Wednesday, October 30, 2019

Politicts Essay Example | Topics and Well Written Essays - 250 words

Politicts - Essay Example The house votes for the Bill after having debated it satisfactorily, where finally the governor can enact or reject it. The Bill once presented to the governor and 45 days elapses without signing; becomes a law (Lurie, 2005). Legislative office formulates and prepares it technically prior its presentation in other preceding steps. This office is non-partisan since it operates according to its given mandates, hence cannot be influenced (Lurie, 2005). The committee discusses the Bill openly in public where it may make some amendments and present to the house as is or offer a substitute Bill (Lurie, 2005). Suppose there is no consideration of the Bill or fails to report it, remains in the committee. Third Reading is a step considered by the president or the chair where the house discusses the Bill effectively. Second and Third Reading may not be in one day except when it was urgent and agreed by 75% of the house. This encompasses 34 votes from the senates and 60 from the Assembly. The House votes to endorse the Bill as per the majority, where there must be 21 senate and 41 Assembly votes to enable it pass to the Second House (Lurie, 2005). Suppose the closing poll fails, the house may consider the Bill in another or return it to the committee. The Bill undergoes via similar process as in the original House. If it makes any alterations, it sends the Bill to the First House for support concerning the changes. Primarily, a Bill gets ultimate legislative when it goes via the two houses without any alterations. The Governor signs the Bill to enact it. Alternatively, it is an Act if after 45 days has passed devoid of any action undertaken concerning the endorsement. Suppose the origin house is in recess, there is a deliberation of extending the 45Th day to date, which it will reconvene. Besides, a rejected Bill may be a law in the occasion where the legislature dominates the refusal by 2/3 poll. Law starts

Monday, October 28, 2019

Understand How to Set Up a Home Based Child Care Service Task Essay Example for Free

Understand How to Set Up a Home Based Child Care Service Task Essay Understand how to set up a home based child care service 1. Outline the current legislation covering the home based childcare, and the role of regulatory bodies. Current Legislation There are many different Legislation being brought out in place to help maintain and improve services, for example; Every Child Matters In 2003, the Government made a new legislation called Every Child Matters. This was published due to a report into the death of Victoria Climbie. There was a wide discussion between people working in childrens services, with parents, children and young people. Following the discussion, the Government published Every Child Matters: the Next Steps and passed the Children Act 2004, providing the legislative spine for developing more effective and accessible services focused around the needs of children, young people and families. Every Child Matters: Change for Children was published in November 2004. This is a new approach to the well-being of children and young people from birth to age 19. The Governments aim is for every child, whatever their background or their circumstances, to have the support they need to: †¢ Be healthy Stay safe †¢ Enjoy and achieve †¢ Make a positive contribution †¢ Achieve economic well-being Meaning that every organisation involved in providing services to children, from hospitals, schools, the police and voluntary groups. Where they will be teaming up in new ways, sharing information and working together, to protect children and young people from harm and help them achieve what they want in lif e. Childcare Act 2006 The Childcare Act, passed into law on 11 July 2006, is pioneering legislation – the first ever exclusively concerned with Early Years and childcare. The Act will help transform childcare and Early Years services in England for generations to come, taking forward some of the key commitments from The Ten Year Strategy published in December 2004. Measures in the Act formalise the important strategic role Local Authorities play through a set of new duties. These duties will require authorities to: †¢ Improve the five Every Child Matters (ECM) outcomes for all pre-school children and reduce inequalities in these outcomes †¢ Secure sufficient childcare for working parents provide a better parental information service The Act also reforms and simplifies Early Years regulation and inspection arrangements providing for a new integrated education and care quality framework (for pre-school children) and the new Ofsted Childcare Register. The sufficiency, information and outcomes duties came into effect from 1 April 2008 and the remaining provisions from September 2008. Other legislation is; Early Years Foundation Stage (EYFS), The Play Strategy, The Charter for Children’s Play, Children’s Centres, Extended Services and Childrens Trusts. Ofsted Ofsted is the office for standards in Education, childrens services and skills. They make sure that people achieve excellence in care for adults, children and young people. Ofsted inspect the following services: †¢ Maintained schools and academies †¢ Some independent schools †¢ Early years and childcare †¢ Children’s centres; children’s homes †¢ Family centres †¢ Adoption and fostering services and agencies †¢ CAFCASS †¢ Children’s services in local authorities †¢ Initial teacher training †¢ Further education colleges and 14 to 19 provision A wide range of work-based learning and skills training †¢ Adult and community learning †¢ Probation services †¢ Education and training in prisons and other secure establishments. Ofsted assess children services in local areas and inspect services for looked after children, safeguarding and child protection. Ofsteds job is to check places that adults, youn g people and children are looked after and the people who look after adults, children and young people. They check to see if people are doing a good job in looking after, if they are not they try to help them get better. Ofsted inspect children services e. g. childminders, schools, nurserys, adult learning and skill’s centres etc. to see if the standard of care for adults, children and young people, after their inspections they carry out a report of what they have found, where you will receive a grade (Grade 1 Outstand, Grade 2 Good, Grade 3 Requires Improvement and Grade 4 Inadequate) depending on your grade some inspectors will have to revisit you for a second report where you must improve your grade to stay open or in business. Ofsteds job is to make sure that all adults, children and young people who are being cared for are safe, being looked after properly, to improve childrens services, to make sure childrens services focus on the interests of the children and young people, parents, adult learners and employers who use them and also to see that the services for children are efficient and effective. Ofsted’s Strategic Plan 2011-2015 sets out how they will try to fulfil their responsibilities to inspect and regulate services for children, young people and learners. The plan sets out how they will achieve four priorities: Better outcomes Driving improvement for children and learners of all ages †¢ Better inspection and regulation Improving the way we work in order to provide sharper accountability that focuses on underperformance and drives fairness for those using services †¢ Better public involvement Ensuring that people’s views and experiences inform how and when we inspect and regulate; and empowering people with the information they need to make choices and hold services to account †¢ Better ways of working Using our resources responsibly in effective, efficient and sustainable ways that focus on the front line.

Saturday, October 26, 2019

school prayer :: essays research papers

did when I was growing up there. Today it is necessary to have a Police Officer in the village of Larsen Bay, Alaska because of domestic violence and alcohol/drug abuse. There was the Russian Orthodox religion, but Priests only made a short visit approximately every six months to a year, that is if the weather and the Priest's schedule permitted. Whenever a Russian Orthodox Priest would visit, he would give all of his sermons in either Russian, or Slavonic. Very few if any of the villagers understood Russian or the Slavonic language. A few years before I left the village the Baptists moved in to cleanse our heathen souls. The Baptist presence in the village lasted for about 10 years after I left. There is a Russian Orthodox religious presence in the village today. The Russian Orthodox religion moved into the village, built a Church and this time give their sermons in English or at least through an interpreter. I had a childhood that was without the pressures and influence of organized religion. When I left the village and went out into the world, my curiosity was aroused to the different supernatural god-beliefs of the world. I found that some people believed so strongly that they had the "only" one true religion that they would fight and die for that belief. Supernatural god-beliefs are just that - beliefs, a figment of imagination and a superstition. People that are indoctrinated from birth into supernatural god-beliefs know that they are right and that the others have it all wrong. -------------------------------------------------------------------------------- Public School Pre-game Prayer Halt prayer before games judge orders This was on the front page of the Atlanta Constitution on September 25, 1986. A federal judge issued a temporary restraining order banning prayers before football games at the Douglas County High School in Douglasville, GA. Doug Jager just returned to Douglasville, GA from his first trip to Larsen Bay, Alaska where he spent the summer. Emotions were intense and out of control for Christians who suddenly found that they lost one of their means of imposing their prayers onto the public. After the Atlanta Constitution's front-page story to halt prayers at public school football games, Georgia went crazy. The Jager household was besieged with some of the nastiest phone calls and open public abuse coming from Christians in the name of God. The abuse coming from Christians was very intense, and meant to terrorize and to intimidate.

