Saturday, August 31, 2019

The Balek Scales: a Measurement of Injustice

The story â€Å"The Balek Scales† by Heinrich Bà ¶ll tells the experience of the narrator’s grandfather in the village upon which the Balek family had a firm grip. The Balek family, later known as Balek von Biligan, is part of the elite class, as the following quote describes: â€Å"the family who lived in the chateau and drove two carriages, who always maintained one boy from the village while he studied theology at the seminary in Prague† (Bà ¶ll 15-16).There are a lot more details, but given the following quotation, they can be seen as a prominent family from the elite class (Bà ¶ll 16). The scales—known as the Balek scales in the story—are the Baleks’ tool for trading mushrooms, herbs, and other tradable goods for money—marks and pfennigs. No one ever questions their sole possession of the scales.However, the narrator’s grandfather, Franz Brà ¼cher, discovers injustice within the measurement of the Balek scales. Even wit h this evidence, the efforts of villagers to seek justice are thwarted by the power and influence of the Balek von Biligan family, which Bà ¶ll portrays as a classic battle between the working and elite classes in â€Å"The Balek Scales.†Injustice is the recurring theme in the story as the Balek scales—the scales of justice for the villagers—favor the Balek von Biligan clan, as the story suggests in the following lines: â€Å"he pulled the five pebbles from his pocket, held them out to the young woman, and said, ‘This much, fifty-five grams, is short in every pound of your justice’† (Bà ¶ll 16).As the line states, the injustice that the narrator’s grandfather claims in front of Frau Balek von Biligan is the unequal or unfair measurement that the scales present for their foraged goods—mushrooms, herbs, and the like. Inevitably, the injustice results in a short bloody revolt with the Reeve’s gendarmes overpowering the pop ulation.Then everything goes back to normal, with the Balek von Biligan clan still on the driver seat—in control. The power of the Baleks is too strong for Franz Brà ¼cher’s, whose search for justice is seen as a futile attempt to overthrow the seemingly unfair rule of the Baleks over the village.Looking at it from a different angle, the village, along with the other two villages, could have avoided the short bloody revolt if Franz Brà ¼cher remained oblivious to the injustice that the Balek scales represented.Upon confronting this injustice, Franz experiences some tragic events, as stated in the following lines: â€Å"the reeve’s gendarmes arrived†¦shooting and stabbing as they came and removed the scales and the book by force. My grandfather’s little sister lost her life,† (Bà ¶ll 16-17) and â€Å"My grandfather’s parents had to leave the village, and the new grave of their little daughter† (Bà ¶ll 17).Franz Brà ¼cher expe riences two tragic moments in his lifetime which were caused by the Balek scales. These were his little sister’s death and their family’s constant migration. This could have been avoided by Franz if he remained ignorant to the injustice mentioned.A classic battle between the bourgeoisie and the proletariat classes unfolds in the story of The Balek Scale. Relating the story to the social divisions of society, it is a fact—always has been—that the rich have control over those who are not because of the wealth they possess and their strong influence over the government; at least a portion of it is attracted to the wealthy of prominent families like the Baleks in the story.The scales of the story represent the injustice in the society—they favor the rich over the poor most of the time anyway. The scales may actually represent the justice system in society as they can sometimes be distorted in favor of those with money. The story represents this illness that is quite evident in past societies, as well as in today’s society. Regardless of how strong is the resolve of the acting â€Å"hero† or â€Å"deliverer of justice,† his efforts are usually just futile.Thus, the story entails a classic battle between the rich and the poor. This battle is always intensified by a mere claim for an injustice brought about by the rich, supposedly, which affects the poor many times over. As the following quotation suggests, the injustice that Franz Brà ¼cher and his family experience in the village is actually present in every place they went to: â€Å"but did not stay long anywhere because it pained them to see how everywhere the finger of justice swung falsely† (Bà ¶ll 17).This clearly shows how injustice is present everywhere and how great is its effect on those who are least fortunate—the poor. It will surely take a long time to cure this illness of society because those who know about this injustice remain o blivious to its presence in society; they are just watching it eat away the true concept of justice.The last two lines in the story are probably the most striking as the Brà ¼cher family and many others realize the gravity of injustice in society: â€Å"And those who wanted to listen can hear the tale of the Baleks von Biligan, whose justice lacked a tenth part. But there were few who listened† (Bà ¶ll 17). In this line, those who receive the painful end of the spear of injustice find it futile to express to the suffering they are feeling caused by the injustice. It is futile because rarely do people listen to their woes and cries for justice.Hardly anyone listens to them because of their place in society as the poor working class—during that time, the poor do not seem to have a strong voice in society. The rich and powerful simply have control over most of them. Any revolt or uprising seems to be thwarted most of the time; however, there are times when a revolt beco mes successful.Heinrich Bà ¶ll’s stor,y The Balek Scales, entails a seemingly unending battle between the rich and the poor as the latter would usually rise against the injustices that the former inflicts upon them and the society. However, it seems that the rich are too powerful and influential to be folded easily. It remains uncertain for the tide of this epic battle to change as many still remain oblivious to the injustices that occur within society.Work CitedBà ¶ll, Heinrich. â€Å"The Balek Scales.† A Walk in my World: International Short Stories about Youth. Eds. Anne Mazer. New York: Persea Books, 2000. 9–17.

Friday, August 30, 2019

Case Study Analysis Ppaer Essay

Introduction A number of problems were made during the recent hiring process. This case Study is an attempt to identify and recommend ways to improve this process. From the information that has been obtained, I believe that a lack of employee experience and a lack of prior planning and follow up resulted in a failure to accomplish all the task necessary to hire the new employees in a timely fashion. ?Background Carol Robins, a new campus recruiter for ABC, Inc. , in early April he was able to hire 15 new trainees who were destined to work for Monica Carrolls,  the operations supervisor. From the interviews that were conducted, it appears that Carl was unable to accomplish all of the tasks necessary so that the new hires could begin work. These tasks included documentation, drug testing, material preparation for the orientation, and facility scheduling. Monica Carrolls did contact Carl on May 15 concerning his process with the hiring process. Other employees had failed to keep the paper copy of the master orientation manual current so that it can be quickly copied. Another factor appears the rapid expansion of the company. Alternatives With more than one problem a major focus on a number of different Solutions, such as, Prior planning by Carl could have eliminated some of the issues; however, Carl’s in experience would probably still have resulted in there being some problems. The company has failed to provide relatively inexperienced employees, like Carl, with comprehensive procedures and job practices. Under the topic of supervision, Monica Carrolls could have made contact more often with Carl. But her job, as operations manager, does not include his supervision. Another solution to the supervision problem could be to increase the staff in the human resources department. However, on examination this does not appear to be the most efficient solution due to the increased costs. Another solution would be to maintain the master â€Å"New Employee Orientation† manual in electronic format. Having the manual in electronic form allows for easy updating of the policy and procedures, and prevents inadvertent loss or damage to that document. This method is cost effective and easily implemented. ?Proposed Solutions. A â€Å"New Employee Checklist† will be created with all pre-employed tasks listed on it. ?The â€Å"Employee Orientation† manual will be maintained in an electronic format. ?Some of the pre-employment tasks will become the responsibility of the potential employees to accomplish. Potential employees will report when the tasks have been completed. A member of the human resource staff will confirm that the task has been completed correctly. ?Employees like, Carl Robins, will be required to submit weekly reports detailing the current status of all potential employees. ?Recommendations New employees are the only way the work of this organization gets accomplished. Everyone efforts to sustain the continued growth and profits of this company cannot be ignored. With the continued growth of the company the proposed solutions that the employee will make on that day may need to be modified as the company becomes larger. I would recommend that a periodic review of the hiring process; looking for ways to improve it. And also a review should be done on an annual basis.

