacturing facility in Jackhammers (an industrial city in Eastern India). This company was managed by J. R. D. Data from 1945 to 1973 and by Summand Moldboard from 1973 to 1988. Summand established the second manufacturing facility in Pine India looking into the mom in the auto market. In 1991 Rattan Data took over the Data Empire from his uncle and moved the Data group out of the sectors where they were not very competitive -? like Cement and Textiles. Today, Tats largest manufacturing businesses are Steel and Motors after the consolidation carried out by Rattan Data. As on end of financial year 2008, the Data Group has an annual turnover in excess of $30 Billion out of which more than $9 Billion is contributed by Data Motors. TELLS Limited is now widely known as Data Motors that is among the worlds top five manufacturers of medium and eave trucks and worlds second largest manufacturer of medium and heavy busses. Data possess a strategic engagement with Mercedes Benz for assembling and selling Mercedes Benz commercial vehicles and passenger cars in India. Another strategic tie up that they possess is with Cummins pertaining to their diesel engines through Data Holiest Limited. In fact, Data Motors contributed to the Cummins Diesel engines by adding turbo chargers on them vide their joint manufacturing operations with Data Holiest Limited. The only partnership of Data that didnt go well was with Rover Group of Britain that went bankrupt in year 2005. Data tried entering the European markets through a model named City Rover that faired poorly due to its negative publicity, higher price and poor quality compared to the competition. Rattan Data is now 70 years old but still presents the image of a dynamic, innovative and revolutionary entrepreneur. He is known for high aggressive moves for the benefits of Data Motors customers. In 1 997, Data Motors launched its first indigenously developed car named Indict that currently possesses more than 15% of the car market share in India. The other car models of Data Motors that are popular in India and some markets of Asia are Data Indigo, Data Sierra, Data SUmo and Data Safari. In 2008, Data achieved a global publicity due to two major activities that made headlines worldwide. In the Geneva Motor show they presented their four- setter small car named Anna priced about $2500 which is expected to be the cheapest car of the world. In March 2008, Data Motors acquired the two globally prestigious companies Jaguar and Land Rover from Ford Motor Company. It is assessed that Data Motors did So to achieve a new image of a global automotive company like Ford Motor Company given that their business span has largely remained indigenous within India for a long time. Strategic Framework of Data Motors: Data Motors is certified as ISO 9001 :2000 compliant in Quality Management System and as ISO 14001:1 996 compliant in Environmental Management System. Hence, they possess global recognition in best practices that strengthens their branding at a global level (http://WV. . Automatons. Com/ our_world/awards. PH). They are known to be very much customer focused and are very conscious about the fitment of their products for customer needs. They believe in continuous innovations as they keep on releasing new innovations in their existing models. Although the indigenous cars of Data Motors do not compare with the engineering exc ellence of a global player like Ford Motor Company, they are well suited for Asian conditions where the comfort factor is more important than cruising at high speeds. Reviews by Indian Motor sites reveal that the Data Motors Indict Indigo models possess sluggish performance of engine in terms of speed and performance but are good in terms fuel efficiency, maintainability, internal space that are more important factors given the road and traffic conditions in India. This reveals that Data Motors have focused on the local conditions of the country and have designed cars that are more suitable for customer needs rather than imposing additional but useless engineering on them. Example, there is no point designing a car that can run at 100 miles per hour if the maximum speeds that can be achieved even at best roads is 70 miles an hour. One of the major success factors of Data Motors are their supply chain excellence. The entire world is surprised by the launch of Data Anna that shall e priced at 1 lake approximately. An analysis by Bogart, Justine (2009) reveals that Data Motors could commit this price to the industry due to their excellent backbend supply chain network. Data Motors worked very early with their suppliers in arriving at the cost estimate of the car to the extent that even the functional specifications of the parts were completed much before even talking about the car to the markets. Data Motors uses Arabia spend management solution as reported by Business Wire in 2005. Arabia is a software based platform that helps in reducing bottom line costs considerably. Data Motors is a modest company when it comes to spending because one of their primary objectives has been achieving highest operational efficiencies at lowest costs. Data Motors extensively uses Information Technology to support their business objectives. They possess Computer Aided Design and Computer Aided Modeling technologies, Siebel for Customer network management, SAP for supplier relationships and supply chain management, business logistics management, customer relationship management, human resources management and Finance management. They also use BMW Soft;are for business services management under the I TILL and ISO 20000:2005 framework. The IT systems of Data Motors limited are outsourced to their group company named Data Technologies Limited. The BMW tools help them to manage IT services management, IT change management and also to comply with critical statutory laws and best practices