Thursday, October 31, 2019
Drug Testing for Welfare Recipients is Illegal and Unnecessary Essay
Drug Testing for Welfare Recipients is Illegal and Unnecessary - Essay Example Employees are required to prove their innocence while showing no outward signs of using illegal drugs. Many would say that violates not only the U.S. Constitution but the precepts of any free society. A more egregious example of an overzealous drug policy is the recent growing trend to require welfare recipients, residents of public housing and other forms of public assistance to be tested for drugs prior to receiving assistance. These policies do not save money or lower the rate of drug use. What they do is oppress and humiliate the most vulnerable of society, the poor and minorities, and constitute a considerable and unwarranted invasion of privacy. At the heart of this passionate political debate are demeaning and inaccurate portrayals of people who ââ¬Å"typicallyâ⬠receive welfare, characterizations that are not supported by evidence. One such stereotype is of the drug or alcohol addicted ââ¬Å"welfare queenâ⬠who continues to bear children so the amount of her assis tance checks increase and she can buy more drugs. Drug testing the poor is unquestionable popular among voters due to the prevailing yet misinformed opinion that the poor are lazy and undeserving of government help, ââ¬Å"why should I work to pay for ââ¬Ëthemââ¬â¢ to sit at home all day?â⬠is a commonly heard phrase. ... The facts, however, mirror this perception. Laws meant to purge the system from ââ¬Å"drug abusing welfare cheatsâ⬠do not accomplish what they are intended to do and are most likely unconstitutional. For example, drug testing people on welfare is supposed to save money, thatââ¬â¢s the main argument. The 2008 Great Recession caused a great financial hardship to individuals as well as all levels of government. Saving money by eliminating waste is a popular political stance but the money saved is relatively small amount and is often exceeded by the cost to implement the testing law. ââ¬Å"Idaho recently commissioned a study of the likely financial impact of drug testing its welfare applicants. The study found that the costs were likely to exceed any money saved.â⬠(Cohen, 2012). An extensive peer-reviewed study found that a only a small minority of public assistance programs recipients such as Medicaid, food stamps, WIC AFDC and SSI, contrary to common opinion, have drug and alcohol problems, about five percent abuse drugs and six percent have an alcohol dependency. (Grant, Dawson, 1996.) A report from the National Institute on Alcohol Abuse and Alcoholism confirmed several other studies which found welfare recipients do not use or abuse drugs or alcohol at a rate higher than the general population. A separate study discovered that nearly three-quarters of adult drug users are have full time jobs. The arguments for drug testing welfare recipients do not square with the facts or the reality of the situation but the laws are politically popular due to the broadly help belief that the poor deserve unequal status and should be punished by society for their financial circumstance. This society would
Tuesday, October 29, 2019
Cybercrime Essay Example | Topics and Well Written Essays - 1250 words
Cybercrime - Essay Example Apart from this, it also reflects the computer-content acts with regard to the confidentiality along with accessibility of the computer systems (NCPC, ââ¬Å"Preventing Identity Theft: A Guide for Consumersâ⬠). Thesis Statement. This study intends to delineate definitions and examples related to cyber-theft and cyber vandalism. Apart from this, the study will also determine the reasons and significant challenges with respect to the traditional law enforcement and other issues associated with cybercrime. Cyber theft primarily refers to an act by which the internet is used in order to steal, interfere or enjoy someone elseââ¬â¢s property. In simpler term, cyber theft is executed to derive othersââ¬â¢ financial and personal information for illegal use. One of the examples of cyber theft is hacking of a bankââ¬â¢s computer data for wrongfully transferring the financial information and monetary amount i.e. ââ¬ËNigerian prince emailââ¬â¢. Another example of cyber theft is hacking of accounts of Barclays Bank (The Huffington Post, ââ¬Å"Barclays Bank Cyber Theft: 8 Arrested For Allegedly Hacking Computer System, Stealing $2 Millionâ⬠). Vandalism is the concept that reflects an action that involves the destruction or damage with respect to the public or the private property. Cyber vandalism is carried out mainly using electronic information. It has been further observed that specific crimes with regard to cyber vandalism include website defacement. Furthermore, the attacks with respect to social web pages are also regarded as cyber vandalism. One instance of cyber vandalism is the hacking along with impairment of ââ¬ËGoogleââ¬â¢s Pakistan pageââ¬â¢. The hackersââ¬â¢ replaced the logo of the ââ¬ËGoogleââ¬â¢s Pakistan pageââ¬â¢ by ââ¬Ëtwo penguins walking up a bridge at sunsetââ¬â¢ (The Express Tribune News Network, ââ¬Å"Cyber vandalism: Hackers deface Google Pakistanâ⬠). Moreover, the other example of cyber vandalism is gaining access of the United
Sunday, October 27, 2019
Strategies for Confessions and Interrogations
Strategies for Confessions and Interrogations Interrogation refers to a method of questioning that is usually used by investigating officers such as police, detectives, or military to obtain information from a suspect (Michael, 2007). Interrogation is a process that is allowed in law as defined by the constitution, but not all forms of interrogation are legal or even ethical from a moral point of view. In United States for instance the form in which interrogation must be undertaken in order to obtain a confession from a suspect are governed by the Fifth Amendment of the Constitution (Michael, 2007). The techniques of carrying out interrogation are not strictly defined by law but guidelines exist that define the limits by which procedures of interrogations must be done. Indeed the type of interrogations that exists and the form it can take are as varied as they are unethical. Generally interrogation techniques can be described in two ways, those that are legal and the ones that are carried out using illegal methods (Michael, 2007). Legal