Wednesday, January 22, 2020
Techno-terrorism and the Future of Civilization Ã Ã Ã Ã "Modern terrorism, with sophisticated technological means at its disposal and the future possibility of access to biological and nuclear weapons, presents a clear and present danger to the very existence of civilization itself"--Justice Arthur J. Goldberg. Mr. Goldberg's statement expresses a valid concern that has become an alarming reality. As terrorists trade pistols for airplanes and pipe bombs for nuclear explosives, technology is rapidly increasing the power, range, and effectiveness of attacks that terrorists are able to execute. Ã We should expect that terrorist attacks will become even more lethal for a few reasons. First, the terrorists themselves are becoming more technologically adept. Second, governments such as Iraq and Syria are providing the wherewithal for attacks against new and more sophisticated targets. Third, religious radicals are establishing new boundaries for mass violence beyond what had been previously anticipated. Finally, the threshold for new forms of attack has already been breached--such as the attacks on technological infrastructure and poisonings of municipal water supplies. Techno-terrorism is the topic of discussion for this paper, however, it is also a topic for legislators, governments, communities, and families to evaluate when molding the world of tomorrow. The purpose of this paper is to examine terrorist ideology and to explore the technology of terrorism and what impact it may have for the future of civilization. Ã In order to better understand terrorism and the effect that technology may have, one needs to be cognizant of the different elements of terrorism. One dimension to start with is the general strategies of terrorism--how are terrorists trying to accomplish their goals. Tactics--a related component to strategies--stands out as the essence to terrorism. Other elements that will be covered include personal weapons and technological improvements that serve as an added bonus to personal weapons. Lastly, the latest, and most noxious, phenomenon of terrorism is mass destruction--the use of explosives and nuclear warfare. Ã When I mentioned general strategies of terrorism, I mean that general themes and patterns or lack thereof will be discussed. The summation of the following points explain the focus of terrorism on a unbiased scale. The first of five major themes is the idea that the terrorist act must always have a victim--someone or something harmed by the act--in order for the act to be utilitarian. Second, there are no real targets in which an enemy or adversary is terminated, only symbolic targets.
Monday, January 13, 2020
The Civil War, a war fought during the 1860s, decided a great many things: slavery or freedom, south and north or unification. In the beginning of the war, the Northern African Americans were not allowed to join the Union Army and fight against the Southern oppressors. Alfred M. Green, while giving a speech in Philadelphia at the beginning of the war, urged African American to prepare to enlist. He also spoke subversively about the unfairness of the treatment of African Americans not only in the South but also in the North. Green uses a variety of methods to persuade his fellow African-Americans to prepare for war while also speaking out against the treatment of the African-Am. in the North. Green begins his speech by immediately mentioning the cornerstone of the American ideology, that American citizens believe in Ã¢â¬Å"freedom, and of civil and religious toleration.Ã¢â¬ By remind the African Americans what America is founded on, he incites in them the desire to go to war against anyone opposing the idea. Green, by the same token, reminds the whites of their unfairness in denying the African Americans their rights. The mention of the Ã¢â¬Å"immortal WashingtonÃ¢â¬ and Ã¢â¬Å"JacksonÃ¢â¬ also appeals to the patriotism in the African Americans, moving them closer to desiring to fight in the war. The appeal Green makes to the religious beliefs of the African Americans is apparent throughout his speech. Because most of the African Americans at the time were Christian, by referring to their God as the Ã¢â¬Å"God of truth, Justice and equality to all menÃ¢â¬ makes the AFri. Am. feel obligated to help the cause of the Civil War. Because their God believed in Ã¢â¬Å"freedom,Ã¢â¬ why and how can they deny anyone else that right? At the same time Green also reminds the whites that their same God is the white God and that the African Americans deserve rights as well. Green also wants the African Americans to be Ã¢â¬Å"trusting in GodÃ¢â¬ because their God wants them to go to war and will protect them. Why should the African Americans not go to war under such protection? By the end of his speech, Green begins to remind the African Americans of their Ã¢â¬Å"oppressed brethrenÃ¢â¬ in the South. He reminds them of people under a Ã¢â¬Å"tyrant systemÃ¢â¬ and requests their assistance in overthrowing it. He alsoÃ mentions the desire of the Southern leaders to Ã¢â¬Å"drive backÃ¢â¬ ¦civil and religious freedomÃ¢â¬ ¦ and have more slave territory.Ã¢â¬ By mentioning the goals of the other side, he motivates the African Americans to battle by showing them the future of the nation if the South wins because they did not fight. Green notes that their Ã¢â¬Å"very presenceÃ¢â¬ on the battlefield will urge the slaves in the South to revolt. GreenÃ¢â¬â¢s word choice throughout his speech helps him to motivate the African Americans to battle without their realizing it. He constantly uses the phrase Ã¢â¬Å"let usÃ¢â¬ to persuade the African Americans to join the army without directly telling them to do so. A direct order is much less likely to be followed than a softer direction such as Ã¢â¬Å"let us.Ã¢â¬ He also includes himself in the group by using the word Ã¢â¬Å"us,Ã¢â¬ making him seem motivated and desirous of joining the army as well. If he desires to join, why should they not? Green also anticipates certain rebuttals to his argument, but he silences them by beginning his arguments with Ã¢â¬Å"it is true.Ã¢â¬ He wants the African American people to know that he too realizes the problems with the government but his is still willing to go to war. Although Green does make certain condescending arguments towards the white audience by the end of the speech he has Ã¢â¬Å"unitedÃ¢â¬ both American Americans and whites by focusing them against a common enemy: the South. He does want change, but he knows that defeating the Southern slavery system is much more pressing and important in the long run. Green is careful to Ã¢â¬Å"hope of the futureÃ¢â¬ but still Ã¢â¬Å"improve the present,Ã¢â¬ and he hopes not only the African Americans but also the whites will do the same.