Thursday, August 29, 2019

Tda 3.4 1.1

Summarise the policies and procedures of the setting relevant to promoting children and young people’s positive behaviour In my setting there are several policy documents that advise both parents and teachers what procedures are in place to help the children to perform to the best of their abilities and also set out guidelines of what the school expects off the staff, pupils and parents. Our schools behaviour policy also incorporates both the code of conduct, dealing with inappropriate behaviour and the rewards and sanctions guidelines, separate to this are the anti bullying policy and the whole school attendance policy . The behaviour policy firstly sets out the aims of the school, explaining how the school promotes good relationships so that people can work together with a common purpose of helping everyone to learn and work together in an effective and considerate way, this is aimed not only at the pupils but to parents and staff alike. It continues to explain that this policy is in place to enable children to grow in a safe and secure environment, and to become positive, responsible and increasingly independent members of the school community. It then goes on to explain the code of conduct expected off children, staff and parents. This includes rules such as parents and staff not smoking in the school grounds, conduct of parents when collecting their children from school i. e. not swearing and being too loud while lessons are still ongoing, to giving guidelines on what is expected from the children while at school. In these guidelines it explains how the school has it’s set of rules but also that each class teacher, at the beginning of the school year, discusses with the children what is expected, behaviour wise, in their class. The children are also invited to give ideas for these class rules, these rules are then printed out and displayed in the classroom. This document then goes on to explain the rewards and sanctions policy, this explains how the children are rewarded for good behaviour in a variety of ways, such as, the giving of house points and presenting their work in school assemblies, it also states as the child gains more house points they work towards certificates Gold, Silver and Bronze, all the achievements the child earns are stored in their Record of Achievement file, which is presented to them as they leave school in year 6. In the explanations of the sanctions the policy, this is under the dealing with conflict and inappropriate behaviour section, gives examples of behaviour that is unacceptable, this can be things such as shouting out in class, being in areas they shouldn’t be and goes, on to the extreme cases such as bullying and assault. It then goes onto the giving of detentions or missing playtimes because of this behaviour and in the more serious cases it explains the fixed-term and permanent exclusions policy. Finally the document goes to explain the roles of all staff members within the school this includes support staff, teachers, head teacher and finally the school governors. These roles are explained in a brief way and if there are any questions to any part of the document not to hesitate to ask for more guidance. The schools anti-bullying policy firstly explains the schools definition of bullying, which is, â€Å"bullying is action taken by one or more children with the intention of hurting a child, either physically or emotionally†. It then goes on to give the schools aims and objectives in this matter, this covers developing the schools ethos in which bullying is regarded as unacceptable, aiming to produce a safe and secure environment where all can learn without anxiety, aiming to produce a consistent response to any bullying that may occur and to make all connected with the school aware of the schools opposition to bullying and to make clear each person’s responsibilities with regard to the eradication of bullying. It then goes on to explain the roles of staff and parent in both dealing with and eradicating bullying, this includes:- 1) The Governors, their role is to support the headteacher in eliminating bullying in the school, they monitor any incidents that occur and review the effectiveness of the school policy regularly. 2) The Headteacher, it is the responsibility of the head to implement the policy and to ensure all members of staff (both teaching and non-teaching) are aware of the policy and how to deal with any incidents that may arise. The head also reports to the governors about the effectiveness of the policy and if it needs amending. ) The Teaching Staff, teaching staff should intervene at the first sign of any bullying, they must keep records of all incidents that happen involving children in their class, if they see another child from another class being bullied or bullying they should immediately inform that childs class teacher so they can intervene and monitor the situation. T eachers routinely liase with each other through staff meetings and discuss existing or new anti-bullying strategies. 4) Non-Teaching Staff, they are instructed to report any signs of bullying straight away to a member of the teaching staff, who can then direct the ssue to the correct teacher. They should intervene straight away and get the names of all children involved so it can be followed up correctly and efficiently. 5) The Parents, any parent that is concerned that their child might be being bullied, or who suspect their child may be the perpetrator of bullying, should contact their childs class teacher immediately. Parents have a responsibility to support the schools anti-bullying policy and to actively encourage their chaild to be a positive member of the school. The policy then goes on to state that it is monitored by the headteacher , who reports to the governors about its effectiveness. The schools whole school attendance policy starts with an introduction as to why it is important the child attends school and has as fewer absences as possible, including the missing of work and how this can affect their education and intellectual development. It then goes on to explain types of absences both authorised and unauthorised, authorised absences include sickness, medical appointments and any emergencies. Unauthorised absences are those that the school does not consider reasonable, these include, truancy, children being generally late, birthdays, holidays in term time not agreed with the school and holidays that exceed those agreed by the school. It is explained that persistent absenteeism at my setting is classed as missing 20% of the school year, it goes on to say that this severely hampers a childs intellectual development, persistent absentee pupils (PA’s) are tracked and monitored closely and all of these cases are automatically made known to the Local Authority Attendance Team. The policy then states the absence procedure of contacting the school as soon as possible , if not contacted the school will telephone the parent/carer on the first day of absence, if absence persists invite in the parent/carer to discuss the situation and refer to the Early Intervention Officer linked with the school if attendance moves below 85% as per Local Authority protocol. It then explains the role of the Attendance Officer, which is to try and resolve any issues with the school and make a signed agreement with the parent/carer about future attendance, if the matter still persists they can sanction penalty notices or even prosecutions in the Magistrates court, these are of course the last resort if all other avenues have failed. It then goes on to holidays in term time where it says how taking these holidays can affect the childs schooling and that any monetary saving of these holidays can be at the cost of the childs intellectual development. Religious absences such as Eid are authorised but no more 3 days in a school year. Finally the policy states the roles of individuals and their responsibilities of them in keeping to this policy, they are:- Parent/ carer should ensure regular attendance, contact school, try to avoid in term holidays Pupils attend school/registration punctually, speak to an adult if any issues arise that may effect school attendance Headteacher should take lead in ensuring attendance has a high profile in the school, ensur all staff know their responsibilities, take overall responsibility for ensuring the school conforms to all statutory requirements in respect of attendance All school staff should provide a welcoming atmosphere to encourage childrens attendance and provide a safe learning environment, provide a sympathetic response to pupils concerns, be aware of the factors that may contribute to non-attendance, participate in training regarding school procedures. Finally the policy document shows an example of the application for absence from school form to be filled out for any holidays or extended leave, a copy of this is included in this assignment.

Wednesday, August 28, 2019

Lions Den Sports Bar & Billiards (Business Plan) Research Paper

Lions Den Sports Bar & Billiards (Business Plan) - Research Paper Example Lion’s Den will run under single proprietorship, with top managers running the various facets of the business. Management wishes to establish the business by means of coordinated marketing and operational execution that will solidify name recognition, and appreciation for the concept. The efforts include both above-the-line and below-the-line advertising, face to face communication and focused strategies. With the marketing plan taking care of drawing the crowd into the business, the operations team will further strengthen client relationship by providing excellent customer service, exemplified by stringent operating guidelines, and up to date employee training and extensive product research. Its expansion plans also prompts management to focus on good inventory management, investing only on fast-moving goods and at the same time, not fearful of experimenting on new trends to find out which fit the target market. The sports bar business will compete in terms of facilities by offering the most number of televisions in the city, and a state of the art table top audio control to give the customers the comfort of being able to listen to his program without the interference of other clients, or without having to wait for the assistance of the service crews. There will also be top-of-the line sports facilities that include billiard tables and dart boards, a mini arcade and a concept bar that are both comfortable and edgy in nature. Clients will feel at ease, and at the same time, be entertained the programs, facilities, visuals and food that the restaurant offers. Lion’s Den will also capitalize on Information Technology and computers to provide the best facilities to the target market. It plans to further expand its business by opening more branches in neighboring cities in the next five years. New Jersey has the most number of malls

Tuesday, August 27, 2019

Bobbitt and Today's Goals Essay Example | Topics and Well Written Essays - 250 words

Bobbitt and Today's Goals - Essay Example Today, output maximization and cost minimization have been factored in other numerous goals to be achieved. In other words, cost and output are not the only concerns when it comes to achievement of goals. A fundamental aspect of social and economic welfare has been introduced in the contemporary times. This is due to the fact that output can be maximized and cost minimized (Flinders & Thornton, 2004) without any effect on the social and economic welfare. Therefore, social and economic welfare has become a contemporary primary goal, with cost and output concerns acting as aiding tools to the realization of the underlying goal. Educational institutions should critically position work of adults in their programs. Mirroring work of adults would critically establish a rich ground for the stakeholders involved to infer, relate information, and undertake studies across variant sources for diversified knowledge. The idea is to enhance the quality of programs and systems run by educational institutions for the benefit of all stakeholders on board. Work of adults, therefore, could be one of the core pillars of educational

Domestic Violence Outline Questions Essay Example | Topics and Well Written Essays - 500 words

Domestic Violence Outline Questions - Essay Example There is also a notion that men are aggressive and combative in nature hence likely to batter their wives. Generally, domestic violence is viewed as women problem hence the picture created is that of a battered woman physically assaulted thus ignoring emotional abuse. It is therefore imperative to ask why women are the most victims as shown by the figures and women advocates’ grievances. Culture is considered a great contributor to domestic violence. Most traditional societies advocated for wife beating as a sign of love and to gain respect (Jaffe, 2006). Culture also determines gender roles in society where a man is supposed to be a provider to the family and the place of a woman is in the kitchen. Women are supposed to be submissive to their husbands and not to question his decisions. Women in some societies do not own property and neither engage in paid jobs hence rely on the husband for survival. Even if engaged in employment they are lowly paid as they take up simple tasks due to their feminism. They are thus prone to abuse by their spouses for example by refusal of financial needs and emotional and physical abuse. Some men who depend on wives for survival are also prone to violence. Boys and girls are socialized into different roles as they grow up and this affects their future. Those who grow up in an abusive family are likely to end up being violent adults (Davis, 1998). On the other hand, not all children exhibit or take up the behavior as adults. Some learn its consequences and would not like to end up as their parents. Some develop fear which makes them prone to abuse. Nowadays people are educated and no longer practice those traditions of wife beating but gender equity has not been achieved and will take long to achieve (Davis, 1998). Feminists should therefore establish new ways of curbing domestic violence. All this debate about