interrogations are defined by each countries law on the subject. However illegal interrogations are not specifically defined per se, but only categorized due to their nature, depth and breadth. The shapes in which illegal interrogation can take are many and cannot be exhaustively defined or even accounted. They are the most common types of interrogation that are usually subjected to suspects regardless of the countries legislation pertaining to the subject, including United States which is seen as the model of constitutional law. These forms of illegal interrogation are generally referred as torture (Michael, 2007). This is because they almost always involve inflicting of physical pain or deprivation of a vital necessity that directly contribute to normal body function such as sleep deprivation, alternating temperatures. However interrogation is not only limited to suspects but is also commonly done to witnesses and crime victims as well. Let us briefly analyze the nature of interrogations most commonly used both legal and illegal. In order to ascertain the level of significance of truth that exists for a person writing a confession under these circumstances. Legally there are four forms of interrogations that are routinely applied by law enforcement worldwide. One technique is use of suggestive words or statements that imply through conversation a notion of promise or threat to the person being interrogated (Kassin, Appleby and Perillo, 2010).. An interrogator therefore suggests to the suspect in no conditional or uncertain terms the possibility of the suspect being given lenient sentence if they were to cooperate. Or makes known availability of discriminating evidence that a witness to the crime has already recorded. This technique is also sometimes referred as deception since most of the time it involves downright lies (Kassin et al, 2010). Whichever the approach that an interrogator will choose it will have an impact to the suspect confessing to the crime. This is because under the circumstances of interrogation his rights will have been compromised. This method is not in any way defined as illegal in many countries, including United States. Another method of interrogations used is Suggestibility. It is built no two important assumptions, that the suspect will believe and accept the implied statements and two that they will act by confessing (Kassin et al, 2010). This method usually involves techniques such as sleep deprivation and sometimes use of drugs that inhibit the ability of mental functions to resist or think logically. The techniques used in this method seem to border on torture and are allowed in some countries as interrogation method. Another method is Goodcop/Badcop (Kassin et al, 2010). A technique used by an investigator that strives to alienate the suspect with the particular detective. The bad cop undertaking the interrogation intentionally exhibiting rough methods such as manhandling. Consequently, the idea is to make a suspect hate the cop and in the process be able to cultivate another relationship with another investigator brought in intermittently and who projects empathy, understanding and consolation. This is a notion that most researchers believe is part of the criminology theory. It elaborates on the main cause of crime, although this shall not be considered in depth. Finally there is the Reid technique, an interrogation process that focuses on a suspect body language to analyze the behavior of the suspect in order to tell if they are lying (Kassin et al, 2010). It is a technique that requires an investigator to have specific interrogation skills and high level of knowledge in behavior analysis. It is usually used by senior detective who have conducted numerous interrogation procedures. Body language analysis is an art that is taught to all FBI officers, that they apply in routine investigation tasks as Standard Operating Procedures (SOP). It is a legal form of interrogation allowed by almost every other country but it is not without it criticism. This criticism pertains to the conduct of the parties involved in the deed. Another method that is very much related to this is one that applies polygraph tests to suspects in order to tell if they are lying. Polygraph is a scientific device that analyzes brain structure activity and heart beat levels to ascertain the truthfulness of answers to statements (Kassin et al, 2010). The other forms of interrogations are the ones whose confessions are not admissible in court and usually involve torture. United Conventions Against Torture defines this type of interrogations as torture (Michael, 2007). But torture is not used to define illegal interrogation alone. It defines torture as ..any act by which severe pain or suffering, whether physical or mental. Is intentionally inflicted on a person for such purposes as obtaining from him, or a third person, information or a confession? It goes on to define torture as acts such as punishments without necessarily intention for information or confession (Michael, 2007). It also defines and includes discrimination and coercion as torture. This form of interrogation and torture in general is illegal according to the International Law. The Third and Fourth Geneva Conventions have ratified torture to be illegal even when directed to prisoners of war (Michael, 2007). UN Universal Declaration of Human Rights prohibits use of any form of interrogation which it considers to be Human Right Violations. The forms that illegal interrogations can take are many and sometimes the techniques themselves cannot be clearly explained to belong to one category or another. What is clear though is that interrogations in whichever form are an effective form of obtaining confessions, and certainly one of the methods that contributes to the success of criminal convictions in courtrooms. The Fifth Amendment of the United States Constitution, states..No person shall be compelled in any criminal case to be a witness against himself (Michael, 2007), a clear reference to a confession. And if such evidence was presented in a court of law then the law is required to view it with suspect and observe discretion (Michael, 2007). Indeed the regulatory mechanisms that have been put in place to guard against coerced confession are numerous and are informs of legislative laws and court rulings. United States for instance provides that Miranda