Saturday, August 31, 2019

Allowing Students to Bring Mobile Phones to School Essay

In today’s generation, mobile phones have been a necessity in everyone everyday lives. Many teenagers today describe their mobile phones as their â€Å"life†. Technology nowadays increasingly sophisticated makes all information is just at our fingertips. So, the question arose whether mobile phones should be allowed during school sessions? What are the effects of it? Some people support this proposal because they felt that mobile phones can help students at the school. While some others felt that it will increase social problems among students. As for my opinion, there are two pros allowing students to bring mobile phones to the school, which is act as convenient communication tool and learning aids, and one con which is increasing in criminal cases. With the development of technology, each purpose of usage has its own pros and cons. There are some advantages of allowing students to bring mobile phones to school which is act as convenient communication tool and learning aids. Firstly, as a communication tool, students can use mobile phones to keep in touch with their parents or friends while they are still at school. As a small tool, mobile phones are very convenient to the students to carry it around the school in their pocket or bag. Moreover, students can use mobile phones as an emergency aid. As we know nowadays that there are lots of illegal activities such as bully and theft that has already plagued school. So, by allowing students to bring mobile phones to school, students can use it to contact authorities if they are in danger during school hour. Besides that, mobile phones can also be used as learning aids at school. As stated above, the technology of mobile phones nowadays is very advance and sophisticated. Thus, students can used this technology to aid them and look for information about knowledge in the faster ways. There are lots of functions or application such as calculator, maps, internet, dictionaries, notes, and calendars that can assist students in their learning process at school. That’s why Deputy Education Minister, Datuk Dr Wee Ka Siong said that in 2013, students will be allowed to bring mobile phones and IT gadgets to school after the rules and regulations under the Education Act 1996 are  amended. It is suggested like that because the government has foreseen how mobile phone can aid students to gain more and faster knowledge during school hour. Read more:  Essay on Heavy School Bags However, every development there is also con when bring a mobile phones to school, which is increasing in criminal cases. Some examples of criminal cases that occur in the school are theft, bullying and cheating. First of all is theft cases, there are good chances of phone theft when students bring an expensive and attractive mobile phones to school. In fact, Datin Noor Azimah (The Star Online, 2012) said â€Å"When there is a theft, time would be spent and wasted while trying to look for the culprit and this would likely disrupt classes†. So, it is best to leave them at home to prevent this problem from occur. As well as bullying, this is the form of cyber-bullying that has replaced the physical bullying and makes the school environment unsafe for many students. This is because, mobile phones nowadays have a built-in digital camera, and there is a distinct possibility that some students may take unflattering pictures, send incriminating videos, or utter threatening. Therefore, the use of mobile phones can be quickly turned into tools of corruption. Apart from it there is increasing in cheating cases. Mobile phones that can surf the Web and have application such as advance calculator or camera can facilitate cheating on tests, quizzes, in-class essays and other assignments. For example, an article titled â€Å"Students Called on SMS Cheating† proves that cheating is present inside the classroom, and allowing cell phones inside the classroom puts a teacher’s classroom management at risk. As a result, it will give a lot of trouble to school. To conclude, we can see that allowing students to bring mobile phones to school will be beneficial to them. Even though, mobile phones can be used as a communication tool and learning aids, still the disadvantages such as increase in criminal cases will give more impact to student’s life and that cannot be overlooked. REFERENCE Bernama (2012, July 17). PTA: No mobile phones to school, please! The Star. Retrieved from http://thestar.com.my/news/story.asp?file=/2012/7/17/nation/20120717222415&sec=nation Culture: Education. (2003, January 30). Students called on SMS cheating. Retrieved from http://www.wired.com/culture/education/news/2003/01/57484 Loo T. E. (2012, July 16). Students can take handphones, IT gadgets to school from 2013. The Star. Retrieved from http://thestar.com.my/news/story.asp?file=/2012/7/17/nation/20120717222415&sec=nation