Thursday, October 24, 2019

Islam and Christian Traditions Essay

Christianity and Islam see recurring themes in beliefs and practices. They share stories from past prophets that declare they know the word of God. God tells prophets about a time before earth and gives them knowledge to spread to man. Life holds sanctity that is not for man to wander and do as their physical bodies might allow. Both Islam and Christian traditions make examples and tell the history of how God desires man to live. There are foretellings of vast destruction when man lives among evils and sin. Muslims say that, like God, Allah will see and end of man and will only accept the faithful into paradise. Traditions of Christianity and Islam can relate to each other by commemorating a higher power as known as God. The higher power in Christianity is known as God, while the higher power in Islamic traditions is known as Allah. In Islamic traditions, Allah shouldn’t be confused with the God known in Christianity because the word Allah is translated as â€Å"the God† in Arabic. Christian and Islamic traditions have cosmogony, eschatology, afterlife, moral codes, and duties that serve the purpose in their existence. Both Islamic and Christian traditions will see some similarities and recurring prophecies that exist in their practices. Christian traditions and cosmogony can be found in the Bible. The Bible is many stories that contains passages from prophets of God and is compiled of several books. The book of genesis describes how God created the universe. He made light, darkness, heaven, earth, fruits and vegetables. On the fifth and sixth day of the week to create the universe and earth, God made beasts and made man that resembles the appearance of God. Genesis 1:29 said to man, â€Å"I give you every seed-bearing plant on the face of the whole earth and every tree that has fruit with seed in it. They will be yours for food† (BibleGateway, 2011). God warns Adam and Eve, the first of all mankind, that there is forbidden fruit that cannot be touched. Genesis 3:3 says, â€Å"But of the fruit of the tree which is in the midst of the garden, God hath said, Ye shall not eat of it neither shall ye touch it, lest ye die† (King James Bible Online, 2013). When Adam and Eve consumed the forbidden fruit despite God’s warning, Adam and Eve were cursed by God to multiply the earth. Eve, the first woman, was created by God to provide Adam, the first of all man, companionship. It was in her mistake that Adam fell under temptation to then be commanded by God to take power of beasts and man to begin the teachings of God on earth. Prophets of God taught man to obey commandments in order to be prepared for the end of the world. Prophets, pastors, preachers, or bishops in Christian sects will preach the gospel of the Bible that predict when Christ will return to earth and reach final days before heaven. Most interpretations of the Bible explain how there is good and evil; Evil will cause suffering for mankind. Christians believe that Christ will return and save those who are faithful to God when there is a final judgment of man. Matthew 24:14 reads, â€Å"And this gospel of the kingdom shall be preached in the whole world for a witness to all the nations, and then the end shall come† (Christian Bible Reference, n.d.). Evil will be taught through deception, so God will need true believers. There will be a place in heaven for Christians to live with God after their trial on earth. Man will be accepted into heaven if he upholds morals and duties that Christians are taught. Many Christians believe that heaven is a place on earth. The book of Luke (21:32-33) reads, â€Å"Truly I say to you, this generation will not pass away, till all be fulfilled. Heaven and earth will pass away, but my words will not pass away† (King James Bible Online, n.d.). In heaven there will once be so much evil that the wicked will overpower the good through violent wars. Like earth, God will create a new heaven for the blessed people. Heaven will be free from evil for many years until its end of days only through destruction and misery upon its holy place. In heaven killing is much of a sin as earth. God commands man not to sin such as killing, adultery, worshiping idols, and stealing among other things. If man upholds these morals and duties, he will be accepted to heaven when salvation c omes. Traditions in Islam are similar religious practices that are commemorated through the Qur’an and are told how the earth and man were created. Like Christians, Muslims believe that Allah, or the God, created a heaven, a world, and the universe with all materials in it that are living or not. The book of Surat Al-Baqarah (2:29), in the Qur’an, reads, â€Å"It is he who created for you all of that which is on the earth. Then he directed himself to the heaven, (his being above all creation), and made them seven heavens, and he is knowing of all things† (Quran, n.d.). Islamic traditions began when the prophet Muhammad spoke with Allah. Allah told Muhammad of the creation of the first man on earth, who is known as Adam, who had a female companion. Allah also told Muhammad how Adam ate the forbidden fruit when he was restricted not to do so. Muslims’ eschatology tells how there will be an evil presence who will be violent and cause destruction. There is also an afterlife of heaven and hell as Christians believe. Although the evil are wicked, they too will be brought to heaven and see a final judgment from Allah. â€Å"And as for those who disbelieves, I will punish them with a severe punishment in this world and the hereafter, and they will have no helpers† (Quran, n.d.). Islamic traditions say how there will be an end of time. There will be warnings from Allah on earth. An antichrist will appear before the last day who will be cruel to man. Followers of the antichrist and the unbelievers of Allah may never reach heaven. Heaven will be a paradise that the Qur’an describes, â€Å"No empty talk will they hear there, nor any call to sin, but only the tiding of inner soundness and peace† (Religious Tolerance, 2005). Morals and duties are important to Muslims in order to avoid sin and reach heaven. Allah tells prophets of his commandments so that man will be holy and plentiful. â€Å"The ones who break the covenant of Allah even after its (binding) compact and cut (off) what Allah has commanded to be held together and corrupt in the earth, those are they (who are) the losers† (Quran, n.d.). Allah tells man not to steal, murder, disobey parents, covet, or commit adultery among other things. When man disobeys Allah, they are expected to know sin from righteousness and should repent for forgiveness. â€Å"..Except for those who repent after that and correct themselves. For indeed, Allah is forgiving and merciful† (Quran, n.d.). The man who doesn’t repent may be a sinner for life and will be questioned on judgment day. The Islam and Christian traditions both believe in a God that share similar interests for mankind. God and Allah teach man how they can return to heaven after their days on earth after Adam and Eve’s tribulations. Prophets will spread the knowledge to man from God as a lesson not to fail under certain temptations and have faith in God to live in paradise with him one day. After time, the rise of evil is bound to cause awfulness when man turns to disobedience and non believing even during a salvation. Heaven will be free from sin and man can live in a peaceful place until it is once again ruined by tribulations. God will continue to confide with man in order for glory to persevere.

Wednesday, October 23, 2019

Process for Implemenation of Supplier Development Strategy Essay

Introduction Supply chain management adopts a systematic and integrative approach to manage the operation and relationship amongst different parties in supply chain one of the major issues is supplier development studies have investigated how quality management can be employer in supply chain management to influence performance in the whole supply network. (Mishra Rik, Patel G-Supplier Development Strategies, Data employment Analysis Business Intelligence Journal, January 2010 vol 3 No.1) There are 8 stages of implementation of supplier development 2.1 Identify critical commodities for development Managers must analyse their situation to determine whether Supplier development is important and if so which purchased commodities and services require the most attention. A corporate level executive steering committee must assess the relevant strategic importance of all goods and services that the company buys and produce a portfolio of critical commodities 2.2 Identify critical suppliers for development The managers must assess the performance of suppliers who supply commodities in the â€Å"strategic supplier category†. These commodities considered strategically important, as they might be difficult to substitute or purchase from alternative suppliers. 2.3 Form a cross-functional team A buyer must first develop internal cross-functional consensus for the initiative before approaching the supplies to ask for improvement such consensus will help to show a â€Å"unified front† and ensure that all buyer functions. 2.4 Meet with supplier’s top management team The buyer’s cross functional commodity team must approach the supplier’s top management group and establish three keys to supplier improvement, strategic alignment, supplier measurement and professionalism. 5 Identify opportunities and probability for improvement At these meetings with the suppliers executive should identify areas earmarked for improvement. Companies adopting a strategic approach to supply base development can usually agree upon areas or improvement .In some areas driven by final customer requirements and expectations. 2.6 Identify key projects After identifying promising opportunities of supplier development managers must evaluate them in terms of feasibility, resource and time requirements and potential return on investments. The aim is to decide what the goals should be and whether they are achievable. 2.7 Define details of the agreement After the potential improvement project is identified, the parties need to agree on specific merthies for monitoring its success. 2.8 Monitor status and modify strategies Manages must constantly monitor the progress and constantly exchange information to maintain momentum in the project. (http://www.ethenmanagementor.com.kuniverser/kmailer_universe/manu_kmailers/som-supplierdev1.htm. Accessed 15/09/2011) Different types Supply Chain relationships | |Transactional |Collaborative |Alliance | | |Relationships |relationships |relationships | |Communication |High potential for problems |Systematic approach to | | | |enhance communication | |Competitive |Low |High | |advantage |Independence | | |Connectedness |Little |Interdependence | |Continuous |Few | | |improvement | |A focus on | |Contributions to | | | |new product |Low |Many/early supplier | |development |Short |involvement | | |Reactive |Difficult/high impact | |Difficulty of exit |Price |Long | |Duration | Little or none |Proactive | |Expediting |Low |Total cost | |Focus | |High or total | |Level of integration |Many |High | |Level of trust |No | | |Number of |Incoming inspection | | |suppliers |Inward looking |One or few | |Open books | |Yes | |Quality | |Design quality into system | |Relations | |Concern with each other’s | | |Few/low skill level |well-being | |Resources |Minimal |Professional | |Service |No |Greatly improved | |Shared forecasts |Possible |Yes | |Supply disruptions |No |Unlikely | |Technology inflows |Tactical |Yes | |Type of interaction | |Strategic synergy | (Handfield RB; Monczka RM; Giunipero LC; Patterson JL. Sourcing and supply chain management; 2004 pg 123) Portfolio Analysis 4.1 Captive buyer Captive buyer relationship the supplier dominates the buyer and the buyer depends on the supplier. In these particular captive buyer relationships this dependence of the buyer is due to the unique intellectual property of the supplier. Because of this intellectual property the buyer has limited or no Substitutes to turn to creating a dependence on the supplier. Despite this dependence a high level of trust plays an important role in making this relationship fruitful for both parties. Apparently the dominance of the supplier is limited to the extent that the mutual trust stays intact. But the level of trust also has its limits from the supplier’s perspective. The supplier is not willing to trust the buyer with its intellectual property. The obvious reason for this is the risk that the supplier would lose its dominating position. Thus, the supplier has a special interest in maintaining its dominant position. The survey and interviews indicate that for captive buyer relationships the explanatory variables were the lack of substitutes, legal property rights and size of the supplier. Apparently the legal property rights of the supplier, and the resulting lack of substitutes, causes the buyer to depend on the supplier. These factors, combined with a supplier that is much larger than the buyer, results in a relationship that can be described as a captive buyer situation. (http://dspace.learningnetworks.org/bitstream/1820/3545/1/MWBHMJFleurenmei2011.pdf ;Accessed 15/09/2011) 2 Captive Supplier Captive supplier relationship the supplier depends on the buyer and the buyer therefore overpowers the supplier. This unbalance of power can have one or a combination of factors: the size of the buyer and its market share but also the switching costs for the supplier contribute to the dependence of the supplier on the buyer. Despite the fact that the supplier has important intellectual property this is not sufficient to balance the level of power towards the buyer. To make this relationship a fruitful one cooperation and mutual goals are of great importance. Via these mutual goals the buyer does depend on the supplier to some extent, thus preventing the buyer from abusing its dominance over the supplier. For this reason, in a captive supplier situation the buyer will also invest (heavily) in the relationship but not to the extent that it loses it’s dominating position. While studying the captive supplier relationships, it became apparent that the Explanatory variables were market share, lack of substitutes, legal property rights, non-retrievable investments and the size of the supplier. These factors resulted in a captive buyer situation. Again the presence of legal property rights, this time of the buyer, causes the supplier to have limited or no substitutes. Furthermore the relationship involved significant non-retrievable investments for the supplier, making it even more difficult to switch to another buyer. Finally, the high market share of the buyer compared to the small size of the supplier was a significant factor. The net result of these explanatory variables is a captive supplier relationship. (http://dspace.learningnetworks.org/bitstream/1820/3545/1/MWBHMJFleurenmei2011.pdf; Accessed 15/09/2011) 3 Interdependent Supply Chain members Some kind of starting point is needed for identification of supply chains. For instance, an end product of some kind may be used for identification and analysis of the activity structure organised ‘behind’ it. This is in line with the transvection concept coined by Alderson (1965, p. 92) who defines transvections as comprising ‘†¦all prior action necessary to produce this final result, going all the way back to conglomerate resources’. This, however, entails a first important connection among chains as they typically merge in different stages within an activity structure where different parts of the end product are assembled, welded etc, tying different chains together successively (Dubois, 1998). Consequently, several different products (and thus also several chains, if defined by products) are involved in every ‘supply chain’ resulting in some kind of end-product. Taking transvections, or end-product related structures, as a starting point we will further analyse the ways in which the activities and reso urces within ‘supply chains’ are connected by analysing how they are subject to the three forms of interdependence. (http://www.impgroup.org/uploads/papers/4324.pdf ;accessed 15/09/2011) 5. Buyer /supplier relationship (Handfield RB; Monczka RM; Giunipero LC; Patterson JL. Sourcing and supply chain management; 2004) High Category Level Low Conclusion The concept of power should be at the centre of any study of buyer-supplier relationships. Power affects the expectations of the two parties over what commercial returns should accrue to them from a relationship. It also affects the willingness of the two parties to invest in collaborative activities. As important, it also affects the willingness of the two parties to share the costs of relationship-specific investments .It also affects the willingness of the two parties to share sensitive information. As a result, an understanding of the power relation which is often stable, with the relative stability should, from the point of view of the purchasing manager, inform both the supplier selection and the relationship management decision as he or she attempts to manage risk proactively. Bibliography 1. http://www.impgroup.org/uploads/papers/4320.pdf 2. http://dspace.learningnetworks.org/bitstream/1820/3545/1/MWBHMJFleurenmei2011.pdf. 3. Mishra Rik, Patel G-Supplier Development Strategies, Data employment Analysis Business Intelligence Journal, January 2010 vol 3 No.1 4. Handfield RB; Monczka RM; Giunipero LC; Patterson JL. Sourcing and supply chain management; 2004 ———————– |1.Leaverage: |2.Strategic : | |Captive Supplier |Mutual dependence | |The buyer has power |Trust is necessary | |Trust may be lacking | | |3.Routine: |4. Bottleneck | |Mutual Independent |Captive buyer | |Trust not necessary |The Supplier has power | | |Trust may be lacking | LowHighBusiness Risk

Tuesday, October 22, 2019

Bias Crime

Running head: HATE CRIME The Hate Crime is violence or harassment motivated by a bias against a victim’s characteristics which include race, religion, ethnic background, national origin, gender, or sexual orientation, and represents a serious threat to all communities. Experts estimate that a bias-related crime is committed every 14 minutes. Criminal justice officials and state policy makers need to realize that it is key to make or adjust hate crime legislation. This has been a heated debate for the last century. I think more hate crime legislation is the key to solving the ever-growing problem of hate crimes. The first legislative efforts to address bias-related crimes dated back to the late 19th century, which was a response to the expanding Ku Klux Klan and segregation in the south. Such laws included mandates against wearing masks and hoods. The next wave of legislation relating to hate crimes resulted from the movement for increased protection for civil rights in the face of widespread racial prejudice shown by segregated buildings and restricted access to public and private resources. The most recent legislation has been directed specifically to acts of hate against people of race, religion, gender, sexual orientation, etc. The Local Law Enforcement Enhancement Act, S. 625, also known as the Hate Crime Prevention Act, if enacted would strengthen current law as it relates to hate crimes motivated by a victim’s race, religion, gender, sexual orientation, disability, etc. Hate crimes are not only destructive to the victims themselves, but also damaging to the victim’s families and friends. It also is very damaging to our American ideals. America stands and shines for diversity and equality. In a way, hate crimes are not only threatening to the individual being attacked but to America as a whole. Last year, Congress had the chance to pass strong hate crimes legislation. On June 19, 2000, the Local Law En... Bias Crime Free Essays on Hate / Bias Crime Running head: HATE CRIME The Hate Crime is violence or harassment motivated by a bias against a victim’s characteristics which include race, religion, ethnic background, national origin, gender, or sexual orientation, and represents a serious threat to all communities. Experts estimate that a bias-related crime is committed every 14 minutes. Criminal justice officials and state policy makers need to realize that it is key to make or adjust hate crime legislation. This has been a heated debate for the last century. I think more hate crime legislation is the key to solving the ever-growing problem of hate crimes. The first legislative efforts to address bias-related crimes dated back to the late 19th century, which was a response to the expanding Ku Klux Klan and segregation in the south. Such laws included mandates against wearing masks and hoods. The next wave of legislation relating to hate crimes resulted from the movement for increased protection for civil rights in the face of widespread racial prejudice shown by segregated buildings and restricted access to public and private resources. The most recent legislation has been directed specifically to acts of hate against people of race, religion, gender, sexual orientation, etc. The Local Law Enforcement Enhancement Act, S. 625, also known as the Hate Crime Prevention Act, if enacted would strengthen current law as it relates to hate crimes motivated by a victim’s race, religion, gender, sexual orientation, disability, etc. Hate crimes are not only destructive to the victims themselves, but also damaging to the victim’s families and friends. It also is very damaging to our American ideals. America stands and shines for diversity and equality. In a way, hate crimes are not only threatening to the individual being attacked but to America as a whole. Last year, Congress had the chance to pass strong hate crimes legislation. On June 19, 2000, the Local Law En...

Monday, October 21, 2019

Serial Killer Couple Karla Homolka and Paul Bernardo

Serial Killer Couple Karla Homolka and Paul Bernardo Karla Homolka, one of Canadas most infamous female serial killers, was released from prison after serving a 12-year sentence for her involvement in drugging, raping, torturing, and killing young girls. The teenage victims included Homolkas younger sister, whom she offered to her boyfriend Paul Bernardo  as a gift.   Homolka was born May 4, 1970, to Dorothy and Karel Homolka in Port Credit, Ontario. She was the eldest child of three, and by all accounts, was well-adjusted, pretty, smart, and popular. She received ample love and attention from friends and family. Homolka developed a passion for animals, and after high school she started work at a veterinary clinic. Everything about her seemed normal. No one suspected her of hiding deeply disturbing desires. Homolka and Bernardo Meet At age 17, Homolka attended a pet convention in Toronto, where she met 23-year-old Paul Bernardo, an  attractive, charismatic blond with a persuasive personality. The pair engaged in sexual relations the day they met and soon discovered that they shared sadomasochistic inclinations. Paul quickly took on the role of master and Homolka willingly became his slave. Over the next few years, the relationship intensified. The couple shared and encouraged one anothers psychotic behavior. Bernardo began raping women with Homolkas approval. Bernardos specialty was attacking women getting off buses, sexually assaulting them, and subjecting them to other  humiliations. The police and media dubbed him The Scarborough Rapist, after the Ontario town in which many of the sexual assaults were committed. A Surrogate Virgin One source of friction between the couple was Bernardos incessant complaint that Homolka had not been a virgin when they met. Homolka was aware of Bernardos attraction to her sexually inexperienced 15-year-old sister Tammy. Homolka and Bernardo came up with a plan to force Tammy into being a surrogate virgin for her older sister. To accomplish the plot, Homolka stole Halothane, an anesthetic, from the veterinary clinic where she worked. On December  23, 1990, at a Christmas party at the Homolka family home, Bernardo and Homolka served Tammy alcoholic drinks spiked with halcyon. After the other family members had retired, the couple brought Tammy to the basement, where Homolka held a cloth soaked in Halothane over Tammys mouth. Once Tammy was unconscious, the couple raped her. During the attack, Tammy began choking on her own vomit and ultimately died. Unfortunately, the drugs in Tammys system went undetected and her death was ruled an accident. Another Present for Bernardo After Homolka and Bernardo moved in together, Bernardo began blaming Homolka for her sisters death, complaining that Tammy was no longer around for him to enjoy sexually. Homolka decided a young, pretty, virginal teenager named Jane, who idolized the attractive, older Homolka, would make a good replacement. Homolka invited the unsuspecting teen out to dinner and, as shed done with Tammy, spiked the girls drinks. After inviting Jane to their home, Homolka administered Halothane and presented her to Bernardo. The couple brutally attacked the unconscious teen, videotaping the sexual assaults. The next day when the teenager awoke, she was sick and sore but had no idea of the violation she had endured. Unlike others, Jane managed to survive her ordeal with the couple. Leslie Mahaffy Bernardos thirst to share his rapes with Homolka increased. On June 15, 1991, Bernardo kidnapped Leslie Mahaffy and brought her to their home. Bernardo and Homolka repeatedly raped Mahaffy over a period of several days, videotaping many of the brutal assaults. They eventually murdered Mahaffy, cut her body into pieces, encased the pieces in cement, and threw them into a lake. On June 29, some of Mahaffys remains were found by a couple who were canoeing on the lake. The Bernardo-Homolka Wedding June 29, 1991, was also the day Bernardo and Homolka married one another in an elaborate wedding at a Niagara-on-the-Lake, Ontario, church. Bernardo orchestrated the wedding plans, which included the couple riding in a white horse-drawn carriage, and Homolka dressed in an elaborate and very expensive white gown. The guests were served a lavish sit-down meal after the couple exchanged vows, which included, at Bernardos insistence, Homolka promising to love, honor, and obey her new husband. Kristen French On April 16, 1992, the couple kidnapped 15-year-old Kristen French from a church parking lot after Homolka lured her to their car on the pretext of needing directions. The couple took French to their home, and for several days, they videotaped as they humiliated, tortured, and sexually abused the teen. French fought to survive but just before the couple left for Easter Sunday dinner with Homolkas family, they murdered her. Frenchs body was found in a ditch in Burlington, Ontario, on April 30. Closing in on the Scarborough Rapist In January 1993, Homolka separated from Bernardo after months of constant physical abuse. His attacks became increasingly violent, resulting in Homolka being hospitalized. Homolka moved in with a friend of her sister, who was a police officer. Evidence against  the Scarborough Rapist was building. Witnesses had come forward and a composite drawing of the suspect was released. A work associate of Bernardo contacted the police, reporting that Bernardo matched the sketch. Police interviewed Bernardo and obtained a saliva swab, which eventually proved Bernardo to be the Scarborough Rapist. The Ontario Green Ribbon Murder Task Force closed in on Bernardo and Homolka. Homolka  was fingerprinted and questioned. The detectives were interested in a Mickey Mouse watch Homolka had that resembled the one  French was wearing  the night she disappeared. During questioning, Homolka learned that Bernardo had been identified as the Scarborough Rapist. Realizing they were about to be caught, Homolka confessed to her uncle that Bernardo was a serial rapist and murderer. She obtained a lawyer and began negotiations for a plea bargain in exchange for her testimony against Bernardo. In mid-February, Bernardo was arrested and charged with the rapes and the murders of Mahaffy and French. During a search of the couples home, police discovered Bernardos diary, with written descriptions of each crime. Controversial Plea Bargain A plea bargain was discussed that would offer Homolka a 12-year sentence for her participation in the crimes in exchange for her testimony against Bernardo. According to the deal, Homolka would be eligible for parole after serving three years with good behavior. Homolka agreed to all terms and the deal was set. Later, after all the evidence was in, the plea bargain  was referred to as one of the worst in Canadian history. Homolka  had portrayed herself as an abused wife forced into participating in Bernardos crimes but when videotapes that Homolka and Bernardo had made were given to police by Bernardos ex-lawyer, Homolkas true involvement came to light. Regardless of her apparent guilt, the deal was honored, and Homolka could not be retried for her crimes. Paul Bernardo was convicted on all counts of rape and murder and received a life sentence on September 1, 1995. Rumors that Homolkas punishment was too lenient surfaced after pictures of her sunbathing and partying with other prisoners were published in Canadian newspapers. Tabloids reported that she was in a lesbian relationship with Lynda Verrouneau, a convicted bank robber. The National Parole Board denied Homolkas application for parole. Homolkas Release On July 4, 2005, Karla Homolka was released from prison in Ste-Anne-des-Plaines, Quebec. Strict conditions for her release limited her movements and whom she could contact. Contact with Bernardo and the families of several murdered teens was expressly forbidden. She is paralyzed with fear, completely panicked, said Christian Lachance,  one of Homolkas attorneys. When I saw her she was in a state of terror, almost in a trance. She cannot conceive of what her life will be like outside. Sources McCrary, Gregg O and Katherine Ramsland. The Unknown Darkness: Profiling the Predators Among Us. 2003.Burnside, Scott and Alan Cairns. Deadly Innocence. 1995.Transcript of Homolka interview. The Globe and Mail, 4 July 2005.