like Serbians Solely Act, ITIL, and ISO 20000:2005. Data Motors do have the fundamentals to play the role of change agent for some of the major changes in the global automobile industry. Historically, Data Motors have not done well in entering the motor markets in western entries and hence this acquisition presents an excellent opportunity for Data Motors to establish their presence in ILK and European car markets. Jaguar and Land Rover may not have done well in the recent past but they have remained the pride and heritage of Great Britain and are very close to heart of the native British citizens. Data Motors may just have to apply some technical innovations in these cars and re-price them according to the modern economics and these models for sure will again do wonders in the UK markets. One good thing about this acquisition is that the heritages of India and Britain have many common links including the very establishment of Data Group that was done during the British rule in India. The fundamentals of Data Motors possess many best practices of the British industries and hence the employees Of Jaguar and Land Rover will be able to easily correlate the culture of Data Motors with the original British heritage although these organizations have remained under American influence for so long. The biggest gamble that Data Motors is currently playing is the Data Anna targeted at urban middle class that are yet to afford a car and have en moving on Motorcycles. Data Motors have priced this car at $2500 approximately which itself is a challenge for them to fulfill. They have already made a loss of more than 300 Million Dollars because they had to shift their entire plant for Data Anna manufacturing from a location called Singer in the eastern part of India amidst local disturbances and security problems The current manufacturing capacity of Data Anna is 50,000 cars per year whereas Brown, Robin (2009) of motorize. Com expects a booking of 500,000 units in the first lot itself. This means that in the current capacity Data Motors will take 10 years to fulfill the orders of first lot itself. After the Singer crisis, they are in the process of setting up a new factory such that the combined output of Data Motors can be 250000 cars per year which again will take two years to fulfill the bookings of the first lot itself. Hence, Data Anna is going to be a major challenge for Data Motors whereby they would need to aggressively deploy new plants although they are reeling under cash crunch due to their acquisition of Jaguar and Land Rover in 2008. Hence, overall it IS a do or die situation for Data Motors if they succeed they will attain the tutus of no. Small car manufacturer of the world; but if they fail they would lose reputation in the global markets permanently. COMPANY PROFILE Data motors one of Indians largest private sector companies with a turnover of over RSI 80 billion, is the countrys leading commercial vehicle manufacturer and has significant presence in the multi-utility and passenger car segments. Data motors were established on September 1, 1945, originally fo r the manufacture of Steam Locomotives at Jackhammers. By 1954, the company had diversified into the manufacture of commercial vehicles in elaboration with Daimler Benz, Germany. By the time their collaboration ended in 1 969, Data motors had become an independent producer of Medium Commercial Vehicles with a great degree of initialization. It had also developed the capability Of designing testing and manufacturing such vehicles. The widely successful Data Indict, an Euro 2 compliant vehicle, is the countrys first indigenously designed, developed and manufactured passenger car. Data Motors followed that up with the Data Indigo, a sedan that was launched in December 2002. The company also makes several other assigners vehicles, including the Safari, Sumo and Sierra. The companys products have received wide acceptance not only in India but also in the Middle East, Asia, Africa, Australia, Latin America and Europe. Business TELLS is into the business of manufacturing and selling medium, heavy and light commercial vehicles, multi utility vehicles and passenger cars. Its major product line can be basically classified into three broad categories. There are various sub-brands and products in these categories: 1 . Passenger Cars 2. Stability Vehicles 3. Commercial Vehicles Chapter 3 OBJECTIVES OF THE RESEARCH Chapter 5 Research Methodology Research Methodology : Hypotheses In the modern business world, company valuation is not only needed for mergers acquisitions but also to present the strengths and fundamentals of the company to the stake holders and investors. The stock markets in many companies use such valuation data to assign ratings to a company starting from very risky to invest to very safe to invest. These analytics are published after carrying out structured mechanisms of company analysis as would be presented theoretically in the Literature Review. These mechanisms an be demonstrated by analyzing practical scenarios which shall be carried out by presenting the case studies of Data Motors based on the published valuation reports of by these companies as well as multiple third parties. The reports of the case studies shall be analyzed to present conclusions about the strengths of the company and the risk factor from the perspective of prospective investors in the stocks of the company or potential buyers of the entire company. However the perspective shall be academic and may not be applicable for professional purposes. The outlook of the next five years for the chosen impasse shall be done based on academic understanding of Strategic and Financial valuation techniques. It is assumed that all the analytics techniques shall be applicable in excel sheets and no special software tools shall be required. Not all valuations are of interest to everyone.