warnings be read to a suspect at the time of arrest (Inbau, 2008). The Miranda statement serves to make the suspect aware of their right under the circumstances. All this procedure indeed proves that the nature of confessions given by suspects through all forms of interrogations in general is usually highly doubtful. But since confession is a product of the interrogation procedure, the method of the interrogation is a huge determinant to the nature of confession that a suspect is likely to make (Inbau, 2008). For instance interrogation through torture can be said to be effective in one way. Since a suspect is more likely to divulge valuable information at times of unbearable physical pain than it is possible for them under any other circumstance. Sometimes the notion of threat is alone can achieve this. What is important to note in this case is that this method is probably only effective when the goal is information and not a confession. On the other hand using torture to obtain a confession cannot be said to present a high probability of the confession statement being truthful. For the simple reason that a person under dire physical pain or strived of vital physical necessities would almost do anything that would ease the pain at all cost. The priority in that case is to deal with the present condition regardless of the consequences associated with the confession. Perhaps the reason why most law enforcement agencies worldwide resorts to torture interrogation mostly when what they is require is information (Inbau, 2008). Torture is against human rights. Although in certain cases, torture will be recommended and opposed to other forms of interrogation. Torture should only be used when information that is critical to saving lives is required from a terrorism suspect. The torture employed should be a matter of personal preference until the suspect surrenders the pertinent information. However the likely hood of obtaining a truthful confession is seen to be high when legal interrogations procedures are used which plays on the suspects fear such as deny of freedom. And which also uses the components of promises, threats and deception appropriately. These are interrogation techniques allowed and the confession obtained is admissible in a court of law. However the interrogator should only be in pursuit for the truth since false confessions cannot be upheld by a court of law. Ultimately the nature of a confession that is obtained whether truthful or not through interrogation method does not matter so much. Since it is provided by law that confessions can be retracted at any point by the suspects if they just so much like mention their confession was not obtained in proper method. In any case conviction of a suspect does not so much depend on the confession by itself but is based on the outcome of a full trial. Hence I would say interrogation certainly results in truthful confessions, but it depends with the independent variable which is the nature of interrogation. Therefore interrogation method can be said to be the independent variable and the truthfulness of the confession as the dependent variable, since it outcomes is influenced by the method of interrogation. The ethical implications posed by the interrogation methods that are used are one that depends on the definition of ethics, since ethics is a relative term. If the saying that the end justifies the means were to hold true then indeed ethics must be found their place in the issues that surround interrogation. Ethics are defined as value, belief, principle and convictions that a groups of people hold to be noble in their life and which they strive to practice in their everyday life. It is the highest moral perception and ideals that a community works to promote and which they have desire to be associated with the larger community. Interrogation by itself is in no way an ethical process and the attempt to introduce ethics in interrogation methods would perhaps require that the purpose of interrogation be redefined. In interrogation a suspect is meant to divulge information that is usually self incriminating so to speak, through confessing probably to crimes committed. Interrogation aids in the preservation of human rights. Indeed, all suspects have equal rights as those who are free and have not been arrested. Hence, using this method ensures that the criminal justice agents do not go against the human rights as required by international law. Therefore, the suspects are required to be truthful and perhaps remorseful as well. In doing so an interrogator is supposed to achieve this according to defined ethical procedures that have been put in place. But ethics have no place in interrogation and one is therefore forced to choose between the two whether to choose undertaking the interrogation process using certain ethics that would probably not yield any confession. Or whether to use every technique in order to obtain the end results which is the confession. If ethics in interrogation existed then they would certainly not be found in coercion. Because coercion involves use of methods on a suspect that are meant to pressurize and presents a level of discomfort and lack of peace mentally that make a suspect yield to the demands of the interrogator. They involve such methods as bullying, harassment, physical force, intimidation including cruelty. It is certainly among the most degrading interrogation methods which are in no way ethical or humane. Therefore, interrogation is an effective method that is aimed at ensuring that the suspects release pertinent information. Although this has its own challenges, it should be the first method that the criminal agencies should employ. If this fails, then they should seek alternative methods which are normally more thorough and involve the use of force or inflicting pain. References Inbau, E. (2008). Law and Police Practice: Restrictions in the Law of Interrogation and Confessions. Criminal Law and Criminology. 89, 87-98. Kassin L. (2009). The Psychology of Confessions. Annual Review of Law and Social Science. 45, 22-35. Kassin, Appleby, Perillo (2010). Interviewing Suspects: Practice, Science, and Future Directions. Legal and Criminological Psychology. 67, 47-60. Michael, J., G. (2007). U.N. Convention Against Torture (CAT): Overview and Application to Interrogation Technique. Washington, DC: McGraw Hill Publishers.