Sunday, October 20, 2019

The Iditarod Trail Sled Dog Race and Animal Cruelty

The Iditarod Trail Sled Dog Race and Animal Cruelty The Iditarod Trail dog sled race is a sled dog race from Anchorage, Alaska to Nome, Alaska, a route that is over 1,100 miles long. Aside from basic animal rights arguments against using dogs for entertainment or to pull sleds, many people object to the Iditarod because of the animal cruelty and deaths involved. â€Å"[J]agged mountain ranges, frozen river, dense forest, desolate tundra and miles of windswept coast . . . temperatures far below zero, winds that can cause a complete loss of visibility, the hazards of overflow, long hours of darkness and treacherous climbs and side hills.† This is from the official Iditarod website. The death of a dog in the 2013 Iditarod has prompted race organizers to improve protocols for dogs removed from the race. History of the Iditarod The Iditarod Trail is a National Historic Trail and was established as a route for dog sleds to access remote, snowbound areas during the 1909 Alaskan gold rush. In 1967, the Iditarod Trail Sled Dog Race began as a much shorter sled dog race, over a portion of the Iditarod Trail. In 1973, race organizers turned the Iditarod Race into the grueling 9-12 day race that it is today, ending in Nome, AK. As the official Iditarod website puts it, â€Å"There were many who believed it was crazy to send a bunch of mushers out into the vast uninhabited Alaskan wilderness.† The Iditarod Today The rules for the Iditarod require teams of one musher with 12 to 16 dogs, with at least six dogs crossing the finish line. The musher is the human driver of the sled. Anyone who has been convicted of animal cruelty or animal neglect in Alaska is disqualified from being a musher in the Iditarod. The race requires the teams to take three mandatory breaks. Compared to previous years, the entry fee is up and the purse is down. Every musher who finishes in the top 30 receives a cash prize. Inherent Cruelty in the Race According to the Sled Dog Action Coalition, at least 136 dogs have died in the Iditarod or as a result of running in the Iditarod. The race organizers, the Iditarod Trail Committee (ITC), simultaneously romanticize the unforgiving terrain and weather encountered by the dogs and mushers, while arguing that the race is not cruel to the dogs. Even during their breaks, the dogs are required to remain outdoors except when being examined or treated by a veterinarian. In most U.S. states, keeping a dog outdoors for twelve days in freezing weather would warrant an animal cruelty conviction, but Alaskan animal cruelty statutes exempt standard dog mushing practices: This section does not apply to generally accepted dog mushing or pulling contests or practices or rodeos or stock contests. Instead of being an act of animal cruelty, this exposure is a requirement of the Iditarod. At the same time, Iditarod rules prohibit â€Å"cruel or inhumane treatment of the dogs.† A musher may be disqualified if a dog dies of abusive treatment, but the musher will not be disqualified if â€Å"[T]he cause of death is due to a circumstance, nature of the trail, or force beyond the control of the musher. This recognizes the inherent risks of wilderness travel.† If a person in another state forced their dog to run over 1,100 miles through ice and snow and the dog died, they would probably be convicted of animal cruelty. It is because of the inherent risks of running the dogs across a frozen tundra in sub-zero weather for twelve days that many believe the Iditarod should be stopped. The official Iditarod rules state, â€Å"All dog deaths are regrettable, but there are some that may be considered unpreventable.† Although the ITC may consider some dog deaths unpreventable, a sure way to prevent the deaths is to stop the Iditarod. Inadequate Veterinary Care Although race checkpoints are staffed by veterinarians, mushers sometimes skip checkpoints and there is no requirement for the dogs to be examined. According to the Sled Dog Action Coalition, most of the Iditarod veterinarians belong to the International Sled Dog Veterinary Medical Association, an organization that promotes sled dog races. Instead of being impartial caregivers for the dogs, they have a vested interest, and in some cases, a financial interest, in promoting sled dog racing. Iditarod veterinarians have even allowed sick dogs to continue running and compared dog deaths to the deaths of willing human athletes. However, no human athlete has ever died in the Iditarod. Intentional Abuse and Cruelty Concerns about intentional abuse and cruelty beyond the rigors of the race are also valid. According to an  ESPN article: Two-time runner-up Ramy Brooks was disqualified from the Iditarod Trail Sled Dog Race for abusing his dogs. The 38-year-old Brooks hit each of his 10 dogs with a trail marking lathe, similar to a surveyors stake, after two refused to get up and continue running on an ice field [...] Jerry Riley, winner of the 1976 Iditarod, was banned for life from the race in 1990 after he dropped a dog in White Mountain without informing veterinarians the animal was injured. Nine years later, he was allowed back in the race. One of Brooks’ dogs later died during the 2007 Iditarod, but the death was believed to be unrelated to the beating. Although Brooks was disqualified for beating his dogs, nothing in the Iditarod rules prohibits mushers from whipping the dogs. This quote from  The Speed Mushing Manual, by Jim Welch, appears on the Sled Dog Action Coalition: A training device such as a whip is not cruel at all but is effective [...] It is a common training device in use among dog mushers [...] A whip is a very humane training tool [...] Never say whoa if you intend to stop to whip a dog [...] So without saying whoa you plant the hook, run up the side Fido is on, grab the back of his harness, pull back enough so that there is slack in the tug line, say Fido, get up immediately rapping his hind end with a whip. As if dog deaths were not enough, the rules allow mushers to kill moose, caribou, buffalo, and other large animals â€Å"in defense of life or property† along the race. If the mushers were not racing in the Iditarod, they wouldn’t encounter wild animals defending their territory. Breeding and Culling Many of the mushers breed their own dogs for use in the Iditarod and other sled dog races. Few dogs can become champions, so it is common practice to  cull  the unprofitable dogs. An email from former musher Ashley Keith to the Sled Dog Action Coalition explains: When I was active in the mushing community, other mushers were open with me about the fact that larger Iditarod kennels frequently disposed of dogs by shooting them, drowning them or setting them loose to fend for themselves in the wilderness. This was especially true in Alaska, they said, where veterinarians were often hours away. They often used the phrase Bullets are cheaper. And they noted that its more practical for mushers in remote parts of Alaska to do it themselves. The Mushers Although the mushers endure some of the same harsh conditions faced by the dogs, the mushers decide voluntarily to run the  race and are fully aware of the risks involved. The dogs do not make such decisions knowingly or voluntarily. The mushers can also voluntarily decide to drop out and walk away when the race is too difficult. In contrast, individual dogs are dropped from the team when they are sick, injured or dead. Furthermore, the mushers are not whipped if they are going too slow. Changes After Dog Death in 2013 In the 2013 Iditarod, a dog named Dorado was removed from the race because he was moving stiffly. Dorados musher, Paige Drobny, continued the race and, following standard protocol, Dorado was left outside in the cold and the snow at a checkpoint. Dorado died of asphyxiation after being buried in snow, although seven other dogs who were also covered in snow survived. As a result of Dorados death, race organizers plan to build dog shelters at two checkpoints and also check on the dropped dogs more frequently. More flights will also be scheduled to transport dropped dogs from checkpoints that are not accessible via roads. What Can I Do? You dont have to be a member of PETA to believe in animal rights. Even with the entry fee, the Iditarod loses money on each musher, so the race relies on money from corporate sponsors. Urge the sponsors to stop supporting animal cruelty, and boycott sponsors of the Iditarod. The Sled Dog Action Coalition has a  list of sponsors  as well as a  sample letter.