Friday, August 30, 2019

Digital Fortress Chapter 5

â€Å"Where is everyone?† Susan wondered as she crossed the deserted Crypto floor. Some emergency. Although most NSA departments were fully staffed seven days a week, Crypto was generally quiet on Saturdays. Cryptographic mathematicians were by nature high-strung workaholics, and there existed an unwritten rule that they take Saturdays off except in emergencies. Code-breakers were too valuable a commodity at the NSA to risk losing them to burnout. As Susan traversed the floor, TRANSLTR loomed to her right. The sound of the generators eight stories below sounded oddly ominous today. Susan never liked being in Crypto during off hours. It was like being trapped alone in a cage with some grand, futuristic beast. She quickly made her way toward the commander's office. Strathmore's glass-walled workstation, nicknamed â€Å"the fishbowl† for its appearance when the drapes were open, stood high atop a set of catwalk stairs on the back wall of Crypto. As Susan climbed the grated steps, she gazed upward at Strathmore's thick, oak door. It bore the NSA seal-a bald eagle fiercely clutching an ancient skeleton key. Behind that door sat one of the greatest men she'd ever met. Commander Strathmore, the fifty-six-year-old deputy director of operations, was like a father to Susan. He was the one who'd hired her, and he was the one who'd made the NSA her home. When Susan joined the NSA over a decade ago, Strathmore was heading the Crypto Development Division-a training ground for new cryptographers-new male cryptographers. Although Strathmore never tolerated the hazing of anyone, he was especially protective of his sole female staff member. When accused of favoritism, he simply replied with the truth: Susan Fletcher was one of the brightest young recruits he'd ever seen, and he had no intention of losing her to sexual harassment. One of the cryptographers foolishly decided to test Strathmore's resolve. One morning during her first year, Susan dropped by the new cryptographers' lounge to get some paperwork. As she left, she noticed a picture of herself on the bulletin board. She almost fainted in embarrassment. There she was, reclining on a bed and wearing only panties. As it turned out, one of the cryptographers had digitally scanned a photo from a pornographic magazine and edited Susan's head onto someone else's body. The effect had been quite convincing. Unfortunately for the cryptographer responsible, Commander Strathmore did not find the stunt even remotely amusing. Two hours later, a landmark memo went out: EMPLOYEE CARL AUSTIN TERMINATED FOR INAPPROPRIATE CONDUCT. From that day on, nobody messed with her; Susan Fletcher was Commander Strathmore's golden girl. But Strathmore's young cryptographers were not the only ones who learned to respect him; early in his career Strathmore made his presence known to his superiors by proposing a number of unorthodox and highly successful intelligence operations. As he moved up the ranks, Trevor Strathmore became known for his cogent, reductive analyses of highly complex situations. He seemed to have an uncanny ability to see past the moral perplexities surrounding the NSA's difficult decisions and to act without remorse in the interest of the common good. There was no doubt in anyone's mind that Strathmore loved his country. He was known to his colleagues as a patriot and a visionary†¦ a decent man in a world of lies. In the years since Susan's arrival at the NSA, Strathmore had skyrocketed from head of Crypto Development to second-in-command of the entire NSA. Now only one man outranked Commander Strathmore there-Director Leland Fontaine, the mythical overlord of the Puzzle Palace-never seen, occasionally heard, and eternally feared. He and Strathmore seldom saw eye to eye, and when they met, it was like the clash of the titans. Fontaine was a giant among giants, but Strathmore didn't seem to care. He argued his ideas to the director with all the restraint of an impassioned boxer. Not even the President of the United States dared challenge Fontaine the way Strathmore did. One needed political immunity to do that-or, in Strathmore's case, political indifference. Susan arrived at the top of the stairs. Before she could knock, Strathmore's electronic door lock buzzed. The door swung open, and the commander waved her in. â€Å"Thanks for coming, Susan. I owe you one.† â€Å"Not at all.† She smiled as she sat opposite his desk. Strathmore was a rangy, thick-fleshed man whose muted features somehow disguised his hard-nosed efficiency and demand for perfection. His gray eyes usually suggested a confidence and discretion born from experience, but today they looked wild and unsettled. â€Å"You look beat,† Susan said. â€Å"I've been better.† Strathmore sighed. I'll say, she thought. Strathmore looked as bad as Susan had ever seen him. His thinning gray hair was disheveled, and even in the room's crisp air-conditioning, his forehead was beaded with sweat. He looked like he'd slept in his suit. He was sitting behind a modern desk with two recessed keypads and a computer monitor at one end. It was strewn with computer printouts and looked like some sort of alien cockpit propped there in the center of his curtained chamber. â€Å"Tough week?† she inquired. Strathmore shrugged. â€Å"The usual. The EFF's all over me about civilian privacy rights again.† Susan chuckled. The EFF, or Electronics Frontier Foundation, was a worldwide coalition of computer users who had founded a powerful civil liberties coalition aimed at supporting free speech on-line and educating others to the realities and dangers of living in an electronic world. They were constantly lobbying against what they called â€Å"the Orwellian eavesdropping capabilities of government agencies†-particularly the NSA. The EFF was a perpetual thorn in Strathmore's side. â€Å"Sounds like business as usual,† she said. â€Å"So what's this big emergency you got me out of the tub for?† Strathmore sat a moment, absently fingering the computer trackball embedded in his desktop. After a long silence, he caught Susan's gaze and held it. â€Å"What's the longest you've ever seen TRANSLTR take to break a code?† The question caught Susan entirely off guard. It seemed meaningless. This is what he called me in for? â€Å"Well†¦Ã¢â‚¬  She hesitated. â€Å"We hit a COMINT intercept a few months ago that took about an hour, but it had a ridiculously long key-ten thousand bits or something like that.† Strathmore grunted. â€Å"An hour, huh? What about some of the boundary probes we've run?† Susan shrugged. â€Å"Well, if you include diagnostics, it's obviously longer.† â€Å"How much longer?† Susan couldn't imagine what Strathmore was getting at. â€Å"Well, sir, I tried an algorithm last March with a segmented million-bit key. Illegal looping functions, cellular automata, the works. TRANSLTR still broke it.† â€Å"How long?† â€Å"Three hours.† Strathmore arched his eyebrows. â€Å"Three hours? That long?† Susan frowned, mildly offended. Her job for the last three years had been to fine-tune the most secret computer in the world; most of the programming that made TRANSLTR so fast was hers. A million-bit key was hardly a realistic scenario. â€Å"Okay,† Strathmore said. â€Å"So even in extreme conditions, the longest a code has ever survived inside TRANSLTR is about three hours?† Susan nodded. â€Å"Yeah. More or less.† Strathmore paused as if afraid to say something he might regret. Finally he looked up. â€Å"TRANSLTR's hit something†¦Ã¢â‚¬  He stopped. Susan waited. â€Å"More than three hours?† Strathmore nodded. She looked unconcerned. â€Å"A new diagnostic? Something from the Sys-Sec Department?† Strathmore shook his head. â€Å"It's an outside file.† Susan waited for the punch line, but it never came. â€Å"An outside file? You're joking, right?† â€Å"I wish. I queued it last night around eleven thirty. It hasn't broken yet.† Susan's jaw dropped. She looked at her watch and then back at Strathmore. â€Å"It's still going? Over fifteen hours?† Strathmore leaned forward and rotated his monitor toward Susan. The screen was black except for a small, yellow text box blinking in the middle. TIME ELAPSED: 15:09:33 AWAITING KEY: ________ Susan stared in amazement. It appeared TRANSLTR had been working on one code for over fifteen hours. She knew the computer's processors auditioned thirty million keys per second-one hundred billion per hour. If TRANSLTR was still counting, that meant the key had to be enormous-over ten billion digits long. It was absolute insanity. â€Å"It's impossible!† she declared. â€Å"Have you checked for error flags? Maybe TRANSLTR hit a glitch and-â€Å" â€Å"The run's clean.† â€Å"But the pass-key must be huge!† Strathmore shook his head. â€Å"Standard commercial algorithm. I'm guessing a sixty-four-bit key.† Mystified, Susan looked out the window at TRANSLTR below. She knew from experience that it could locate a sixty-four-bit key in under ten minutes. â€Å"There's got to be some explanation.† Strathmore nodded. â€Å"There is. You're not going to like it.† Susan looked uneasy. â€Å"Is TRANSLTR malfunctioning?† â€Å"TRANSLTR's fine.† â€Å"Have we got a virus?† Strathmore shook his head. â€Å"No virus. Just hear me out.† Susan was flabbergasted. TRANSLTR had never hit a code it couldn't break in under an hour. Usually the cleartext was delivered to Strathmore's printout module within minutes. She glanced at the high-speed printer behind his desk. It was empty. â€Å"Susan,† Strathmore said quietly. â€Å"This is going to be hard to accept at first, but just listen a minute.† He chewed his lip. â€Å"This code that TRANSLTR's working on-it's unique. It's like nothing we've ever seen before.† Strathmore paused, as if the words were hard for him to say. â€Å"This code is unbreakable.† Susan stared at him and almost laughed. Unbreakable? What was THAT supposed to mean? There was no such thing as an unbreakable code-some took longer than others, but every code was breakable. It was mathematically guaranteed that sooner or later TRANSLTR would guess the right key. â€Å"I beg your pardon?† â€Å"The code's unbreakable,† he repeated flatly. Unbreakable? Susan couldn't believe the word had been uttered by a man with twenty-seven years of code analysis experience. â€Å"Unbreakable, sir?† she said uneasily. â€Å"What about the Bergofsky Principle?† Susan had learned about the Bergofsky Principle early in her career. It was a cornerstone of brute-force technology. It was also Strathmore's inspiration for building TRANSLTR. The principle clearly stated that if a computer tried enough keys, it was mathematically guaranteed to find the right one. A code's security was not that its pass-key was unfindable but rather that most people didn't have the time or equipment to try. Strathmore shook his head. â€Å"This code's different.† â€Å"Different?† Susan eyed him askance. An unbreakable code is a mathematical impossibility! He knows that! Strathmore ran a hand across his sweaty scalp. â€Å"This code is the product of a brand-new encryption algorithm-one we've never seen before.† Now Susan was even more doubtful. Encryption algorithms were just mathematical formulas, recipes for scrambling text into code. Mathematicians and programmers created new algorithms every day. There were hundreds of them on the market-PGP, Diffie-Hellman, ZIP, IDEA, El Gamal. TRANSLTR broke all of their codes every day, no problem. To TRANSLTR all codes looked identical, regardless of which algorithm wrote them. â€Å"I don't understand,† she argued. â€Å"We're not talking about reverse-engineering some complex function, we're talking brute force. PGP, Lucifer, DSA-it doesn't matter. The algorithm generates a key it thinks is secure, and TRANSLTR keeps guessing until it finds it.† Strathmore's reply had the controlled patience of a good teacher. â€Å"Yes, Susan, TRANSLTR will always find the key-even if it's huge.† He paused a long moment. â€Å"Unless†¦Ã¢â‚¬  Susan wanted to speak, but it was clear Strathmore was about to drop his bomb. Unless what? â€Å"Unless the computer doesn't know when it's broken the code.† Susan almost fell out of her chair. â€Å"What!† â€Å"Unless the computer guesses the correct key but just keeps guessing because it doesn't realize it found the right key.† Strathmore looked bleak. â€Å"I think this algorithm has got a rotating cleartext.† Susan gaped. The notion of a rotating cleartext function was first put forth in an obscure, 1987 paper by a Hungarian mathematician, Josef Harne. Because brute-force computers broke codes by examining cleartext for identifiable word patterns, Harne proposed an encryption algorithm that, in addition to encrypting, shifted decrypted cleartext over a time variant. In theory, the perpetual mutation would ensure that the attacking computer would never locate recognizable word patterns and thus never know when it had found the proper key. The concept was somewhat like the idea of colonizing Mars-fathomable on an intellectual level, but, at present, well beyond human ability. â€Å"Where did you get this thing?† she demanded. The commander's response was slow. â€Å"A public sector programmer wrote it.† â€Å"What?† Susan collapsed back in her chair. â€Å"We've got the best programmers in the world downstairs! All of us working together have never even come close to writing a rotating cleartext function. Are you trying to tell me some punk with a PC figured out how to do it?† Strathmore lowered his voice in an apparent effort to calm her. â€Å"I wouldn't call this guy a punk.† Susan wasn't listening. She was convinced there had to be some other explanation: A glitch. A virus. Anything was more likely than an unbreakable code. Strathmore eyed her sternly. â€Å"One of the most brilliant cryptographic minds of all time wrote this algorithm.† Susan was more doubtful than ever; the most brilliant cryptographic minds of all time were in her department, and she certainly would have heard about an algorithm like this. â€Å"Who?† she demanded. â€Å"I'm sure you can guess.† Strathmore said. â€Å"He's not too fond of the NSA.† â€Å"Well, that narrows it down!† she snapped sarcastically. â€Å"He worked on the TRANSLTR project. He broke the rules. Almost caused an intelligence nightmare. I deported him.† Susan's face was blank only an instant before going white. â€Å"Oh my God†¦Ã¢â‚¬  Strathmore nodded. â€Å"He's been bragging all year about his work on a brute-force-resistant algorithm.† â€Å"B-but†¦Ã¢â‚¬  Susan stammered. â€Å"I thought he was bluffing. He actually did it?† â€Å"He did. The ultimate unbreakable code-writer.† Susan was silent a long moment. â€Å"But†¦ that means†¦Ã¢â‚¬  Strathmore looked her dead in the eye. â€Å"Yes. Ensei Tankado just made TRANSLTR obsolete.†