Friday, October 25, 2019
Progression Of Music From The 1940s To The Present Essay -- essays res
Progression of Music From the 1940's To the Present The progression of music from the 1940's to the present has seen extremes, it has been controversial at times, traditional at times and inspirational at times, but never have the American people turned away music in its entirety. There have been times when parents did not approve of the music that their children chose to listen to, but the parents had never turned away music. Music has been criticized and promoted. Since the 40's music has progressed from Ballads (which were still lingering around from the 30's) to blues (popular among Blacks) to rock and roll, to pop, and back again. In the 1940's ballads were popular. Ballads were dancable music performed by big bands. They were composed of stringed instruments, wind insteruments, and a singer or two. This was the time period when music started to be broadcasted live over television and record albums were entering the home. (Hays) The 50's marked a beginning for a new era of music to be known as Rock & Roll. Many of the artists took advantage of the Electric guitar, developed for popular music in the 1930's but never really became popular until the 50's. Rock & Roll was a combination of many music styles in an upbeat sort of fashion. One example of when country had an impact on Rock & Roll was with Bill Haley and Jerry Lee Lewis. Jerry's career was huge, with his hits like "Whole Lotta Shakin' goin' On" and "Great Balls of Fire". That is, his career was huge, until the it was made public that he fell in love with a married his 13 year old cousin. In 1957 Rock & Roll had been turned upsidedown when Buddy Holly hit the airwaves with "That'll be the Day." Buddy Holly rolled out hit after hit after hit. That is, until his plane went down in Iowa. He died at the young age of 22. That night his music was playing non-stop and has not stopped playing to this day. The blues and gospel of James Brown and Jackie Wilson was popular with the black community. "Someday, maybe someone will discover the reason that Chuck Berry, Do Diddley, Fats Domino, and Little Richard never connected with black audiences" (25 years,p15). This may be because they might have almost been embarrassed from their blues roots. In the 60's such st... ...n the 90's or present day, the synthesizer is still being used in dance and techno music. Also introduced into the 90's was the computer. The computer has been around a while, but not been used in the music industry. Today just about anyone can produce their music using this tool. Also metal has become more aggressive, popular and contains political lyrics. Lite rock has also developed and has captured the ears of many listeners. Music has progressed from fun to an industry in itself. People can now earn a living off of music, often luxurious life. Along with the music progressing the American people have progressed. The world of music continues to change and may never stop progressing until the world stops progressing. Footnotes 25 Years of Rock & Roll (USA:Lorelei Publishing Co. Inc.,1979) William Hay, Twentieth-Century Views of Music History (USA:Berne Convention.,1972) Bibliography 25 Years of Rock & Roll. USA:Lorelei Publishing Co. Inc.,1979 Ewen, David. American Popular Songs. New York:Random House, 1966 Hay, William. Twentieth-Century Views of Music History. USA:Berne Convention, 1972 Wilder, Alec. American Popular Song New York:Oxford University Press, 1972
Thursday, October 24, 2019
Alchemist: Doubt and Perfect Disciple
Fatima Meeting Santiago- When I first met Santiago, there was something about him. I could not explain it then, and I doubt I ever will be able to. His eyes entrapped me, and he looked so gentle and sincere I could not help but smile! The way he looked at me was unlike anything else, it was almost as if he looked into my soul. We understood what the other was thinking without speaking any words. It was what the strange old man, the Alchemist was always talking about, the language of the world. Santiago Professing His Love- When he told me, I was shocked.So shocked I dropped the water vessel I was carrying. Stupidly, I thought how angry mother would be when she found out I got dirt on our water vase. Even though I knew I loved him from the first day we met, how could he be brave enough to say it aloud? This strange boy who believed in alchemy and Rim and Thumb, and who told me he loved me out of the blue, was everything I had been waiting for. I knew he had to find his treasure, and s o I told him I would wait for him, with hope and love. The Day He Left- The day Santiago left, was possibly the saddest day of my life.While I had told him I would look with hope, and that was true, I also looked with longing and desire. I missed him terribly, and it tortured me not knowing whether he missed me too. I put on a brave face for him, but inside I was reeling from the realization he may not come back. It was awful, and so I did not even bid him farewell on the day of his departure. I was worried I would drop the mask of bravery and independence and beg him to stay, and even worse he probably would. The Day He Returned- The day Santiago returned is one of the happiest days of my life.I looked to the desert as per usual, but I did not really expect him to be there. A few caravans had passed through before, but each one more disappointing than the last, because none of them came with Santiago. I was beginning to lose hope, and doubting if he would even come back at all. Per haps he had not found his treasure, or met a girl who had more to offer than me, a poor desert flower. The thought that tortured me the most, kept me from sleep, and made me pray even more than ever, was the possibility he had been caught in the middle of the tribal wars and died.But the day he returned I cried out with Joy, and ran into his welcoming arms. We were both finally at peace. The Alchemist My first impression of Santiago was bravery. He was young, but age is Just a number after all. So, when he read the sign of the hawks I thought maybe he could accompany me to the desert tomorrow. There, his training would begin. He could be the perfect disciple, after all. Santiago Finding