Saturday, October 19, 2019

Processing & Packaging of a Specified Prepared Chilled Food Product Assignment

Processing & Packaging of a Specified Prepared Chilled Food Product - Assignment Example Such chain incorporates consumer refrigerators and retail displays. The chilled food must be microbiologically safe at the consumption point by controlling pathogens that lead to food-born disorders. The integrity of the entire food chain determines the quality and safety of chilled food including storage and preparation by the consumers. However, the diversity of raw material, conditions for processing and packaging system presents impossibility for designing the effective single framework for microbiological safety. Manufacturers have hard tasks to comply with legislation and safety requirements (International Commission on Microbiological Specifications for Foods. 2005). They must ensure raw material quality, temperature, acidity, water, modified temperature and hygienic processing. Such consideration collapse into designing sufficient control of microbiological growth. Thus, preventing food spoilage and development of conditions that facilitate the occurrence of food-borne diseas es. The manufacturer must, therefore, determine the effective choice and merger of such safety elements to hit an optimum shelf life for products. Further, the manufacturer establishes product usage conditions that ensure food safety for consumer utilization. The product that I will discuss in this essay is Pizza Dough. The dough is a lean, yeast-leavened bread-type dough. It is similar to the French bread and Middle Eastern flat breads. The Pizza crusts or shell fall under thin or thick crust. There may be a variation in the formulation of crust based on makeup equipment, desired eating properties, and thickness. However, the commercial and wholesale Pizza dough has a higher level of fats that help with the greater speed dough processing. The ingredients include flour, yeast, shortening or vegetable oil, salt, water and sugar. There are also a number of optional ingredients such as reducing agents, mold inhibitors, and

Cross Cultural management Essay Example | Topics and Well Written Essays - 1750 words

Cross Cultural management - Essay Example It is important to understand CCM In the management of global operations, particularly in the case of MNEs. All aspects of international business – understanding the customers, motivating employees, controlling operational processes, and strategically planning for shareholders – necessitate an understanding of the dynamics between the cultures of home country and host country nationals. CCM remains the central theme in MNE literature on this subject, and will be further examined in this brief study. Culture impacts the behaviour, morale and productivity of individuals at work, and because of this values and patterns of behaviour reflect upon company attitudes and actions. This poses no problems for companies operating domestically, but for globalized business problems are created when people from different cultural backgrounds are required to work together (Ching-Hsiang & Hung-Wen, 2008). For MNEs and even for domestic corporations, there are advantages in having a meas ure of cultural diversity in the workforce. A workforce is culturally diverse ‘if it is composed of individuals who differ on a characteristic on which they base their own social identity’ (Mazur, 2010, p. 6). A diverse workforce is vital in the present global environment because it currently reflects the changing world and marketplace (p.14). If a company is to grow significantly and prosper into the future, it cannot remain monocultural because doing so would render it irrelevant in an increasing multicultural environment. Furthermore, diversity in an organization enhances the adaptability of its workforce, and organizations characterized by high adaptability have a significant relationship to high performance (Taylor, et al., 2008). CCM is vital to a firm in both the marketing and operational functions. When a firm serves a foreign market, then its products for that market should be compatible with the culture of that country while maintaining the identity of the par ent company’s brand. In such cases, workforce diversity provides the firm with the necessary human resources (skills, tastes, and knowledge) needed to design, construct and market the product. Diversity among operations personnel, particularly in the provision of services, will enable the firm to connect more closely with the intended market (Lindholm, 2000). Literature Review There are six perspectives identified by Fontaine after his seven-year study on CCM in Malaysia, based on comparisons made between Britain, a relatively homogeneous culture, and Malaysia, a heterogeneous culture. The first perspective typifies the classical approach which is based on Hofstede’s theory that national cultures are defined by commonly shared values. Fontaine found issue with Hofstede’s discussion of Malaysian culture, which he described as sharing the same cultural values. Fontaine contends to the contrary, and found that Malaysians tended to mould their values and viewpoints according to their ethnicity, and a number of ethnical groups comprised Malaysian society. CCM uses Hofstede as its classical foundation and from thence diverge into the other perspectives. The

Friday, October 18, 2019

Learning styles journal Essay Example | Topics and Well Written Essays - 1750 words

Learning styles journal - Essay Example Before that I pretty much procrastinated with the writing.... I started out with a kind of a chronological thing, I mean where I described myself and things that make me unique. Then I went on to describe the actual work and then pull the elements out that contributed to my response. After initial class sessions on genre; plot, and character failed to engage him ("Was I the only one who felt trapped in a class which embarked on discussing genre at 8:10 A.M."), a nineteen-year old man suddenly found the situation changed: "We had a confrontation. The entire class time surrounded a dispute. I readily sat up in my seat to observe what my classmates were anxious about, so I could participate. They were butting heads about their interpretations of the story read for our class assignment." At first he did not feel he could "jump in," but "definitely felt caught in the middle of it," agreeing with each side to some degree. As interpretations continued to "clash . . ., uninformed opinions were corrected by educated ones, and faces blushed due to embarrassment and anger," he found himself anticipating and preparing for class in new ways. I was in awe that the instructor allowed it to continue. ... I carried my excitement with me. I did not mind waking up for class.... I began to review the material read and my class notes. And anticipate the opinion I would promote in class. I had been quiet in class for the first few weeks, but I was coming out of my shell. My opinions were refused as well as accepted by my classmates, and I realized my face felt a bit flushed a few times as I walked out of the classroom door. I began to wonder why I was so anxious and moved by the discussions. Why everything was so heated and sensitive. What came to me most, while I was doing the painting aesthetic response, was how much I now want to become involved with music and do that same thing with musical pieces. [Originally,] I couldn't really make any sense out of [jazz]. I always had the feeling it relaxed me and took me away from the things I thought about during the day, but beyond that it was really hard for me to identify my response and what was going on that caused it. And so now I have a challenge ahead of me, and these last couple of times we have been to [the jazz club] it's been kind of like a little lab for J. Also I'm interested in hearing what some of the music faculty say about jazz because . . . in lots of ways, it's not too conventional . . . , and I'd like to see what they think. A twenty-two-year-old senior was able to make connections between readings and work done in our course and other courses in religious studies. "[This course] has paralleled research I have been doing for other courses, which has been very exciting and useful. I have read Abraham from a feminist perspective in Dr. L.'s course, and discussed Kirkegaard's radical transcending of ethics with Abraham as the model (aaak, gag,

Equity and Debt Essay Example | Topics and Well Written Essays - 750 words

Equity and Debt - Essay Example However, this is balanced by the requirements of the debt covenant to regularly service that debt; that is, the company regularly needs to make payments to the issuer of the debt to cover the principle they borrowed and the interest required by the debt covenant. This detriment is offset in some regard through the reduction in tax liability (Seidman, 2005) – in short, the payment of debt reduces the amount of income that the company is taxed upon. Equity financing carries with it its own distinct set of advantages and disadvantages. Chief among the advantages of equity financing is the existence of no repayment period of the capital used to expand the business (Seidman, 2005). Since the capital is raised through individuals or businesses buying a share of both the company and its future earnings, the rewards for providing the capital come through an expected increase in the value of their investment. This, however, translates into a disadvantage of equity financing. Namely, wh ile profits are expected to increase, the â€Å"pie† is now being divided into more pieces, thus reducing the value of the existing stakes. Further, with the issuance (or release) of additional stock into the market to support an equity financing endeavor, the company becomes more susceptible to outside influences, whether through potential takeovers or through some loss of control of the decision-making process (Seidman, 2005). I neither fully agree nor fully disagree with management’s decision to proceed with equity financing instead of the intended debt financing in the expansion of their manufacturing capabilities. Equity financing makes sense, especially in light of the 305% rise in the company’s stock price over the past year (American Superconductor, 2003). Management is able to take advantage of the ability to raise capital with less dilution of current stockholders’ shares than would otherwise be expected in an environment of stable share price. Debt financing, too, makes sense in regard to the fact that with the government project becoming profitable a quarter ahead of expectations and with the massive savings in operating expenses, debt financing would have been rather easy to service (American Superconductor, 2003). Using that approach, no dilution of stockholder value would be necessary and there would be no potential for a loss of corporate autonomy. Further, with an eye again to lower future operating costs and an unexpectedly profitable revenue stream, debt financing would have lowered the potential future tax burden that the company will soon be faced with. Instead of management undertaking either approach, I believe that a third option would be best. With the company’s results that lent themselves to support debt financing as well as a nearly doubling of revenue company-wide over the past year, management could have funded the entire endeavor through retained earnings had the expansion decision been put off for a short period of time (American Superconductor, 2003). This approach would prevent any dilution of share value, any potential loss of autonomy, and would avoid the seemingly unnecessary burden of additional indebtiture at a time when the company is flush with cash. Having made the decision to raise the capital through equity financing, management needs to determine what the cost of equity truly would