Monday, August 26, 2019

Assignment Example | Topics and Well Written Essays - 1000 words - 12

Assignment Example Most members of the staff understand the linkage that exists between receiving knowledge in their different institutions and learning or working with collogues. However, areas where staffs’ attentions are seriously required are the same areas where students do not place much emphasis, since they work collectively to contribute to the general success of the institutions. However, most students have taken learning as an add-on to their educational career and in most cases do not work collectively as they busy competing against each other for their academic success. It is proven that the learning process can not be a success without certain factors being considered by professionals. In a professional learning community, society members must be in attendance. Both students and staff must gather and come at an amicable solution on the curriculum, instructional strategies, data, goals and the type of learning required to make the process a success. The professionals also are require d are required to direct their attention to the needs of the students involved so as to provide a common purposes for all the students in the school. Professional learning communities also require effective leadership to oversee the whole process. Capable hands of professionals are tasked with major roles of defining purposes for both staff and students in different schools and organizations. This promotes success as the students and staffs are provided with the needed support which is essential to the learning process and success of students. School heads are also tasked with the responsibility of identifying and setting a space for the professional learning community or faculty involved in the process. This allows members of the staff to gain insight from fellow staff members as there is sharing of teaching practices and artifacts needed in student learning. According to Gamble (2008), a professional learning community transforms professional development of both the teachers and a dministrators into goals. It provides a system which enables both parties to fully benefit from it as it advocates for theories and practices which are accordance with the learning and work environment. The community is data driven as both the teaching and administrating professionals are self motivated by the need to meet the different educational and work requirement for the students or employees. It also greatly depends on both parties accepting their responsibilities in accordance with the work structure existing within a society. Professional learning community incorporates the attitude of professional development amongst educators in schools. It provides both parties concerned with a goal that they work to attain. In addition, professional learning community offers teachers with all the relevant resources they need to become successfully in their teaching process to the students. They are motivated to become better and efficient at their work and this result positively as grad es and performance of the students in school and after school improves significantly. Teachers are provided with an opportunity of what to access for the students’ ideas, how to access and ways to conveying it to the students. Professional learning community also provides teachers with the trustworthiness needed in the current data-driven curriculum as they have their objectives and goals organized before presenting it to the

Sunday, August 25, 2019

Introduction and Letter of Transmittal on Taco Bell Case Study Essay

Introduction and Letter of Transmittal on Taco Bell Case Study - Essay Example om their governmental agencies arguing that their grocery store might have been selling the brand containing a corn ingredient which is harmful to the public (Hall and Viola, 2003). The report targeted Taco shells, which the brand name of the Taco Bell and distrusted by the Kraft Food industry, the media as well as other consumer’s reactions proved the damage of the Taco Bell reputation. This made the Taco Corporation to face the crisis of destroying brand reputation due to selling of tinted food known as Cry9c, which is harmful to human consumption. The public hold the perception that the company was selling the same product in their restaurant. However, Taco Bell has nothing to do with the manufacturing of the genetically modified corn but it is licensed under the company’s brand name known s Taco shells. Although Kraft already recalls that the food was announced to be having side effects to the consumers, they still distribute and sell it using Taco’s brand na me. Therefore, Taco bell should take action through communicating effectively about the crisis management. They should communicate in order for the corporate to maintain food safety standards and regulations in the restaurants; thus maintaining brand reputation. In compliance with the Kraft Food Industry, the company should make effective communication in order to come up with the conclusion of payment owing that the Taco Bell is undergoing a severe threat of the brand reputation. This is because the company would be interfered especially on revenues that may decrease. This is due to brand reputation; thus, the agreement should be made on transfer of funds. The main purpose of the letter is to inform Taco Bell Company to communicate effectively with Kraft Food Industry and solve the problem the company is facing. Taco Bell Company should also formulate and make the follow-ups of a comprehensive and effective action plan in order to address the issue of food safety. This is essential because it will

Saturday, August 24, 2019

Pulmonary Hypertension Essay Example | Topics and Well Written Essays - 5000 words

Pulmonary Hypertension - Essay Example Genetic factors may account for mutations in the blood vessels which may manifest in the increased prevalence of smooth muscle cells and fibroblasts in the walls of the blood vessels (Ali, Summer, and Levitzky, 2005). Pulmonary hypertension may also be caused by congenital heart defects like atrial septal defect, ventricular septal defect, patent ductus arteriosus, and congenital heart problems which have left to right shunts (Ali, Summer & Levitzky, 2005). In instances when the pulmonary hypertension would worsen, the right-side pressure may overwhelm systemic pressure and â€Å"poorly oxygenated mixed venous blood bypasses the lungs and enters the systemic circulation, causing severe shunt-related hypoxemia† (Ali, Summer & Levitzky, p.129, 2005). Non-specific symptoms like dyspnea on exertion, fatigue, angina pectoris, and syncope (Ali, Summer & Levitzky, 2005). These are however symptoms which also apply to other cardiopulmonary disorders like ischemic and valvular heart disorder. Hoarseness is a symptom more specific to pulmonary hypertension because it is caused by compression of the recurrent laryngeal nerve due to the enlarged main pulmonary artery (Ali, Summer & Levitzky, 2005). In cases of cardiac overload, sodium and water retention increases under the influence of the aldosterone hormone. Sodium and water retention consequently manifests as volume overload causing distended neck veins (jugular vein distention), ascites, and leg edema. Other symptoms may include tachypnea, dizziness, apprehension, fear, persistent hypoxemia, excessive fatigue, and cyanosis (Canobbio, 2006). Dizziness, fatigue and syncope are largely due to insufficient cardiac output (Newman, 2008). Initial diagnostic tests may include chest x-ray, spirometry, ECG, and echocardiography, and CBC following a complaint of significant exertional dyspnea in patients who seem relatively

Friday, August 23, 2019

Criminal Punishment in American Society Essay Example | Topics and Well Written Essays - 2500 words

Criminal Punishment in American Society - Essay Example Other societies, mostly the dictatorial ones, do not take the criminal to the court. The criminal is punished arbitrarily. A prisoner, or the criminal, has his rights that are protected under the constitution. These rights should not be taken away from him, regardless of the fact that he has broken a law. The constitution of America has undergone many amendments since its inception. The first ten amendments that took place are referred to as the bill of rights (Todd et al 67). Contained within these ten amendments are the rights that should be enjoyed by a prisoner (Todd et al 67). These amendments took pace at the same time. They were put forward on September twenty fifth, 1789 (Todd et al 67). In their book "American Corrections", Todd et al identify two amendments that relates to the right of the prisoner and his relationship with the correctional institution. The eighth amendment is such one amendment that the book talks about. The amendment was carried out in the year 1791. It covers cruel and unusual punishments meted out to the prisoner. It says, in part ".excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted" (Todd et al, 2000). This amendment still inf... This amendment still influences the relationship between the prisoner and the correctional institution. The institution holding the prisoner should not treat him using inhuman techniques like electric shocks, lashing or food rationing. The courts should not issue an excessive punishment to the prisoner. The punishment should be in line with the crime committed. For example, a prisoner cannot be issued with a death sentence for pick pocketing. Unusual punishments should not be meted out to the prisoner by the incarcerating institution. Some authorities have been known to sexually abuse and harass the inmates. For instance, the united states have been accused of castrating prisoners taken in the Iraq war. Inhumane acts have been committed to terrorist suspects in the now defunct gutaenamo bay prison. It thus altered how the prisoners related with the correctional institutions. They are respected and treated as human beings not like animals. The prisoners are not given punishments like hard labor. As a result of this amendment, living conditions in the holding institutions are periodically checked to ensure that the prisoner is not under any threat as far as his human rights are concerned. The Fourteenth Amendment and Right S of the Prisoner Another amendment that touches on the rights of the prisoner as identified in this book is amendment number 14. It states in part that ".no state shall deprive any citizen of life, liberty or property.without due process of the law" (Todd et al, 2000). What this means is that a prisoner who is a citizen of the country should be taken to court before he is punished. The due process been referred to means alignment in court and sentencing by the court. The prison should not incarcerate an inmate,

Thursday, August 22, 2019

Advantages and disadvantages of internet Essay Example for Free

Advantages and disadvantages of internet Essay Nowadays internet is the most common form of communication. It is a worldwide connection of computer systems over a massive network. There are certain advantages and disadvantages to the Internet. First of all internet has made communication very simple, easy and convenient. It is possible to stay in touch with people that you hardly ever see. Moreover internet is a source of knowledge. Anyone could simply open internet and get many information about anything. In other words it is a small encyclopedia about everything in the universe. Nothing online is trustworthy. Websites that are supposed to be trusted and are supposed to be reliable are not full of reliable information. Even major websites that are run by big and trusted companies are using writing firms to write their websites and the writing firms are simply hiring the cheapest freelancers to do their work for them. It is true that the Internet has made it easier to find out basic facts such as the location of places, but even that information is commonly incorrect. Also some people use the Internet too much and forgot real life contact. It may now be easier to keep in contact with people you know, but it has removed any incentive to visit people. In other words it can be addictive and a waste of time and even money. Two angles have been compared in both a positive and negative light. Internet can be useful and dangerous at the same time. In my opinion, Treat the information you read online with a high degree of skepticism and you will be alright. It is also a good idea to use the Internet in order to stay in contact with people, as it is easy and convenient. However, do not allow online contact to start replacing physical contact. It is important to strike a balance between the two.

Wednesday, August 21, 2019

Political Culture Essay Example for Free

Political Culture Essay The single greatest contributor to the way American Politics plays out both within and outside of our borders today is in our rich and long-lasting political culture that defines they way we look as the world and how to respond to it. Shaped by values, history, current events, and emotional commitments that our populace collectively shares, political culture in the United States determines the way government functions and reveals the intricacies of our collective way of life in a way nothing else can. Throughout our nations history there have been three different types of political culture proposed by three different authors as stated below. The first model of conceptualized liberty is a tradition of longstanding liberalism maintained by Myrdal in Wilsons American Politics. Claiming that Americans naturally crave their individual rights and want their liberty to constitute freedom within the law to do whatever they want as their own person, he states we are a self concerning people with central regard for our own lives independent of the rest of the nation. This style of political culture emerged the greatest during the 60s when individualists like hippies and protestors came out against the large Model II type government that strove to provide and manage the people in the overbearing sense it did. Todays culture draws strong parallels to liberalism as well, with most Americans concerned for their own rights first. An example of this is the dog laws imposed in New York where dogs cannot be off a leash or make excessive noise in Central Park that distracts other people. Some people feel they are having their right to quiet and safety violated by these dogs and the laws behind them, while others maintain it is their right to have dogs and be able to run them freely. The second claim is of political culture is the one that was created in the grand scheme by the founding fathers and proposed by Hartz. This perception of liberty claims that there is a collectivist notion of unity among the people that promotes the general welfare of the nation as a whole and not just based on individual rights. First established by puritan settlers who wanted to build a city on a hill with a strong central purpose and unity among its citizens, the concept of a strong government that united the people in one common goal to achieve the greater good became known as republicanism. This concept of liberty is alive today as the populace stands united against the global threat of terrorism that threatens all Americans equally. To protect each other and nation as a whole Americans look to the greater good beyond their personal rights to sustain the nations security. An example is in peoples ability to forego some of their individual rights in the patriot act or at airports to give up some privacy to keep them safe from terrorists in order to maintain the greater good of the nation. The third perception of liberty is proposed by Roger M. Smith who states that America is traditionally hierarchical and is driven by social and economic classes that preside over others. This concept has been prevalent for hundreds of years in times of slavery and civil unrest when African Americans and other surges of immigrants were oppressed and looked upon as outsiders by the White Anglo-Saxon Protestants that formed the backbone of the nation. While civil rights have been passed to make the nation equal for all, Smith argues an underlying factor of racism and inequality among minorities still lingers in the heart of America. An example of this is the Duke Lacrosse Scandal where three elite white males were charged in the rape of a black woman and media frenzy that ensued around it. Claiming that the white males thought themselves superior and able to escape consequences for crimes against minorities, African American leaders such as Al Sharpton and Jesse Jackson came out in force to lead rallies for their prosecution. Another parallel is Hurricane Katrina and the thousand of black residents displaced by it in 2005. Most of the 9th district of New Orleans was destroyed by the storm because it sat unprotected and vulnerable and to this day it remains in shambles with little done to improve the area. Smith would argue this is because of the racial and economic hierarchy that differentiates the poor African American residents of the area from the white controlling politians with the power to do anything about it. While all these three conceptions of liberty are prevalent and present in todays political culture, the structure of our government and the speed with which the world changes does not allow any one style to dominate the rest. Americans live off and pride themselves on their civil individual rights while at the same time unifying collectively to stand as one against outside threats like terrorism. There is some hierarchical dissonance that remains in the actions of many government officials and elite pockets of society separated from citizens of different economic standing and ethnicity, but after the civil rights laws were passed the vast majority of these problems have been removed. This leaves the United States with a balanced and ever changing political culture that hinges back and forth between the three conceptions of liberty.

Tuesday, August 20, 2019

The National Curriculum In Primary Schools

The National Curriculum In Primary Schools The aim of this assignment is to discuss the trends policy that took place in primary education from 1988 and 1997. The assignment will start with examining the rationale behind the changes introduced in those years. Then it will look at the changes themselves. The last section will talk about the advantages and disadvantages of those changes. It should be mentioned from the outset that I will not be mentioning reforms related to secondary and higher education, even though they came at the same time as the Primary schools. The term educational provision refers to the use of the equipment or tools with the intention of providing knowledge and skills, and includes things such as such as, classroom, textbook, chairs, pens/pencils and many more for students. Education is about the process of learning where knowledge, skills and information is transmitted. Yero (2002) believes that education is a procedure of improving the students or pupils knowledge, skills and character. So education can help to reduce inequality in society. In the United Kingdom, this concept of eliminating inequality was at the base of changes in education policy. Prior to 1988, education in the United Kingdom was completely different. The decision of the curriculum contents was in the hands of schools, with religious education being the only subject which was compulsory. This means that pupils had different attainment levels due to following different programmes. Education was ruled by the 1944 Education Act which handed the administration of schools and the formulation of school policies to local authorities; the only exception being Section 1 where control and direction of education were given to the Secretary of State. In fact, in the 1944 Education Act, the role of the Department of Education and Science was simply promotional and not one of giving direction, which means they could not supervise local authorities policies. This Act also fixed the age of leaving school at 15 and instituted free secondary education for all pupils. However it was noticed that the standard attained in basic skills by the UK population was low and poor compared to other European countries, and this could not satisfy the country national economic needs (Department of Education, 2011). To solve the problem raised by the falling standard, the Conservative Government came with the 1988 Education Act, sometimes referred to as the Kennet Baker reform which instituted a standardisation of all school programmes, and brought four main changes with a view to bringing back the level (Young, 2008). The first change was the introduction of the National Curriculum, which defines four Key Stages, moving from Key Stage 1 to Key Stage 4. In primary schools, two Key Stages, 1 and 2 were identified: Key Stage 1 for Year 1 and 2 up to age 7; Key Stage 2 for Years 3 to 6, meaning age 7 to age 11. Later on, a Foundation Stage which concerns children aged 3 up to reception year was introduced. The National Curriculum came with a new terminology related to two types of school subjects, core subjects and Foundation subjects. In Primary schools, that is Key Stage 1 and Key Stage 2, the curriculum consists of the following subjects: English, Maths, science, information and communication technology (ICT), history, geography, art and design, music, design and technology (DT) and Physical Education. This was supplemented by the literacy and numeracy reforms in the 1990s taught everyday to improve children standard in those skills. Another change in the curriculum was the introduction foreign languages for children aged 7. This curriculum was later reconsidered for improvement. One advantage of National Curriculum is that all children in England and Wales have the same education programmes, and this makes comparison of levels easier and the transfer of children from one school to another is made easy. Actually the national Curriculum contains all the topics to be taught, in terms of knowledge, skills and expectations at the end of each key stage; it also determines how assessment has to proceed. The second change had to do with assessment of pupils. Here national standard tests such as SATs at age 11 (Standard Assessment tasks, and later Standard Attainment Tasks) were put in place, not only to assess whether they are up to the national standard expected, but also to put strategies in place to ensure improvement in those children learning. This led to the National Curriculum Council (NCC) as an advisory service to the secretary of State in matters related to the curriculum, and the School Examinations and Assessment Council (SEAC) in charge of assessments. The third change affected the administration of schools. As mentioned above, prior to 1988, Education administration was handled by local authorities. In London, for example it was in the hands of the Inner London Education Authority (ILEA), which was created in 1965, while outer London schools were directed by county councils and borough councils. The Education Reform Act of 1988 gave power to schools to opt out of local authority control and be funded by central government, so that schools could manage their own finances. The Local management of Schools meant that the role of head teachers included budget management as well (Powell and Edwards, 2003). This was the beginning of Grant maintained schools, which were later replaced by foundation schools. This led to the abolition of the Local Education Authority. The forth change concerned the creation of a league table where people could go and compare the performance of different schools. It was hoped that such a table would push schools to compete, and therefore provide better education to children. In 1993, another education act came into place. It aimed at increasing the number of Grant Maintained Schools; it replaced the NCC and SEAC with School Curriculum and Assessment Authority so that the curriculum content could be controlled by the government; more power was given to headteacher in their exclusion decisions of unruly pupils; changes were introduced for pupils with special educational needs; and the establishment of referral units. An inspection body called Ofsted came into existence to inspect schools in LEAS. Finally the SCAA and NCVQ formed the QCA. In 1997, the Labour Government introduced another reform. The Government introduced specialist schools such as Business, Sport schools so as to diversify education and the types of schools. So doing parents could have a variety of choices to make for their children. Failing schools were reopened under academies administered by churches or businesses. In deprived areas, the Government created Education Action zone in order to help improve education standard in those areas. Parents were given power and a voice to decide on the choice of schools for their children; they were given power to be represented in the school governing body. Further, a system of exam league table was introduced where parents could easily spot schools that are doing well, and those falling behind. Be it as it may, parents had the duty to ensure that their children attend schools. School funding was linked to the number of pupils a school had in its roll. The implication was that schools had to compete to improve their performance so as to attract parents and their children, and thus good funding as well. This is termed the market reform introduced by Conservative governments in the 1980s and 1990s, where schools were seen as a service and the parents and children as the clients. As a matter fact, education should provide valued forms of knowledge and equip children for life (James and Pollard, 2012) In the 1997 White Paper, Excellence in Schools, the rights of parents to information were extended including sending them the child progress annual report, their part in the inspection process, annual meeting, allowing them to have access to the childs school record. Schools were further obliged to publish an annual report about their management and a prospectus. Teachers were also given power to restrain pupils By so, doing the government, say the Department of Education gained new power, because they are in charge of the school curriculum, not the local authorities any more, the types of tests to administer to pupils, the types of qualifications to be awarded, the funding to give to schools, the nomination of members of the National Curriculum Council to plan the curriculum. The approval of schools that want to opt out, the change of school status is given by the State Secretary, even though the involvement of parents should be sought for. He has the administration of grants. The role of head teachers also changed as they became budget managers as well. The question one might ask at this point is to know whether those reforms were successful. Two views can be expressed here. On the one hand, the introduction of the national Curriculum should be appreciated, because it helps to have children expected to have the same knowledge and skills. The tests would help schools to work hard to improve their results, and research has revealed that more people are now going to university. The league table gives a better view to parents as to which school is doing better, so make an informed choice of schools for their children. On the other hand, it would appear that testing is not good enough to assess the performance of schools, and learning should not be limited to passing tests. With the league table, teaching has turned into preparing pupils to pass exams, and not a preparation for life. The league table has also been criticised as it ignores some areas such as Art and sport. Further, the league tables make some schools more popular than oth ers, and this raises difficulties for some parents to get a school of their choice for their children. Ball (2006) examined the concepts of markets in the context of education only to find that more needs to be discussed, and that such concepts as competition, supply and demand, producer and consumer behaviour, privatisation and commodification, values and ethics and distributional outcomes should be addresses as there is a paucity of research in this field. In Primary schools, teachers complained of the increased workload imposed by the National Curriculum, especially at the end of Key Stage 2 with the preparation of SATs, and this lead to Dearing Report which brought the load down by 20% (Alexander, 2012). The system of inspection also came into fire by various teachers unions who find the Ofsted as a problem, not a solution. Another problem concerned the introduction of foreign language teaching at age 7. This raised problems in a country such as the United kingdom where secondary schools teach various languages, French, German, Spanish. So a child could learn one language in primary school and have a different language in secondary schools. This means there will be no continuity as noted by the Guardian (2012). The structure of Key Stage 2 has also been criticized as it takes four years which the Framework for the National Curriculum found too long (DE, 2011). To conclude, it can be said that there have been one main Education reform Act, the 1988, and many education acts from 1988 to 1997. The changes in educational policies in those reforms can be regrouped in three categories: changes to do with centralisation, as education moved from local authorities to the government with the introduction of the National Curriculum; assessment by outcomes with the use of national assessment and the establishment of league-tables to compare the performance of different schools, and the quasi-market reform where schools are the manufacturers and children and their parents as consumers who have choices to make between different schools. In primary schools, the reforms could be noticed with the introduction of Key Stages 1 and 2, the national Curriculum with Maths, English and science as core subjects, while others were considered as foundations and religious study as statutory, the introduction of SATs and the literacy and numeracy strategies.

law :: essays research papers

asdfadsfDave: Bad Doctor Obtained from: Kids in the Hall FAQ Dave: Wanna know something? I'm a bad doctor. I'm not boasting. I mean, who would? Just stating a fact that I've never really gotten the hang of the whole healing-the-sick thing. And don't interpret this as some sort of false modesty, please its not, its not like I’m weak in some areas. No, I'm homogeneously unqualified to practice medicine in any capacity. I *really* don't have a clue. And no one could be more shocked than me that I've been allowed to rise to a position of such importance and responsibility. I guess it all started in high school where I was a very bad science student. One day when we were supposed to be dissecting a frog, I accidentally disassembled my desk. Oh, but, you know, I was a popular kid. You know, the other students were always eager to help me out. So you know, during a test whenever I'd get that *confused* look on my face - which was invariably - well, the cheat notes would just start flying! Even the teachers would start whispering answers, you know, *ahem* mitochondria... But I didn't worry about it. I figured, how far could you coast on charm? Well, pretty far, actually! They just offered me the job of Chief of Surgery. Apparently, I've logged more hours in surgery than any other man my age. Four thousand hours this year alone. What no one seems to have noticed that it was all with the same patient. Oh I wanna show†¦. Oh, I want to show you something. You know what this is? Urine. Another man's urine, aonther man’s urine. I ask for it, and they give it to me! I don't know what to do with it! I've got a fridge full of this stuff. I mean, I suppose I could send it out to the lab, but they'd only send back a lot of test results that I couldn't possibly understand. The only thing I'm actually sorta good at is referrals. You know that thing where doctors send patients to other doctors. Well, I'm the king of referrals. What I do is I call the, uh, the sick person into my office, and I stare for a long time really seriously at this blank sheet of paper.

Monday, August 19, 2019

Romeo and Juliet by William Shakespeare :: Free Essay Writer

Romeo and Juliet by William Shakespeare "Violent delights have violent ends" Romeo and Juliet, two young people from Verona, come from two families in conflict. They meet at a ball and fall in love and only to find out their roots and families. They realise their stubborn families would not approve and plan on how they can be together. As we see in the play the friars words "violent delights have violent ends", has a very significant meaning to the story where things that are started violently have often have violent ends. At the beginning of the play the scene opens with the Montages and the Capulets fighting in the market place of Verona. Already from the first scene we know that there will be more violence and possibly a tragic end. Here the friar's premonition is already coming true before he has even said it. The prince suddenly appears and says, "thrice has my city been disturbed by your fighting". He vows that if they disturb again the culprits would be put to death. The climate in Verona is very hot and dry this often sparks fights and people's tempers become fiery. The main characters in the play are Romeo and Juliet who are in love and the play is centred on them. Mercutio is a Montague; he is a lighthearted man and a joker. Benvolio is also a Montague; he is a ver peaceful and sensible man. Tybalt is very aggressive and passionate. Romeo and Juliet meet at a masked ball hosted by the Capulet family. Romeo goes because he thinks that Roselyn the girl he admires will be there. When Romeo arrives there he puts his mask on so they do not recognise him, as he is the Capulets enemy. Romeo begins to dance and he spots Juliet she also spots him. They gaze at each other's eyes and begin to dance. It could be said that fate is already at work here. Juliet's nurse calls for her and here is where they both find out each there's identity. They are both devastated.

Sunday, August 18, 2019

Stopping by the Woods Essay example -- essays research papers

"Stopping by Woods on a Snowy Evening" is by far one of my favorite works of modern poetry. The pensive, unhurried mood of the poem is reflected with a calm rich imagery that creates a vivid mental picture. The simple words and rhyme scheme of the poem give it an easy flow, which adds to the tranquility of the piece. Every aspect of the poem builds off the others to put the mind into the calm of a winter evening. The first stanza of the poem is rather simple and provides the basis for the imagery. It mentions the woods and implies that they are located away from town and civilization "his house is in the village though". It also shows the easy pace that speaker is taking, having plenty of time to simply watch the falling snow. As I think about them, the words of the first stanza are not overtly somber, they do however through their order and the way they were chosen create a rather pensive mood. The second stanza provides a more in depth view of the imagery sketched out in the first; it also provides a more definite time and location. The first two lines of this stanza firmly place the reader rather deep in the woods and away from any dwelling. He is so far out in fact that his horse is puzzled by his actions. The next line gives a better image of the scene "Between the woods and frozen lake"; it seems to be a rather quiet and lonely place. The next line then provides that it is night...

Saturday, August 17, 2019

The Validity of Chinese College Entrance Exam Is Questioned

Xiaoqi Jin (Jessica) Professor Karen College English Writing 23 July 2012 The validity of Chinese college entrance exam is questioned Introduction The Chinese College Entrance Exam is some ways like the SAT, except it lasts more than three times long as the SAT tests. It is offered just once a year and the result of the two days exam greatly affect the future of any Chinese student. The score determines whether you can receive the college education and what level of the education you can enroll in. For most place of China, only a half of the students are eligible for the college education.One Chinese compared the exam to a stampede of â€Å"Thousands of soldiers and tens of thousands of horse across a single log bridge. † The time and difficulty it takes for all the soldiers to cross the bridge showcases the students rush to pass the exam. Only a few students qualify to sit and pass the exam. Most colleges rely on the composite score, rather than individual subject scores, the value of the entire exam is questioned by the study (Shum & Zhang 55). History of the exam The exam is a national determinant in the academic council in China.Taken annually, the exam is a prerequisite in almost all education institutions in China universities. Students are required to take the exam in the last year of their high school education. No age restriction is placed on the individuals taking the exam hence the number of candidates’ increases as years go by (Hargreaves, Lieberman, & Fullan 352). The exam helps the Chinese education system to develop a simple method of placing individuals in the correct course. Regulation of the number of students enrolled in the educational system aids regulating student population growth in the institution of education.The exam sets to enroll students with specified standards into higher education systems. The procedure The exam runs under equivalent rules as those of SAT. The exam runs to 2 or 3 days with papers offers in Mathemat ics, Chinese and a foreign language. The entrance exam also requires the candidate to handle papers in six other standard subjects, 3 being sciences and 3 being humanities. The program a student hopes to study determines the subjects examined. On an overall experience, the students go through a science integrity test, a general integrity test, and a humanity integrity test.The general procedure and requirements of the exam is set within the constitution of the republic of China. The student taking the exam has to have a high school diploma or its equivalent. Health is also an important factor the education system considers. The examination council does not allow for students enrolled in a higher education program to take the exam. Students applying for special courses such as the military are allowed to take the exam with special specifications (Shu 52). The advantages and disadvantages of the examThe exam is important to the Chinese people as it offers a fair platform for talents p resented by the China students. Every student is considered equal before the marks, which makes it fair for students to enroll in colleges. The exam elevated the will of teenagers to accomplish in the academic sector. In a technological oriented country like China, the exam is important as it improves the level of education. Students strive to perform well as it determines their success. The exam works with individual groups within a community who associate with leadership of an area.This helps gain control over the set territory in the community. The exam helps the country deal with illegal behavior, either as a group or individually (Burger 177). The youth are vulnerable to becoming unproductive gang members as they have all characteristics that meet the gang demands. Various ethnic backgrounds have gangs operating on the streets. Young people become gang members for benefits such as protection, respect, money and power. The vulnerability of the youth provide an easy time for gang leaders, as the benefits are influential. The benefits are the main reason as to why individuals join the gangs.In most cases, the youth lack the benefits hence; do not hesitate on joining the gang. The community fails in supporting the youth realize success, safety, and financial security hence they opt to join a gang instead. On joining the gang, the youth gain a feeling of identity as they have relations through bonds created in the gangs. Placing the examination provides the students with an opportunity of leaving a better life (Burger 177). Geographical boundaries defined by cultural, social, and economic forces are the distinctive characteristics in taking the examination.Institutions protecting other institutions are common in identification of which class each education system relates to in the community. Characteristics common to various education institutions across boundaries include social adjustment problems, tribulations or trials of the members, handling the business , and the jobs offered to the members. Most of the youth have no choice but to join these institutions to further their studies. Poverty and unemployment is a significant contributor to the youth enrolling into these institutions.The reason is the same across boundaries as the youth enrolling in the youth lack needs due to effects of poverty, and unemployment. Once joining the institutions, the youth expect to have a bright future, which is not the case. The exam system makes the students concentrate of blue-collar jobs forgetting the skills they could deploy in practical oriented jobs. Youth that face challenges are prone to joining the job marketing to gain the advantages that come with joining the industry. The study comes with distinctive identities such as money, security, and popularity.Vulnerable youth with no financial support find refuge in deploying for the exam to match up to pressure from their peers. The educational system does offer individuals from different backgroun ds the same environment of study. A less privileged youth falls into gang activity to secure comfort. The youth who are technologically advanced fall prey of joining gangs. The progress is visible in social networking sites. Social networking sites establish as a distinct with graffiti tags, signals, and colors, which attract the youth to joining.The study attracts individuals from one location as it becomes easy to find them online, and offline. Technology and study grows, and in China, the students elevate the ideas through sharing the ideas on the social networking framework (Shum & Zhang 52). How does the exam affect the well being of the youth in China? The age of individuals allowed take the exam is not limited to teenagers as they come with the characteristics required to run activities. Teenagers are vulnerable to lack money, security, and power. They are willing to earn this at every cost.The exam controls teenagers easily as opposed to young adults who attain the benefits on their own. Age affects the performance of the exam by setting the limit of the people who can sit for the exam annually. Some gangs have different age sets for different jobs. Research shows that the benefits for the exam include protection, respect, money and power. Individuals who do not meet the exam targets suffer distortion from the leaders. Threatening is common against the members, and their family members if they do not meet the rules set by the exam.Research displays the benefits of passing the examination with the vulnerable wants that the youth lack. Youth from poor backgrounds lack the pleasures that come with constant financial supply. They become vulnerable to the conditions set by the educational systems (Hargreaves, Lieberman, & Fullan 352). Conclusion Different examinations set to acquire different purposes. Taking the exam requires the individual to pass the set subjects. A target placed on the pass mark is keenly followed, failure to which the member faces cons equences.A student who fails to acquire the pass mark result is subjected to passing the exam once more. China’s system of education may mimic the SAT certification but it plays a role in ensuring that the students acquire basic education before setting to study a higher program in the university. Enrolling the students to university through the examination is essential in setting pace for the right direction. Instilling the importance of knowledge through examination may sieve the success path of many students, but they elevate level to which students find education important.The rush for students to achieve excellent results remains a challenge as the pass mark rises according to the results.Works Cited Burger, Jerry M. Personality. New Jersey: Cengage Learning, 2010. Hargreaves, Andy, Ann Lieberman and Michael Fullan. Second International Handbook of Educational Change, Volume 2. New York: Springer, 2010. Shu, Hui. Sojourners in Transition: Chinese Women Undergraduate Stud ents at an American University. New Jersey: ProQuest, 2008. Shum, Mark Shiu Kee and Delu Zhang. Teaching Writing in Chinese Speaking Areas. New York: Springer, 2005.

Friday, August 16, 2019

Boony Doon Case Essay

CASE FORMATTING RULES AND CONTENT GUIDELINES/ CASE QUESTIONS FOR BONNY DOON VINEYARD I Formatting rules The case write-ups should be typed and double spaced, 12 point font (Times New Roman), normal margins with a maximum length of 5 pages which you can split between text, numerical tabulations or appendices as you see fit. You should have a cover page with your names, student numbers, title and course section. You can add the table of contents page and 1 page with the appendices. I expect that it will take you about 3.5 pages to do the analysis (points 1to 4) and about 1.5 pages for points 4 to 7. II Content guidelines The structure of your report should follow the following template: 1. Brief statement of current position/outlook of Bonny Doon (about 1 paragraph) 2. Firm Analysis (This part should include: – business model, business-level strategy and position, – value chain model analysis – analysis of the firm’s resources, capabilities and competitive advantage, – organizational analysis (management, ownership) – profitability analysis (please make sure to include relevant numbers). 3. Industry analysis This part should include: – basic descriptors (size of the market, key players, demand) – Porter’s 5 forces model, – life-cycle model, – key success factors (what it takes to be successful in this industry) – economics of the industry (profitability, costs and revenues) – industry’s overall attractiveness (including the past performance and projected growth) 4. Strategic problem/issue identification and definition 5. Generation of alternatives 6. Recommendation(s) 7. Brief implementation schedule III Case Guidelines/major points for â€Å"Bonny Doon Vineyardsâ€Å" Reference point: You are writing a report as consultants to Bonny Doon. Your report will be presented to their senior management. Here are the main points for your report. 1Describe the current environment for Bonny Doon, including competition and the market trends in the California wine industry at the time of the case. 2.Outline the main features of Bonny Doon’s business strategy. What are its benefits and drawbacks in the light of current situation? Why has Bonny Doon been so successful? 3What are the main challenges and strategic problems facing Bonny Doon? 4.In light of the problems that Bonny Doon is facing, what would you recommend to their management? You should attach a statement to this write-up, which should be signed by all members of the group, indicating that this is entirely the group’s own work, is based exclusively on the information provided in the case, and that each group member contributed their best.

Thursday, August 15, 2019

Human Profile

Chapter 5 Human Factors in Aviation Security Contents Page INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background on Human Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA AND HUMAN FACTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA Policy and Plans for Human Factors and Aviation Security . . . . . . . . . . . . . . . . . . 80 FAA Requirements for Aviation Security: Human-Factors Implications . . . . . . . . . . . . . 82 Other Issues for Human Factors and Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Box Box Page 5-A. UAL Hi-Tech Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter 5 Human Factors in Aviation Security factors in these cases can greatly improve the utilization of technology for airline security. Dramatic accidents caused by human errors in the nuclear power, chemical, and transportation industries have increased public attention to human performance issues during the past decade. Additional training requirements, revised operating procedures, warning devices, and expanded government oversight are typical recommendations following accident investigations.However, these stopgap measures address only the surface of problems that are rooted in the complex interactions of people and equipment within the larger system and the institutional and organizational structures and procedures that drive the planning, design, and management of these systems. Following the ground collision of two jetliners in Detroit in December 1990, Dr. John Lauber, a member of the National Tr ansportation Board, said that â€Å"basically the [aviation] system, the way we’re operating it, almost demands nearly error-free [human] performance. Similar concerns can be echoed for the aviation security system—a number of successful airline terrorist events have been traced to a human failure. 2 â€Å"The challenge is to design a system. . which is tolerant of those errors when they do occur and which detects and traps them before we have [a catastrophe]. †3 Multilayered defenses are employed at many commercial airports and airline terminals, and security managers and government authorities are turning to new technologies to buttress these systems. Heretofore, Federal requirements and industry use of security technologies have usually been with specific functions in mind.As long as the technical goals could be met effectively, the equipment was considered satisfactory and human performance problems related to the technology were resolved through revised tr aining and procedures. Technology use in counterterrorism will likely increase dramatically over the next decade, but if early and INTRODUCTION Human resources are critical to aviation security. Security personnel—passenger and baggage screeners, guards and law enforcement officers, and airport and airline employees in general-are important elements of a system that prevents and deters hostile acts against air carriers.Technology can enhance, but cannot replace, the capabilities of these people and the many services they provide. Moreover, management practices based on behavioral research findings can further improve human performance. This chapter considers the function of screeners in weapons and explosives detection, and the role of guards, officers, and other aviation employees in discovering (and deterring) suspicious individuals or situations. Within the past 20 years, technology has greatly increased the capability and productivity of these security people.Metal detect ors and x-ray devices are faster, more accurate, and more socially acceptable tools for screening passengers and baggage than manual searches. Remote television and other monitoring devices, computer-controlled access to restricted areas, and communication and data systems allow comprehensive surveillance and threat assessment. While these technologies raise the capabilities of a security system to new levels, their ultimate success and actual performance depend on the people who design, operate, and maintain them.Many security assignments require repetitive tasks and close monitoring for rare events— functions that humans perform poorly. Selecting well-suited individuals, training them properly, designing their work environment and rotation schedule to elicit the best possible performance, and providing motivating incentives are fundamental requirements for successful operations, regardless of the type of technology in place. These functions involve human performance; applic ation of human p. A17. IJohn Lauber quoted by John H. Cushmau Jr. , â€Å"Test for Aviation: Coping with Human Shortcomings,†The New York Times, Dec. 0, 1990, ~ne example was the destruction of a Korean Air Lines flight over the Andaman Sea by a bomb planted by North Korean agents. The device, in a carry-on bag, was ahnost detected at a security checkpoint in Baghdad at an earlier stop. When a security guard wished to remove the batteries from a radio, one terrorist turned the radio on, proving it operated, and then raised a hue and cry, yelling and complaining. Instead of using this as a reason to stop the two suspect individuals and to examine their belongings minutely, the security forces decided to avoid trouble by allowing them to proceed. Lau~r, op. cit. , footnote 1. –79– 80 q Technology Against Terrorism: Structuring Security methodic attention is not given to human performance issues, we may expect that system efficiency and effectiveness will be substa ntially impaired. Background on Human Error The human role in a security system is complex; thus the nature of human errors, from mental to physical, varies widely. Mental or cognitive errors can include improper judgment or decisionmaking, while physical errors may stem from motor skill deficiencies or faulty equipment design.A combination of physical and mental processes may influence other kinds of errors, such as those involving communication, perception, or alertness. Human factors, a discipline combining behavioral sciences and engineering, focuses on improving the performance of complex systems of people and machines. Designing and operating a system so that it does not induce human error (in fact, designing it so that human error may be minimized) is one critical component of human factors and limiting the impact of a human error once it occurs is another aspect.Many types of human error are systematic, following certain predictable patterns; once these patterns are identifi ed, countermeasures can be developed. For example, poor location of switches or dials can induce manual or perceptual errors. For those types of human error that do not follow predictable patterns, mitigation techniques are difficult to develop. Some examples of mitigation techniques include automatic monitoring and warning devices. These subsystems, when properly designed and implemented, can be invaluable tools for negating human error.Employee selection—allowing into the system only those people least likely to make mistakes— and continued quality control maintained through training and monitoring are basic steps for minimizing human errors. Potential errors can be forestalled by the use of standard procedures and checklists for routine and emergency tasks, planning work shifts and assignments so as not to induce inattention and 4EM1 L. hlC. , fatigue, and properly designing the work environment. â€Å"If human factors engineering is done properly at the conceptual and design stage, the cost is high, but paid only once.If tranin g must compensate for poor design, the price is paid every day. † 4 According to one expert, there does not appear to be a strong need for new basic research in human factors related spectifically to security-behavioral science findings in general and experience with human performance problems in other industries are probably sufficient to enhance current security operations. 5 For example, such knowledge is being used to upgrade security screener selection by airlines, and to improve training standards.However, the mechanisms to identify early on and to address effectively the human performance issues stemming from new security technologies, such as explosives detection systems, are not yet in place in industry or the Federal Government. Shifting boring and repetitive tasks that people perform poorly to machines is an approach that can reduce errors. However, automated devices (or any new technology) may create new sources of human error. 6 Excessive false alarms unnecessarily distract operators and may lead to the device being ignored or disabled.During unusual or emergency circumstances, the lack of flexibility in many automated systems can be a serious limitation and the human backup may not be mentally or physically prepared (or possibly even capable) to take over. Consequently, a full system approach is required for reducing total human errors. FAA AND HUMAN FACTORS FAA Policy and Plans for Human Factors and Aviation Security In a report released in July 1988, OTA concluded that FAA attention to the spectrum of human performance problems in commercial aviation fell far short of the level warranted, since human error is the leading cause of aviation accidents. Later that same year, Congress passed the Aviation Safety Nagel wiener, $~cw~it Automation’ Hu~n ~ac~or~ in Aviation, Eu1 L. wiener and David c. (eds. ) (Sm Diego, CA: Academic PESS, 1988) p. 454. SH. c~fion FoUShee, c~ef scien~lc and Tec~~ Advi,qor for Human FaCto~, FAA p~so~ wmmunimtio~ 1991. 6see wiener, op. cit. , f~~ote 4, Ch. 13 for a discussion of new and subtle types of human error that have resulted from the introduction of automation into aircraft cockpits. W. S. Congress, OffIce of Technology Assessment Safe Skies for Tomorrow: Aviation Safefy in a Competitive Environnzent, O’E4-SET-381 (Washington, DC: U.S. Government Printing Offke, July 1988). Chapter 5-Hurnun Factors in Aviation Security q 81 Research Act, which directed the FAA to expand its research efforts on human performance in aviation and authorized funds specifically for that purpose. 8 The FAA responded by creating the position of Chief Scientific and Technical Advisor for Human Factors, responsible for coordinating for the FAA various human-factors research efforts within the FAA NASA, and the DOD and for opening lines of communication within the FAA and industry.Communication among Federal agencies is critical, since decisions made by the aviation industry and the operational and regulatory sections of the FAA often drive the need for new human-factors research and could benefit from an understanding of humanfactors research findings and products. The FAA has made progress in addressing the earlier criticism of its human-factors programs and understanding in aircraft and air traffic control (ATC) equipment and operations.However, the key shortcomings in FAA human-factors efforts that OTA cited in its 1988 study-insufficient agency expertise, uncoordinated research efforts, and regulations and certification standards that do not reflect human-factors principles-still exist within FAA civil aviation security programs. During the course of its study, OTA examined closely many of the technology development programs and regulatory efforts underway in the security sections of FAA and found a general lack of awareness and understanding of the human-factors issues involved with possible new security te chnologies.An exception to this situation, however, and a hopeful indicator of a new trend, has been the hiring of a human-factors expert at the FAA Technical Center to oversee human-factors research as it relates to airline security. However, at present, it appears that the FAA is ill-prepared to identify and address possible human-factors concerns with the increasingly complex and diverse security technologies now under development. The dearth of trained humanfactors specialists in areas of the FAA responsible for civil aviation security is a serious deficiency.Until recently, the Aviation Security R&D Service of the Technical Center would have merited similar concerns, but this shortcoming is being redressed, at least in part. Some of the expertise that the FAA is developing on human factors for other uses could also be applied to security issues. One potential vehicle for bringing human-factors knowledge into aviation security efforts is the National Plan for Aviation Human Fact ors (HF Plan), the first major product of the heightened FAA attention to human performance issues following the enactment of the Aviation Safety Research Act.The HF Plan identifies significant human performance issues and lays out a 10-year blueprint for establishing and coordinating research programs and conveying the results across Federal agencies and industry. The HF Plan’s development depended strongly on advisory committees composed of a cross-section of research, operational, and regulatory representatives from government and industry and approximately 50 of the nation’s leading human-factors researchers. The good news for aviation security is that the Plan appears to provide a strong foundation for multi- and cross-disciplinary efforts and understanding in human factors and has begun to institutionalize and focus consideration of human-factors issues in FAA decisionmaking. The bad news is that nowhere in the Plan is security mentioned—the Plan addresses the following five aviation environments only: aircraft flight deck, air traffic control, aircraft maintenance, airway facilities maintenance, and flight deck/ATC integration.This should not be construed as criticism of the general thrust of the HF Plan—the human-factors categories considered have historically been more critical to aviation safety and are considerably more complex than human performance issues in security-and it is beyond the scope of this study to analyze in detail the specifics of the HF Plan. However, some objectives and products of the HF Plan maybe directly transferable to aviation security, provided that lines of communication are established and security experts are included in committee structures.The Plan has eight objectives, all of which can apply to aviation security, but the following two are especially pertinent, given the present attention to technologies for countering terrorism: . to encourage the development of principles of ‘human-ce ntered’ automation and the design of SAviation Stieu Research [email  protected] I%blic bW 100-591. %J. S. Department of Transportation Fedeml Aviation Administratio~ â€Å"The National Plan For Aviation Human Factors,† vol. I, draf~ November 1990. 82 q Technology Against Terrorism: Structuring Security dvanced technology that will capitalize on the relative strengths of humans and machines; . to develop human factors-oriented validation and certification standards for aviation system hardware and personnel that will enhance both safety and efficiency . 10 The HF Plan is designed to be reexamined and revised periodically and aviation security could be added explicitly as a focus area if need and resources warrant. Crucial to the development and future success of the HF pian is the Human Factors Coordinating Committee (HFCC), formed by the FAA administra11 tor in September 1989.HFCC has representatives from each major division of FAA and serves as ‘‘an adv isory body for senior management of FAA in all matters involving human performance and [is] intended to assure that human factors issues are represented in all FAA activities. ’ ’12 Until very recently, the Assistant Administrator for Civil Aviation Security was not represented on this committee. However, this omission has since been recti13 critical-flight safety is at risk only when security performance fails at the same time that a threat occurs.Moreover, FAA staff and the agency â€Å"cul- ture† are predominantly interested in aviation technology and operations and protecting facilities and countering terrorism are not an inherent part of aviation, l4 However, the increasing Complexity of screening technologies and the continuing (possibly increasing) terrorist threat make the performance of aviation security systems more critical to flight safety. fied. Aviation terrorist events in the 1980s made apparent the shortcomings of the minimum Federal security req uirements.The FAA and the airlines both focused attention on screener selection and training, detection and screening technologies, and airline management of security programs and systems. The FAA has increased requirements and oversight of security personnel (selection, training, and management) and equipment (weapons and explosives detectors), but has not yet addressed how security personnel and equipment perform as components of a system. Screener Selection and Training For years, the people who screened airline passengers and baggage for domestic flights generally received little training, low wages, and few benefits.Consequently, alarmin g numbers of domestic 15 FAA Requirements for Aviation Security: Human-Factors Implications Aviation security personnel and equipment have received (and have not needed) the same level of regulatory and certification attention that the FAA places on flightcrew, air-traffic controllers, and ground support personnel and their respective aviation equipment. The FAA has focused its regulatory efforts on elements of the aviation system essential to flight safety. For example, the performance of pilots and aircraft systems are continuously critical for maintaining safety-a failure could cause an accident.On the other hand, the performance of the security system (other than as a deterrent) is rarely not screeners failed unannounced FAA tests (22 percent failure rate in 1988). 16 Since there has not been a severe domestic terrorist threat against aviation in the United States, these shortcomings have not resulted in life or property losses. 17 In light of public pressure following the Lockerbie disaster and costly fines stermming from FAA inspections, the Air Transport Association (ATA) developed an extensive set of screener selection, training, and compensation standards.ATA pro- 1%id. , p. 3. lllbid. , p. 28. l%id. , p. 28. lsundm tie FAA ~rga~tio~ s~c~e fi plaW in 1988 [email  protected] 1990, tie Office of Aviation Security wu represented @ the Executive Director for Regulatory Standards and Compliance, to whom it reported. 14fiowl~ge of aviation tw~olow ~d Operatiom i5 impo~t to fic~t ad @ofi s~ty. For e~ple, spec~ characteristics of aviatio~ Such as large volumes of people and luggage that must be screened quickly, drive the security system design and functions.IsHowever, ~~es ~ustom~y ~ve ~gher s~n~ds for security personuel working h ktWtEitiOlld OpelZitiOllS. 16Lpe Osmus, office of Aviation Security, FW, personal COllMIluIlktitiOIL Feb. 22, 1991. [email  protected] on tie deffitio~ he des~ction of a PSA ftight in 1987, caused by a disgruntled ex-emPIOYW Who Shot tie flying Crew in [email  protected] @@t aircraft be considered a terroris4 as well as criminal, act. In this case, theex-employee had an identifkation card with which he gained access to the so screener training was not an issue. Chapter 5-Human Factors in Aviation Security 83 posed that airlines (or their security contractors) 18 co nsider education and health criteria, the ability to speak English, and aptitude test results before hiring screeners, and that they offer competitive wages, benefits, and incentives and follow a comprehensive training curriculum. In March 1990, the ATA asked the FAA to adopt its proposal as requirements for all airlines. Based on this cooperative industry effort, the FAA has required some of these suggested upgrades in training measures for screeners. (Most U. S. irlines have adopted at least some of the ATA recommendations; the failure rate on random checks has since dropped significantly. )19 The FAA decided not to include selection and wage standards because such a change would require public comment (i. e. , through the Federal Register), thereby calling attention to perceived or actual security weaknesses. rewards to those who detect test weapons and explosives (and even higher rewards to those who find the real thing); and increasing wages to at least the â€Å"local prevail ing rate. For comparison, in Israel, screeners are paid at a level considered a â€Å"good† salary, far higher than minimum wage. In Switzerland, they are paid at the rate of about $lOper hour. In the United States, rates are often near minimum wage. Management Practices and Human Performance The FAA mandates certain positions in an airline’s organizational structure, such as a security director for the airline and security coordinators at each airport, but airline management practices and philosophy usually fall outside the scope of FAA 20 regulatory authority.In Safe Skies for Tomorrow, OTA found that the effect of airline operating or management practices on airline safety, and changes in those practices, were rarely addressed in FAA safety analyses. 21 The FAA's Human Factors plan cites the influence of management â€Å"culture† on human performance as one area where basic research is needed. 22 If the organizational â€Å"climate† (i. e. , working co nditions, wages, management, organizational culture, etc. ) does not allow an individual to perform at his or her peak, it may not matter how well he or she is trained or how well designed the technology is. 3 The ATA proposal for upgrading screener standards suggests giving screeners employee benefits common in many industries (vacation, holiday, medical) that contractors often don’t receive); offering to contractors the advantages of airline employment (e. g. , low-cost travel) and career opportunities to top performers; providing monetary The United Airlines’ approach to improving screener performance on all flights from selected airports delineates one set of management techniques (box 5-A). Another approach has been undertaken by American Airlines, lthough only for its international flights. 24 American treats its international screeners as part of the American team. They are hired as full-fledged airline employees, not employees of a contracted security agency, a nd enjoy the same salary levels and benefits that ticketing agents do. The educational level of entrants appears relatively high, with a few individuals having advanced degrees. There appears also to be a real opportunity for advancement within American Airlines, and not just in the security division.Before starting work, the entrants are brought to Dallas (from across the world; many screeners are hired from the countries in which they will be working) for 2 weeks of training at American’s headquarters. The training includes emphasis on the screening questions as well as on what to look for on the x-ray screens. The screeners ask the standard questions as to who packed the baggage and whether anyone could have placed contraband in it. But they also ask general questions regarding destination and travel plans, somewhat akin to the lines of questioning performed by El Al.Indeed, American has used Israeli security consultants in designing their security system. The screeners lo ok for a number of specific characteristics, which remain proprietary to the company. If too many of the characteristics match a passenger, the individual’s baggage will receive much closer inspection. Screeners are ro- 18Most scree~g for domestic flights in the United States is conducted by security Contractors, nOtairhe employC%S. l~we Osmus, op. cit. , footnote 16. ~u. s. Conwss, OffIce of Technology Assessment, op. it. ,fOOtiOte 7. 211bid. , p. 88. 22U. S. