Tuesday, May 12, 2020

Preventing Juvenile Delinquency Essay - 2173 Words

Preventing Juvenile Delinquency There is a saying that history often repeats itself. If this is a true saying, then society will have to deal with the complex issue of juveniles delinquents, who may eventually become adult criminals, as societies in time past dealt with the same conflict. Moreover, if this saying is true then the community in which juvenile delinquencies exist must have the tools necessary to divert the youth from crime. If one is to convert delinquent youth’s behavior, they need to be able to variegate the justice system in order to prevent juvenile delinquent recidivisms. Furthermore, understanding the cause of juvenile delinquency is an important key in its prevention. In order to understand the cause of†¦show more content†¦The treatment of youths had created distaste among the reformers towards jail terms for juveniles; they desired a system to be more compliance with the â€Å"due process of law.† Furthermore, the reformer was seeking to convert from what they saw as inhumane treatment of the juvenile therefore, facility such as the house of refuge was started. â€Å"The earliest Reformatory Refuge was built in 1825 and was called the New York Hoses of Refuge† (Bartollas Miller, 2008, p.9). â€Å"It was not until 1890s when the Progressive Era commenced in the US that individual states started setting up rehabilitating centers† (Bartollas Miller, 2008, p.10). There was a feeling during the progressive era stating that the justice system should take the responsibility to recover the lives of young offenders before they were absorbed into criminal activities. The parenting responsibility was been exerted by states to give juveniles an opportunity to return to their former condition. Moreover, the progressive movement lead to juvenile delinquency been tried in juvenile courts in 1967. This meant Persons under the age of 18 were tried in juvenile courts. This was due to the ruling by the Supreme Court that it was necessary for the juvenile courts to use the due process of law. The approach afterShow MoreRelated Preventing Juvenile Delinquency Essay1386 Words   |  6 PagesPreventing Juvenile Delinquency The saying is that history often repeats itself. If this is true then society will have to deal with the complex burden of juvenile who eventually become adult criminals. However, if this saying is not true then the community in which juvenile delinquency exist must have the tool necessary to divert the youth in the community. If one is to change delinquent youth’s behavior, they need to variegate the justice system in order to prevent juvenile delinquent recidivismsRead MorePreventing Juvenile Delinquency Rough Draft1976 Words   |  8 Pagesthe importance of Preventing Juvenile Delinquency and what different ideas, concepts and methods are available to those adolescents that are either at-risk already or those that can be in the future. Early prevention is the best method of slowing down the statistics of crimes among adolescents, by keeping them off of the streets and out of the justice system by providing the means to teach them to be productive rather than destructive . Prevention of Juvenile Delinquency-Rough Draft IntroductionRead MoreThe And Its Role For Preventing Juvenile Delinquency And Violence850 Words   |  4 Pagesfathers are major contributors to males being incarcerated. Careful analyses of juvenile court cases in the United States, shows that economic conditions rather than family composition influenced children’s delinquency.(Juvenile Crime, Juvenile Justice (2001)) (Chilton and Markle, 1972). Absent Fathers One of the most prominent findings concerning the importance of fathering and its role in preventing juvenile delinquency and violence was first disclosed by evidence in a cross-cultural study, whichRead MoreA Healthy Home Environment Is A Leading Factor For Preventing Juvenile Delinquency?2145 Words   |  9 PagesSusan Babb Tutor: Course: Date: Is there Evidence that a Healthy Home Environment is a Leading Factor in Preventing Juvenile Delinquency? Crime committed by adolescents and children is called juvenile delinquencies under the statutory age. A juvenile delinquent is one who has many troubles but is a minor. The need for dealing with juvenile delinquency is becoming more urgent each day. The number of young people going through court has increased tremendously and therefore our young people need helpRead MoreBreaking Down the Walls of Delinquency1685 Words   |  7 Pagesexplore how family life influences juvenile delinquency. Juveniles are more likely to become juvenile delinquents if there is little structure provided for them in their families. Children who are rejected by their parents, who grow up in homes with considerable conflict, or who are inadequately supervised are at the greatest risk of becoming delinquent. Literature reviews, focused on the relationship between child abuse and juvenile delinquency, indicate that juvenile delinquents are often productsRead MoreJuvenile Delinquency Is An Increasing Problem Within The United States995 Words   |  4 Pages Juvenile delinquency has become an increasing problem within the United States. According to Siegel and Welsh (2012), more than 1.1 million youth are being arrested each year for various crimes ranging from loitering to murder. There are numerous reasons why there should be programs to help deter delinquency. One of which, Greenwood (2008), states that juvenile delinquency has started to take it’s toll on tax payers. The cost of arresting, incarcerating, prosecuting, and treating offenders has beganRead MoreThe Effects Of Juvenile Delinquency On Teens864 Words   |  4 Pagesunderdevelopment, deficiency and lack of housing areas. Theses can also affect teens that increase-doing crimes in which it called juvenile delinquency. There are two terms that define juvenile delinquency, 1: conduct by a juvenile characterized by antisocial behavior that is a beyond parental control and therefore subject to legal action; 2: a violatio n of law committed by a juvenile and not punishable by death or live imprisonment. (Cite). In this topic, I will explain more about family factors in whichRead MoreBalancing Justice and Rehabilitation Essay538 Words   |  3 Pageson track, the multistep juvenile justice system determines adolescent offenders’ consequences to provide them a chance for change and rehabilitation, making it overall effective and fair to juveniles and the community. Although most juveniles who enter the system are not real criminals, some are, so by understanding their crimes and reasoning, law enforcement can better identify and stop repeat offenders. For instance, most crime rates have gone down recently, but juvenile robbery arrests have increasedRead MoreThe Effects Of Delinquency On Children s Life1657 Words   |  7 Pagescommit more crimes than adults, and that if we can reduce the amount of delinquency that occurs in the United States, then we will also reduce the amount of crime. To understand how to prevent delinquency, we must first understand what causes it. Delinquency can be caused by a number of factors involving the child s family, socialization, economic background and drug use. Of course, the earliest contributor to delinquency in a child s life is the family. (1) Early family dysfunction can leadRead MoreGender Roles : The Juvenile Justice System1244 Words   |  5 PagesGender Roles in the Juvenile Justice System What role does gender play at the various stages of the juvenile justice system? Gender plays an enormous role in the juvenile justice system; both boys and girls have their fair share of run-ins with the Juvenile Justice System, but now more so than ever, females crime rates have increased. In some instances within the juvenile justice system, it may appear that boys and girls are comparable; however there are differences, even though they are subtle.