Life in the Desert- Perhaps I was wrong. Finding life is usually one of the easiest tests I have in store for my students. Oh well, people are all different.Maybe he will fail the easy tests, but ace the difficult ones. If that even makes sense. The boy is different though. He seems to understand thi ngs that others are so blind to. As with the hawks, he can see what others cannot. Patience will have to be a virtue for me here. He said he does not even want to leave the oasis. I have never felt love for a woman, but I doubted it could be so strong you do not want to discover your Personal Legend Just so you are close to your significant other. This boy is definitely different from my other students, UT the perfect disciple?We shall see. Santiago Turning to Wind- I laughed. I laughed and laughed and laughed. Inside of course, I could not let the tribesmen know how overjoyed I was. You see, we alchemists have a reputation for being cool and calculating. But Oh how my heart soared! The perfect disciple, at last. He understood the Soul of the World! I was amazed and so proud. What a wonderful experience, listening in on their conversation. The desert and I are good friends, but when the Father himself Joined in it was absolutely delightful. Finally, the perfect disciple.Santiago Rea ction to Turning Lead to Gold- His expression was quite amusing. I think he doubted I could actually do it. Of course, I could turn myself into the wind, but I could not make gold. He asked if he could do that, but unfortunately for him, that is my Personal Legend. He understood, and I could see the excitement, the fireworks Just waiting to go off when I spoke of Personal Legends. I knew he was waiting for the Pyramids, so it was time for me to say goodbye to the one perfect disciple. What a sad day it was.
Wednesday, October 23, 2019
Case Studies: Chapter 1-4
Chapter 1: Whatââ¬â¢s the Buzz on Smart Grids? 1. How do smart grids differ from the current electricity infrastructure in the United States? One of the main differences between smart grids and present electricity infrastructure in the U. S. is that smart grids provide electricity by utilizing digital technology in order to save energy, to reduce costs, and to increase reliability as oppose to present electricity grids provides electricity which is obsoleted and inefficient (Laudon & Laudon, 2012).Another difference is that current electricity grids do not deliver any information about how people utilize energy which makes even more difficult to create approaches to distributions in the efficient manner (Laudon & Laudon, 2012). Since current electricity grids do not provide useful information, distributors and consumers may not be able to make proper decisions about how they use energy efficiently (Laudon & Laudon, 2012). Conversely, smart grids provide information to both energy provides and consumers so that they can make decisions for better efficiency (U.S. Department of Energy, 2012). Additionally, smart grids deliver information from the house to the power provider and can monitor the electricity usage to lower the cost to the consumers and save energy by using them more efficiently (Laudon & Laudon, 2012). 2. What management, organization, and technology issues should be considered when developing a smart grid? The management issues that need to be considered during the development of smart grid would be to convince the consumer to switch over to the smart grid system (Laudon & Laudon, 2012).The need for smart grid must be relayed to the consumer and shown how the utilization of the smart grid will benefit both the power provider and the consumer by being able to utilize power more efficiently (Laudon & Laudon, 2012). Consumers will like to have their privacy protected, and the management of the power provider must assure their consumers not to feel i ntruded by the power company but focus on the benefits of the smart grid system such as lowering their electricity bills though the information feedback system that can relay how the energy s being used and the ability to analyze it (Laudon & Laudon, 2012). The organizational issue that the smart grid system will have to overcome would be the high cost of the smart grid system to be put into place. The meter that needs to be installed in each household may range from $250 to $500 per unit (Laudon & Laudon, 2012). Some consumers are not willing to initially spend the money to have the meter installed especially when they know that to save energy they need to turn off lights and other appliances or electronics when they are not being used (Laudon & Laudon, 2012).Additionally, once the smart grid system has been successfully been set up, the power provider may risk losing revenue as more consumers are able to use their energy more efficiently (Laudon & Laudon, 2012). The technology iss ue would be the fact that in the initial installation of the system, it will be time and money consuming on both the consumer and the power provider (Laudon & Laudon, 2012). A completely new system must be put into place and replace the old system. With the advancement of technology, this may become vulnerable to forms of cybercrimes as with any other advanced forms of technology may be attacked (Laudon & Laudon, 2012).Also, the complicated technology may not be user friendly to everyone especially to the elders or someone who is not as technologically aware. 3. What challenge to the development of smart grids do you think is most likely to hamper their development? The challenges that smart grids face that may hinder their development would be the fact that first of all the startup of the system is very expensive and time consuming (Laudon & Laudon, 2012). The complete infrastructure must be changed in order for smart grids to be fully replaced (Laudon & Laudon, 2012).It is also ex pensive for the home or business owners to install the meter necessary to monitor the electricity use and have to figure out who will pay for the initial installation of the meter, when the power provider will have to cover the cost of the system running which may be as high as $75billion (Laudon & Laudon, 2012). As mentioned in previous question, the consumers must also be assured that they do not have to worry about being a victim of a cybercrime and their privacy will be protected.Additionally with the advancement of technology, they must make sure it is user friendly to everyone as some consumers are already making claim that they had a hard time figuring out how to read and analyze the meters (Laudon & Laudon, 2012). The hardest part of the power providers starting up with the grid system is to solve all of the issues mentioned above and convince the entire nation to switch over to the smart grid system. 