Thursday, August 29, 2019

In Partial Fulfillment of the Requirements for Thesis Writing Essay

1.1 Background of the Study An elementary school or primary school is an institution where children receive the first stage of academic learning known as elementary or primary education. In most countries, it is compulsory for children to receive proper education although it is permissible for parents to provide it. The major goals of education are achieving basic literacy and numeracy amongst all pupils, as well as establishing foundations in science, mathematics, geography, history and other social sciences. (http://en.wikipedia.org/wiki/Elementary_school) The education system of the Philippines includes formal and non-formal education. Compared to other Asian countries, the Philippine education system differs in a number of ways. Basic education in the Philippines is only 10 years as against 12 in other countries. The Philippine education system is closely related to the American system of formal education while other Asian countries are influenced by the English, French or Dutch system. The Philippines is using a bilingual medium of instruction. Certain subjects are taught in English and the rest in the national language which is Filipino. However, since June 4, 2012, DepEd started to implement the new K-12 educational system, which includes the new curricula for all schools. In this system, education is now compulsory. K-12 means â€Å"Kindergarten and the 12 years of elementary and secondary education.† Kindergarten points to the 5-year old child who undertakes the standardized curriculum for preschoolers. Elementary education refers to 6 years of primary school (Grades 1-6) while secondary education means four years of junior high school (Grades 7-10 or HS Year 1-4). In addition to this, two years are now allotted for senior high school (Grades 11-12 or HS Year 5-6). Northside Christian Academy is one of the well-known Christian elementary schools in Bacolod City. It can be located at They provide good teaching aid and services for pupils in elementary. Through the dream and aspiration of the founders of the school, it became into existence. The researcher chose it as her course study because as an institution that offers needs for pupils, it should also provide an attractive, functional, stable and green environment for the children to learn and to be educated. The school had been there for almost 2 decades but the school hasn’t changed much since then. It needs proper planning of the spaces, ventilation and a stable design that would fit for an elementary school. As a student designer, working to aim this goal will achieve to answer the stated problems through gathering data, analyzing and planning. This proposed study does not only provide for their children’s care but also a workable environment for the teachers and also for other working facilities and parents. It could accommodate a space where in they can be comfortable and relaxed and a space where each unit has its function of its services. This would affect a better development of the school and also it will benefit to them to receive more credits and many visits from new visitors and enrollees. 1.2 Statement of the Problem Parents know what’s best for their children. They want their children to send them to school because it is their learning experience with teachers and having groups of friends. It’s an opportunity to learn to share, follow instructions and begin learning that will occur in a school. But sometimes parents have their common worries about the space being uncomfortable get intimidated by the institutional ambience of the schools which sometimes children would usually get scared of entering or left there. In creating an interior environment of the proposed, the researcher will aim for a functional, stable, attractive, and organized space for the parents to bring their children by seeking answers to the following questions during the course study: 1. Considering the design standards, what will be the appropriate interior design concept for the school? 2. What will be the color schemes that will give the school’s students and teachers a more effective and comfortable environment for education? 3. What will be the proper interior treatment and finishing material for the following? 3. a. Furniture 3. b. Floor 3. c. Ceiling 3. d. Walls 3. e. Lighting 4. What are the additional changes needed to pay attention as a researcher? 5. What is the proper lighting plan for the school offices and classrooms? 1.3 Theoretical Framework The concept planning for the improvement of the interior environment of Northside Christian Academy is to study the given spaces and conduct a research towards redesigning and improving the school’s interior by getting sources of inspiration out of other concepts and abiding to its design principles which can be suited. For the users’ benefit, the proponent is trying to create a design that considers, creative aesthetics, functional, stable and organized environment. This would enhance the school’s working environment for both students and teachers and staff. Before the proponent plans out the concept, she first gathered some of her sources. There is no perfect classroom design. However, Lippman (2002, 2003) in his study of schools mentions that providing a variety of spaces within a classroom supports student-teacher / child-adult relationships. With the understanding that schools are learning centers for development, and building on his research findings, Franklin (2008) recognized that non-traditional, modern learning environments could encourage students to fully participate in activities with others as they acquire knowledge for themselves. He then developed the following criteria for the modern classroom: †¢ The classroom layout should have the amount of space a child will need varies with the activity, such as reading, writing, working or simply listening. Therefore, the plan has to be able to accommodate instruction, experimentation, or group related activities. †¢ It has to accommodate the formation and functioning of small learning groups while providing a sense of separation, because groups working together will experience distractions and non-productive interaction. †¢ It has to be flexible enough to allow the continual reorganization of the whole class into various sizes and number of small learning groups. This means the space must be as free as possible of permanent obstructions. †¢ It has to be manageable by a single teacher who has command of the entire space. This means the space must be compact and open (Dyck 1994) In terms of school design, connection, on one hand, involves pathways between spaces within the school building. In this case, safe, easy movement and allowing surveillance are three basic requirements. On the other hand, connections also refer to the allowance of school and community functions to be integrated into a cohesive network of closely adjacent facilities, creating an involvement and awareness of the educational process. Circulation such as hallways and corridors are a costly percentage of a school building. The circulation provision has to create gentle transitions from different spaces, taking advantage of turns and bends to create unique areas of learning. Conversely, for issues of safety, circulation paths also need to ensure supervision by, not only administrators, but also students, teachers and parents. Poorly designed circulation can make movement around the building difficult and even facilitate bullying. It is not just a corridor. It is a critical dimension where good design can make a real difference to spatial quality. Lying behind the detail of design elements for general and particular needs there is also a recurrent theme around the general level of stimulation that is appropriate for given situations. In broad terms this may vary from buildings designed for relaxation, such as, homes, to those designed to stimulate, such as theatres, but also variation will be appropriate within buildings. So in a school, classrooms may need a different approach from assembly areas. Children of kindergarten through elementary-school ages are mostly extroverted by nature. A warm, bright color scheme complements this tendency, thereby re- ducing tension, nervousness, and anxiety; color may be light salmon, soft, warm yellow, pale yellow-orange, coral and peach. Colors of opposite temperature should also be introduced as accents. Under no circumstances should it be believed that by pinning drawings, cartoons or the like on the wall, the child’s need for changes in hue, color intensity, and lightness, is satisfied, or that it will reduce a monotonous room experience. 4. Significance of the Study A. To the Students This newly planned, functional and sustainable interior environment of Northside Christian Academy will be beneficial for the students. It presents that for a small institution; it will be a place of comfort and created to enrich their minds with the use of the interior design, conducive for effective learning. B. To the Parents This proposed interior space will be improved and at the same time will be the suitable design for their children’s environment. To create a second home for their children that will always bring them to comfort and safety. C. To the Principal, Teachers and Working personnel It will help the school’s interior to be improved and at the same time to present a good working environment for them. Creating a safe place will bring them to the warmth of home and belongingness. And also to which it will be beneficial for their interaction with the children. D. To the Proponent As the proponent, this study is significant for me to learn in enhancing my skills, to utilize my knowledge for research and to share my ideas to those who will benefit. And a stepping stone for me to achieve what I want by applying this project as my experience for me.

Wednesday, August 28, 2019

Price Strategy for Business Market Essay Example | Topics and Well Written Essays - 3000 words

Price Strategy for Business Market - Essay Example Pricing decisions are highly complex, and organizational objectives are primary factors while deciding upon a pricing strategy. Price skimming, penetration pricing, mixed pricing, cost-plus pricing, variable pricing, marginal pricing, promotional pricing, and differential pricing are techniques used by organizations while developing their pricing policies. Price skimming involves offering a product or service for a premium on a low volume. The strategy is typical for new products or services in new markets, where a certain number of customers are willing to pay more for new innovative products or services. The process speeds up the payback period. When the product or service becomes popular and sales volume increase, prices come down. An example of this technique has been deployed in the mobile phone industry. Penetration pricing is a technique used for penetrating the market for gaining substantial market share, by setting the price low for high volume sales. The payback period is l ong, however, the strategy allows for the establishment of strong market position. The strategy has been deployed in airline industries and fast food businesses. Mixed pricing involves price skimming in the beginning, and penetration pricing when competitors enter the market. An example of this approach has been used in mobile communications. Cost-plus pricing is based on total cost of the product or service and addition of the margin. The disadvantages of the method include, pricing may be too high or too low.

Tuesday, August 27, 2019

Prescription for Improvement of Organizational Behaviors- Part 5 Essay

Prescription for Improvement of Organizational Behaviors- Part 5 - Essay Example Gender discrimination was observed in the organization and as well as biases against older employees. Another negative attitude observed in the organization was that management do not let go any mistake of the employees, no matter how small it is and there is a very little mediation seen on the management side. All these create a negative impact on the organization. Budget restraint is another problem and the government should solve it. It not only creates problems during work but also restraint them to hold on their projects and activities which affects their work capabilities. The work overload is another problem in the organization and this is due to less staff and more work. Deploying more staff members can solve this problem. All these negative points increase complaining and too much complaining declines the quality of work as well as the work environment get tense. After observing the organization and the behavior of employees and manager, I am suggesting some ways to improve the environment of the organization. Drucker (2006) has given a very convincing analysis of what the effective manager should be like. As a manager, following steps can be taken in order to overcome these negative attitudes in the organization: According to Drucker (2006) â€Å"Effective executives do not start with their tasks. They start with their time.† As a manager, one must model positive behavior to all the employees, and it should never be negative. Each staff members is important for the manager and showing favoritism towards any staff member is a self-attack for the manager. So the first thing is that the behavior of the manager should be positive and a model for his employees. Manager must show confidence in the abilities of his staff members and like this a positive and constructive work place environment can be build. If a manager talks in a negative way and favors a particular employee, staff will follow him and will feel no shame in doing the same. When a

Monday, August 26, 2019

Case Study Ethical Practice Paper Essay Example | Topics and Well Written Essays - 1000 words

Case Study Ethical Practice Paper - Essay Example Social therapists and medical practitioners often face the predicament of having to make critical decisions in their experiential practice. Critical scenarios that pit the practitioner's decision making procedures and systems with other factors extrinsic to the logic of the medical and psychological therapy practice often culminate in ethical dilemmas. This paper presents a case study of one such case featuring an ethical dilemma setting characterised by the dissonance between my socio-cultural values and the subject's predicament. The exploration of the ethical dilemma will take the form of a case study. A case study is naturally a qualitative study. A phenomenological study is "the type of research that examines the human experience (Beauchamp, T, & Childress, J, 1983, pp 43). The emphasis is on "experience and interpretation" (Neil T. Anderson 1998). Parton N (1998) continues "In the conduct of a phenomenological study, the focus would be on the essence or structure of an experience (phenomenon)". As such the case study model is perceived to be an ideal study model to meet the core objectives of this paper which entail illuminating the dynamics of an ethical dilemma scenario in a social therapy professional practice setting. The anticipated scenario culminating in dilemma i... The crux of the scenario stems from the fact that I'm strongly against abortion and the client is very dependent on me as her close associate. What characterizes the ethical dilemma is that I need to spell out my values on abortion to her yet for objectivity reasons I must refer her to some one who can take a neutral stand on the issue and yet she views me as her anchor in the predicament that she is facing. Systems Theory Application The featured scenario has entailed the application of the Systems Social Therapy Theory by a practitioner dealing with substance abuse related case. The core tenet and perspective of the Systems Approach; in close relation to the subject of depression related social therapy dwells on that the problem has to be placed within the broader precincts of the factors (social, political, economic, etc) that characterise the environment of the affected individual. The practical application of the model employs among other aspects the thrust of bolstering the subject's morale and self-concepts and recommending perceived solutions and remedies for the client. The external factors surrounding the subject/client are identified and used to map a framework that constitutes the source of the individual's problems culminating in substance abuse. This perspective argues for the interventions that will focus on reducing the environmental and extrinsic stresses and pressures that push people to making certain decisions that may not suffice for the curtailing of ensuing problems and for the objective of coping with external forces. The systems approach strives for the contextualization of the subject's problems within the broader precincts of

Newcastle College- Virtualisation Technologies Essay

Newcastle College- Virtualisation Technologies - Essay Example The college uses the virtual system for bringing the staff, the learners and the administrators together with over one hundred sites. New Castle College implementing Virtualisation technology, has made it possible for the, learners, staff and administrators to connect, teach, address issues, saving a lot of time, resources and money while delivering high quality services to all associated with the institution. Advantages of Virtualisation to New Castle College Saving money: Virtualisation has allowed the New Castle College to save a lot of money. The system consumes about 30% of the physical hardware which translates to less bill payments for the energy (Sanders, 2006). Staff and learners would also save money they would have used to travel, on accommodation and other resources. The New Castle College has saved more than seven billion pounds since the successful deployment and implementation of the Virtualisation system (Josyula, 2011, Golden, 2013). Security: Virtualisation is very secure and can be checked from a centralized location. There is a set of guidelines which have to be met for a person to access the system. The compliance of the system can handle more than thirty hidden procedures which ensure maximum security of the system. The compliance procedures are automated and the system does not grant access if there any compliance procedures that were not met (Stewart, 2013). ... Many man hours are saved and responses to the issues are made faster as there is no need to go to different places to have the queries answered (Wolf and halter, 2006). The repetitive queries can also be uploaded from one central location to all the users, such that they can access them anytime (Savill, 2012). Users can only contact the staff and administrators only when they have extremely issues. Even so, such issues can be addressed within a short time accordingly unlike when physical systems are being used. In addition, recovery is easy as there are no many data hardware used (EC-Council, 2010). Economic benefits of virtualization Virtualisation has had many economic benefits for the New Castle College. Users can access information they need at their own convenience. This saves New Castle college resources that would have been used for buildings, furniture, computers, storage devices and other accessories that would have to be used to make learning and management of learners and staff possible. Virtualisation of the New Castle College saved the institution more than seven billion pounds, which can be used for other benefits of the college (Dittner and Rule, 2011). Staff can operate from anywhere saving a lot of money and time.. The man hour saved by the staff and students would be equal to a lot of money. Supposing that each staff member saves 30 minutes a day and 40% of staff are working through the system. About one thousand man hours would be saved per day. Basing on the United Kingdom average earnings per hour of 10 pounds per hour, the New Castle College would save ten thousand pounds on the lower side per day (Office for National Statistics, 2012). That is a lot of money saved for such an institution. Using

Sunday, August 25, 2019

Humanitarian Ethics System Essay Example | Topics and Well Written Essays - 750 words

Humanitarian Ethics System - Essay Example According to a recent report by the World Federation of International Societies of the Red Cross and Red Crescent is no longer defensible humanitarian intervention before certain disaster without addressing its causes. This paper 2000 humanitarian ethics system in a concise and comprehensive way. Speaking in the context of twenty first century, humanitarian action is consisted on strong values, norms and standards of 'humanity', from which its name is taken. Humanity, thus, appears as the unshakable link that unites and cements all human beings: a feeling, emotion and a sense that push each person to recognize the other as his or her equal and fellow human being. Most ethical theories in the ancient world were forms of virtue ethics, but in the era of 2000 there have, until recently, been few virtue ethicists. Most moral theories of 2000 treat rightness as a matter of producing good results or conforming to moral rules or principles, but virtue ethics specifies what is moral in relation to such inner factors as character and motive, and unlike most modern views, it treats aretaic notions like "admirable" and "excellent" - rather than deontic concepts like "ought," "right," and "obligatory" - as fundamental to the enterprise of ethics (Slote, 2007). Slote (2007) mentions that in its 2003 report on disasters, the International Federation of Societies of Red Cross and Red Crescent, in addition to analyzing some timely topics such as famine in southern Africa, the conflict between power and ethics in humanitarian aid to Afghanistan, the phenomenon of forced migration, framed conceptually ethics humanitarian disasters and wars, reflect on the measurement of disasters (challenges, opportunities and ethics) and provide data on disasters and refugees. Regarding the famine in early 2003 affected 15 million people in southern Africa, the document denounces lack of foresight, inefficiency and delay in implementing the aid. The combination of this disaster with the HIV / AIDS and poverty dramatically complicates the situation and generates questions about the relevance of certain intervene in conflicts without attacking its structural causes (Slote, 2007). Jacques (2003) discusses that another example of the difficulties of international aid to solve basic problems is the situation in Afghanistan, where in many aspects of security and human rights were compounded since the invasion of the allied troops led by the United States. Also the phenomenon of forced migration (175 million people living outside their homeland) raises ethical and legal problems related to humanitarian aid and citizenship and their rights. The humanitarian ethics is guided by two principles: neutrality and independence. These are the basis of a code of conduct for humanitarian aid which has acceded to over 200 organizations worldwide. However, the Federation of Societies of Red Cross and Red Crescent noted that compliance with these principles has been uneven. Humanitarian assistance tends to

Saturday, August 24, 2019

Cunduct a survey criticle analyzing Essay Example | Topics and Well Written Essays - 750 words

Cunduct a survey criticle analyzing - Essay Example The paper goes systematically. In the first half of the paper, it provides a brief account of the approach to be taken while conducting this research. This is followed by a step-by-step guide through the entire process of data collection, data analyzing and reporting. It is not a manual on how to conduct a research. It is not even intended that way. It is rather a way to enlighten the novice researcher of the pitfalls associated with research and common mistakes encountered. It tells him, how he must avoid those mistakes if the work is to be deemed authentic and valid. Survey research asks of the same practices and methods as those undertaken in other approaches for research. The journal editors and the research community at large will evaluate a research report with the same level of intensity as that of any other research report. This does not imply that the survey research is difficult or complex, but the point being that the researchers need to be aware of the steps that should be taken in a survey research and they should be thoughtful, in their planning, execution and reporting of the project. More than anything else, survey research should not be considered as a quick, easy and dirty option. It should be worked over very cautiously. If haphazard work is done on it then, it won’t be able to add sufficient and desired value to education. The article elaborates on the development of the Team Diagnostic survey (TDS). It is an instrument which is used to evaluate the strengths and weaknesses of work teams and for research on team behavior and performance. The TDS revolves primarily around research and theory on the conditions set to foster and build team effectiveness. It gives an insight into how well a team is structured, supported and what is it’s leadership like. It reflects on how the processes members engage in while working, the impact of their reactions to the team at large and to the work . On the psychometric properties level, TDS

Friday, August 23, 2019

Legal Aspects Related to the Exploitation of Weaknesses in Terrorist Research Paper

Legal Aspects Related to the Exploitation of Weaknesses in Terrorist Organizations - Research Paper Example The September 11 bombing, popularly known as the 9/11 bombing in 2001 was only the worst terrorist attack in the United States homeland. It was a wake-up call for the American people as thousands of innocents were killed in a conflict they knew nothing about and on which they had no involvement. Suddenly, it occurred to the American people that they are vulnerable to attacks not only abroad but also in their homeland where they are supposed to be safe. Nobody among the American people is safe. The terrorists blend themselves incognito among civilians and the innocents. A purely military or conventional police approach will not fully work as terrorists blend themselves deep among office workers, employees, workers, business people, mothers, commuters, pedestrians, and in all walks of life. America has to confront the threat of terrorism comprehensively. America must face the threat of terrorism at home and confront terrorism whenever it tries to displays its ugly head. However, to defeat terrorism, America must do more. Terrorism is like any of the deadly mosquitoes of the world. It must be stopped or neutralized on sight but America must also destroy its breeding places, its network, its organization, and its personnel. Thus, America must be proactive. It must do what it can to proactively destroy terrorism----its organization, network, supply and logistic lines, and personnel. America must search for the terrorist breeding areas and destroy its network in-situ or on-site. The obligation of America to combat terrorism is an obligation not only to her citizen but also to the international community as well (Carillo-Salcedo, 2009, p. 13). In destroying terrorism at their breeding places, destroying their organizations including the ideological foundation that provides the reason for their (wrong) existence is an important route. Terrorist

Thursday, August 22, 2019

Land Pollution Essay Example for Free

Land Pollution Essay Land pollution, in other words, means degradation or destruction of earth’s surface and soil, directly or indirectly as a result of human activities. Anthropogenic activities are conducted citing development, and the same affects the land drastically, we witness land pollution; by drastic we are referring to any activity that lessens the quality and/or productivity of the land as an ideal place for agriculture, forestation, construction etc. The degradation of land that could be used constructively in other words is land pollution. Land Pollution has led to a series of issues that we have come to realize in recent times, after decades of neglect. The increasing numbers of barren land plots and the decreasing numbers of forest cover is at an alarming ratio. Moreover the extension of cities and towns due to increasing population is leading to further exploitation of the land. Land fills and reclamations are being planned and executed to meet the increased demand of lands. This leads to further deterioration of land, and pollution caused by the land fill contents. Also due to the lack of green cover, the land gets affected in several ways like soil erosion occurs washing away the fertile portions of the land. Or even a landslide can be seen as an example. Causes of Land Pollution Below are the sources of land pollution: 1. Deforestation and soil erosion: Deforestation carried out to create dry lands is one of the major concerns. Land that is once converted into a dry or barren land, can never be made fertile again, whatever the magnitude of measures to redeem it are. Land conversion, meaning the alteration or modification of the original properties of the land to make it use-worthy for a specific purpose is another major cause. This hampers the land immensely. Also there is a constant waste of land. Unused available land over the years turns barren; this land then cannot be used. So in search of more land, potent land is hunted and its indigenous state is compromised with . 2. Agricultural activities: With growing human population, demand for food has increased considerably. Farmers often use highly toxic fertilizers and pesticides to get rid off insects, fungi and bacteria from their crops. However with the overuse of these chemicals, they result in contamination  and poisoning of soil. 3. Mining activities: During extraction and mining activities, several land spaces are created beneath the surface. We constant hear about land caving in; this is nothing but nature’s way of filling the spaces left out after mining or extraction activity. 4. Overcrowded landfills: Each household produces tonnes of garbage each year. Garbage like aluminium, plastic, paper, cloth, wood is collected and sent to the local recycling unit. Items that can not be recycled become a part of the landfills that hampers the beauty of the city and cause land pollution. 5. Industrialization: Due to increase in demand for food, shelter and house, more goods are produced. This resulted in creation of more waste that needs to be disposed of. To meet the demand of the growing population, more industries were developed which led to deforestation. Research and development paved the way for modern fertilizers and chemicals that were highly toxic and led to soil contamination. 6. Construction activities: Due to urbanization, large amount of construction activities are taking place which has resulted in large waste articles like wood, metal, bricks, plastic that can be seen by naked eyes outside any building or office which is under construction. 7. Nuclear waste: Nuclear plants can produce huge amount of energy through nuclear fission and fusion. The left over radioactive material contains harmful and toxic chemicals that can affect human health. They are dumped beneath the earth to avoid any casualty. 8. Sewage treatment: Large amount of solid waste is leftover once the sewage has been treated. The leftover material is sent to landfill site which end up in polluting the environment. Effects of Land Pollution 1. Soil pollution: Soil pollution is another form of land pollution, where the upper layer of the soil is damaged. This is caused by the overuse of chemical fertilizers, soil erosion caused by running water and other pest control measures; this leads to loss of fertile land for agriculture, forest cover, fodder patches for grazing etc. 2. Change in climate patterns: The effects of land pollution are very hazardous and can lead to the loss of ecosystems. When land is polluted, it directly or indirectly affects the climate patterns. 3. Environmental Impact: When deforestation is committed, the tree cover is compromised on. This leads to a steep imbalance in the rain cycle. A disturbed rain cycle affects a lot of factors. To begin with,  the green cover is reduced. Trees and plants help balance the atmosphere, without them we are subjected to various concerns like Global warming, the green house effect, irregular rainfall and flash floods among other imbalances. 4. Effect on human hea lth: The land when contaminated with toxic chemicals and pesticides lead to problem of skin cancer and human respiratory system. The toxic chemicals can reach our body through foods and vegetables that we eat as they are grown in polluted soil. 5. Cause Air pollution: Landfills across the city keep on growing due to increase in waste and are later burned which leads to air pollution. They become home for rodents, mice etc which in turn transmit diseases. 6. Distraction for Tourist: The city looses its attraction as tourist destination as landfills do not look good when you move around the city. It leads to loss of revenue for the state government. 7. Effect on wildlife: The animal kingdom has suffered mostly in the past decades. They face a serious threat with regards to loss of habitat and natural environment. The constant human activity on land, is leaving it polluted; forcing these species to move further away and adapt to new regions or die trying to adjust. Several species are pushed to the verge of extinction, due to no homeland. Other issues that we face include increased temperature, unseasonal weather activity, acid rains etc. The discharge of chemicals on land, makes it dangerous for the ecosystem too. These chemi cals are consumed by the animals and plants and thereby make their way in the ecosystem. This process is called bio magnification and is a serious threat to the ecology. Solutions for Land Pollution 1. Make people aware about the concept of Reduce, Recycle and Reuse. 2. Reduce the use of pesticides and fertilizers in agricultural activities. 3. Avoid buying packages items as they will lead to garbage and end up in landfill site. 4. Ensure that you do not litter on the ground and do proper disposal of garbage. 5. Buy biodegradable products. 6. Do Organic gardening and eat organic food that will be grown without the use of pesticides. 7. Create dumping ground away from residential areas.

Wednesday, August 21, 2019

Bmw Films Essay Example for Free

Bmw Films Essay The primary issue faced by Jim McDowell is what to do for his next marketing campaign. He will need to decide what direction BMW will take in order to stay current in the target market and position the brand as the leader in the luxury car industry. A sub issue that Jim is facing is that in order for BMW to stand out compare to the competition, it must be at the forefront of the marketing trend. There is always pressure on innovative marketing campaigns as a bad campaign can lead to severe damage in the company image and reputation. Decision Alternatives. There are a number of alternatives that Jim faces when deciding in what direction to move with the BMW marketing campaign. Develop more short films and build a big series out of it. Develop a full length movie for the theatres Do nothing to the existing campaign and move on to develop a new campaign To continue to use the existing BMW films plus developing a new campaign Creating new films on the heels of the original films plus developing a new campaign Develop a full length movie plus developing a new campaign In order to decide the best alternative it is important to look at some key decision criteria. In this case the important factors would be: delivery time, risk, cost, competitive advantage, ease of implementation. Analysis of Industry In the luxury car segment, BMW and Mercedes have stand strong against the strong competition from Japan like Acura, Lexus, Infiniti. In year 2001, BMW is second best luxury car seller, just behind Lexus amount the other ten major luxury brands. However, BMW only ranked 8th in media expenditures, which again proved the great success on their innovative campaign. In terms of customer loyalty, luxury brand customers do tend to stay among the top brands and are very loyal. There are always customers who switch from BMW to Mercedes or the other way around. Since BMW has the competitive advantage of a younger clientele, it is very important for BMW to create marketing campaign to young adult so they can look forward to own a BMW when they can afford one. Analysis of Company Evaluation of Alternatives Alternative #1, 2, and 3 should only be considered as a short term alternative that can achieve quick beneficial results with no long term prospects because all the alternatives evolve around the same film concept, which eventually will wear out and target audience will not be interested in it anymore. Alternative #4 takes into account with BMW’s long term goal, to be the leader in the industry with innovative campaigns. However, developing a new concept takes time and research before implementation, therefore some immediate alternatives needs to be done before the new campaign kicks in. Alternative #5, 6, or 7 will achieve that goal. Alternative #5 Introduce the BMW films to new markets that may have missed the online films during the campaign period will enable BMW to entice an entirely new segment. By showing the films throughother mediums, BMW will be able to reach a wider audience plus raising the brand awareness. Since this campaign is so successful and unique, BMW can also produce DVD and make itas a collectible item. This alternative is easy to implement, low cost to run, low risk as the campaign is already running with huge success with good reputation. However, other companies may copy the idea and there is a chance that BMW will lose its competitive advantage as the films are getting overly exposed to the original audiences that BMW targeted during the initial campaign period. Therefore, developing another campaign while this is running is necessary in order to achieve BMW’s long term marketing goal. Alternative #6 The other option would be to follow up with another series of films on the heels of the original films. BMW would want to keep the number of films low to try and blend them into the successful original films and not to market them as another series of short films. This alternative will require some time to prepare, and the cost will be much higher in comparison to Alternative #5, which will make it harder as BMW will need more resources in creating a new campaign at the same time. It is easy to implement as all the ground works are in place from the previous films. However, this alternative will have a higher risk than other options due to the high anticipation of BMW to produce high quality films. If any of the film receives negative feedbacks, BMW will risk losing out on the campaign inwhole, plus the reputation of the series. BMW will still keep its competitive advantage with this alternative as they are still the one who leads the marketing trend. Alternative #7 Creating a full length movie can be the next big campaignfor BMW. It is a new approach and will make the brand stand out of all others. The target audience is also much wider in comparison to the initial campaign. It will take a long time to implement, and not as easy as short films because a full length film is more complicated in terms of plot and production. The cost will also go veryhigh that may use up all of BMW’s resources in marketing. It is a two sided sword because if BMW is not placed enough in the film there is no difference in doing product placement in the James Bond movie series; meanwhile if BMW is overly exposed in the film it may create negative feedbacks as it will look like an hour long commercial. The interest level of audience will also be much lower in watching a long commercial than a short film. Decision Criteria Chart Here is the chart for the best 3 alternatives: (X? low score, XXX? high score) Recommendation Based on the analysis above it is evident that the appropriate course of action is to utilize the existing movies in the short term while developing a new full scale marketing plan in the background. By utilizing the existing films BMW will be able to quickly get to market films that they have already completed. They will ride the coat tails of the internet marketing, however by introducing the films to another target markets, BMW will hopefully build on the impact created by the original films. There is relatively low risk to this model because BMW has already invested in the films and by using different mediums to convey their message it is likely that an entirely new market segment will appreciate the films as the original audience did. Although the potential payback may not as great as some off the wall innovative idea, the concept behind releasing the films to a different audience should allow more time and resources to develop another new campaign. If there are enough resources, BMW can also consider creating 1 or 2 more films to avoid losing the competitive advantage toward the target audience.

Tuesday, August 20, 2019

An Analysis of Data On Rape Crimes

An Analysis of Data On Rape Crimes Introduction I will comment on the value of data and highlight advantages and disadvantages of this data and finally and come up with appropriate business actions that could be taken and enable Russex constabulary to help prioritise their work. Methods of data collection Official statistics are those published by the central Government. This source of statistical information informs the general public about the extent of notifiable offences. Official statistics are easy and cheap to access as you can observe them on the Home Office web page. The second source of statistical information comes from the British Crime Survey (BCS). These statistics are unofficial and the procedures used to gather information are completely different to the first, as the statistical data comes from surveys carried out by the public themselves. The statistics given are based on a large representative sample of the general public about their experiences as victims of household and personal crime. The BCS endeavours to provide a count of crime that consists of episodes not reported to the police, therefore examining the dark figure of crime which is not recorded in official statistics. The British Crime Survey (BCS) is a large random survey of private households, designed to give a count of crime that includes incidents not reported to the police, or those reported to them but not recorded. The main BCS interview takes place face-to-face, with no gender matching of interviewer and respondent. This context is not conducive to accurately measuring levels of highly personal victimisation. Estimates of the level of sexual victimisation obtained by the main BCS are acknowledged to be underestimates Consequently, the survey now makes use of Computer Assisted Self-Interviewing (CASI), whereby respondents keyed their responses into a laptop computer themselves. This method provides respondents with an increased sense of confidentiality and minimises interviewer effects. Respondents who answered the self-completion modules were routed through a series of three screener questions, designed to identify whether or not they had been a victim of a sexual offence. If they responded positively to one or more of these, they then answered a series of follow-up questions, designed to elicit the exact nature of the last incident experienced. Data as a management tool Data collection is practical because you cannot manage what you do not measure. Statistics from data enables a police department to make smart judgments and assists them in possibly identifying department and procedural problems. Data collection is also a great gesture to the community, showing law enforcement has the willingness to take an inward look to prevent discrimination. It also displays a true commitment by law enforcement to address community concerns and needs. Data collection gives everyone something to work with even though it might be just a partial solution. With mandatory data collection, officers will be forced to think about what happens during an encounter and what they do and say and possibly what parts should be looked at closer. Data collection provide a basis for important policy changes. Statistical techniques Line Graph A line graph is most useful in displaying data or information that changes continuously over time. The example below shows the Rape of a female from 1993-2005/06 Some of the strengths of line graphs are that: They are good at showing specific values of data, meaning that given one variable the other can easily be determined. They show trends in data clearly, meaning that they visibly show how one variable is affected by the other as it increases or decreases. They enable the viewer to make predictions about the results of data not yet recorded. Unfortunately, it is possible to alter the way a line graph appears to make data look a certain way. This is done by either not using consistent scales on the axes, meaning that the value in between each point along the axis may not be the same, or when comparing two graphs using different scales for each. It is important that we all be aware of how graphs can be made to look a certain way, when that might not be the way the data really is. Rape of a female Long-term national recorded crime trend he rate of rapes on females during this period has dramatically increased (see above). Leah Williams from the Womens Resource Centre stated that there were 1,842 rapes reported in 1985, compared to 14,449 in 2005. There may be a good explanation for this trend. Research by feminist scholars Hanmer and Saunders (1984) cited in Goodey (2005) found that everyday reality of womens encounters of violence by men were not revealed in the BCS because the BCS is not designed to reveal such information. Therefore the number of rapes on females may not have increased during this period, but the number of reports to the police has increased. This suggests that rapes which may have occurred prior 1995 are only being reported to the police in the last decade. This may be due to the social construction of the police changing. There are more female officers now than previously which makes rape victims more willing to talk to female officers than male officers. Society has also changed in order to pr ovide more victim support for rape victims by establishing rape centres for victims. However, Hough (2004) stated in the Guardian newspaper that the BCS shows that the major types of crime have fallen dramatically since 1995, however, recorded crime has increased. This increase is due to the change in the way in which police count crime. In 1998 it was decided that victim reports of crimes will be recorded even if they are doubted. This may be an alternative reason to why there is an increase in rape crimes, as rape is hard to record without sufficient evidence. Reservations over data How accurate are the estimates? Unreported rape may feel that the government cannot do anything about it There are several reasons why the BCS self-completion modules are likely to underestimate the true level of sexual victimisation in England and Wales for women à ¢Ã¢â€š ¬Ã‚ ¢ general survey errors associated with response, sampling and coverage in particular, the BCS does cover institutions, the homeless or women under the age of 16, which excludes some high risk women à ¢Ã¢â€š ¬Ã‚ ¢ the crime context of the BCS may lead to some women not reporting incidents they do not view as criminal, particularly where the perpetrator is known à ¢Ã¢â€š ¬Ã‚ ¢ the screener question format will exclude women who do not identify with the particular terminology used in the questions à ¢Ã¢â€š ¬Ã‚ ¢ the BCS interview is not always conducted in private and the presence of other people in the room may inhibit disclosure, especially if this includes the perpetrator of an attack. Conclusion actions and recommendations Sexual offence statistics could be improved by enhanced police procedures, and by having better facilities to encourage a greater willingness of victims to come forward. The sexual crime reduction team are committed to tackling sexual offences and to providing the right support for victims. Better facilities have been introduced through the introduction of 13 sexual assault referral centre across the country. The Government want to make these multi agency services for victims available on a national basis, along with a rape help line. Low reporting rates to the police particularly occur in the area of rape, where the respondent might find it embarrassing or difficult to talk about the attack. However, this problem is trying to be countered out. Computer assisted self-interview forms have been introduced for issues such as sexual attacks. Even so much of this area of offences is still missed as victims might want to stay in denial, and keep the fact that they have been a victim of a sexual assault within their sub-conscious, due to finding it to painful to think about. Further specialist training for sexual offence cases should be undertaken by officers. As a result of these services, victims should feel more confident from the outset that their case is treated with professionalism and empathy. In turn, it will improve theirs and others confidence in the criminal justice system. Ultimately, this enhanced approach should lead to more reporting, recording and subsequently more realistic statistics. Offer tips for rape prevention. Wider use of rape clinics, and awareness of these.

Asian Women in the Eyes of Americans Essay example -- Asian Studies Res

Introduction The history of Asian women has many facets. I am about to touch on two key monumental points over a sixty year span that have shaped the views of Asian women in the eyes of Americans. As a brief overview, from as early as the 1940s, Asian women were recruited to serve their soldiers during World War II as sex slaves. Forty years later, the dawning of the 1980s brought about the desire of Asian women into American households and sparked the mail order bride phenomenon. The beginning of a new century has altered the lives of Asian women, in parts of Asia as well as in the United States of America. I will give you a glimpse into their every day lives in their home country and site observations to their strides into the American workforce today. Let me unveil the lives of Asian women . . . past, present, and future. Comfort Women During World War II, hundreds of thousands of women from all parts of Asia were forced into sexual slavery by the Japanese army to â€Å"serve† soldiers on the front lines. These poor young women, generally known as â€Å"comfort women†, were recruited, kidnapped, sold, enticed, and deceived with the promise of well-paying jobs to serve their soldiers. Eighty percent of the estimated 100,000 to 200,000 â€Å"comfort women† of WWII were Korean girls and women. These unfortunate victims were stationed in â€Å"comfort stations† throughout Asia and the South Pacific. Prisoners in these stations were subject to daily degrations such as physical and verbal abuse, repeated rapes, hard labor, and sometimes murder. The women drafted as â€Å"comfort women† had a regimented schedule. To much astonishment, each women had to serve twenty to forty men a day at a rate of a man every t... ...l reach the same level of respect in another sixty years. The past and present lives of Asian women have been unveiled, now I am anxious to see what the future reveals. Works Cited Kumar, Nita, ed. Women As Subjects. United States: University Press of Virginia, 1994. Lee, Rose J., and Clark, Cal, ed. Democracy and the Status of Women in East Asia. United States: Lynne Rienner Publishers, Inc., 2000. Stetz, Margaret, and Oh, Bonnie B.C., ed. Legacies of the Comfort Women of World War II. United States: M.E. Sharpe, Inc., 2001. â€Å"Tajik Forum Urges Laws on Violence Against Central Asian Women.† Global News Wire. 2003. 27 November 2003. (LexisNexis) â€Å"Why I Recommend Asian Women.† 2003. 05 December 2003. http://www.heart-of-asia.org/gen/whyasia.html â€Å"Women of Color Make Big Strides in the Workforce.† Star Tribune. 2003. 01 August 2003. (LexisNexis) Asian Women in the Eyes of Americans Essay example -- Asian Studies Res Introduction The history of Asian women has many facets. I am about to touch on two key monumental points over a sixty year span that have shaped the views of Asian women in the eyes of Americans. As a brief overview, from as early as the 1940s, Asian women were recruited to serve their soldiers during World War II as sex slaves. Forty years later, the dawning of the 1980s brought about the desire of Asian women into American households and sparked the mail order bride phenomenon. The beginning of a new century has altered the lives of Asian women, in parts of Asia as well as in the United States of America. I will give you a glimpse into their every day lives in their home country and site observations to their strides into the American workforce today. Let me unveil the lives of Asian women . . . past, present, and future. Comfort Women During World War II, hundreds of thousands of women from all parts of Asia were forced into sexual slavery by the Japanese army to â€Å"serve† soldiers on the front lines. These poor young women, generally known as â€Å"comfort women†, were recruited, kidnapped, sold, enticed, and deceived with the promise of well-paying jobs to serve their soldiers. Eighty percent of the estimated 100,000 to 200,000 â€Å"comfort women† of WWII were Korean girls and women. These unfortunate victims were stationed in â€Å"comfort stations† throughout Asia and the South Pacific. Prisoners in these stations were subject to daily degrations such as physical and verbal abuse, repeated rapes, hard labor, and sometimes murder. The women drafted as â€Å"comfort women† had a regimented schedule. To much astonishment, each women had to serve twenty to forty men a day at a rate of a man every t... ...l reach the same level of respect in another sixty years. The past and present lives of Asian women have been unveiled, now I am anxious to see what the future reveals. Works Cited Kumar, Nita, ed. Women As Subjects. United States: University Press of Virginia, 1994. Lee, Rose J., and Clark, Cal, ed. Democracy and the Status of Women in East Asia. United States: Lynne Rienner Publishers, Inc., 2000. Stetz, Margaret, and Oh, Bonnie B.C., ed. Legacies of the Comfort Women of World War II. United States: M.E. Sharpe, Inc., 2001. â€Å"Tajik Forum Urges Laws on Violence Against Central Asian Women.† Global News Wire. 2003. 27 November 2003. (LexisNexis) â€Å"Why I Recommend Asian Women.† 2003. 05 December 2003. http://www.heart-of-asia.org/gen/whyasia.html â€Å"Women of Color Make Big Strides in the Workforce.† Star Tribune. 2003. 01 August 2003. (LexisNexis)

Monday, August 19, 2019

The American Dream in Arthur Millers Death of a Salesman :: Death of a Salesman

The American Dream in Arthur Miller's Death of a Salesman Death of a Salesman is centered around one man trying to reach the American dream and taking his family along for the ride. The Loman's lives from beginning to end is a troubling story based on trying to become successful, or at least happy. Throughout their lives they encounter many problems and the end result is a tragic death caused by stupidity and the need to succeed. During his life Willy Loman caused his wife great pain by living a life not realizing what he could and couldn't do. Linda lived sad and pathetic days supporting Willy's unreachable goals. Being brought up in this world caused his children to lose their identity and put their futures in jeopardy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Willy lived everyday of his life trying to become successful, well-off salesman. His self-image that he portrayed to others was a lie and he was even able to deceive himself with it. He traveled around the country selling his merchandise and maybe when he was younger, he was able to sell a lot and everyone like him, but Willy was still stuck with this image in his head and it was the image he let everyone else know about. In truth, Willy was a senile salesman who was no longer able to work doing what he's done for a lifetime. When he reaches the point where he can no longer handle working, he doesn't realize it, he puts his life in danger as well a others just because he's pig-headed and doesn't understand that he has to give up on his dream. He complains about a lot of things that occur in everyday life, and usually he's the cause of the problems. When he has to pay for the repair bills on the fridge, he bitches a lot and bad mouths Charl ey for buying the one he should of bought. The car having to be repaired is only because he crashes it because he doesn't pay attention and/or is trying to commit suicide. Willy should have settled with what he had and made the best of things. He shouldn't have tied to compete with everyone and just made the best decision for him using intelligence and practicality. Many of Willy's problems were self-inflicted, the reason they were self-inflicted was because he wanted to live the American dream. If he had changed his standards or just have been content with his life, his life problems would have been limited in amount and proportion.

Sunday, August 18, 2019

anger :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ANGER Anger is a healthy emotion when it is expressed appropriately. When it is not, it can have devastating effects. Anger is at the root of many personal and social problems, e.g., child abuse, domestic violence, physical and verbal abuse, and community violence. Problematic interpersonal relations may also disrupt employment activities because of the interference of anger on workplace performance. Left unchecked, anger can destroy relationships, obstruct problem solving skills, and increase social withdrawal. Anger also affects our physical health. For example, it can tax our immune system; contribute to headaches, migraines, severe gastrointestinal symptoms, hypertension, and coronary artery disease. Anger is a healthy and valid emotion. But many of us are taught not to express or show our anger. This often leaves us feeling frustrated and unable to express how we feel inside. As a result, some of us store and suppress our anger, while others may express it, but in negative and unhealthy ways. Individual counseling sessions will assist you in learning how to express and communicate your anger in positive and effective ways. Anger is 'an emotional state that varies in intensity from mild irritation to intense fury and rage,' according to Charles Spielberger, Ph.D., a psychologist who specializes in the study of anger. Like other emotions, it is accompanied by physiological and biological changes; when you get angry, your heart rate and blood pressure go up, as does the level of your energy hormones, adrenalin and/nor adrenalin. Anger can be caused by both external and internal events. You could be angry with a specific person (Such as a coworker or supervisor) or event (a traffic jam, a canceled flight), or worrying or brooding about your personal problems could cause your anger. Memories of traumatic or enraging events can also trigger angry feelings. The instinctive, natural way to express anger is to respond aggressively. Anger is a natural, adaptive response to threats; it inspires powerful, often aggressive, feelings and behaviors, which allow us to fight and to defend ourselves when we are attacked. A certain amount of anger, therefore, is necessary to our survival. On the other hand, we can't physically lash out at every person or object that irritates or annoys us; laws, social norms and common sense place limits on how far our anger can take us. People use a variety of both conscious and unconscious processes to deal with their angry feelings. The three main approaches are expressing, suppressing, and calming. Expressing your angry feelings in an assertive --not aggressive -- manner is the healthiest way to express anger. To do this, you have to learn how to make clear what your needs are, and how to get them

Saturday, August 17, 2019

Discuss the concepts of the Ideal Ruler

1. Gilgamesh, as a ruler, has portrayed a character that stirred up the necessity of having a leader who does not just have the time but also the passion for service. He drew his strength in leadership from his intelligence, bravery and respect. It was his skills that encouraged social consciousness among his people that heightened their aspirations to search for answers for the freedom of his city. Amidst his many battles, he has been grateful to God for the skills that he has.The image of a warrior and a soldier being an epitome of discipline and bravery among all the people in his city appealed to Gilgamesh greatly. Gilgamesh has shown his strength when he made it to the top of double cliff of Mt. Mashu on his way to Utnapishtim. Apparently, this is just one of the rather resilient moments of Gilgamesh. The ruler, who, at all times, exhibited instances of valor, made his journey while holding characteristics of a true hero. 2. The Odyssey was a great epic led by the main character , Odysseus who holds a group of men for more than years.He led the group for years and all this he did with an innate love for his country, his crew and his self. The inevitable fact however comes with its entire weakness when Odysseus pursued his plan of getting through the walls of the Trojans by making a giant wooden horse. Odysseus had one man to present the giant horse to the Trojans as a sign of peace. Not knowing what’s inside the horse, King Priam of Troy, freely accepted the gift and had merriment together with his people.After such, when everybody was falling asleep, Odysseus and his men sneaked out from the wooden horse and murdered every man in the palace, including the King. Odysseus was known for his bravery and brilliant minds. But like any other ordinary hero, he too, has his own weaknesses. As a leader, Odysseus demonstrated a deceitful act towards the Trojans and seldom reserved his humble personality because of his pride.Despite everything though, he was ab le to portray the good traits of a true leader – clever and gallant, that is. . Augustine, a man of â€Å"mystical piety and great philosophical acumen† was always hungry for knowledge. And this carnivorous-like desire entrapped him to be enamored with different philosophies and works – Manichaeism, Platonism, and Cicero’s Hortensius. These might have influenced him to write the greatest of his writings – Confessiones, De Trinitate, and De Civitate Dei – but they don’t hold a candle to what move most believers, Augustine’s conversion. Augustine’s faith was not handed to him on a silver platter.It was a faith earned even if it took all his life to achieve it. He was rather free in choosing his own religion. But in August of 386, Augustine was subjected to incessant pressure from the stern ethical demands of the preaching Ambrose, the Bishop of Milan. Augustine was worried and was carried by anger to his own self for rejec ting the will of God and for not entering into His covenant (Confessions 8. 8). And as he stood there in the garden, he heard the voice of a child saying, â€Å"Tolle lege,† which means take it and read.Augustine took the Bible and read the first passage he came upon, Romans 13:13-14. And after reading such passage, he underwent a dramatic metanoia, a profound life-transforming experience wherein all his human desires were completely surrendered to God. 4. Oedipus’ being a King is no surprise for he was born as a prince. The people of Thebes had seen evidence of that. He was raised as a leader in a group of men who were happy during his time of leadership. He took responsibility on his people and was doing well on it. But what weaken him most were his low temperance and his pride.He couldn’t take hold of it for long that sometimes it was the only thing that was pulling him down. One instance that described how low-tempered Oedipus, was the time when he crossed t he highway and had a group of people before him. He wanted to go ahead of them and because of his impulsiveness; he jumped off and killed the group excluding one man who was leading it. With the scene, it can be concluded that despite his being a good leader and a king to his people, he too, can be as evil as any wicked beast could be to anyone who may break off before him.

Friday, August 16, 2019

Continuing Case: Cory and Tisha Dumont Essay

1.Using the earnings multiple approach would result in the following life insurance calculations for Cory and Tisha. Cory’s needs= $38,000 x (1 – 0.22) x 12.46 = $369,314 Tisha’s needs= $46,000 x (1 – 0.22) x 12.46 = $447,065 Cory currently has $76,000 (2 x $38,000) of term life insurance through his employer. Consequently, Cory should consider purchasing approximately $293,000 of additional life insurance coverage. Tisha has $69,000 of term insurance through her employer, as well as a whole life policy of $50,000. She should consider purchasing an additional $328,000 of life insurance coverage ($447,065 – $119,000). While Tisha or Cory would continue to earn their salaries, if widowed, and would receive some Social Security benefits, they would experience a significant reduction in their standard of living without adequate life insurance. 2. The Dumonts, and Cory in particular, take a big risk when their life insurance is entirely in the hands of their employers. If Cory or Tisha leave their jobs, their group term coverage ends. However, they may be able to convert the group coverage to an individual policy. Since the Dumonts need additional life insurance, they should purchase individual policies to supplement the coverage they have. This will reduce the risk of later becoming uninsurable or, if they were to lose their jobs, having no life insurance at all. 3.At their stage in the life cycle, term insurance is the best option for the Dumonts. It provides the greatest amount of insurance per premium dollar. Universal and variable life policies both include cash value components, through earnings from interest or mutual funds, respectively, which increase the cost of insurance coverage. These policies also tend to have high insurance, investment and administrative expenses, which add to their cost. The option to skip the premium payment on universal life or a  variable universal life may prove too tempting, as it does for many policyholders, who subsequently let the policy lapse. The Dumonts would be well advised to purchase affordable term insurance and do their saving/investing outside of their insurance policies. 4. The life insurance policy features that should be explained to the Dumonts include: ï‚ · Type of policy: term or cash value. The Dumonts’ policies provided at work are group term insurance policies available for the duration of their employment. Tisha also has a whole life policy (cash value insurance) with $1,800 of accumulated cash value. ï‚ · Nonforfeiture clause (on Tisha’s whole life policy): options for receiving a policy’s cash value, a paid-up whole life policy with a reduced face value, or a paid-up term policy with the original policy face amount in exchange for ending the policy. The Dumonts could exercise this right if they are unable to pay the annual premiums to continue the coverage for an extended period of time. ï‚ · Beneficiary designation: persons named as primary and contingent beneficiaries to receive the death benefits from the policy. ï‚ · Coverage grace period: automatic extension, usually 30 to 31 days after a premium payme nt is due, before a policy lapses. The premium may be paid without penalty. ï‚ · Loan clause: (on Tisha’s whole life policy) describes procedures and the interest rate charged for borrowing against the policy’s cash value. ï‚ · Suicide clause: clause stating that the face amount of the policy will not be paid for a suicide death within 2 years of the purchase of a policy. ï‚ · Incontestability clause: clause stating that the insurance company cannot dispute the validity of a contract after it has been in force for a specific period, usually 2 years. ï‚ · Settlement options: section that describes alternative ways that the beneficiaries of a life insurance policy can choose to receive death benefits. ï‚ · Riders: special provisions added to a policy that either provide extra benefits or limit the insurance company’s liability. Riders attached to one or more of the Dumonts’ policies could include: guaranteed insurability, multiple indemnity, COLA, waiver of premium for disabili ty, or living benefits. 5. Life insurance is meant to provide funds to replace a breadwinner’s to protect and support dependents. Chad and Haley are dependents, not income providers. Therefore, the purchase of life insurance is unnecessary and not recommended. The Dumonts should use the money they would spend on policies for the children to increase their own coverage. The claim that Chad and Haley would always be insured is only relevant if (1) the Dumonts continue the premium payments and (2) there is a high probability, based on family health history, that Chad or Haley will contract cancer, diabetes, or heart disease. Otherwise, they will be eligible for insurance in the future and there is no need for â€Å"permanent† coverage starting at this young age. 6. As a â€Å"comprehensive major medical insurance policy,† the Dumonts’ coverage includes basic health insurance for hospital, surgical, and physician expense needs, as well as major medical expense coverage. The latter is very important to extend the basic coverage to protect the Dumonts from the financial effects of a catastrophic illness or accident. The policy has a very adequate lifetime cap of $3,000,000 per insured. The Dumonts should continually analyze the health plans from both employers to determine which offers the best overall plan. But, the annual coinsurance, stop-loss amount, and family deductible, are all standard policy features with reasonable amounts. They are currently paying annual premiums of $2,700 for the coverage, but the monthly opt out fee, from Cory’s employer, effectively reduces this by $1,020 (less the taxes paid on the increased income). Overall, their health care coverage is very cost effective, so no changes are recommended. 7.The Dumonts have four options for paying a $5,000 medical bill incurred through an auto accident, including payment by: Health insurance. Medical expense coverage with their auto insurance.  Bodily injury liability coverage on an auto policy, assuming someone else was at fault for the accident. Personal funds, or out-of-pocket. These funds would supplement the health insurance coverage, or be the only source of payment, should the Dumonts not have health insurance. Luckily, they do. Expenses for an emergency appendectomy would be covered through health  insurance and personal funds. Assuming no one else has made a claim this year, Tisha’s health insurance would pay $3,600: the $5,000 medical bill minus the $500 deductible and the $900 of co-insurance (0.20 x $4,500). Tisha would be responsible for the $1,400 of deductible and co-pay expenses because the Dumonts’ out-of-pocket expenses for the year have not yet exceeded the $5,000 stop-loss limit. 8. Advantages for the Dumonts of switching to an HMO include: regular physical examinations and preventive care, minimized paperwork, and lower costs. Tisha may be able to reduce the $225 monthly premium charged for her current coverage. Disadvantages associated with an HMO focus on concerns about quality of care stemming from the incentive system—quick, cursory services and the difficulty in receiving a referral, particularly outside the geographic region. Some fear the system does not allow for building a trusting relationship with a well-qualified physician. Restrictions on physician choices and the associated level of reimbursement vary with the HMO system: individual practice association, group practice plan, or a point-of-service plan. The Dumonts need to thoroughly comparison shop the plans; Checklist 9.2, Choosing an HMO, should be helpful. If Tisha switches to a PPO, costs and paperwork may also be reduced. Members, typically representing an employer group, receive health care at a reduced cost—with the negotiating power of the group determining the level of discount. The disadvantage of a PPO is that participants must seek medical services from participating doctors and hospitals, thereby limiting their choice of care. With a PPO, a participant can go to a non-member doctor but must pay an additional, or penalty, co-payment to do so. 9.Assuming Tisha works for an employer with 20 or more employees, she is eligible—under the federal COBRA law—to continue health insurance coverage for 18 to 36 months, depending on the reason for leaving the company. Tisha would be responsible for the full cost of coverage, but it may be less expensive than an individual policy. Although this does not apply to every â€Å"opting out† situation, the Dumonts also have the option of enrolling for Cory’s health coverage. According to the Health Insurance Portability and  Accountability Act of 1996, employees and their dependents must be allowed special enrollment rights, beyond the open-enrollment period, (1) if they declined coverage because of coverage through another plan or (2) if their family situation changes (e.g., marriage, birth, adoption). The former situation applies to the Dumonts, so if Tisha loses her family medical coverage, the Dumonts could enroll on Cory’s plan. To insure protection from preexisting condition exclusions, it would be important that the Dumonts arrange for continuous enrollment, with no breaks or lapses between policies. Should Tisha decide to become a self-employed accountant, the Dumonts would have another option besides Cory’s coverage. The household would be eligible for a high deductible health plan and a Health Savings Account (HSA). Access to a HSA is limited to the self-employed, small business owners, employers of small to medium-sized businesses that offer very limited health benefits, and those under age 65 who individually pay for health care—all of whom must have a qualified high-deductible health plan. The combination is cost effective because high-deductible plans have lower premiums and annual HSA contributions (limits apply) are an adjustment to income, so the funds are not taxed and they grow tax-deferred, and tax free, if spent according to the HSA rules. The HSA funds accumulate for paying health care costs incurred prior to meeting the annual deductible or for health care expenses not covered by the high-deductible health plan. Funds not spent remain in the account for future expenses, such as for health expenses after retirement or long-term care expenses. 10. Disability insurance policy features that Cory and Tisha should purchase include: ï‚ · Definition of disability: Tisha and Cory should look for a policy that provides coverage if they can’t perform the duties of their current occupations (i.e., accounting and retail management). ï‚ · Residual or partial payments benefits: this policy feature provides partial payments if they were disabled and unable to return to work full-time, but could return part-time. ï‚ · Benefit duration: the Dumonts should select policies that provide benefits until retirement age (e.g., 65) or for their lifetime. ï‚ · Waiting or elimination period: the Dumonts should select a realistic waiting  period (i.e. one to six months) during which they would have to â€Å"absorb† the income lost. They should consider their employer’s sick day policy (e.g., whether or not sick days can be accumulated) and emergency fund when selecting an elimination period. The longer the delay, t he lower the premium. ï‚ · Waiver of premium: this important provision waives premium payments if a policyholder becomes disabled. ï‚ · Noncancelable: this provision protects against both policy cancellation and future rate increases and guarantees that the policy is renewable. ï‚ · Rehabilitation coverage: this provision provides for employment-related educational or job-training programs. 11.The Dumont’s $25,000 HO-4 renter’s policy amount is probably sufficient given their estimated personal property value of $12,000. However, their property insurance coverage is inadequate for two major reasons: ï‚ · It lacks replacement cost coverage on personal property, which provides for the actual replacement cost of a stolen or destroyed item (e.g., stereo equipment). Currently, the $25,000 coverage is actual cash value, or coverage for the depreciated cost of property. ï‚ · It lacks a personal articles floater to increase the limit of coverage on Tisha’s $19,700 antique jewelry collection. To improve their coverage, Cory and Tisha should add a replacement cost rider and a personal articles floater to the existing HO-4 policy. Increasing the deductible could offset a premium increase. See the response to question 14 below for other cost saving ideas. 12.The Dumont’s auto insurance is inadequate because of its low liability limits. The 25/50/25 split liability and property damage limit is extremely low in relation to current medical, repair, and liability costs. The Dumonts should increase their liability limits to at least 100/300/50. Otherwise, they could be liable for judgments in excess of their current liability limits. Higher limits, such as 200/600/100, are also available. The Dumonts also have low uninsured motorist coverage limits. These, too, should be increased to a minimum of 100/300/50 to provide adequate protection against negligent drivers who carry no or inadequate liability coverage. The $20,000 of medical expense coverage is far lower than the recommended $50,000 of coverage per person. Assuming the Dumonts increase their  emergency fund or other savings, they should increase the $200 deductible amounts. 13.Cory and Tisha’s current auto insurance policy would pay $25,000 for bodily injury losses incurred by any one person hurt in the accident, a total of $50,000 for bodily injury losses incurred by all persons hurt in the accident, and $25,000 for property damage if they were judged to be at fault. In other words, these are maximum liability coverage limits. If the accident resulted in a total of $65,000 of bodily injury losses to more than one person, the Dumonts would be personally responsible for arranging payment for the remaining $15,000. However, if the $65,000 in bodily injury losses were incurred by only one individual, the Dumonts would be personally liable for $40,000. This coverage is not adequate; the Dumonts are risking their financial future in lieu of paying a slightly higher annual premium. 14.To reduce the cost of property and liability insurance, the Dumonts could: Make every effort to keep their insurance credit score high, to qualify for lower premium rates. Increase insurance deductibles (e.g., $200 to $500 or higher). ï‚ · Take advantage of multiple policy discounts (e.g., HO-4 and auto insurance with the same company). ï‚ · Pay insurance premiums less frequently (e.g., annually or semi-annually instead of monthly). ï‚ · Shop around and compare the costs of at least three insurance providers. ï‚ · Consider only high quality insurers, and possibly a direct writer. ï‚ · Install security systems or smoke detectors. ï‚ · Inquire about ANY other available discounts; these can vary significantly by company and may relate to the property (home or auto, such as fire-resistant building materials, auto passive restraints or anti-theft devices) or the characteristics of the policyholder (e.g., over age 50 or 55, noncommuter, or good student). ï‚ · Buy a car that is cheaper to insure and consider low â€Å"damageability† models; be sure to check insurance rates when auto shopping. ï‚ · Drive less (e.g., fewer miles, join a carpool) and improve driving records. ï‚ · Double check your policy to insure that all features and endorsements are included as planned; a claim could be costly that you  thought was covered, but was not because of an oversight in the policy. ï‚ · Include adequate liability insurance to avoid paying damage awards from personal assets or income. 15.When the Dumonts become homeowners, they should purchase an HO-3 policy. An HO-3 policy is the most comprehensive of available policies for homeowners because it covers losses to the structure from all perils except those that are specifically excluded. Typical excluded perils include flood, earthquake (supplemental coverage is available for both, if needed), war, and nuclear accident. Coverage on an HO-3 policy on the contents is limited to the named perils coverage provided in a broad, or HO-2 policy. The Dumonts should strongly consider adding personal property replacement cost coverage for their contents. The additional premium cost of 5 to 15 percent over the cost of a policy without this coverage is meager when compared to the increased level of reimbursement. Inflation guard and personal articles floaters—particularly for Tisha’s antique jewelry or any other items that exceed the value of the policy limits—should also be added. The minimum level of $100,000 of personal liability coverage is likely inadequate, and should be increased to $300,000 to $500,000. However, the Dumonts should review this relative to their individual situation (i.e., pets owned or other unique situations). Cory and Tisha should consult Checklist 10.2, A Checklist for Homeowner’s Insurance, when shopping. An umbrella policy extends the liability coverage of the auto and homeowner’s policies owned by the insured. An umbrella policy protects against large lawsuits and judgments associated with your home or auto. Umbrella policies do not cover activities with the intent to cause harm, activities with aircraft and some watercraft, and most business and professional activities. The latter require a separate policy. Typical limits range from $1 million to $10 million; the policy does not become effective until the limits of the underlying policies have been exhausted. As the Dumonts proceed through the life cycle and attain more wealth, they may want to consider a policy of this type. However, in the interim, a more cost effective alternative may be increasing their existing liability limits to $300,000 or $500,000.