Wednesday, May 6, 2020

Planning a Lesson Module 1 Free Essays

Course:Teaching Assistant Level1 Q1. Give examples of how you would plan activities. Under the direction of the teacher, you will discuss and fully understand your role within the teacher’s lesson plan. We will write a custom essay sample on Planning a Lesson Module 1 or any similar topic only for you Order Now The teacher will have previously completed long and medium term plans for the class. The class teacher’s short terms plan for the week can be broken down into daily plans. These will give you an idea of the number of children involved in the learning objective, previous learning, environment, resources available and a time scales. Which individuals or groups of children are to work on tasks at a particular time, taking into account individual needs and interests, grouping together children with similar abilities so that they are working towards the same targets, and give an indication of whether they are to be supported by an adult. This is a great opportunity for you the TA to get involved with the weekly plan and to contribute your own ideas to the planning session. †¢You are aware in advance of what you are required to do. There are clear roles and responsibilities for you working together with the teacher to support the pupils. †¢The work you are covering fits in with the activities and topics which have been planned for the term. †¢You are aware of where, when, what and who you will be working with. †¢The objectives of the learning activity. †¢The type and level of support the pupils may need. The above established you can start preparing and organising for the learning activity: †¢Where the learning activity is being taken place: is there sufficient space for the learning activity. What resources may be needed: are the resources readily available and accessible, do you need to bring in furniture or equipment for implementing the learning activities. †¢Who you will be supporting: individuals, groups or perhaps a SEN pupil, in the event of a SEN pupil, you may want to gather further information on the pupil for example you should be aware of the IEP’s and PSP’s Q2. Describe your role in delivering learning activities Know and understand the objectives of the learning activities and strategies for supporting pupils and ensure you share the same goals as the teacher. Example of an Individual Lesson plan for Geography Learning Objective: For pupils to be familiar with and understand the water cycle. Introduction: Find out what the children know about the water cycle. Class discuss to see how much they can remember about water from the previous lesson. Main part of lesson: Children to work in groups: Group 1: Work with teacher, using the internet and reference books to see what they can find out. Group 2: Work with TA using artwork and models to explain what happens. Group 3: Work independently to explain the water cycle, in their own words and diagrams. Conclusion: Children to discuss what they have found out and give examples. As a TA you would: †¢Prepare the learning environment to meet the needs of all the pupils. †¢Provide appropriate learning activities for the individual or group, selecting the appropriate learning materials required. †¢Maintaining pupil safety at all times. †¢Interacting with the pupils, using praise and encouragement. †¢Observe the pupils responses. Assist the teacher in the implementation of set tasks, e. g. setting up and clearing the classroom before and after activities. Assist in the production of teaching aids and preparation of work for the pupils as required, charts, displays, worksheets, etc. Provide general classroom help. Making accurate and detailed records of what has been planned and delivered. Take a pro-active role and use initiative within the classroom. Q3. Make a list of the things expected from you as part of your role in supporting an individual pupil or group of pupils. Adapt activities that will encourage independent learning and provide challenges. Ensure the pupils understand and follow the teacher’s instructions. Help the pupils to use equipment and resources that is relevant to the learning activity. Supporting the pupils in enabling them to gain independence and participate fully in the curriculum. Challenge the pupils thinking and observe individual pupils progress and achievements. Provide focused support to help pupils move to the next level of learning. Be adaptable, have empathy but also follow the school’s positive discipline guidelines. Give the pupils choices and praise. Q4. Think about your role and responsibilities as a teaching assistant. List examples of your own general and specific tasks. 1. Supervise individuals / groups of pupils during specified learning activities, as directed by the class teacher. 2. Assist in preparing and maintaining an effective learning environment for pupils. 3. Getting the classroom ready for lessons. 4. Listen to children read and reading to them. 5. Helping children who need extra support to complete tasks. 6. Taking care of children who are upset or have had accidents. 7. Clearing away materials and equipment after lessons. 