Thursday, October 17, 2019

Briefly describe the elements of the Drake equation. Are they Essay

Briefly describe the elements of the Drake equation. Are they reasonable Why, or why not - make a list of each of the different variables in the Drake equations - Essay Example Apparently, though the seven key elements aforementioned are each less certain in estimating the existence of ET intelligence through the formation of stars, they serve as quite reasonable factors of determining at least the possibility that there exist potential regions in the galaxy from which transmitted signals, of logical frequencies, indicate signs of communication. Drake equation may be claimed as reasonable in its setup since the factors that depict the key elements are multiplied with each other so as to present the flexibility of considering the number of developing civilizations within the expanse of the Milky Way. In application of a ‘best estimate’ possible, assuming R* = 7 suns/yr, fp = 0.1, ne = 1.025, fℓ = 0.5, fi = 0.01, fc = 0.3, and L = 10,000, the number of advanced extraterrestrial civilizations in our galaxy is approximately

Principals of Management Essay Example | Topics and Well Written Essays - 2500 words

Principals of Management - Essay Example If customers needs more detailed information not covered on the terminals, service centre staff needs to refer customer to the service centre manager who have a greater knowledge of services and products to ensure customer gets the correct information. The new customer service manager experience a increase in calls referred to her by service centre staff, even though they could have answered some of the questions themselves. This resulted in increased delay for customers as the manager will have to address more queries than necessary. This is supported by rising customer complaints about the time they have to wait on the phone. The manager is concerned and requested some guidance on the possible use of McGregor's Theory X and Theory Y to motivate staff. Firstly it is obvious that the service manager are new and may have taking the position over persons who have been with the bank a longer time, persons with more experience and skills. These persons may feel that they are not seen as good enough and that is why they where not considered for the manager position, influencing them negative and this they retaliate by acting as if they are unable to address the customers queries. Then the tasks these service centre staff have to perform has been designed in a monotonous and boring manner, offering no real challenge or a opportunity for staff to use their own initiative. This combined with strict control of staff's movements and restrictive job descriptions allows no flexibility, resulting in repetitive work without any break will be enough to reduce the employees willingness to perform. Furthermore, the strict control seem to only penalise staff and that there is very little in rewards for above average performance or dedication, giving staff no reason to improve their performance, or to help customers with little more complex questions. With only the service manager to help customers with more complex queries, staff will refer any customer to her if they ask questions only slightly deviating from the norm, without even trying to clarify what the customer wants to know. Five Functions of a Manager Before looking at motivational theories we need to look at the functions of a manager. Management is management in any organization and the principals of management are general and not specific to any business environment. "However, management is universal only if the manager has become familiar with the specific situation in which it is applied. Production technology, customer characteristics and the culture of the industry are examples of specifics that managers need to learn to be effective in applying their generic management skills," (James Higgins, 1994). The main goal of a manager is to reach the organisations mission and objectives through the five functions of management; planning, organizing, staffing, directing and control. It must be stressed that even though a manager have the ability to apply the five functions of management to accomplish the organizations goals, it is no guarantee that he or she will be successful. Managers also need to be effective and efficient, effective in achieving goals and efficient in allocating resources. Below the functions defined as: Planning Planning is the continuous process of developing business objectives and determining how they will be accomplished. Planning can be broad, as in designing the mission of a organisation

Wednesday, October 16, 2019

Briefly describe the elements of the Drake equation. Are they Essay

Briefly describe the elements of the Drake equation. Are they reasonable Why, or why not - make a list of each of the different variables in the Drake equations - Essay Example Apparently, though the seven key elements aforementioned are each less certain in estimating the existence of ET intelligence through the formation of stars, they serve as quite reasonable factors of determining at least the possibility that there exist potential regions in the galaxy from which transmitted signals, of logical frequencies, indicate signs of communication. Drake equation may be claimed as reasonable in its setup since the factors that depict the key elements are multiplied with each other so as to present the flexibility of considering the number of developing civilizations within the expanse of the Milky Way. In application of a ‘best estimate’ possible, assuming R* = 7 suns/yr, fp = 0.1, ne = 1.025, fℓ = 0.5, fi = 0.01, fc = 0.3, and L = 10,000, the number of advanced extraterrestrial civilizations in our galaxy is approximately

Tuesday, October 15, 2019

Marketing Philosophy and Strategy Research Paper

Marketing Philosophy and Strategy - Research Paper Example The research conclusions assert that while, technological advancements such as the Contemporary Marketing Practice (CMP) framework, Hybrid Distribution Systems and Demand Change Remediation have significantly aided the effectiveness of marketing practices, ethical and legal issues such as concerns regarding consumer online privacy and targeting children via marketing efforts still need to be addressed. The paper also assesses the product launches of Sony BetaMax, Colgate Kitchen Entrees and Pepsi-Kona to determine the challenges in new product development in the marketing landscape of today. Marketing Philosophy and Strategy The dynamism of the marketing landscape requires a comprehensive understanding of the issues and concerns related to the development of new products and the impact of the global economy on the marketing philosophy and strategy of a business. The purpose of this research paper is to employ the findings of prior literature and scholarly articles to examine the chal lenges that are involved in the development of new products thereby, assessing the impact of technological advancements in assisting the effort of new product development. Furthermore, the paper conducts extensive research into prior literature to fulfill the objective of addressing the legal and ethical implications of marketing efforts. ... products is highly influential, such that the volatility of the worldwide business environment extends to the individual characteristics of consumers including patterns of consumption which increase the need for organizations to engage in practices that encourage the creation of products that can appeal to the specific tastes and preferences of the target market. In their article, Ogawa and Piller (2006) highlight the problem that is associated with the commercialization of new products that has led to the staggering failure of more than 50% of new product launches. Certainly, the pivotal challenge being faced by businesses in the economy of today is a failure to recognize the needs of customers (Chaturvedi & Rajan, 2000; Ogawa & Piller, 2006). Research into the failure of Pepsi-Kona, the launch of which was essentially inspired by Starbuck’s triumph in reviving the declining demand for coffee suggests that Pepsi did not undertake effective marketing testing and continued with the launch of the beverage even though initial results did not predict a successful product launch (D. Pitta & E.Pitta 2012). Ogawa and Piller (2006) note that developing sales forecasts and expected sales volume for new products is becoming a highly challenging task, this notion essentially asserts that the accuracy and preciseness of determining customer needs and creating sales forecasts during the extended period that is prior to the development of new products is a vital challenge. According to Jhang et al. (2012), extensive product innovation during the process of new product development and decisions regarding brand extension must be finalized once the product is aligned with the consumer product category expectations, products such Colgate Kitchen Entrees and Cosmopolitan Yogurt

Monday, October 14, 2019

Famous Personalities Who Took Up Engineering Courses Essay Example for Free

Famous Personalities Who Took Up Engineering Courses Essay 1. Dolph Lundgren (Chemical Engineering) Before pursuing an acting career, Dolph Lundgren studied chemistry and chemical engineering. He has a Bachelor’s Degree in Chemical Engineering (Royal Institute of Technology, Sweden) and a Master’s Degree in Chemical Engineering (University of Sydney) and was studying at MIT on a Fullbright Scholarship before finally deciding to quit and pursue acting. 2. Cindy Crawford (Chemical Engineering) Cindy Crawford graduated as the batch valedictorian during high school and attended the Northwestern University to study Chemical Engineering on a scholarship. She dropped out after a semester to go into modelling full-time. 3. Bill Nye (Mechanical Engineering) Bill Nye actually graduated from Cornell University with a Bachelor’s Degree in Mechanical Engineering in 1977. After graduation, he headed to Seattle to work for Boeing. During his time in Seattle, he entered a Steve Martin look-a-like contest that eventually led to his dual careers: An engineer by day, stand-up comic by night. In a few short years, he began appearing on Saturday Night Live and later on Comedy Central, and â€Å"Bill Nye the Science Guy† was born. 4. Tom Scholz (Mechanical Engineering) Before Tom Scholz founded the rock band â€Å"Boston†, he received both bachelors and master’s degrees in mechanical engineering from MIT. While he was a student at MIT he made his own pedals for his electric guitar and experimented with sounds. His first job out of college was as a senior product designer for the Polaroid Corporation, where he received his first of many patent credits. 5. Jimmy Carter (Nuclear Engineering) Jimmy Carter was the 39th US president and was also a nuclear engineer. Carter went to the Georgia Institute of Technology and graduated in 1947 from US Naval Academy with a general Bachelor’s Degree in Nuclear Engineering. In the navy, he focused on submarines. He was chosen for the nuclear submarine program and did graduate work in reactor technology and nuclear physics. 6. Scott Adams (Software Engineering) Scott Adams was never technically trained as an â€Å"engineer,† though â€Å"engineer† was on his business card. He worked as a software / telecommunications engineer at Pacific Bell. From 1989 until 1995, he worked his day job while doing the Dilbert comic strip mornings, evenings and weekends. 7. Neil Armstrong (Aerospace Engineering) The first man on the moon was an engineer! Armstrong majored in aerospace engineering at Purdue University, which he followed up with a masters in aerospace from the University of Southern California. Afterwards, he joined the navy and trained as a pilot. He later became a test pilot, and finally an astronaut before landing on the moon and uttering one of the most repeated and quoted phrases in human history. 8. Jorge Mario Bergoglio / Pope Francis (Chemical Engineering) Before entering the seminary, Pope Francis studied chemistry and graduated as a chemical engineer. 9. Rowan Atkinson (Electrical Engineering) Before becoming the famous Mr. Bean, Rowan Atkinson studied at the Newcastle University in 1975 where he obtained his bachelor’s in electrical engineering. Afterward he continued his studies, ultimately obtaining the degree of MSc in Electrical Engineering from The Queen’s College, Oxford. While studying at Oxford, he pursued acting on the side with a variety of clubs. It is from here that he was bitten by the acting bug and decided to forgo his career as an engineer. 10. Herbert Hoover (Civil and Mining Engineering) Before becoming the 31st US president, Herbert Hoover was both a civil and a mining engineer. Hoover started out at Stanford in 1891 and got a job as a mining engineer in Australia. He then went to work in the Chinese mining industry and started a few mining companies. Afterwards, he got more and more involved with government work, before finally becoming president. 11. Tom Landry (Industrial Engineering) One of the most famous coaches in NFL was an engineer. Tom Landry received his degree in industrial engineering from the University of Texas (where he played football) and the University of Houston, graduating in 1952. Before starting his coaching career in 1956, he first became a player in the NFL. 12. Ashton Kutcher (Biochemical Engineering) Before becoming an actor, Ashton Kutcher enrolled at the University of Iowa in 1996 where he majored in Biochemical Engineering. He was motivated to take this degree because he had the desire to find a cure for his younger brother’s heart ailment. 13. Ally Walker (Biomedical Engineering) Walker went to college with the intention of becoming a scientist or a doctor. She attended the University of California at Santa Cruz and obtained a bachelor’s in biochemistry. But, while there, she worked in the labs as a researcher on a genetic engineering project. But shortly after being a cast in her first film (Aloha Summer), her career in science was put on hold. 14. Herbie Hancock (Electrical Engineering) Herbie Hancock attended Grinnell College and double-majored in electrical engineering and music. Though he was an accomplished musician before he even got to college, music was not his first draw. 15. Sergei Brin and Larry Page (Computer Science) Brin and Page were two computer nuts who first met at Stanford University a decade ago while earning graduate degrees in computer science. Brin had a B.S. in mathematics from the University of Maryland while Page had an engineering B.S. from the University of Michigan. They didn’t get along at first, but their friendship grew as Brin and Page toiled in the dorm, seeking a new way to search the Internet. The fruits of their labor: Google, the Internet’s most popular search engine.