Friday, November 22, 2019

5 Cases of Excessive Commas

5 Cases of Excessive Commas 5 Cases of Excessive Commas 5 Cases of Excessive Commas By Mark Nichol The rules about commas can seem so complicated and contradictory that writers can (almost) be forgiven for tossing in an extra one or two. Here are several examples of overly generous deployment of commas. 1. â€Å"If a killer asteroid was, indeed, incoming, a spacecraft could, in theory, be launched to nudge the asteroid out of Earth’s way, changing its speed and the point of intersection.† This thirty-word sentence is littered with six commas one for every five words five of them appearing before the halfway point. By simply bending the rule about bracketing interjections with commas a rule that advocates of open punctuation flout routinely anyway the number is reduced by two, rendering the sentence more free flowing: â€Å"If a killer asteroid was indeed incoming, a spacecraft could, in theory, be launched to nudge the asteroid out of Earth’s way, changing its speed and the point of intersection.† One more comma can be eliminated by relocating the parenthetical phrase â€Å"in theory† to an earlier position in the sentence, so that the comma after incoming does double duty: â€Å"If a killer asteroid was indeed incoming, in theory, a spacecraft could be launched to nudge the asteroid out of Earth’s way, changing its speed and the point of intersection.† 2. â€Å"The metaphor, ‘The world is a machine,’ began to replace the metaphor, ‘The world is a living organism.’† In this sentence, the comma preceding each instance of metaphor implies that that metaphor is the only one not just in the sentence, but anywhere. (But two metaphors are expressed here, and innumerable others exist.) Metaphor, appearing in apposition to the two brief quotations, should not be set off from them: â€Å"The metaphor ‘The world is a machine’ began to replace the metaphor ‘The world is a living organism.’† 3. â€Å"The event is part of a catchy, public health message about the importance of emergency preparedness.† Catchy and â€Å"public health† are not coordinate adjectives. The point is not that the message is catchy and public health; it’s that the public health message is catchy. Therefore, no comma is necessary: â€Å"The event is part of a catchy public health message about the importance of emergency preparedness.† If, by contrast, the sentence read, for example, â€Å"The event is part of a catchy, quirky message about the importance of emergency preparedness,† note that because catchy and quirky are parallel they are coordinate adjectives a comma should separate them. 4. â€Å"The report was completed in December, 2012.† A comma is necessary between a month and a year only if a date is specified (â€Å"The report was completed on December 1, 2012†): â€Å"The report was completed in December 2012.† (The same rule applies when the name of a season appears in place of the name of a month: â€Å"The report was completed in fall 2012.†) 5. â€Å"Jones traveled by boxcar from California to New York with fellow fledgling artist, John Smith, sketching the American landscape along the way.† Commas are necessary with this type of apposition only if the epithet is preceded by an article (â€Å"Jones traveled by boxcar from California to New York with a fellow fledgling artist, John Smith, sketching the American landscape along the way†): â€Å"Jones traveled by boxcar from California to New York with fellow fledgling artist John Smith sketching the American landscape along the way.† Unfortunately, this type of error has gone viral its ubiquity is mistaken for propriety and is seemingly ineradicable. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:"Because Of" and "Due To" 8 Types of Parenthetical Phrases7 Sound Techniques for Effective Writing

Wednesday, November 20, 2019

Family Biography Essay Example | Topics and Well Written Essays - 1000 words

Family Biography - Essay Example This paper illustrates that the author’s parents met many years back when they were appointed as prison guards in OJT. At that time, his Dad was divorced and was 30 while his Mom was married to another man and was 25 years of age. His Mom and Dad started seeing each other about which his Mom’s husband knew nothing. They fell in love with each other. His Dad could do anything for her because she was smart, skinny and attractive. He would drive miles just to see her for an hour. To the author, he was a very superficial person giving importance to looks rather than the person inside. He always liked skinny women and loathed bigger ones. As for his Mom, even though she was pretty, she was very rude and rough in her behavior. That is why she did not have many friends. Since she was attractive, nobody ever held her accountable for her terrible behavior. She always thought that she was right even when at times she would be wrong. She has always been very bossy in nature and ob livious to what others think of her. She was, and is till now, very possessive toward the author. The researcher knew that she loved him very much but her possessiveness and messing with everybody who tried to pick a finger at the authorreally ripped the researcher of his personality. The researcher was not humble anymore. Until now, the researcher share a love-hate relationship with her and the reseahasr have not been able to change his feelings toward her no matter what she does for him.  ... I would miss my older Dad too much and developed a constant hatred for my Mom for tearing apart the family. I knew she was the one who had always started the fights. But now, everything had changed and a new guy had come into my life as my real Dad. I came to know about this fact when I was about 7 or 8 years of age and I would not understand why it all happened. After a couple of years, I realized that my Mom was getting better along with my Dad. They seemed to love each other quite well. They would take me for outings and helped me do my homework. We became a happy family. My Dad is a bit superficial person in that he likes me being always in good shape. He likes cars, houses, money and beauty. But still I think I like him a lot because he enjoys sports with me. He attends my parent-teacher meetings with my Mom. I like both of them being there for me whenever I need them. They communicate with me whenever they want me to do something for them and make me understand the logic behind . When I was growing up, I wanted to be a doctor. My parents wanted me to go into law school. So, they made me understand why they wanted me to become a lawyer. Once I got into the habit of coming home late in the evening because I started hanging out with my friends. My Dad did not shout at me; instead, he talked to me about the issue. He made me understand why late nights would be harmful for me. I understood and straightened myself. We go to visit friends and family and invite them to our house. My Mom, at times, shouts and makes issues of small things but my Dad and I handle her quite well with her temper tantrums. I wish she could leave

Tuesday, November 19, 2019

Louis Paul Pojmans Argument Essay Example | Topics and Well Written Essays - 750 words - 1