4. What other areas of our infrastructure could benefit from ââ¬Å"smartà ¢â¬ technologies?Smart technology can monitor, assess and analyze any form of data and optimize the consumption of resources to be able to utilize them effectively. Smart car can effectively monitor the consumption of gasoline and use it to minimize the consumption and extend it in order to get the maximum miles per gallon ratio to save money and gasoline (McGlaun, 2012). Some cars automatically shuts their engine off while the vehicle is not in motion and automatically turns itself back on when it needs to move (McGlaun, 2012). Hybrid vehicles use gasoline and combine it with electricity to further increase the miles to the gallon ratio.Other smart technologies that are used in cars would be the two way communication technology that will tell cars where other cars are at and what path they are taking. In that way the computers inside the cars can know exactly where each other are at and avoid collision (McGlaun, 2012). Smart technologies are being utilized in automobiles and oth er areas not only limited to houses but also electricity in order to maintain and preserve the nonrenewable resources (McGlaun, 2012). 5. Would you like your home and your community to be part of a smart grid?Why or why not? Explain. I personally would not like to be a part of the smart grid system. I think that the grid system is a great idea for someone who needs to be reminded and guided on how to effectively utilize electricity. In addition, I also believe that it is important for the environment to conserve power; however like many other consumers I know how to conserve electricity. For example, I turn off electronics and unnecessary appliances when they are not in use, I lower the air conditioner at night time and when I leave the house and make ure all the lights and TV are turned off when they are not being used to name a few. I feel that I am responsible and have the ability to regulate my electricity consumption. That being said, I do wish to pay up to $500 up front for so mething that I already know and can manage. That is why I do not wish my neighborhood to switch over to the smart grid system. Chapter 2: Collaboration and Innovation at Procter & Gamble 1. What is Procter & Gambleââ¬â¢s business strategy? What is the relationship of collaboration and innovation to that business strategy?The Procter & Gambleââ¬â¢s business strategy is to keep the consumers by maintaining the brand and popularity they have with existing consumers (Laudon & Laudon, 2012). Procter & Gamble also focuses on improving their already existing line of products in order to keep the popularity that they already have (Laudon & Laudon, 2012). Lastly, Procter & Gamble creates completely new products from start to the final product and sent out new items to the market to improve their sales (Laudon & Laudon, 2012).Procter & Gamble innovates and adds to the market by dividing its focus to developing and creating new brands and items for the market. The company needs the colla boration between all of their stake holders being the researchers, marketers and the managers to all work together in order to improve work efficiency which has made them one of the top companies in the world (Laudon & Laudon, 2012). 2. How is P&G using collaboration systems to execute its business model and business strategy?List and describe the collaboration systems and technologies it is using and the benefits of each. The collaboration of over 8,000 scientists and researchers that are employed by Procter & Gamble worldwide, marketers and managers working together increases innovation and as a result further their success in the industry (Laudon & Laudon, 2012). As large as the company is, they keep utilizing all of their employees to research, experiment, produce, market and organize their own brand and create new products (Laudon & Laudon, 2012).With a large amount of employees throughout the world, good communication was crucial to working as one and becoming successful. Proc tor and Gamble collaborated with Cisco Telepresence to improve their communication abilities and made certain that all employees have access to the system to bring the organization into one well-oiled machine (Cisco, 2008). While P&G were conducting business, they realized that one communication system was not sufficient enough to be able to satisfy their large demands and needs (Laudon & Laudon, 2012).They also incorporated Connectbeam, which is another communication system which allowed employees to share more effectively more information by the utilization of networks between one coworker to another in the form of tagging and bookmarks (Laudon & Laudon, 2012). 3. Why were some collaborative technologies slow to catch on at P&G? Some collaborative technologies were slow to catch on at P&G because it took time for all employees to try out something new as many people are more comfortable with what they are used to and are not eager to make changes (Laudon & Laudon, 2012).Employees may feel intimidated or does not want to change their normal routine even though they may be told that the new system such as the new communication systems are better and more efficient than the ones that already exist such as new email systems (Laudon & Laudon, 2012). Another example would be a specific incident where researchers were using old outdated version of Microsoft software to print out the research and paste them onto notebook physically with paper and glue (Laudon & Laudon, 2012).To counter this effect, Microsoft overhauled the communication system and attempted to make it easier for the employees to utilize new technology and bring everything together (Laudon & Laudon, 2012). 