8. Helping with outings and sports events. . Assist in the implementation of Individual Education Programmes for students and help monitor their progress. 10. Provide support for individual students inside and outside the classroom to enable them to fully participate in activities. 11. Assist class teachers with maintaining student records. 12. Prepare and present displays of student’s work. 13. Support class teachers in photocopying and other tasks in order to support teaching. Q5. Briefly describe the role of the teaching assistant in relation to the teacher. Teachers Role: The teacher is responsible for planning and delivering of the National / Early Years Curriculum. To teach pupils to their educational needs. Assess record and report development. They are also responsible for all adults within the learning environment. Communicate and consult with parents. Teaching Assistant: Plan and prepare work alongside the teacher Support learning activities effectively, as directed by the teacher. Assess / evaluate pupil’s work, as directed by the teacher. Report any problems / queries to the teacher Give feedback to the teacher following planned activities. Q6. Briefly outline the role and responsibilities of: Head Teacher, Deputy Head Teacher, SENCO, Key stage co-ordinators, subject co-ordinators, class teacher. The Head Teacher: The role of the Head Teacher is to manage all aspects of the school and all of those within it, as well as making sure the curriculum are being effectively taught and managed. The Head is answerable to parents, Ofsted and the local authority for the smooth running of the school. The Deputy Head: Works closely with the Head, when the Head Teacher is absent from the school, the Deputy is responsible for its management. The Deputy will usually work as a Teacher; however he will still be responsible for running the day to day arrangements such as supply staff or training courses. He will liaise with the Head on a daily basis concerning the day’s priorities. SENCO: Is responsible for the managing of children with special needs throughout the school. Keeping records on all these children as well as being responsible for the management of individual support assistants in the school. SENCO are the line of contact for any outside agency, i. e. Speech and Language, Educational Psychologist. Key Stage Co-ordinators: Employed to lead and manage either Key Stage 1 or 2. They usually also have a class teaching commitment Subject Key Stage Co-ordinators:Responsible for the leadership and management of a particular curriculum subject. Class teachers may be expected to accept responsibility for an area of the curriculum as part of their normal professional duties The Teacher / Subject teacher: Plan, prepare and deliver lessons to meet the needs of all pupils, setting and marking work and recording pupil development as necessary. Includes advanced skills teachers and supply teachers. Often work in partnership with teaching assistants Q7. Give examples of how to promote independent learning, e. g. using ICT skills. Give positive encouragement and praise – this gives a pupil a feeling of achievement and the desire to continue with the learning activity. Listen – let the pupil see that you are listening to what they are saying, that you are taking notice of their contributions, this will build confident in their own abilities. Motivate – Give them positive experiences which are interesting and can be made real for them. Resources – Ensure that the relevant resources are available to them so they don’t need to ask for help, make things available and accessible. Repetition:Reminding a pupil what the teacher has said and encouraging them to think about what they are doing, without giving them the answer. Instruction:Following steps to complete a task, asking them simple questions, â€Å"Do you think this is the best way to do it† or â€Å"Why do you think this is the best way†. Facilitating:Giving the pupils the tools to carry out a task and discover the outcome, again encourage the child to talk you through what they are doing and why. ICT: Encourage the children to access, enter, save and retrieve information independently, to research and interpret information to support work in other subjects. Encourage them to write themselves reminders for accessing different programmes. Q8. What strategies can be used to support pupils learning activities? Create a positive learning environment. Adapt learning activities to support each individuals needs. Encourage independent learning. Prompt shy or reticent pupils. Ask open-ended questions to encourage their participation, also to see their understanding of the subject. Look for and note any common problems that the pupils have or mistakes made, this will enable the teacher to address these at a future learning activity. Give pupils choices and only give further assistance if required. Check pupils work and encourage them to correct their own mistakes Translate or explain information used by the teacher, i. e. words / phrases. Organise and participate in appropriate play activities or games. Ensure that all pupils behave and concentrate Listen, respect and value the pupils. Gain the pupils trust and confidence. How to cite Planning a Lesson Module 1, Essay examples

Friday, May 1, 2020

Security Breach at OSHA Samples †MyAssignmenthelp.com

Question: Discuss about the Security Breach at OSHA. Answer: Introduction Information Security has grown to become the most researched area in the present scenario. It is because of the reason that there are a number of security issues that have emerged and there are also a great use of the information sets by the users and business organizations all across the globe. There are data sets that fall under the category of public, private, sensitive, critical, personal and shared classes. The security and privacy of the information in all of these data sets is equally important. It is, therefore, required to be made sure that none of the security occurrences and events takes place and there is no breaching/leakage of information as well. One of the recent security breach and the ransomware attacks that took place a couple of months back has been covered and analyzed in the report. Security Breach at OSHA OSHA is an abbreviation for Occupational Safety and Health Administration which is a United States Government agency that operates in the department of labor. Because of the nature of operations and the line of business, the information that OSHA is associated with comprises of sensitive health information. In accordance with the latest development in the technological area, OSHA made a decision to move and convert its entire database in the electronic form. However, the decision backfired as the organization fell victim to a massive breach of information security in the month of August, 2017. The breach resulted in the breakdown and a complete shutdown of the electronic reporting system at OSHA. There was a web-based form that was present in the application to provide the employees with the ability to submit the details on injuries and associated information electronically. An injury tracking application was launched by OSHA on August 1, 2017 so maintain an automated record of all the reported injuries. Soon after, certain pages of the application became inaccessible and it gradually led to a shutdown. The sensitive health information of the patients was exposed to the unauthorized entities leading to a serious occurrence of a computer security breach (Gonzalez, 2017). The worst impact of the breach came down on the employees of OSHA along with the patients that have reported their injuries. The personal and critical data of these entities went in the hands of the malevolent elements. Such computer security breaches also impact the brand image and the market value of the organization that happened in this case as well. OSHA has to bear the rage of the customers and also lost a huge amount of its customer base (Tornone, 2017). The primary threat agent that the attackers made use of in case of OSHA was the weak link in the form of an unsecure access point. The injury tracking application was launched in OSHA on August 1, 2017 and such an application was being implemented for the first time at the agency. The development and the implementation team must not have taken the adequate measures which led to the presence of a weak access point. It became major security vulnerability and the same was utilized by the attackers to cause security breach and attack (Golla, 2017). Networks have been found to be prime threat agents in the recent times. It is through the aid of these networks that the attackers and other malicious entities succeed in gaining entry to the systems and the information. The countermeasures that OSHA may have adopted are in the form of the network based automated systems and tools. These tools have been created to perform various activities and operation to enhance the network security. For instance, there are tools that may perform advanced detection of the intruders and can also implement the preventive measures for the same (Bertino, 2015). There are also automated tools that have been created for the enhanced security of the network through continuous and advanced monitoring and control. The attackers succeeded in breaking through the access control mechanisms that were implemented at OSHA. The agency must have made sure that proper access control mechanisms were deployed and used. With the use and implementation of advanced access control, it is possible that the authorized users only pass through the access gates and the unauthorized users are restricted. There are advanced access control protocols that have been developed that grant the access on the basis of user roles and privileges. The same process should have been implemented in OSHA to protect the internal and external connections. Advanced authentication may also have been used in the form of multi-fold authentication measures comprising of a mix of biometric mechanisms, one time passwords (OTP) and single sign on (Wangen, 2017). Physical security of often not paid much attention by the organizations after the development of the automated tools and applications. However, the relevance and importance of the physical security measures must not be ignored. The presence of physical security mechanisms at all the entry and exit gates of the organizations must be ensured and shall also be reviewed at an timely basis. There have been advancements that have been done in the areas of malware protection with the development of numerous anti-malware packages. These packages can prevent the attack of malware such as viruses, worms, logic bombs and Trojan horses. Denial of service attacks are also common in the current times which can be prevented and controlled through automated anti-denial tools. Planning and analysis are the two major activities that have a lot of significance in every activity. There are many analytics tools that have been developed that may assist in the process. These analytics tools can bring up the trends and patterns that are present in the execution of the security attacks by the malevolent entities. These tools make use of data from different data sources and analyze all of the data to reveal the interesting trends. Also, it is necessary for the organizations to include only the defense mechanisms that are applicable to the requirements of the organizations. It shall be ensured that a plan is put in place before the implementation of the prevention and detection methods. Ransomware Attack May 2017 Occurrence of security attack or risk is not a rare phenomenon in the current era. There have been multiple incidents that have been reported in the past. However, there are some incidents that take place that cause a lot of damage. There was a ransomware attack that was launched at a massive scale in May, 2017. Ransomware is defined as a type of a malware which leads to the blocking of access of the systems that are targeted and the unblocking of the same can be done only after providing a ransom amount to the attackers. WannaCry took place at a global level and cause damage to various systems and applications spread in over one hundred and fifty countries. The malware was a kind of a cryptoworm that blocked user access on the systems that has Microsoft Windows as the operating system. Encryption of the user data and information present within the system was done and the ransom that was being demanded to unlock the access was in the measures of the Bitcoin cryptocurrency (Wong Solon, 2017). The first occurrence was reported by National Health Staff (NHS) in the United Kingdom on 12th May, 2017. NHS experienced the uncontrolled shutting down of its systems and applications and there was a message being displayed that stated that $300 (230) was required to be paid as ransom. The reporting of the incident by NHS was soon followed by the reporting by many other European countries. The incident also impacted a huge number of business applications and systems in Russia. It is being stated that Russia was the country that was affected the most. Many of the private and government institutions were impacted by the ransomware attack in Russia (Hern Gibbs, 2017). Countries such as Germany, China, Taiwan, India, Malaysia, Thailand, Singapore, Spain, and Portugal etc. also reported of the similar cases and occurrences. Worms are the malicious codes that are intentionally designed to cause damage to the systems and the malware spreads on its own. There are many malicious codes that demand human intervention of some form or the other to be triggered. However, the case is not the same with worms. These cryptoworm were used in WannaCry that led to the damage at such a massive scale (Bbc, 2017). The first step that was carried out by the attackers was the exploration of the security vulnerabilities and loopholes associated with the systems having Microsoft Windows as their operating system. EternalBlue was one of the security vulnerabilities that were identified in the Windows-based systems. The vulnerability that was found demanded the implementation of the security patches to control the attack using the same. However, the Shadow Brokers was the group of the attackers that made the vulnerability available in the public in the month of April, 2017. The same vulnerability was used to give shape to WannaCry. The primary reason that was present with the launch of WannaCry was the existence of the security loopholes and vulnerabilities. With the presence of so many security threats and issues, all of the security vulnerabilities shall be analyzed carefully and an immediate action must be taken to overcome the same. There was negligence that was observed by the users and the business organizations that allowed the attackers to easily make advantage of the same (Palmer, 2017). There are steps that Microsoft could have taken to ensure that the users had complete information of the security vulnerability and weakness that was present. The awareness could have been made with the aid of the social media platforms and with the use of email exchanges with the customers. It would have provided the users with the ability to easily detect the loopholes at their end and the fixes would have been made (Erlich Zviran, 2010). Malicious codes have the ability to spread to a number of systems that are connected with each other and the spread takes place at an extremely rapid rate. The infected systems lead to further reproducibility of the codes and there are scenarios wherein it becomes extremely difficult to put a control on the transfer of these codes. The same situation happened in the case of WannaCry as well. The malicious code made use of the security vulnerability and the cryptoworm was launched. The organizations and the users must have made use of the technically and logically advanced tools such as anti-denial, anti-malware and intrusion based detection and prevention. These tools would have generated alters regarding the presence of such malicious codes and the corrective measures would have been taken (Al-Hamdani, 2009). There are many loopholes and insufficient knowledge that is present with the users as well. Users are still not aware of the common security issues that take place and the basic security practices that they must follow. Such events lead to the occurrence of unintentional and accidental attacks at the end of the user. There shall be campaigns and sessions that must be carried out to increase the user knowledge and awareness in this area. Conclusion It is essential to put a check on the security attacks to make sure that the necessary properties of the information are protected and secured. These properties include integrity, availability and confidentiality of the information. References Al-Hamdani, W. (2009). Three Models to Measure Information Security Compliance. International Journal Of Information Security And Privacy, 3(4), 43-67. https://dx.doi.org/10.4018/jisp.2009100104 Bbc. (2017). Massive ransomware infection hits computers in 99 countries - BBC News. BBC News. Retrieved 23 August 2017, from https://www.bbc.com/news/technology-39901382 Bertino, E. (2015). Security and privacy of electronic health information systems. International Journal Of Information Security, 14(6), 485-486. https://dx.doi.org/10.1007/s10207-015-0303-z Erlich, Z., Zviran, M. (2010). Goals and Practices in Maintaining Information Systems Security. International Journal Of Information Security And Privacy, 4(3), 40-50. https://dx.doi.org/10.4018/jisp.2010070103 Gollan, J. (2017). Labor Department blames data breach for injury reporting sites shutdown. Reveal. Retrieved 23 August 2017, from https://www.revealnews.org/blog/labor-department-blames-data-breach-for-shutdown-of-employee-injury-reporting-site/ Gonzalez, G. (2017). Security breach shuts down OSHA electronic reporting application - Business Insurance. Business Insurance. Retrieved 23 August 2017, from https://www.businessinsurance.com/article/20170816/NEWS08/912315224/Security-breach-shuts-down-OSHA-electronic-reporting-application Hern, A., Gibbs, S. (2017). What is WannaCry ransomware and why is it attacking global computers?. the Guardian. Retrieved 23 August 2017, from https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20 Palmer, D. (2017). Your failure to apply critical cybersecurity updates is putting your company at risk from the next WannaCry or Petya | ZDNet. ZDNet. Retrieved 23 August 2017, from https://www.zdnet.com/article/your-failure-to-apply-critical-cyber-security-updates-puts-your-company-at-risk-from-the-next/ Tornone, K. (2017). OSHA halts new online reporting following security breach. HR Dive. Retrieved 23 August 2017, from https://www.hrdive.com/news/osha-halts-new-online-reporting-following-security-breach/449551/ Wangen, G. (2017). A framework for estimating information security risk assessment method completeness. International Journal Of Information Security. https://dx.doi.org/10.1007/s10207-017-0382-0 Wong, J., Solon, O. (2017). Massive ransomware cyber-attack hits nearly 100 countries around the world. the Guardian. Retrieved 23 August 2017, from https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs

Saturday, March 21, 2020

Otis Case Study Essay Example

Otis Case Study Paper Otis would have gone through a major restructure of several of Its service offices, because an IS was being built from the ground up. Information was now going to be traversing through a streamlined information channel, rather than layers of hierarchical structure. A lot of resources would have been invested in training employees about the new processes, and training managers about the added responsibilities and new information that was going to be available as a result of OUTSHINE. Any sort of organizational change experiences resistance from stakeholders in one form or the other. Toots employees might have resisted the change for a number of reasons. Fear of redundancy, added responsibility without any change in remuneration, lack of self-confidence in acquiring new skills required for the Job, lack of perspective as to why the change was being implemented, or imply too comfortable with the status quo, are some examples of the form of resistance that Otis might have had to overcome (Melcher, Rata, Bray Vane, 2012). Information Transformation Obvious noticed the change in the industry, and the way business was being done, Ana presented a violin Tort Otis: 10 Decode ten recognizes leader In service excellence among all companies-not Just elevator companies-worldwide. (McFarland Delayed, 2005). His aim was to create a paradigm shift within the organization from being a product manufacturing company to an excellent customer focused service provider. Due to regional and cultural variations within manufacturing, sales and supply-chain departments, he decided to streamline the department processes globally by using technology as an enabler. The organization went through a third- order change of transformation, whereby the existing IS was changed drastically. Its focus was shifted from managing production and physical assets to managing logistics and information, and this caused a systemic effect on all the other departments (McFarland Delayed, 2005; Piccolo, 2007). We will write a custom essay sample on Otis Case Study specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Otis Case Study specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Otis Case Study specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As a part of this transformation, departments were restructured and new process improvement orgasm were implemented on a global basis. Programs such as Standard Interface and Modular Based Architecture (SAMBA), Achieving Competitive Excellence (ACE), and Sales and Installation Process (SIP), were introduced in engineering, supply chain, and sales and field operations departments, respectively (McFarland Delayed, 2005). E*Logistics Project The most significant aspect of this IS transformation was the e*Logistics information transformation project (McFarland Delayed, 2005). It provided the tools, in the form of IT systems, which were required to re-engineer business processes across the many. The project involved merging separate IT initiatives that were under development within Otis, with the basic idea of connecting different departments of the organization through the Web. Giuliani Did Francesco was appointed the Project Director of e*Logistics, perhaps due to his experience working in quite a few departments of the company, or because he might have had a vested interest in the transformation (McFarland Delayed, 2005). Under his supervision, e*Logistics automated manual processes involved in different stages of product installation and maintenance, while simultaneously integrating the dispersed data and information on a global scale. Back-end Technologies The technologies behind the development of e*Logistics were based on standardized data interfaces, and they were owned and built by Otis itself. This means that the software solutions were designed to incorporate and adapt to existing technologies, rather than designing solutions with fresh technologies from square one (McFarland Delayed, 2005). The new business model and companys vision were instilled into Otis on a global scale. Senior management ensured that every employee, from top to OTTOMH, was on-board the change Otis was about to embark upon, and that employees were willing to adapt to the technological and organizational restructuring (Messier, Rata, Bray Vane, 2012). The company valued the role of its employees in successfully implementing this change, and therefore invested resources in familiarizing them with technologies. It was this tactic that enabled them to reap extraordinary benefits by using simple IT tools. Institutionalizing Changes Since the launch of e*Logistics, changes to sale orders became transparent across different levels of the sales cycle. SIP program was based on the idea of identifying best practices across different units of Otis, globally. During the project proposal phase, SIP recognized that a pre-bid checklist was an appropriate way of managing new clients. Elogistics anomie tons Day Introducing a steward solution, Instead AT paper based forms, which enforced a sign-off from both sales and field-installation supervisors(McFarland Delayed, 2005). This eliminated information inconsistency between the two units, and also helped in other aspects of this phase by retaining consistent information about customers and proposals. Upon acceptance of a proposal, the order would enter the next phase of sales processing. E*Logistics automated and institutionalized the new processes of this phase by electronically dispersing important documents amongst the managerial staff for bookings, validations and scheduling. Data was uploaded to different financial systems of the company, and as a result of these automated processes and clear visibility of sales orders, field-installation supervisors were able to better assess the readiness of a site, thereby reducing costs and excess inventory, while improving delivery times McFarland Delayed, 2005). To improve processes in the order fulfillment phase, Contract logistics centers (CLC) and distribution centers (Docs) were established to manage customer requirements, product configurations and supply chain management. Instead of faxing or mailing sales orders, e*Logistics provided a central software solution which connected CLC on a global level. As a result, CLC were able to place orders from different suppliers in a cost-effective and timely manner (McFarland Delayed, 2005). E*Logistics embedded new processes in the field installation phase as well, by sending reminder e-mails to field-installation supervisors, and demanding an update of the field sites prior to shipping the products. Orders were now processed and shipped Just-in-time, as per remote requests from the field-installation supervisors. These processes gave the supervisors a better control on the fiscal accomplishment of each sale (McFarland Delayed, 2005). E*Logistics also automated the process of billing customers and transitioning sales into service contracts, by prompting service agents to contact customers upon Job completion. This resulted in precise billing, increased conversion of new-unit sales to service contracts, and faster collections in the closing activities phase (McFarland Delayed, 2005). The above five phases highlight how e*Logistics baked new best-practice processes into the organization. Implementation In 2001, Ron Beaver became the Chief Information Officer (CIO) at Otis with 450 IT employees and 250 contractors reporting to him on a dotted-line basis. He was the leader of global IT with seven regional IT leaders reporting to him directly, who were responsible for their local systems and processes. 0 of the aforementioned staff were dedicated towards design and implementation of e*Logistics, and it was not deemed as a separate investment to all the other programs that were introduced for process improvements (McFarland Delayed, 2005). Rather, it was considered as an enabler to implement those programs successfully. As with any IS transformation project, there were a number of technological challenges involved in ensuring successful implementation of e*Logistics. Delivering the software to over 20,000 desktops across the organization, and training over 3000 staff in sales and field- operations worldwide, were a couple of such challenges faced by Otis (McFarland Delayed, 2005). Therefore, to minimize the associated risks, the project was rolled out at pilot sites across Europe. Its successful implementation at pilot sites aided in planning implementation in other regions, which were priorities based upon need Ana return on Investment (McFarland Delayed, 2 I en projects success was measured based on a number of metrics, such as number of orders processed through e*Logistics by each sales representative (McFarland Delayed, 2005). Conclusion The organization invested a lot of resources into streamlining its processes globally and shifting its focus from product flow to information flow.

Thursday, March 5, 2020

Supermajority Vote in US Congress

Supermajority Vote in US Congress A supermajority  vote is a vote that must exceed the number of votes comprising a simple majority. For example, a simple majority in the 100-member Senate is 51 votes; while a 2/3 supermajority vote  requires 67 votes. In the 435-member House of Representatives, a simple majority is 218 votes; while a 2/3 supermajority requires 290 votes. Key Takeaways: Supermajority Vote The term â€Å"supermajority vote† refers to any vote by a legislative body that must get more votes than a simple majority of votes in order to win approval.In the 100-member United States Senate, a supermajority vote requires a 2/3 majority or 67 of 100 votes.In the 435-member United States House of Representatives, a supermajority vote requires a 2/3 majority or 290 of 435 votes.In the US Congress, several major legislative actions require a supermajority vote, most notably impeaching the president, declaring a president incapable of serving under the 25th Amendment, and amending the Constitution. Supermajority votes in government are far from a new idea. The first recorded use of supermajority rule took place  in ancient Rome during the 100s BCE. In 1179, Pope Alexander III used a supermajority rule for papal elections at the Third Lateran Council.   While a supermajority vote can technically be specified as any fraction or percentage greater than one-half ( 50%), commonly used supermajorities include three-fifths (60%), two-thirds (67%), and three-quarters (75%) When is a Supermajority Vote Required? By far most measures considered by the U.S. Congress as part of the legislative process require only a simple majority vote for passage. However, some actions, like impeaching presidents or amending the Constitution, are considered so important that they require a supermajority vote. Measures or actions requiring a supermajority vote: Impeaching: In cases of impeachment of federal officials, the House of Representatives must pass articles of impeachment by a simple majority vote. The Senate then holds a trial to consider the articles of impeachment passed by the House. Actually convicting an individual requires a 2/3 supermajority vote of the members present in the Senate. (Article 1, Section 3)Expelling a Member of Congress: Expelling a member of Congress requires a 2/3 supermajority vote in either the House or Senate. (Article 1, Section 5)Overriding a Veto: Overriding a presidential veto of a bill requires a 2/3 supermajority vote in both the House and Senate. (Article 1, Section 7)Suspending the Rules: Temporarily suspending the rules of debate and voting in the House and Senate requires a 2/3 supermajority vote of the members present. (House and Senate rules)Ending a Filibuster: In the Senate only, passing a motion to invoke cloture, ending extended debate or a filibuster on a measure requires a 3/5 supermajo rity vote - 60 votes. (Rules of the Senate) Rules of debate in the House of Representatives preclude the possibility of a filibuster. Note: On November 21, 2013, the Senate voted to require a simple majority vote of 51 Senators to pass cloture motions ending filibusters on presidential nominations for Cabinet secretary posts and lower federal court judgeships only. Amending the Constitution: Congressional approval of a Joint Resolution proposing an amendment to the U.S. Constitution requires a 2/3 majority of those members present and voting in both House and Senate. (Article 5)Calling a Constitutional Convention: As a second method of amending the Constitution, the legislatures of 2/3 of the states (33 states) can vote to request that the U.S. Congress convenes a constitutional convention. (Article 5)Ratifying an Amendment: Ratification of an amendment to the Constitution requires the approval of 3/4 (38) of the state legislatures. (Article 5)Ratifying a Treaty: Ratifying treaties requires a 2/3 supermajority vote of the Senate. (Article 2, Section 2)Postponing a Treaty: The Senate may pass a motion to indefinitely postpone its consideration of a treaty by a 2/3 supermajority vote. (Senate rules)Repatriating Rebels: An outgrowth of the Civil War, the 14th Amendment gives Congress the power to allow former rebels to hold office in the U.S. gove rnment. Doing so requires a 2/3 supermajority of both the House and Senate. (14th Amendment, Section 3) Removing a President from Office: Under the 25th Amendment, Congress can vote to remove the President of the United States from office if the vice president and the Presidents Cabinet declare the president unable to serve and the president contests the removal. The removal of the president from office under the 25th Amendment requires a 2/3 supermajority vote of both the House and Senate. (25th Amendment, Section 4) Note: The 25th Amendment is an effort to clarify the process of presidential succession. On-the-Fly Supermajority Votes The parliamentary rules of both the Senate and House of Representatives provide means by which a supermajority vote can be required for the passage of certain measures. These special rules requiring supermajority votes are most often applied to legislation dealing with the federal budget or taxation. The House and Senate draw authority for requiring supermajority votes from Article 1, Section 5 of the Constitution, which states, Each chamber may determine the Rules of Its Proceedings. Supermajority Votes and the Founding Fathers In general, the Founding Fathers favored requiring a simple majority vote in legislative decision-making. Most of them, for example, objected to the Articles of Confederations requirement for a supermajority vote in deciding such questions as coining money, appropriating funds, and determining the size of the army and navy. However, the framers of the Constitution also recognized the need for supermajority votes in some cases. In Federalist No. 58, James Madison noted that supermajority votes could serve as a shield to some particular interests, and another obstacle generally to hasty and partial measures. Hamilton, too, in Federalist No. 73 highlighted the benefits of requiring a supermajority of each chamber to override a presidential veto. It establishes a salutary check upon the legislative body, he wrote, calculated to guard the community against the effects of faction, precipitancy, or of any impulse unfriendly to the public good, which may happen to influence a majority of that body.