Sunday, October 13, 2019

Criminology Research Methods

Criminology Research Methods Using examples from published research, critically consider that way that choice of study design might influence research findings and conclusions.   A study design is a fundamental component of any piece of research, providing a structure within which to implement a suitable methodology for the collection and analysis of information and data. The choice of study design employed in criminological research will inevitably influence the findings and conclusions drawn, which may subsequently be used to shape the direction of future policies and interventions within the sphere of criminal justice. This is particularly the case in relation to domestic violence, which remains a socially and politically contested area with regards to the extent to which it merits and requires criminalisation. I therefore intend, with reference to published research, to critically examine how choice of study design may yield different findings and contributions to contemporary understandings of domestic violence. Before considering the various types of study design, it is necessary to provide a brief account of the nature and context of domestic violence. Academics highlight that it is a distinct phenomenon from other forms of conventional violence, often characterised by a series of ongoing violent episodes as opposed to one discrete event and a typical reluctance on the part of victims to recognise and voice their victimisation (Mirrlees-Black, 1999). Criminological research in this area has assumed heightened importance in recent years due to shifts in Government policy towards criminalisation  [1]  . It is therefore vital that any research in this area necessitates an appreciation of the contextual circumstances within which perpetrators and victims operate. A number of study designs are available for the purposes of criminological research, the primary distinction existing between experimental and non-experimental designs; which include randomised control trials, quasi-experiments, cross-sectional and longitudinal designs as well as ethnographic studies. The choice of design will affect the strength of both the internal  [2]  and external  [3]  validity of the findings and conclusions. Bryman notes that the study design chosen reflects a decision about the priority being given to an array of dimensions. These include articulating causal connections, generalising the findings, understanding behaviour in a specific context and having a temporal awareness of social phenomena (2008:35). In addition, certain designs may lend themselves more easily to quantitative or qualitative data, which may impact upon a researchers choice of design given the fundamentally diverse characteristics of both.  [4]   The true experimental design is often referred to as the gold standard (Bryman, 2008:38), despite being rarely employed in criminological research (Wesiburd, 2000:181) due to its potential to yield findings with strong internal validity, particularly if randomised control trials are employed. The experimental design involves the manipulation of the independent variable in order to elicit variation in the dependent variable, a classic example being Bushmans (1995) investigation into the impact of violent films on those pre-disposed to aggression. In randomly assigning subjects to control and experimental groups, he was able to control for rival causal factors, resulting in findings with strong internal validity. True experiments may be either laboratory experiments  [5]  or field experiments  [6]  , although it can be argued that conclusions drawn from laboratory experiments may not have the same level of generalisation due to their artificial setting. However, it is argued th at it is the theoretical principles that are being generalised, not the specific characteristics of the sample, setting or measure (Anderson and Bushman, 1997:22). The experimental design was utilised by Sherman (1984) in investigating the specific deterrent effects of arrest on perpetrators of domestic violence, whereby three types of police response (arrest, mediation ad separation) were randomly assigned to legally eligible cases. The dependent variable, in this case recidivism, was measured over the course of 6months following police intervention using both official data and victim reports. The studys conclusion, that swift imposition of a sanction of temporary incarceration may deter male offenders in domestic violence cases (Sherman, 1984:270), is often cited in support of mandatory arrest policies. However, given that experimental designs are notorious for their weaker external validity  [7]  , it is questionable whether Shermans findings lend themselves to such a sweeping generalisation. Indeed, follow up studies in other US cities revealed more mixed results, with some concluding that arrest had negative effects for victims (Garner et al. 1995). The findings and conclusions by Sherman have been attacked on a number of grounds. Dobash contends that the experiments were designed and carried out with little knowledge of existing and theoretical positions regarding violence against women (2000:254). Indeed, it can be argued that the failure to appreciate the possibility that the reason the arrest of perpetrators resulted in lesser recidivism was not due to its deterrent effects but a result of the victim failing to call the police again or to report their victimisation to interviewers due to fear of a repeated retaliation by the perpetrator that might have followed the initial arrest. This is particularly since qualitative studies have revealed the extent to which victims reluctance to involve the police are a direct product of their fear that an arrest will lead to an escalation of the violence (Felson et al.2002). In addition, Fagan highlights that the short follow-up period of 6months failed to take into account the episodic and cyclical patterns of family violence (1989:382). It therefore appears that Shermans pre-occupation with experimental form, in this case a randomised control experiment, precluded a proper consideration of the nature and contextual characteristics of domestic violence. A variation of the true experimental design is the quasi-experiment, commonly employed in the evaluation of criminal justice interventions due to the ethical difficulties associated with random assignment. Such experiments have been used to research the effect of rape law reforms on the number of rapes reported to the police.  [8]  However, due to the absence of random assignment, such a design may not yield findings that are considered as strong in terms of their internal validity due to the lack of control over intervening causal variables. The Violent Men Study (Dobash, 2000) employed a non-equivalent control group design to evaluate the impact of different criminal justice sanctions on domestic violence, involving the matching of subjects within the different groups. The qualitative data revealed much higher rates of re-offending than the quantitative arrest records portrayed, leading the authors to remark that these stark differences cast grave doubt on the veracity of criminal justice statistics as indicators of the levels of violence or of the effectiveness of interventions (Dobash, 2000:267). In addition, in contrast to the experimental study of arrest that merely speculated the reasons for reduced levels of recidivism following arrest (Sherman, 1984), the Violent Men Study was able to contribute to an understanding of both how and why certain interventions could lead to a cessation of violence (Dobash, 2000). Such findings were arguably facilitated by the fact that the study design was more attuned to the context and dynamics of domestic violence, such as the fact that it was longitudinal in nature, tracing victims experiences and perpetrators criminal involvement over a period of 12months at regular intervals and drawing a comparison between the two sets of data  [9]  . The advantages associated with this design have led to a replication of it in subsequent research.  [10]   An example of a non-experimental study design is the cross-sectional, involving the collection of information and data relating to a designated phenomenon at a particular instance in time. A classic example is the investigation of the effects of visible public and social order on evolving crime rates in Chicago (Sampson and Raudenbush, 2001). However, the problems associated with such a design relate to both the internal validity and the ambiguity of the direction of causality, which may therefore significantly influence any conclusions drawn, as was the case in the Chicago study which could not establish whether the high crime rates resulted before or after a variation in social control (Bachman and Schutt, 2007:154). A study by Hoyle and Sanders (2000) of victims within Thames Valley police force areas utilised a cross-sectional non-experimental design to investigate victims perceptions of the value of various criminal justice interventions. The non-experimental dimension facilitated a more in-depth exploration of victims experiences and beliefs and a deeper contextual understanding of the nature and effects of domestic violence, with the authors highlighting that the more powerful the controlling behaviour of their partners, the less likely it is women will seek to involve the criminal justice system (2000:21). However, a significant drawback of the cross-sectional design is that it results in findings that inevitably fail to capture the recurring and ongoing nature of domestic violence. By contrast, a longitudinal design, involves the collection of information and data at several points in time, which can also resolve any ambiguity concerning the direction of causal influence. Thus, academics assert that the value of longitudinal data is so great that every effort should be made to develop longitudinal research designs whenà ¢Ã¢â€š ¬Ã‚ ¦appropriate (Bachman and Schutt, 2007:155). A study by Sullivan and Bybee (2004) interviewed 278 women, who has just left a domestic violence shelter, at various intervals for three years. By collecting and analysing data over a substantial period of time, the study was able to provide a greater understanding of the unique trajectory of domestic violence. However, the problem of attrition is particularly salient for longitudinal designs, with Bachman and Schutt highlighting that those in greatest need are often the most likely to drop-out (2007:159). This has obvious implications for the validity of findings, since a drop-out of the most domestically victimised subjects could mask the extent and seriousness of domestic violence. An interesting study design that is rarely employed, but could nevertheless provide a valuable insight into the phenomenon of domestic violence, relates to ethnography. The purpose of which is to look more in-depth at the mechanisms underlying a social process and to gain an insight into the interpretations and perceptions of actors (Crow and Semmens, 2008:37). Such an approach was taken by Websdale, who provided a critical ethnography of how rural patriarchy shapes the perpetration and policing of domestic violence (Adelman, 2004:135). Although such findings and conclusions cannot obviously be generalised, ethnographic designs serve to reveal important details about the experiences of particular sub-groups of the population, which may not be adequately reflected in the findings of more conventional study designs. In conclusion, it is apparent that choice of study design in criminological research can have a marked influence on the findings and conclusions drawn. In relation to domestic violence, whilst it appears that true experiments yield results with the strongest internal validity, they nevertheless fail to account for the dynamic processes operating which trigger the variation in the dependent variable. The context-specific approach taken by other designs may have the potential to fill this gap by affording a greater emphasis on process as opposed to outcome. In addition, longitudinal designs are vital in capturing the intrinsic trajectory nature of domestic violence which is often ignored by cross-sectional designs. However, it is apparent that a deeper and proper understanding of domestic violence, in order to implement effective policies, necessitates the exploitation of the various strengths of both experimental and non-experimental study designs. To conclude otherwise would be to ig nore the inherent nature of domestic violence and to relegate it to the status of any ordinary violent crime, from which it is clearly distinct. Word Count: 1992