4. Compare P&Gââ¬â¢s old and new processes for writing up and distributing the results of a research experiment. In the past, researchers wrote up experiments that were performed or to be performed using Microsoft Office (Laudon & Laudon, 2012). The researchers then printed out what they have ty ped, and physically glued them onto a notebook one page at a time to place them into a book format (Laudon & Laudon, 2012).The old email system were too controlled by the employees in terms of the receivers of that specific email, being that if the employee who was sending the email did not send it to the appropriate receiver, then the email was ineffective as a means of communication (Laudon & Laudon, 2012). On the other hand, other forms of communications such as blogs reached out to too large of an audience that being anyone who were interested and cannot be relied on sending sensitive messages (Laudon & Laudon, 2012).Microsoft products streamlined the communication problems and issues that P&G had to make communication more effective (Laudon & Laudon, 2012). 5. Why is telepresence such a useful collaborative tool for a company like P&G? Telepresence is a useful collaborative tool for company such as P&G because in an organization as large as P&G, they need to be able to keep all of their employees which lives in 80 different countries connected through communication (Cisco, 2008).Not only does Telepresence allow international communications not only by the forms of telephone, email or the internet, Telepresence has the ability to supply P&G with 300 videoconferencing rooms where employees such as researchers can see each other during conference which may allow the researchers visual communication or actually show each otherââ¬â¢s research and experiment over the video than just verbally explaining tedious and confusing procedures (Cisco, 2008). The videoconferencing room will also allow for a company meeting or private meetings between any employees of P&G without having to travel, which can save time and travel fees.Telepresence can help the P&G Company by effective communication methods (Cisco, 2008). 6. Can you think of other ways P&G could use collaboration to foster innovation? Procter and Gamble has more than 8,000 researchers with 1,000 or more o f them having Ph. D. experimenting, researching and innovating new products for the company in approximately 30 research facilities (Coleman & Hymowitz, 2012). Procter and Gamble is well known and respected company that is known to innovate new products and as a result they have a collaboration of many individuals and organization working for the company and assisting those (Coleman & Hymowitz, 2012).Procter and Gamble can reach out and incorporate more researchers from other parts of the world to collaborate and innovate new products using new ideas and point of view from different part of the world (Coleman & Hymowitz, 2012). Chapter 3: HOW MUCH DO CREDIT CARD COMPANIES KNOW ABOUT YOU? 1. What competitive strategy are the credit card companies pursuing? How do information systems support that strategy? The credit card companies may be following low-cost leadership strategy and product differentiation strategy at the same time (Laudon & Laudon, 2012).For instance, the credit compan ies can categorize the cardholders based on the regular charges the cardholder charges on the credit card (Laudon & Laudon, 2012). From the types of charges that are made on a regular bases. For example the credit card company may see someone charging many speeding ticket costs onto their credit card as being risky and impulsive just as much as someone who has a record of being behind on their bills (Laudon & Laudon, 2012).Furthermore, someone that will pay off their credit card bills in a timely matter or someone that will go out of their way to put a high quality product on their credit card categorized as being responsible and a better customer and may have a higher maximum balance on their card (Laudon & Laudon, 2012). The information system gathered by the credit card company profiles cardholders and places them into categories which may be bias and profiling (Laudon & Laudon, 2012).Additionally using this data and reaching out to the customers and offering them advices may res ult in the customers wanting to pay off their debt to their credit card companies before they pay off other credit cards as an individual who was going through a divorce paid off their debt to one company who took time to offer the customers assistance while that customer was unable to pay off other credit cards (Laudon & Laudon, 2012). 2. What are the business benefits of analyzing customer purchase data and constructing behavioral profiles?The benefits of analyzing customer purchase data and constructing behavioral profiles would be that the business can have an idea based on the data who will be more likely to pay back the debt in a timely matter and potentially avoid loss (Laudon & Laudon, 2012). Customers with a history of not paying off their debt or customers who spend in an impulsive matter may have a hard time paying off the charges and have a hard time getting qualified for loans and higher limit. An example would be customers who lost their homes to foreclosures that put their mortgage on their credit card and abandoned paying their debt (Laudon & Laudon, 2012).On the other hand, customers who have a history of paying off their credit card debt in timely matter may be able to get a higher limit and may have a better reputation from their credit card company (Laudon & Laudon, 2012). There are benefits to the credit card company to analyze using the purchase data being that the credit card companies will be paid back the customers debt, however this does create a bias opinion of their customers as some may not be true and potentially good customers.Additionally, by using analysis from data, it may protect the cardholders as it may alert the credit card companies any charges that may be unusual and ultimately alert the cardholders and potentially avoid or protect the customers from fraudulent transactions (Dhanapal, 2012). Once the fraudulent transaction is identified, the cardholders can then request to start an investigation and shut down that accoun t (Dhanapal, 2012) (Mavri, Angelis, Ioannou, Gaki, & Koufodontis, 2008).Once the investigation has been initiated, it allows law enforcement to track down the date, time and the location of transactions and even request a video surveillance of the fraudulent transactions and create a starting point for investigators and law enforcement officer to conduct and identify the subjects (Laudon & Laudon, 2012). 