Louis Paul Pojmans Argument - Essay Example Man is a social animal and it is difficult for him to lead an isolated life. We are connected to many entities in this world and therefore our actions may affect others also. For example, if a person committed a crime, the police will interrogate all his relatives and family members in order to collect evidence. In other words, the crime committed by a person may affect others as well. If one person kills another, the relatives of both the killer and the killed will be suffered along with the killer. The person who was killed may have a wife, parents, and children. The wife lost her husband whereas the children lost their father. The parents lost their son and the neighbors might have lost a good friend. Same way the killer may also have all the same entities and they also will suffer because of the killer’s criminal act. In other words, even if the criminal is a single entity, many other entities suffer because of the actions of the single entity. In short, even if we arrest the criminal and punish him, the persons who lost their beloved one may not get much in return. Under such circumstances, Pigman's arguments seem to be good on paper, but in practice, it is difficult to achieve. It is a fact that we deserve what we earn. But it is difficult to limit the earnings within ourselves because of the complex relationship within the human community. Human has emotions and feelings and it is difficult to lead an emotionless or feeling less life. We can argue that the hardworking fellows should be rewarded properly whereas criminals or culprits should be punished. But we cannot argue hardworking fellows always get rewards whereas the criminals always get punishments. At the time of writing this paper, world cup football is going on.     

Saturday, November 16, 2019

Web or Mobile System Essay Example for Free

Web or Mobile System Essay As a network engineer it is very important to keep the network available for users at all times. â€Å"A highly available network means that the network and the applications that are used on it are both operational and accessible at all times† (CiscoPress 2008 p. 124). Working as a network engineer I am always on call because there is someone always using the network. â€Å"An always on facility is needed to maintain the business-critical apps† (Volonino 2011). The network is monitored 24 hours 7 days a week even if no one is scheduled to be in the office we still have to monitor the network to make sure there are not outages are hiccups along the way. If there is a network outage are any bandwidth issues that come up, I need to be able to run diagnostics and be able to manage the switches and routers as needed 24 hours 7 days a week just in case, and if something does happen I need to be able to find out what is causing this issue before it becomes a major problem. We also have to monitor all of our network equipment to make sure there is no unusual behavior like a Denial Of Service (DoS) or security breaches. Each engineer on our team has a laptop that we take home with us so when we are on call it is easy to vpn into our corporate network to run diagnostics on the network equipment to make sure everything is functioning properly. The majority of devices we us on our network are Cisco devices. Cisco systems offer a software application called LMS (Cisco Works LAN Management Solution). LMS is a centralized system for sharing device information across all LAN management applications (Cisco 2012). We use the LMS software to monitor equipment, traffic, and users. I use this software to do the majority of my daily work. Recently cisco developed a mobile app for this software application for iPhone and Droid OS. This gives me a huge advantage because when I am on call I don’t have to lug my laptop around with me all the time and I can still monitor the equipment and run specific reports where ever I am. This application allows a highly secured connection to tunnel thru so I can connect to the web portal of the LMS software. Once the application is downloaded to my mobile device I have to configure the appropriate security settings and the network ip address and a few settings that are specific to our network to load the application on my iPhone and configure my network information and this allows me to check and monitor network traffic and connectivity over a secured port from the appliance. This mobile application does not allow me to have all of the flexibility of the actual software would if I was on my laptop but it lets me do the important task like monitoring and maintaining reports and statics from my mobile device. The good thing about this tool is it has to be enabled on the devices that I want to manage and an access list has to be created on the switch to allow the traffic from my mobile device. â€Å"The benefit of this application is that it increases productivity, because workers can be productive anywhere they go† (Cisco 2012). Applications like this one help companies to connect and to know what is going on at all times. The drawback to this is if the network goes down the application will not work. Because the applications software is house on an appliance on the network if the network connection drops then the software cannot operate. This tool like VPN allows you to access the application software through a specific port on the network that is set by the Network Administrator to allow specific users access to the application. If the network connection is not available then the application cannot be accessed. Even though this drawback exists it is still a huge benefit being able to work from a mobile device from any location verses my desk. I think as technology continues to grow Cisco will also expand on the number of features it offers through this mobile application as will.

Thursday, November 14, 2019

Comparing Those Rainy Mornings, In The Cutting of A Drink, and The Return :: Comparison Compare Contrast Essays

Comparing Those Rainy Mornings, In The Cutting of A Drink, and The Return      Ã‚  Ã‚  Ã‚   The two short stories "In the Cutting of a Drink" and "The Return" bring different responses from me.   "In the Cutting of a Drink" makes me think about what it would be like to go into a new culture.   It also makes me think about the current decline in moral values.   "The Return" reminds me to be more thankful for the many things I take for granted.   It also makes me think about how hard it can be to cope with change.   In the poem "Those Rainy Mornings" I am reminded of my grandma and what a kind, loving, wonderful person she is.      Ã‚  Ã‚  Ã‚   In Frank Chipasula's poem "Those Rainy Mornings" the speaker is talking about his aunt Gwalanthi.   The speaker tells us what a wonderful loving person his aunt is.   In the first section the speaker tells us how his aunt would wake up at the crack of dawn and build a fire.   Then she would begin cooking porridge. In the second section of the poem the speaker talks about waking up "out of the nagging nightmare."   Then the speaker describes his aunt a little bit more, "her soft but husky call."   In the last section the speaker talks about how kind his aunt is to take care of his brothers and sisters while his parents "strayed to the copper mines."      Ã‚  Ã‚  Ã‚   This poem makes me think about my grandma and all the wonderful things she has done for me.   The speakers aunt is an old fragile woman, "hoe-broken palms" and "scrawny ribs."   But she is also a very hard worker and loving person.   Both these things remind me of my grandma.   My grandma may be old and fragile but she is still a very hard working and loving person.   My grandma is always up at first light doing household chores or working in her garden.   Many times we have to force her to go inside, so she won't be exposed to the hot sun for to long. I can't count the number of times my grandma has made my bed, folded our clothes, washed our dishes, or done various other household chores for me and my family. I could never fully repay my grandma for all the wonderful things she has done. My grandma, like aunt Gwalanthi, is a very kind, hard working person.      Ã‚  Ã‚  Ã‚   Ama Ata Aidoo's "In the Cutting of a Drink" is about a person relating his story of looking for his lost sister in a big city called Mamprobi.

Monday, November 11, 2019

Kit Kat vs Snickers Essay

Kit Kat is the best value because of its milk chocolate, crispy crumbs of sweetness. The taste is unbelievable, can be easily shared, melts in your mouth, and has less sugar than Snickers. Like they say on Kit Kat commercials: have a break, have a Kit Kat or break time any time, it balance you and fills you with energy, and So on your next break you might want to grab a kit Kat bar to kill of the hunger. The taste of kit Kat is incredible, the milk chocolate will blast flavors in your mouth. you will taste the milk chocolate , the crispy crumbs of wafers and think it really does taste as good as looks. The first bite will make you carve for more, less than a minute they will be gone, and you will rush to the store to get more. Just unwrap, break, snap, and enjoy. With Kit Kat you can easily share it. Just break or snap. With snickers you would need to put lots of effort into breaking a section off. When you try to break snickers it get sticky on your fingers and your friend would not want it anymore, but with the Kit Kat you just snap a bar off just like that! Kit Kat easily melts in your mouth, unlike snickers you would have to chew to the peanuts and its sticky caramel that get stuck on your fingers and teeth. For kit Kat all you have to do is pop it in your mouth and let it do it thing. Snickers fan say they like it better because it has more protein, it crunchier then kit Kat, and because it was invented before kit kits†¦ First, Snickers does have more protein then kit Kat, but snicker has more fat (12g) and has way more calories than kit Kat (250), which people look how much fat it has before buying a candy bar†¦Second, it is NOT crunchier then kit Kat because kit Kat has three layer of wafer (which is crunchy) and snicker has 4 or 5 piece of peanut in them which make it less crunchy then kit Kat.

Saturday, November 9, 2019

Qcf Level 2

diploma in health & social care level 2 knowledge learning outcomes mandatory units Unit Cu2470 Understand the need for secure handling of information in health and social care settings |Identify the legislation that relates to the recording, storage and sharing of information in health and social care (1. 1) | | | | | |The legislation relating to this are, | |CQC standards regulation 20 personal records remain confidential. |Data Protection Act 1998 | | | |Explain why it is important to have secure systems for recording and storing information in a health and social care setting | |(1. ) | | | | | |It is vital that the company that is providing the health and social care to individuals has a secure system set in place to | |record personal information as it will be needed for a number of different reasons. It is also the law to document and record | |this information so it should also be done to comply with legislation it must also protect confidentiality.Prevent identity | |thef t and also maintain the rights of individuals. The information must also be accessible for those who need it. | Know how to access support for handling information |Describe how to access guidance, information and advice about handling information (2. 1) | | | |read Policies and Procedures file, attend training, speak to Team Manager, speak with work colleagues, research on websites | | | |Explain hat actions to take when there are concerns over the recording, storing or sharing of information (2. 2) | | | |Delete, and keep hard copy, carefully filed, of the important stuff. On your computer, keep an up-to-date index of what is in | |your hard-copy file. If you use titles only, that should do. If you're really paranoid, use randomly selected titles that have| |NOTHING to do with the content. |A breach of confidentiality and or the privacy act, contact the relevant or authority involved, if this is a serious situation| |resulting in the detrimental sharing or misuse of personal info rmation | | | | | | |

Thursday, November 7, 2019

Youth Antisocial Behaviour Britain

Youth Antisocial Behaviour Britain The problem of the youth antisocial behaviour in the British society is discussed at several levels. Today definite Antisocial Behaviour Orders are developed by the government as one of the main measures in order to control and correct the facts of antisocial behaviours in community.Advertising We will write a custom essay sample on Youth Antisocial Behaviour: Britain specifically for you for only $16.05 $11/page Learn More Nevertheless, the effectiveness of this practice is argued by the researchers, sociologists, and psychologists because of the complexity of the notion of antisocial behaviour and its connection with the adolescents’ behaviour (Burney 2009; Connell et al. 2011). That is why the major issues which are discussed in the literature on the topic of reducing youth antisocial behaviour with the help of legislative programmes are associated with the questions of the definition of the term, the problem of the programmes’ effectiveness , the possible success in the usage of the community-related programmes, and the role of the family in the process. The term ‘antisocial behaviour’ is rather broad and has different variants of its interpretation from the position of the governors, psychologists, and sociologists. There is also a number of associated notions. Thus, Burney states that it is necessary to distinct between the notions which can be discussed by the public as equal ones because they refer to the same field, but are connected with different problems. These terms are, for instance, ‘disorder’, ‘crime’, and ‘antisocial behaviour’. According to Burney, â€Å"‘disorder’ is a term applied collectively to communities; ‘anti-social behaviour’ is something done by individuals who are thereby singled out and blamed for the harm they inflict upon communities† (Burney 2009, p. 2). Following Burney’s considerations, it is possi ble to say that antisocial behaviour is predominantly connected with the specific behaviour of a person or a group of person which influences the character of their interactions with other representatives of the community negatively. Moreover, it is also important to pay attention to the fact that the term of ‘antisocial behaviour’ also involves the problem of the intrusive measures realized against individuals (Burney 2009).Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More To define the term more clearly, it is significant to focus on the examples or patterns of realizing by the youth their antisocial behaviour in communities. Connell, Cook, Aklin, Vanderplong, and Brex developed the study in which they concentrated on the analysis of the most typical patterns of antisocial behaviour using the results of conducting the survey (latent class analysis) in a nonmetropolitan r egion of Britain (Connell et al. 2011). According to their survey, such types or patterns of the youth antisocial behaviour as damaging property, stealing, vandalism, and fighting were determined. Furthermore, the evidences stated that the fact of antisocial behaviour was in the most cases fixed by police (Connell et al. 2011). Having determined the most frequent patterns of antisocial behaviour typical for the youth in Britain, the researchers analysed the results of the survey and proposed the groups or classes of antisocial behaviours (ASBs) organised according to their severity. These classes are a non-ASB class, a mild ASB, a moderate ASB, and a serious ASB class (Connell et al. 2011). If Connell and the group of researchers’ classification is based on the level of severity of the definite antisocial behaviour (according to the determined patterns), the types of antisocial behaviour provided by Frick and White depend on such a characteristic as callous-unemotional (CU) t raits (Frick White 2008). Concentrating on this term, the researchers determine such influential traits as the absence of empathy presented by the adolescents in their personal interactions, the lack of guilt as the determiner of the level of their responsibility and tolerance (Frick White 2008). Therefore, callous-unemotional traits are important factors for forming the youth model of antisocial behaviour. The focus on the problem of antisocial behaviour in Britain resulted in the development of the practice of Antisocial Behaviour Orders (ASBOs) as the measure to realise the antisocial behaviour policy in the country. The project of ASBOs was presented in 1998. It was worked out as the measure to control and regulate the level of antisocial behaviours in society. Today this order is associated with the antisocial behaviour of adolescents who are inclined to realising different antisocial behaviour patterns. In his research, Donoghue discusses the problem of ASB and ASBO with ref erences to such terms as ‘reflexive modernity’ and ‘risk society’ (Donoghue 2008).Advertising We will write a custom essay sample on Youth Antisocial Behaviour: Britain specifically for you for only $16.05 $11/page Learn More From this point of view ASBOs are considered not only as the ways of the legislative control but also as the facts of the social control. Explaining the aspects of the notion of ‘risk society’, Donoghue states that ‘risk society’ provokes the occurrences of the youth antisocial behaviours (Donoghue 2008). That is why the effectiveness of realising ASBOs in the context of modern ‘risk societies’ depends on reformatting the main principles of providing ASBOs as the key controlling and regulating measures. However, there are many categories according to which it is necessary to analyse the aspects of ASBOs. In their research, Flint and Nixon concentrate on the concepts of ci tizenship, self-regulation, and responsibilities as the basic ones for determining the idea of a socially appropriate behaviour. The authors of the research focus on the discussion of ASBs from the point of Antisocial Behaviour Orders, Acceptable Behaviour Contracts, and tenancy agreements (Flint Nixon 2008). However, along with paying much attention to the government’s role in providing the legislative programmes for controlling the situation and reducing ASBs Flint and Nixon emphasise the role of communities in regulating the youth antisocial behaviour (Flint Nixon 2008). They also make accents on the fact that the effectiveness of the governmental measures and legislative programmes significantly depends on the range of the regulatory mechanisms used. In spite of the fact Flint and Nixon discuss the issue with focusing on the character of interactions and antisocial behaviour in definite residential areas, their conclusions can be used for the proper analysis of the situ ation with the occurrences of antisocial behaviour at individual and community levels (Flint Nixon 2008).Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Thus, legislative programmes can become more effective, if they are implemented with referring to the development of the system of community control. Many researchers agree that the social effect of involving the community in the process of controlling and regulating the youth antisocial behaviour is higher than the effectiveness of such programmes as, for instance, ASBO (Burney 2009; Donoghue 2008; Flint Nixon 2008). Moreover, to regulate the issue of antisocial behaviour which is typical for adolescents in Britain, it is necessary to use all the opportunities to predict it (Flint Nixon 2008). That is why researchers accentuate the role of community and family in forming the individual vision of possible positive interactions in society which do not abuse the interests of the other people (Donoghue 2008). Psychologists state that antisocial behaviour of adolescents is in many cases a result of reflecting the situation at home, the character of relations between parents and the re lations of the individual with his or her parents (Burney 2009; Donoghue 2008). Analysing the role of the relations between parents and their children, Connell, Cook, Aklin, Vanderplong, and Brex states that positive relations in families which are based on the principles of mutual understanding between the members of the family can be considered as the protective factor or as a key aspect for predicting the further antisocial behaviour of adolescents. Moreover, this protective factor can be discussed as effective for different levels of antisocial behaviour (Connell et al. 2011). To understand the nature of the adolescents’ possible antisocial behaviour, Ensor, Marks, Jacobs, and Hughes concentrates on the examination of the aspects of the relations between the siblings in the family (Ensor et al. 2010). The fact of demonstrating aggression, anxiety, and hatred directed toward the other children in the family is typical for many families. Nevertheless, to state that such sit uation in the family can provoke the adolescents’ further antisocial behaviour, it is necessary to analyse all the aspects of the problem. The researchers determined three factors according to which they examined the siblings’ behaviour. These factors were the refusal to interact with each other, the frequency of the occurrences of bullying and harming each other (Ensor et al. 2010). The results of the research confirm the psychological visions of the nature of relations between siblings. Moreover, they can be discussed as significant for the development of the possible strategies of predicting the issues of antisocial behaviour in the future (Ensor et al. 2010). The role of the community and family is also significant with references to the factors which can stimulate children and adolescents’ antisocial behaviour. Paying much attention to CU traits, Frick and White focus on the connection between the realization of these traits in childhood and adolescence and the role of the community in regulating the development of CU traits which can lead to the formation of the antisocial and aggressive youth. Mahoney, Stattin, and Lord conducted the investigation on the base of the sample from Sweden. The researchers examined the peculiarities of the unstructured youth recreation centre participation and concluded that the participation in such centres also cannot be considered as the effective measures to regulate the adolescents’ behaviour and predict their further antisocial behaviour (Mahoney, Stattin, Lord 2004). Such conclusions are the result of the analysis of the adolescents’ relations between each other and between them and their peers in the centres. Thus, according to the research’s evidences, many peers can provoke, stimulate, and promote the adolescents’ antisocial behaviour (Mahoney, Stattin, Lord 2004). The controversial question of the effectiveness of legislative programmes as the measures to control the youth antisocial behaviour is also associated with the problem of predicting and regulating. In their research, Rutten, Biesta, Dekovic, Stams, Schuengel, and Verweel state that it is possible to use such methods as a forum theatre intervention in order to create the necessary positive atmosphere in the group of adolescents and avoid or correct the issues of antisocial behaviour (Rutten et al. 2010). Nevertheless, the findings of the research accentuated the fact that the changes in the antisocial behaviour of the youth are not significant in comparison with the other methods to correct the ASBs (Rutten et al. 2010). To provide the effective research of the problem of reducing youth antisocial behaviour through legislative programmes in Britain, it is important to concentrate on the methods used for conducting the investigation, collecting the necessary data and evidences, and analysing the findings. The issue of antisocial behaviour is closely connected with the aspects of psyc hology of children and adolescents. That is why it is effective to use the research methods which are generally utilised while conducting the psychological surveys and investigations (Breakwell 2006). Sekaran proposes a range of research methods which can be successfully used in providing the studies in the field of social sciences (Sekaran 2006). According to the criteria presented in the book by Sekaran, the research on the topic of reducing youth antisocial behaviour in Britain should be realised with the help of combination of such methods as the elements of the quantitative research and the aspects of the descriptive study (Sekaran 2006). The priorities of the programmes developed to solve the problem of antisocial behaviour in the British society are generally changed according to the main principles provided by this or that prime-minister. According to the findings presented in the researched literature, the existing policies should be reformed with references to the new soci al demands and requirements because of the fact that community control and definite measures provided at the community level can work more effectively in comparison with the effectiveness of the legislative programmes. There were several stages in discussing the effectiveness of ASBOs which reflected the public and governmental vision of the issue. Thus, the whole campaign has faced a lot of criticism from different sides. It is possible to say that the majority of the British society agrees that the Antisocial Behavior Orders are not really successful in stopping the development of antisocial behavior in Britain (Squires Stephen 2005). Reference List Breakwell, GM 2006, Research methods in psychology. Sage Publications Ltd, London. Burney, E 2009, Making people behave: anti-social behaviour, politics and policy, Willan Publishing, Cullompton, UK. Connell, CM, Cook, EC, Aklin, WM, Vanderplong, JJ, Brex, RA 2011, â€Å"Risk and protective factors associated with patterns of antiso cial behaviour among nonmetropolitan adolescents†. Aggressive Behaviour, vol. 37 no. 1, pp. 98-106. Donoghue, J 2008, â€Å"Antisocial Behaviour Orders (ASBO’s) in Britain: contextualizing risk and reflexive modernization†. Sociology, vol. 42 no. 2, pp. 337-355. Ensor, R, Marks, A, Jacobs, L, Hughes, C 2010, â€Å"Trajectories of antisocial behaviour towards siblings predict antisocial behaviour towards peers†. Journal of Child Psychology Psychiatry, vol. 51 no. 11, pp. 1208-1216. Flint, J Nixon, J 2006, â€Å"Governing neighbours: Anti-Social Behaviour Orders and new forms of regulating conduct in the UK†. Urban Studies, vol. 43 no. 5-6, pp. 939-955. Frick, PJ White, SF 2008, â€Å"Research review: the importance of callous-unemotional traits for developmental models of aggressive and antisocial behaviour†. Journal of Child Psychology Psychiatry, vol. 49 no. 4, pp. 359-375. Mahoney, J, Stattin, H, Lord, H 2004, â€Å"Unstructured yout h recreation centre participation and antisocial behaviour development: selection influences and the moderating role of antisocial peers†. International Journal of Behavioural Development, vol. 28 no. 6, pp. 553-560. Rutten, EA, Biesta, GJJ, Dekovic, M, Stams, GJJM, Schuengel, C, Verweel, P 2010, â€Å"Using forum theatre in organized youth soccer to positively influence antisocial and prosocial behaviour: a pilot study†. Journal of Moral Education, vol. 39 no. 1, pp. 65-78. Sekaran, U 2006, Research methods for business: a skill building approach. Wiley-India, Mumbai. Squires, P Stephen, DE 2005, Rougher justice: anti-social behaviour and young people, Willan Publishing, Cullompton.