Tuesday, February 18, 2020

Hrd Practice Essay Example | Topics and Well Written Essays - 5750 words

Hrd Practice - Essay Example Information was gathered and notes taken through personal discussions with HRD personnel, management and a number of personnel affected by these systems. Data on attrition rates, performance appraisals, and career development was garnered from the meticulous records maintained by the ORTD. This data was allowed to be drawn for study only and not allowed to be used in this report. The main findings included in the following report are that ABC has a clear view of its mission and objectives and HRD strategy is visibly and strongly linked to the overall plans. The two areas studied are well developed and effectively used. This report offers some recommendations to further strengthen these. This report is written at the conclusion of a study of Human Resource Development (HRD) practices in an existing company (ABC, at their request). Theoretical inputs received during class and the thinking of various experts was compared with actual practice, to develop deeper understanding of HRD. HRD embraces a large range of activities aimed at bringing out the best in each individual to meet organizations' objectives this study was limited to two areas, Career Development and Performance Appraisal. ABC adopts a paternalistic approach and shows total involvement in the welfare of the employee both on and away from the workplace. In all dealings with employees the company makes a conscious attempt to integrate feelings, priorities and welfare of the employees' family. ABC also has well thought out medium and long term plans for growth and consolidation and its efforts at career planning and development are fully integrated into them. Manning and skill level requirements of the organisation as it evolves and grows in the next five years are written and HRD responds to this through its activities of recruitment, training and development of in-house human resources. Lateral recruitment at higher levels is rare. 2.0 Industry Studied - Overview 2.1 Background The Organisation selected for study is a large company, employing about 3,600 personnel. The company manufactures fertilizers, PVC and Cement and is essentially chemical technology driven. The company is very successful in its performance as is

Monday, February 3, 2020

Nursing Competencies Thesis Example | Topics and Well Written Essays - 2250 words

Nursing Competencies - Thesis Example s focused on the discussion of some of these competencies as offered by tree organizations, namely: American Association of Colleges of Nursing (AACN), Quality, Safety Education for Nursing (QSEN), and the National League for Nursing (NLN). The challenges in the industry will also be discussed alongside a personal reflection of the author on the relevance of these competencies to his personal career. Nursing is a critical profession in the United States and, as has been dictated by the increasing healthcare needs, advancements in it are paramount. Advancements in the profession are of equal importance, all in an effort to empower nurses and help in meeting the rising healthcare needs across the country. As such, there are many stakeholders and public agencies that focus on the achievement of this goal by providing the skills that nurses need throughout their academic and professional lives. The American Association of Colleges of Nursing (AACN), Quality, Safety Education for Nursing (QSEN), and the National League for Nursing (NLN) are primary contributors in this. These three associations have made unique efforts in trying to equip nurses with specific competencies at the Masters level. In addition to these competencies, this paper will discuss some of the factors in the nursing profession and the health care system that make the achievement of these skills necessary, based on evidence from current literature. From a personal and reflective point of view, this paper will also discuss how these skills and competencies related to my career trajectory and describe the steps I am willing to take in an effort to achieve the knowledge and skills necessary during my graduate studies as I seek to master each of these competencies. The AACN has outlined a number of competencies that it is willing to equip nurses with in an effort to enhance their skills. Of the many competencies that it defines under Adult- Gerontology Acute Care NP Competencies, one of the most