Sunday, January 5, 2020
Sample details Pages: 7 Words: 2149 Downloads: 9 Date added: 2017/06/26 Category History Essay Type Essay any type Tags: John F Kennedy Essay Did you like this example? The John F. Kennedy Assassination On November 22, 1963 President John F. Kennedy was assassinated in Dallas, Texas. Lee Harvey Oswald was arrested for the murder. It is believed that Lee Harvey Oswald was not the only one involved with the crime. There are countless theories on how President Kennedy was murdered. Some of the theories include the FBI, CIA, and the mob being involved. The Warren commission said that they believe that it was solely Lee Harvey Oswald who killed President Kennedy. Most of the evidence shows that Lee Harvey Oswald could not be the only one involved. John F. Kennedy was the fourth United States President to be assassinated. Even today, there remains tremendous debate on who was responsible for the murder of Kennedy. The assassination of President Kennedy has started many different conspiracy theories about who was involved with the murder. President Kennedy wanted to travel to Dallas, Texas to help strengthen his vote for the upcoming election and also to gain more Democratic Party members. Before Kennedy went on the trip there was some concern about a sniper being on top of a building. President Kennedy also made comments before he was killed about his safety in a convertible car. The car President Kennedy was driving in was a 1963 Lincoln Continental open top limo. Sergeant Davis of the Dallas police department was the one who made sure the city was secure whenever any President or foreign leader came to Dallas. The secret service agent who was responsible for the planning of the Kennedy motorcade was Winston Lawson. Lawson told Sergeant Davis not to allow any police officers to follow the presidents car. It was standard procedure for the police to secure the perimeter when any president came to Dallas. Jessy Curry who was the chief of police said that if the cops were allowed to secure the area, then the murder could have been stopped. The cops who would normally secure the area have submachine guns and rifles.(Harrison Edward Livinstone, High Treason 2 The Great Cover-Up:The Assassination of John F. Kennedy (1992) Hardback) The original plan was to go from the Love Field Airport to downtown Dallas and Dealey Plaza. Kennedy was supposed to give a speech at the Dallas Trade Mart. Kennedys car did not have a bullet proof top, because they did not have anything invented at the time. At 12:30 President Kennedys limo went towards the Texas School book depository. Then the car turned right in front of the building and was only 65 feet away. The car was going 13 miles per hour and then slowed down to 9 miles per hour. Once the car passed the building the shots rang out. A man named Abraham Zapruder was right in front of the limo when it was being shot at. Zapruder was filming as the shooting took place. Kennedy and Texas Governor John Connally were both shot. John Connally was riding in the same car as Kennedy and was sitting in the passenger seat in front of the president. Governor John Connally was in critical condition but he survived. There was also another person that was just watching the motorcade that was injured from debris when the bullet hit a curb. (David S. Lifton, Best Evidence:Disguise and Deception in the Assassination of John F. Kennedy) Lee Harvey Oswald had been arrested for the killing a Dallas police officer J.D. Tippit. Lee Harvey Oswald was charged for killing President Kennedy and officer J.D. Tippit. Whenever Oswald was questioned about the shooting of President Kennedy he denied everything. There was a twelve hour interrogation of Lee Harvey Oswald and no recordings or notes were taken. Oswald said that he wasnt involved and that he was just a patsy. Two days after the assassination, Lee Harvey Oswald was shot by Jack Ruby. Oswald was in police custody at the time of the shooting. Jack Ruby posed as a reporter who was trying to ask Oswald a question.(The Assassination of JFK 19 June 2005 www.spartacus.schoolnet.co.uk/JFKindex.htm) The gun that was used was an Italian Manl icher-Carcano rifle. The rifle was found at the Texas School Book Depository on the sixth floor. When the police officers found the gun they recorded everything. The rifle is said to be the same gun that was used in the assassination. There was a bullet on the Connallys stretcher and it was fired from the gun that the police had found. Lee Harvey Oswald purchased the gun under the fake name of Alek James Hiddell. (The Assassination of JFK 19 June 2005 www.spartacus.schoolnet.co.uk/JFKindex.htm) President Kennedy was announced deceased at the emergency room. The surgeons at the hospital said that Kennedy had absolutely no chance for survival. Dr. George Burkley came to the hospital shortly after the president was shot and looked at the head wound and said that it was the cause of death. A priest came to give President Kennedy his last rites. Lyndon B. Johnson who was the vice president was the next person to become president. Lyndon B. Johnson was riding in a car behind Kennedy . Lyndon B. Johnson went through the procedure to become president while he was on Air Force One. (The Assassination of JFK 19 June 2005 www.spartacus.schoolnet.co.uk/JFKindex.htm) Once Air Force One had landed, an autopsy was performed at Bethesda Naval Hospital. The autopsy report said that Kennedy had been shot in the head and in the shoulder. Reports of the autopsy were incorrect and did not match up. It is said that Dr. James J. Humes probably destroyed the autopsy report and notes that were taken during the autopsy. The measurements that Dr. James J. Humes took were inconsistent and not exact. The autopsy reports were not shown to the Warren Commission. The people who handled the autopsy records did not keep track of how many pictures were taken. It is also said that the pathologists were not experienced enough to handle Kennedys body in the first place. Kennedys neck was not looked at to determine how the bullet entered and exited. After the autopsy Kennedys body was em balmed and was put into the white house for the public to see. The body was removed from the white house and buried in Arlington National Cemetery. (David S. Lifton, Best Evidence:Disguise and Deception in the Assassination of John F. Kennedy) There was also no recordings or radio coverage of the assassination. All of the news crews were waiting at the trade Mart for Kennedy and not in Dealey Plaza. There was some news crews riding with the Kennedy motorcade, but they were in the very back. The only recording of the murder was from Abraham Zapruders camera. Many individuals took still pictures of the shooting also. The Zapruder film shows Kennedys head moving forward and then backwards. The Zapruder film was shown on television, but was edited a lot. More recently, in 2003 ABC News drew Dealey Plaza in three dimensional computer models.(David S. Lifton, Best Evidence:Disguise and Deception in the Assassination of John F. Kennedy) The government is doing a good job in preven ting records of the Kennedy assassination from becoming publicly available. In 1964 President Lyndon B. Johnson made the Warren Commission findings to be kept from public viewing. Johnson said that the documents cannot be seen by the public for 75 years, which would be until 2039. Covering up all of the records, leads more people to believe that there is indeed a conspiracy involved with the death of President Kennedy. Congress established the Ã¢â¬Å"President John F. Kennedy Assassination Records Collection Act of 1992Ã¢â¬ . Congress made the act so that people could see the records earlier and they also felt that there was not a need to keep the records from public eyes. The act says that any document that has not been lost of destroyed must be given to the public by 2017. Many documents have already been opened, but the majority still remains locked away. All of the original evidence and material cannot be released, because it was lost or destroyed. Some import pieces of evi dence that were neglected are; the Governor of Texass suit being dry cleaned, the limo being cleaned, and Lee Harvey Oswalds Marine service file being lost. (Josiah Thompson, Six Seconds in Dallas (1976 Paperback)) There was a paraffin test conducted on Lee Harvey Oswalds right cheek and hands. The purpose of the test was to tell if Oswald had fired a weapon. The paraffin test came out positive, but the Warren commission said the data was inaccurate. The first people to conduct an investigation were the FBI. The director of the FBI said that he wanted something to convince the public that Lee Harvey Oswald was the only one involved with the assassination. The FBI report took 17 days to complete and was given to the Warren Commission. The FBI assisted the Warren Commission. Both the FBI and the Warren Commission said that there were only three shots fired from the rifle that Lee Harvey Oswald had. The House Select Committee Investigated the FBIs results. The committee con cluded that the FBI did not investigate whether or not President Kennedy was involved in a conspiracy and also that they did not give their data to other law enforcement agencies. James Hosty was an FBI agent who name appeared in Jack Rubys address book. The FBI made another copy of the address book and erased James Hostys name out of it and then gave it to the Warren Commission. Before the assassination took place, Lee Harvey Oswald went to the FBI office so that he could meet with James Hosty. Hosty was not in his office when Oswald had arrived, so Oswald left a note for him. When Oswald was murdered by Ruby, James Hosty destroyed the note by tearing it up and flushing it down the toilet. (Josiah Thompson, Six Seconds in Dallas (1976 Paperback)) When the Warren Commission completed their report many people questioned it and did not believe its findings. Many people have written books and articles disproving what the Warren Commission had said. In 2003 ABC News did a poll to see what the public thought about the John F. Kennedy assassination. The poll said that seventy percent of the people think that there is a plot involved with the murder of Kennedy. Around seventy to ninety percent of the American people did not believe the Warren Commissions findings. Even government officials that worked for the Warren Commission said that they did not completely believe the commissions results themselves. The House Select Committee on Assassinations said that the Warren Commission and the FBI failed to investigate who else could have been with the murder. The committee also said that the main reason for the lack of information and results were due to the Warren Commission not communicating with the CIA. (Gerald Posner, Case Closed (1993 Hardcover, 1st Edition)) The House Select Committee determined that President Kennedy was killed because of a conspiracy. Their results went directly against the Warren Commissions and were the complete opposite. The HSCA said that four shots were fired and Lee Harvey Oswald was not the only one who did the shooting. Lee Harvey Oswald has shot 3 shots and another gunman had fired the other shot from behind the fence on the grassy knoll. The grassy knoll theory has came from acoustic evidence and many different witnesses. In 2001, an article by D.B. Thomas stated that the HSCAs second gunman theory was right. The Assassination Record Review Board said that the autopsy of John F. Kennedy was a tragedy. (David S. Lifton, Best Evidence:Disguise and Deception in the Assassination of John F. Kennedy) The majority of the evidence involved with the John F. Kennedy assassination was mishandled and not dealt with the way it should have been. Since most of the evidence was lost and is locked away, its leads people to further believe in a conspiracy theory. The murder of John F. Kennedy shows that the government has not served its people in a righteous manner. They have lied, covered-up, and twisted things so m uch that it will never be possible to find out who was really involved with the murder. The government has violated the right of its own people. If the government took the time to correctly gather all of the evidence and look at all the aspects of the murder, than there would not be so much mystery surrounding the murder today. The government had violated the Kennedy familys 14th amendment. The 14th amendment and the due process of law were violated, because the Government failed to do a proper investigation of the assassination. The Kennedy family was not provided with a thorough and correct investigation of the murder. The government should have been a lot more accurate and involved with the investigations its agencies performed. DonÃ¢â¬â¢t waste time! Our writers will create an original "John Kennedy Assassination" essay for you Create order
Saturday, December 28, 2019
Introduction Managing diversity and equality effectively in the workplace is the core responsibility of any organization in the contemporary business world. Shen, Chanda, DÃ¢â¬â¢Netto and Monga (2009) conducted a survey whose results revealed the massive diversity within the British society in terms of ethnicity, nationality and religion. As a result, the Equality Act of 2010 was formulated and became law whose provisions focus on legal protection against discrimination based on gender re-assignment, marriage, civil partnership, age, disability, sexual orientation, religion, pregnancy and maternity, sex and beliefs (Monks, 2007). Therefore, managing diversity in the workplace is critical towards the achievement of equality and discrimination free working environment. Bhatia (2008) observed that the ability to understand, accept, value, acknowledge and celebrate differences among people with respect to race, sexual orientation, religion, age, ethnicity and mental ability within an organization i s crucial in eliminating discrimination. Discrimination refers to the tendency of denying equal treatment to people believed to be members of the same social group (Ozbilgin, 2009). In other words, discrimination in the work place is related to denial of equal treatment in terms of promotion, compensation, career development, training and empowerment. Therefore, managing diversity in the work place is crucial towards the achievement of a discrimination free working environment and theShow MoreRelatedBBC: Managing Diversity and Equality Essay1469 Words Ã |Ã 6 PagesRunning Head: MANAGING DIVERSITY AND EQUALITY BBC Case on Managing Diversity and Equality BBC Case on Managing Diversity and Equality Introduction The paper will present a case study on the diversity and equality issues in the worldÃ¢â¬â¢s largest broadcasting network, BBC. The company has employed around 24000 employees. It aims to reflect its audience with the diverse workforce as diversity is considered as a vital success factor of organisation. The company needsRead MoreDiversity in the Workplace1452 Words Ã |Ã 6 PagesIntroduction As a general statement diversity refers to the prevention of discrimination in conjunction with the improvement of equality. ItÃ¢â¬â¢s about valuing differences and inclusion; this is the act of spanning such areas as ethnicity, age, race, culture, sexual orientation, physical disability and religious beliefs. In a global marketplace diversity is theorised as a corporation that employs a diverse workforce in that includes both genders, people of many generations and those from ethnicallyRead MoreBusiness Case And Moral Case Justification For Diversity Management1748 Words Ã |Ã 7 Pagesthe organisation. More often than not, there will be some sort of discrimination in the workplace, especially with a very diverse workforce. Therefore, with proper training and benefits to ensure the development of these employees, and legislation and policy to ensure equality and reduce discrimination within the workforce, it can drive competitive advantage and organisational profit. When looking at diversity in the workforce, the business case and the moral case justification are often necessaryRead MoreManaging Diversity Within An Organization1674 Words Ã |Ã 7 PagesManaging Diversity is often defined as a Ã¢â¬Å"management philosophy of recognising and valuing heterogeneity in organisations with a view to improve organisational performanceÃ¢â¬ (Ozbilgin and Tatli, 2011). Hence recognising the wide variety of qualities possessed by people within an organisation and creating an environment that understands, values and utilises the differences within people. Due to the rapidly growing trends of a more diverse workforce, diverse market and globalisations of businesses,Read MoreDiversity Management And Equal Treatment1293 Words Ã |Ã 6 PagesAlthough large strides have been made to promote equal opportunities in the workplace over the past 50 years, diversity management and equal treatment can be improved. According to employment laws are put in place to stop discrimin ation, but it is the responsibility of people to put them into practice. By tackling diversity and promoting equality, is not only morally right but is ultimately a business advantage. Organizations are making themselves accessible to the talents all over the world andRead MoreManaging Diversity Within The Workplace1605 Words Ã |Ã 7 PagesAbstract- Managing Diversity in the workplace requires a lot of focus, training, and time. This paper gives an insight into the world of management and how diversity plays a big part. It explores the key benefits to putting emphasis on diversity and also how not putting emphasis on diversity could hurt your business. This paper also gives examples on how to go about managing diversity in the workplace. With proper focus on managing diversity, your organization can be at a big advantage. I. INTRODUCTIONRead MoreOrganisational Behaviour Challenges Sb1292 Words Ã |Ã 6 Pagesexplain the problems in context to Indian business. Managing People Often managers think managing people is something that they often think they can do, or indeed ought to be able to do. The interesting thing is that it is neither something they have been trained to do, nor something that they have necessarily learnt or taught to do. (Kay et al., 2005, p.79). I too had a similar thought, and with the initial chapters my perspective towards managing people has changed completely. OrganisationalRead MoreEssay on Managing Diversity in the Workplace1207 Words Ã |Ã 5 PagesJohn F. Kennedy once said If we cannot end now our differences, at least we can help make the world safe for diversity. Diversity in the Workplace: Benefits, Challenges, and the Required Managerial Tools1 Kelli A. Green, Mayra LÃ ³pez, Allen Wysocki, and Karl Kepner2 Introduction The worlds increasing globalization requires more interaction among people from diverse cultures, beliefs, and backgrounds than ever before. People no longer live and work in an insular marketplace; they are nowRead MoreChanging Working Force And The Positive Outcomes Of Managing Diversity At Work1471 Words Ã |Ã 6 PagesIntroduction The following essay will delve into the challenges of the changing working force and the positive outcomes of managing diversity at work. Ageing baby-boomers along with an increased number of women in paid work and an influx of workers from diverse backgrounds within the workplace raise new diversity challenges, which people managers must handle. Managing diversity in the workplace has become an essential skill for people managers. There are many social and economic reasons that make it highlyRead MoreDiversity at Deloitte - Plans and Policies1397 Words Ã |Ã 6 PagesGender amp; Diversity Plan and Policies When talking about equality opportunities implemented by companies, we can make a differentiation between two different models, the liberal and the radical one. The liberal model, described by Jewson and Mason, is emphasized on a philosophy of sameness, where people should have access to and be assessed within the workplace as individuals, regardless of social category. In the other hand, the radical approach is focused on a positive discrimination
Friday, December 20, 2019
Summary Groups were told to design a prototype which wold be able be used by a library as a computer system. The aim of this report was to show the factors that led to the group failing to carry out this tasks. The factors that caused this to happen were time mismanagement, bad project planning and poor communication. Factors that lead to a group failing a project was chosen as the topic of the report so problems that led to the group failing could be identified and understood in a way that would prevent group members from making the same mistakes in any future projects. These factors can be avoided by using planning resources and steady communication through Email services andÃ¢â¬ ¦show more contentÃ¢â¬ ¦An example of this was during the design specification stage of the project. The group ended up getting very low scores because of the way the project was carried out. The work was not evenly shared out between the group members and all group members did not meet up regularly to see who h ad done which stage of the project. One group member ended up doing most of the task including the story design, the Entity relationship diagram, most of the use case descriptions and the structured English because the other group members did not understand how to do these part of the projects. This led to the group getting very low scores in all these sections as the individual who carried out most of the tasks was not able to fully focus on each section and develop them to an adequate level. This could have been avoided if the group had planned the project well because the weaknesses of individual members could have been discussed earlier and the person who understood the work could have showed the other members of the group how to carry out the various task they did not understand and this would have helped the group avoid failing this stage of the project. Poor project management is also harmful to a group chances of passing a project because it also leads to a lack of communica tion as group members would not be ableShow MoreRelatedProject Mgmt296381 Words Ã |Ã 1186 PagesStevenson, Operations Management, 10th Edition Swink, Melnyk, Cooper, and Hartley, Managing Operations Across the Supply Chain, First Edition Thomke, Managing Product and Service Development: Text and Cases, First Edition Ulrich and Eppinger, Product Design and Development, Fourth Edition Zipkin, Foundations of Inventory Management, First Edition QUANTITATIVE METHODS AND MANAGEMENT SCIENCE Hillier and Hillier, Introduction to Management Science: A Modeling and Case Studies Approach with Spreadsheets
Thursday, December 12, 2019
Juvenile Essay Study on Juvenile PsychopathsWhat is the super predator? He or she are young hypercriminals who are committing acts of violence of unprecedentedcoldness and brutality. This newest phenomena in the world of crime is perhaps the most dangerous challenge facing society and law enforcement ever. While psychopaths are not new, this breed of super criminal exceeds the scope of psychopathic behavior. They are younger, more brutal, and completely unafraid of the law. While current research on the super predator is scarce, I will attempt to give an indication as to the reasons a child could become just such a monster. Violent teenage criminals are increasingly vicious. John DiIulio, Professor of Politics and Public Affairs at Princeton University, says that The difference between the juvenile criminals of the 1950s and those of the 1970s and early 1980s was the difference between the Sharks and the Jets of West Side Story and the Bloods and the Crips. It is not inconceivable that the demographic surge of the next ten years will bring with it young criminals who make the Bloods and the Crips look tame. (10) They are what Professor DiIulio and others call urban super predators; young people, often from broken homes or so-called dysfunctional families, who commit murder, rape, robbery, kidnapping, and other violent acts. These emotionally damagedyoung people, often are the products of sexual or physical abuse. They live in an aimless and violent present; have no sense of the past and no hope for the future; they commit unspeakably brutal crimes against other people, often to gratify whatever urges or desires drive them at the moment and their utter lack of remorse is shocking.(9) Studies reveal that the major cause of violent crime is not poverty but family breakdown specifically, the absence of a father in the household. Today, right now, one-fourth of all the children in the United States are living in fatherless homes this adds up to 19 million children without fathers. Compared to children in two parent family homes, these children will be twice as likely to drop out of school, twice as likely to have children out of wedlock, and they stand more than three times the chance of ending up in poverty, and almost ten times more likely to commit violent crime and ending up in jail. (1)The Heritage Foundation a Conservative think tank reported that the rise in violent crime over the past 30 years runs directlyparallel to the rise in fatherless families. In every state in our country, according to the Heritage foundation, the rate for juvenilecrime is closely linked to the perc entage of children raised in single-parent families. And while it has long been thought that poverty is the primary cause of crime, the facts simply do not support this view. Teenage criminal behavior has its roots in habitual deprivation of parental love and affection going back to early infancy, according to the Heritage Foundation. A fathers attention to his son has enormous positive effects on a boys emotional and social development. But a boy abandoned by his father in deprived of a deep sense of personal security, In a well-functioning family, he continued, the very presence of the father embodies authority and this paternal authority is critical to the prevention of psychopathology and delinquency. (2)On top of the problem of single parent homes, is the problem of the children whose behavioral problems are linked to their mothers crack use during pregnancy. These children are reaching their teenage years and this is a potentially very aggressive population, according to Sheld on Greenberg, director of Johns Hopkins Universitys Police Executive Leadership Program. Whats more, drug use has more than doubled among 12- to 17-year-olds since 1991. The overwhelming common factor that can be isolated in determining whether young people will be criminal in their behavior is moral poverty, Greenberg says. (3)According to the recently published Body Count: Moral Poverty . . . and How to Win America s War Against Crime and Drugs, a new generation of super-predators, untouched by any moral inclinations, will hit Americas streets in the next decade. John DiIulio, the Brookings Institute fellow who co-wrote the book with William Bennett and John Walters, calls it a multi variate phenomenon, meaning that child abuse, the high number of available high-tech guns, alcoholism and many other factors feed the problem. University of Pennsylvania professor Mavin Wolfgang says, 6 percent to 7 percent of the boys in an age group will be chronic offenders, meaning they are arre sted five or more times before the age of 18. If that holds true, because there will be 500,000 more boys ages 14 to 17 in the year 2000 than there were in 1995, there will be at least 30,000 more youth criminals on the streets. Between 1990 and 2010, there will be 4.5 million more boys, yielding 270,000 young criminals. The big destruction happens early, Heritage Foundation fellow Pat Fagan says. By the age of 4 or 5, the kid is really warped. Psychologists can predict by the age of 6 wholl be the super-predators. According to Fagan: Child abuse and alcohol ruin these children. But the groundwork was laid three decades ago with the widespread adoption of birth control, which made the sexual revolution possible. It altered peoples dedication to their children and altered a fundamental orientation of society. Sexual morality got unanchored in the 1960s, followed by the legalization of abortion. Abortion is a very definite rejection of the child. So is out-of- wedlock births, as well as divorce, he says. The predatorseveryone s afraid of were abused kids. Theres sexual abuse and alcohol, and just the general decline in the cultural knowledge of what love is. In 1950, for every 100 children born, he says, 12 had divorced parents or were born out of wedlock. In 1992, that number had quadrupled to 60 children for every 100 born. Throw abortion into the mix, and the number shoots up to 92 per 100. (4)John Dilulio asserts that each generation of crime-prone boys has been about three times as dangerous as the one before it. And, he argues, the downhill slide into utter moral bankruptcy is about to speed up because each generation of youth criminals is growing up in more extreme conditions of moral poverty than the one before it. Mr. Dilulio defines moral poverty as growing up surrounded by deviant, delinquent, and criminal adults in abusive, violence-ridden, fatherless, Godless, and jobless settings. The super-predator, as told to a Washington press gathering by DiIulio, is a breed of criminal so dangerous that even the older inmates working their way through life sentences complain that their youthful counterparts are out of control. He describes these teen criminals as radically present-oriented. Because their time horizon may be as short as the next guards shift, they have no capacity to defer gratification for the sake of the future. When these super- predators were asked by DiIulio or other inmates if they would commit their crimes again, most answer, Why not? DiIulio also says, they are radically self-regarding incapable of feeling joy or pain at the joy or pain of others. (7)According to Dilulio, todays juvenile super-predators are driven by two profound developmental defects. They are radicallypresent-oriented, perceiving no relationship between action and reactionreward or punishmentand they are radically self-regarding. Nothing is sacred to them. They live only for what brings them pleasure and a sense of power, placing zero value on the lives of their victims. Ultimately, concludes Mr. Dilulio, only a return to religion will restore to youth the sense of personal responsibility that leads to moral behavior. He cites a growing body of scientific evidence from a variety of academic disciplines that indicates that churches ameliorate or cure many severe socioeconomic ills. Let the liberal elite argue church-state issuesall the way to the next funeral of an innocent kid caught in the crossfire, he says. Our guiding principle should be, `Build churches, not jailsor we will reap the whirlwind of our own moral bankruptcy. (5)DiIulios super predators are born of abject moral poverty, which he defines as: The poverty of being without loving,capable, responsible adults who teach you right from wrong. It is the poverty of being without parents, guardians, relatives, friends, teachers, coaches, clergy and others who habituate you to fe el joy at others joy, pain at others pain, happiness when you do right, remorse when you do wrong. It is the poverty of growing up in the virtual absence of people who teach these lessons by their own everyday example, and who insist that you follow suit and behave accordingly. In the extreme, it is the poverty of growing up surrounded by deviant, delinquent, and criminal adults in chaotic, dysfunctional, fatherless, Godless, and jobless settings where drug abuse and child abuse are twins, and self-respecting young men literally aspire to get away with murder. Grapes Of Wrath - Plot Questions and Answers EssayA profile of a Serious Habitual Offender was collected from data collected and analyzed by the Reagan Administration team at the U.S. Department of Justice in the 1980s presents a graphic portrait of the serious habitual offender: The typical SHO is male, 15 years and six months old. He has been arrested 11 to 14 times, exclusive of status offenses, and five times for felonies. He comes from a dysfunctional family; and in 46 percent of cases, at least one of his parents also has an arrest history. He has received long-term and continuing social services from as many as six different community service agencies, including family, youth, mental health, social services, school, juvenile, or police authorities, and continues to drain these resources for years before he is finally incarcerated as a career criminal. The typical SHOs family history follows a classic pattern of social pathologies: 53 percent of his siblings also have a history of arrest; and in 59 percent of these cases, there is no father figure in the home. The absence of a father is particularly destructive for boys; only 2 percent of SHOs are female. Furthermore, 68 percent of these offenders have committed crimes of violence, 15 percent have a history of committing sex crimes, and 51 percent have a reported missing or runaway record. If a broken family characterized by physical or sexual abuse is an early indicator of criminal behavior, then virtually all of these serious habitual offenders fit this category. These findings are consistent with the Heritage Foundations widely reported analysis of the true root causes of violent crime, particularly the crimogenic conditions associated with broken or dysfunctional families. (10) * SHOs do not consider the crimes they have committed to be all that bad. * Forty-five percent are gang members, 64 percent associate with other serious habitual offenders, and 75 percent abuse drugs. Recent studies show that illegal drug use among the young is on the rise and a significant majority of all present day SHOs-Super Predators- use or sell illegal drugs and often become addicted themselves. Illegal drug use and alcohol abuse tend to be regular features of their criminal conduct. Drugs, in particular, are part of the criminal scene of these juvenile offenders, and the use and sale of drugs contributes significantly to a SHOs other criminal activity. The need to purchase illegal drugs, combined with the warped hedonism of the addict, shapes and drives much of the criminal activity of this class of criminals. Conclusion:Juvenile crime and violence is on the rise. Many criminologists are calling it an epidemic, a ticking time bomb, the calm before the storm and a long descent into night, you choose the cliche. The reasons for this rise in teen crim e seems to have its roots not so much in poverty as it does to poverty of values. Experts like John DiIulio and James Q.Wilson believe that the cure lies in a renaissance of personal responsibility, and a reassertion of responsibility over rights and community over egoism. There is definitely a need for more study on the new breed of teen criminal -the Super Predator- But we dont need yet another library full of jargon-riddled criminology studies to tell us what the Roman sages knew: what society does to children, children will do to society. While most in the education as well as the psychological fields blanch Whenever the terms values, church, responsibility, andfamily, are bandied about. But the inescapable reality is that since the sixties, when these terms were castigated and relegated to being quaint, we have witnessed an incredibly fast and pernicious rise in the types of pathologies that have accompanied the decline of the family structure. While I am by no means a religiou s zealot, it seems to me that government has been a poor substitute for the family and the church in teaching basic core values. Government certainly has a role to play financially, but the strictures and the applications of any type of largess need to come from Community leaders or clergy members who have a real stake in the community. While it is tragic that there seem to be a large number of lost youths mired in a life of crime and violence, the safety of thecommunity, especially the children in the community, should be the primary concern. While I agree with John DiIulio, that we need more churches, I also feel that if more jails need to be built to house young thugs, build them. If children as young as 7, 8, or 9 yrs of age need to be incarcerated like adults, do it. While this may seem harsh, I believe that it is the only way to prevent further decay. With harsher enforcement of laws towards violent minors enforced, attention can be paid to addressing the ills that create the problem; family decay. More attention needs to be paid to the people who actually live in the communities affected. We must deal with this problem ofthe super predator teen thug swiftly and harshly, before its too late to save the children in danger of falling in with or becoming victims of crime themselves. Bibliography1- Ethnic NewsWatch SoftLine Information, Inc., Stamford, CT2- F.R. Duplantier, The Importance Of Fathers 08-16-1995, HERITAGE FOUNDATION HOME PAGE3-Worsham, James-Blakely, Stephen-al, et, Crime and drugs.., Vol. 85, Nations Business, 02-01-1997, pp 24. 4-Julia Duin, Alarm over crime puts focus on nations `moral crisis., The Washington Times, 11-17-1996, pp 31. 5-Parker, Shafer, Violence with a youthful face.., Vol. 23, Alberta Report /Western Report, 06-17-1996, pp 27. 6- Richard Zoglin Reported By Sam Allis/Boston And Ratu Kamlani/NEW YORK,CRIME: NOW FOR THE BAD NEWS: A TEENAGE TIME BOMB., TIME, 01-15-1996, pp 52+. 7-NINA J. EASTON, The Crime Doctor Is In; But Not Everyone Likes Prof. JohnDiIulios Message: There Is No Big Fix; Home Edition., Los Angeles Times, 05-02-1995, pp E-1. 8-Paul Kaihla, NO CONSCIENCE, NO REMORSE. MACLEANs 1/22/969- William J. Bennett, John J. DiIulio, Jr., and John P. Walters BODY Please Submit your good papers to us and help Cyber Essays grow!
Wednesday, December 4, 2019
Question: You are required to follow the Project Management Institute Process for Managing Project Risks. Answer: Introduction Risk management is the technique we need to use in project management to control the three constraints of the project that is the time, the scope and the cost. This risk management plan provides a technique or step to control the changes in the scope, the time and the cost from getting overrun. Background of the case study OIT (Office of Information Technology) of SFSU (Silicon Forest State University) use ticketing software to track and report the bugs which gets generated in all the departments in the university. The front end users were using Window based Remedy software, but the back end users uses UNIX based software Request Tracker. Because of which the transfer of information between front and back end need to be done manually entering the data from Remedy to Request Tracker. So, it was decided by head of the department of USS (User Support Services) to replace the ticketing software of front end user by Request Tracker. The project was supervised by Ron Bashley, additionally he was responsible for creating interfaces and Harry Bonnett for replacing the by Request Tracker. So the project scope is to replace the Remedy by Project Tracker system. Risk Management Plan The dangers in any undertaking are overseen on the premise of the procedures characterized in the risk and hazards administration design. The activities which includes in the preparation of risk management plan are Identification of Risk, Risk Analysis, Risk Monitoring and Risk Mitigation. The risks are of two types, one is positive risk which is the opportunities and we must always adopt procedure to explore for the maximization and the negative risks are the risk for which mitigation plan is done. The risks can be of many types, and capable of effecting cost, schedule, quality, technical, contractual, procurement, policies etc.. The ultimate aim of the plan is to set the mitigation action plan for all the identified risks specially the high or medium-high zone. There are various types of risks mitigation processes or steps which need to be followed to for the proper mitigation planning. There can be mainly four types of response after the assessment of risks are done, Avoi dance, Acceptance, Mitigation and Deflection. Risk Identification Recognizable proof of dangers should be done insightfully to get to the entire circumstance of the task and look past the limits and out of the case considering. The maximum detailed identification of risks needs to be done. While identifying risk it must be kept in mind that the risks will not delay the project unless it is identified and mitigation planning done, but the threat will remain with those which are yet to be identified if could not be identified. Accordingly all the probable list of risks (positive or negative) needs to be documented in register. Risk / Opportunity Identification Number Date Logged Raised By Status Type Description and Cause 1 24/08/2017 Ron Open Risk There is a risk of making some miss communication during the project phase due to the non-using of 'Remedy' software in the front end user group 2 24/08/2017 Ron Open Risk There is a risk of non-delivery of the e-mail sent from end use group to back end group for some bug rectification 3 24/08/2017 Harry Open Opportunity There is an opportunity of improving the communication and minimizing any errors between the users and back end by the implantation of 'Request Tracker' all over throughout the departments of the university. So if doing the user interface and replacement of the software 'Remedy' could be expedited, the communication can be made easier well before six months of time 4 24/08/2017 Pike Open Risk There is a risk of slipping the delivery date because of taking so much time in gathering the requirements from the users Risk Analysis  Risk / Opportunity Analysis Number Description and Cause Likelihood Consequence 1 There is a risk of making some miss communication during the project phase due to the non-using of 'Remedy' software in the front end user group Almost Certain Major 2 There is a risk of non-delivery of the e-mail sent from end use group to back end group for some bug rectification Possible Major 3 There is an opportunity of improving the communication and minimizing any errors between the users and back end by the implantation of 'Request Tracker' all over throughout the departments of the university. So if doing the user interface and replacement of the software 'Remedy' could be expedited, the communication can be made easier well before six months of time Possible Moderate 4 There is a risk of slipping the delivery date because of taking so much time in gathering the requirements from the users Possible Major So after plotting it in the matrix Risk responses plan for identified risks. Following actions can be taken to increase the opportunity and decrease the threat: Risk No. 1 (Extreme Risk): the risk must be avoided at any cost to avoid raise of any major issue during the project phase. So, review meeting frequency need to be increased for personal interaction an avoid any miss communication Risk No. 2 (High): any major issue which has been sent through e-mails must again be verified verbally over phone regarding its receipt Opportunity No. 3 (Medium): more dedicated team members need to be involved and assets should be expanded if conceivable from some division for the task stage. Risk No. 4 (High): need to avoid by increasing the resources in the project Monitoring and Controlling Risks The risks identified need to be discussed first in all review meetings so that the issues can be tracked throughout the project life cycle and whenever felt is going serious, some extra measures need to be taken to again reduce the possibility and impact of the negative risk. At the same time if any other risks come in to mind of any team members, it must be documented first n the register and then traced according to the earlier risks too after doing the proper analysis and mitigation plan. Justification This plan has captured all the required parameters for analyzing it properly and monitor during the project phase by discussing the issue or the opportunities first during all the weekly review meetings so that it gets the maximum importance among all stakeholders. In case of change in status of any risks or opportunities, it need to be informed to all the related team members. Conclusion This is to conclude the whole report is developed on the basis of the risks and the opportunities being identified which the team can faces in execution stage. Then the analysis is performed in the best possible manner, although the numbers of risks in the register are less, but it can be increased by collecting further data from other team members too. The mitigation plans are also strong enough to counter the risks and enhance the opportunity. References Rajman Md. Rawi. (2013, December) Project Risk Identification for New Project Manager. [Online]. https://www.projecttimes.com/articles/project-risk-identification-for-new-project-manager.html mark Piscopo. (2017) Risk Management Plan. [Online]. https://www.projectmanagementdocs.com/project-planning-templates/risk-management-plan.html#axzz4qmTwRGbJ et al. Wiley. (2017) 11.2 Risk Management Process. [Online]. https://pm4id.org/chapter/11-2-risk-management-process/ Science Enginerng Medicine. (2017) Chapter: 5 Risk Mitigation. [Online]. https://www.nap.edu/read/11183/chapter/7#51 Sidharth Thakur. (2015, June) A Critical Tool for Assessing Project Risk. [Online]. https://www.brighthubpm.com/risk-management/88566-tool-for-assessing-project-risk/