3. Are these practices by credit card companies ethical? Are they an invasion of privacy? Why or why not? I believe that these practices by the credit card companies on analyzing their customers purchase data have both pros and cons.They are unethical in the terms that every situation is different in every case. If the customer is having a hard time in their life, such as being in between jobs, they may not have the financial means to pay off all of their debt on time, however it does not mean that the customer is intentionally not paying off their debt to steal from the credit card companies (Mavri, Angelis, Ioannou, Gaki, & Koufodontis, 2008). It may be that the individual may have a job lined up and they may pay off the credit card debt as soon as they get more financial stability (Mavri, Angelis, Ioannou, Gaki, & Koufodontis, 2008).As a customer, the idea of credit card would be that the customers can purchase what they need at the time even though they donââ¬â¢t have the liquid asset in that particular time and pay them off on a later date and time (Mavri, Angelis, Ioannou, Gaki, & Koufodontis, 2008). By being judged by the analysis based on data, customers may be being judged by unfair bias (Mavri, Angelis, Ioannou, Gaki, & Koufodontis, 2008). On the other hand credit card companies are business and need to be paid back the debt that people make by making a purchase on their credit cards.If the company does not get paid back the debt, then the credit card company will be losing revenue in a highly competitive industry. Chapter 4: The Perils of Texting 1. Which of the five moral dimensions of information systems identified in this text is involved in this case? Accountability and control is one of the moral dimension of information systems that is involved in this case because people that text while driving should be held accountable and liable if they put someone in danger, injure, or worse (Laudon & Laudon, 2010).Mobile phone subscriptions have increased considerably over the past decade and have been continuing to rise at a rapid rate. According to recent study, 5,870 more deaths and 515,000 more accidents were caused from prior years by texting while driving (The Perils of Texting, 2012). Based on this information, it is obvious that we should not wait until someone gets injured in order to hold people accountable for texting and driving; there needs to be accountability now.Quality of life is another moral dimension of information systems that is involved in this case because though we are living in an information-and-knowle dge based technological society, there are certain values and practices that should be preserved and supported (Laudon & Laudon, 2010). Valuing human life is one of those practices that should be supported. Those who text while driving put so many people at risk. Society as a whole is aware of the dangers associated with texting while driving; therefore, those who do so, are not valuing human life. 2. What are the ethical, social, and political issues raised by this case?Several States, 31 to be exact, have already prohibited texting while driving, and there are likely more to come; President Obama has also prohibited texting while driving for Federal government workers (Laudon & Laudon, 2010). The ethical, social, and political issues raised by this case are very important as texting while driving has become one of the most prevalent and dangerous practices people all over are vulnerable to. The laws surrounding texting while driving vary among states, some severer than others. The point is that this is a major issue in anywhere throughout the world.It is ethically wrong to text while driving because people are putting others in dangerous way (Laudon & Laudon, 2010). There is, however, still some debate between the social and political aspects of this problem; some feel that we should be allowed to text while driving because we should be free to make our own decisions, while others argue it is not the stateââ¬â¢s or federal responsibility to outlaw poor decision-making (Laudon & Laudon, 2010). Despite the opposition, there is a need for legislatures to set harsher penalties for drivers who creates an unsafe road conditions when they text and drive (Laudon & Laudon, 2010). . Which of the ethical principles described in the text are useful for decision making about (Dhanapal, 2012)texting while driving? The ethical principles described in the text that are useful for decision making about texting while driving are: â⬠¢The Golden Rule because people shoul d do unto others as people would like to have them do unto themselves (Laudon & Laudon, 2010). Therefore, people should not put others in harmââ¬â¢s way by texting behind the wheel if they donââ¬â¢t want to be put themselves in harmââ¬â¢s way because others could potentially do the same thing. Immanuel Kantââ¬â¢s Categorical Imperative principle is applicable because it applies to everyone. It is not ok for me to text while driving and not others because my actions could endanger someone else. If everyone texted while driving the probability of that action endangering people increases enormously. â⬠¢Descartes Rule of Change is useful for decision making about texting while driving because every time you text you are increasing the risk of injury to yourself or others.This rules states that if the action cannot be taken repeatedly, it is not right to take it at all. This also applies because if you text and drive once and get away with it, you may be inclined to keep doing. This is the slippery slope rule (Laudon & Laudon, 2010). â⬠¢Risk Aversion principle is useful for decision making about texting while driving because it asks you to take a course of action that produces the least amount of harm (Laudon & Laudon, 2010). In this case, you should choose not to text while driving because it could potentially cause a great deal of harm.
Subscribe to:
Posts (Atom)