Monday, November 4, 2019

Analysis Power of Computers Essay -- Computer Technology

Keywords- Family Similarity Recognition, Facial Feature Extraction, Face Detection, PCA, Image Database. I. INTRODUCTION Over the last thirty years or so, face recognition is an active research area in computer vision and one of the most successful applications of image analysis and understanding. Different algorithms have been proposed by researchers for solving this problem and many of them are considered as the state of the art. Nowadays, the face recognition problem is not only important in the research area, but it is vital in the commercial applications. A general statement of the face recognition problem can be formulated as follows: Given still or video images of a scene, identify or verify one or more persons in the scene using a stored database of faces. Due to this definition well-known algorithms such as PCA [24], ICA [1], LDA [28], EBGM [27], B... ... middle of paper ... ...e considered for it. For example, humans use terms such as "entire face of person A is similar to person B" or "eyes and eyebrows of person A are similar to person B" or "profile view of person A is similar to person B" to express the similarity criteria between people. With respect to these observations, three features are utilized in the proposed method include: "The Whole Face", "The Facial Features’ Perimeter" and "The Ratio between Facial Features". These features are selected from the frontal and side view images. The facial features’ perimeter includes forehead, eyebrows and eyes, nose, mouth, chin and cheek. The ratios between facial features’ point can be calculated from the distances that are evident in Figure 1. Utilizing ratio instead of distances between the facial features' point eliminates the dependency to the image scale. These ratios are as follow:

Saturday, November 2, 2019

The Principles of Delivering Remarkable Service in the Hospitality Essay

The Principles of Delivering Remarkable Service in the Hospitality Industry - Essay Example It is important to adopt positive attitude when dealing with customers because this is the key practice towards achieving remarkable service delivery in the hospitality industry. Therefore it can be argued that organizations in the hospitality industry need to embrace the culture of remarkable customer service delivery. Organizations need to empower itself to ensure that exceptional customer service delivery is made possible. Remarkable service delivery enhances the identification of customer needs and how to customize the service delivery approach. This will ensure that all members in the entire organization fully embrace and develop the culture of effective and efficient remarkable service delivery. To achieve this organization need to incorporate principles of remarkable service delivery in its operations, vision and the entire corporate culture. These principles basically provide guidelines and procedures on how organizations in hospitality industry can have remarkable service delivery (Kusluvan 2003). It notably helps teams and leaders in hospitality industry have an insight understanding on remarkable excellent customer service delivery. The principles of delivering remarkable service in the hospitality industry entail the following. There are various attributes in hospitality industry which significantly contribute to these organizations delivering remarkable service. These attributes compliment the remarkable service delivery skills which are very essential in the industry. These attributes ensure that the remarkable service delivery skills are focused on the satisfaction of customer needs. It establishes a core foundation in establishing strong relationship with the customers based on trust and loyalty. It is notable that all the attributes contributes collectively on the customer retention, loyalty and overall success in the hospitality industry (Kusluvan 2003). The