Saturday, October 12, 2019

Transvestic Fetishism :: science

Transvestic Fetishism Introduction Someone you know-any male close to you-could be having a secret "affair" behind closed doors and you may not even be aware of it. Not to worry, it may not involve another woman. This man may be having an affair with female clothing. If so, it is safe to say that this man is suffering from a transvestic fetish. What is a transvestic fetish? Transvestic Fetishism is a psychosexual disorder found mostly in men. To better understand this disorder, we must first look at the definition. Transvestism is defined as dressing in the clothing of the opposite sex to achieve sexual arousal, excitement, and gratification. Fetishism is the reliance on nonhuman objects as the preferred or exclusive method of achieving sexual excitement. The major symptom of fetishism is the use of nonliving objects to obtain sexual arousal. The most common fetish objects are articles of women's clothing such as bras, underpants, stockings, shoes and boots. The individual will often masturbate while fondling, kissing, or smelling the fetish object. In other cases, the individual's sexual partner will wear the object during sexual encounters, thereby providing an arousing stimulus that enables the fetishist to participate in otherwise normal sexual behavior. Thus, men suffering from transvestic fetishism gain sexual pleasure from dressing in women's clo thing, a behavior defined as cross-dressing. Cross-dressing can range from wearing only one article of women's clothing while alone to dressing completely in women's clothing and appearing that way in public. In some cases, the cross-dressing is so effective that it is difficult to distinguish a cross-dressed transvestite from a woman. However, the person's goal is not to "pass" but to achieve arousal. Cross-dressing seems to be exclusively male behavior, and there is really no explanation for it. There is no evidence of any hormonal or genetic abnormality. One explanation is that childhood experience with cross-dressing may have been associated with sexual play and arousal. One sample of transvestites found that 78 percent were either married or formerly married, and marital friction is one of the main reasons that transvestites seek therapy. A man with a transvestic fetish will often masturbate while dressed in women's clothes and will fantasize about other men being attracted to him while he is dressed in those clothes. In a very limited number of cases, homosexuals may cross-dress to attract other men, but the homosexuals do not gain sexual pleasure from the cross-dressing and are therefore not diagnosed as having a transvestic fetishism. Transvestic Fetishism :: science Transvestic Fetishism Introduction Someone you know-any male close to you-could be having a secret "affair" behind closed doors and you may not even be aware of it. Not to worry, it may not involve another woman. This man may be having an affair with female clothing. If so, it is safe to say that this man is suffering from a transvestic fetish. What is a transvestic fetish? Transvestic Fetishism is a psychosexual disorder found mostly in men. To better understand this disorder, we must first look at the definition. Transvestism is defined as dressing in the clothing of the opposite sex to achieve sexual arousal, excitement, and gratification. Fetishism is the reliance on nonhuman objects as the preferred or exclusive method of achieving sexual excitement. The major symptom of fetishism is the use of nonliving objects to obtain sexual arousal. The most common fetish objects are articles of women's clothing such as bras, underpants, stockings, shoes and boots. The individual will often masturbate while fondling, kissing, or smelling the fetish object. In other cases, the individual's sexual partner will wear the object during sexual encounters, thereby providing an arousing stimulus that enables the fetishist to participate in otherwise normal sexual behavior. Thus, men suffering from transvestic fetishism gain sexual pleasure from dressing in women's clo thing, a behavior defined as cross-dressing. Cross-dressing can range from wearing only one article of women's clothing while alone to dressing completely in women's clothing and appearing that way in public. In some cases, the cross-dressing is so effective that it is difficult to distinguish a cross-dressed transvestite from a woman. However, the person's goal is not to "pass" but to achieve arousal. Cross-dressing seems to be exclusively male behavior, and there is really no explanation for it. There is no evidence of any hormonal or genetic abnormality. One explanation is that childhood experience with cross-dressing may have been associated with sexual play and arousal. One sample of transvestites found that 78 percent were either married or formerly married, and marital friction is one of the main reasons that transvestites seek therapy. A man with a transvestic fetish will often masturbate while dressed in women's clothes and will fantasize about other men being attracted to him while he is dressed in those clothes. In a very limited number of cases, homosexuals may cross-dress to attract other men, but the homosexuals do not gain sexual pleasure from the cross-dressing and are therefore not diagnosed as having a transvestic fetishism.

Friday, October 11, 2019

Articles of association Essay

This sets out the rules for running the company. It contains the procedures for calling shareholder meetings, the number, rights, and obligations of directors, shareholder voting rights, and lastly details of how accounts will be kept and recorded.  Once these two documents have been agreed they are sent to Companies House (a government body that watches over limited companies). If everything is in order, the registrar of companies’ issues a Certificate of incorporation, which allows the company to start trading out makes the company a separate legal entity from the owners. Details of the director’s and the secretary’s intended address for the registered office as well as their personal details and information of other directorships they may have held within the last five years.  This must be signed after all the other documents as it confirms that all the other registration requirements have been fulfilled. This declaration must be signed before a solicitor.  Once all the forms are completed, they should be send to the company’s house where they are checked for such instances as confirming that the prospective officers of the company are not on the disqualified directors’ list. How the ownership suits the business activity  Peacocks group’s ownership suits their activity because they operate on a large scale by selling a wide range of goods like women’s wear, (lingerie, night wear, swimwear, e-vie fashions), men’s wear (jackets, shirts, ties, trousers), children’s wear (new borns, toddlers, babies), street wear, foot wear, home wear. With this, they employ more than 5000 personnel and trades from over 385 stores throughout the UK. The profits Peacocks receives from selling their goods is used to pay wages, and buying other products to be sold from the suppliers. Because Peacocks is a large company, it gets a lot of profits from different branches and can manage to sell a large number of products and also employ enough staff to maintain the smooth running of the business. Relationship between the size of the business and the type of ownership  Peacocks is a large business covering 110,000 square feet and has about 385 stores in the UK. It operates on a large scale and this is one of the reasons why it is a public limited company. It employs 5000 personnel to work for it throughout the UK.  The industrial sectors to which my businesses belong  The primary sector is concerned with the production or obtaining of raw materials. This includes occupations like farming, forestry, fishing and mining, and oil and gas drilling. For many products, such as fish fingers, this will be the first stage of production. The fish will be then sold on for processing at the secondary stage. The secondary sector deals with manufacturing, processing, construction, and assembly. This relates to manufacturers of consumer and industrial goods. A paper mill, a carpet factory, and a house builder are all found in this sector. Secondary industry processes the goods that come from the primary industry and turns them into something that people want. My two businesses, which are Peacocks, and Top Girl hairdressers both belong to the same industrial sector. They both belong to the tertiary sector, which is known as the service sector. The tertiary sector includes all the providers of services to businesses and to individuals, and can be divided into four sections. These are business services, financial and business services, transport and communication, retailing, distribution, hotels and catering. They belong to this sector because they provide services. Peacocks mainly provides retailing while top girl hairdressers provides hair styling. Top girl hairdressers also provides retailing but as a side activity. It sells a few hair products to its customers just in case they come to get their hair done without any products. They also provide information about maintaining hair. Peacocks sells women’s wear, men’s wear, home wear and children’s wear.Consultancy work is generally popular- tax consultants, management consultants, and computer consultants. Whenever there is constant, rapid change that affects business you will find that consultants are often used to advise how best to adjust to these. Recruitment agencies and selection consultants depend on the job market. When unemployment is high they may struggle, when employment is good and people are looking to change jobs regularly they benefit from increased business. Don’t forget that recruitment agencies often specialise in temporary employment opportunities.  Security firms are becoming more and more popular. Certainly many retail organisations do. Security services are normally sub-contracted because this is more cost-effective than employing and managing specialised security staff.  Industrial cleaners are also sub-contracted. Your college probably buys in its cleaning services rather than employing cleaners. This has been a growth area for entrepreneurs in the past few years.  Secretarial services are generally less popular than they were several years ago. The use of computers and modern software packages means that many people can produce their own documents quickly and easily.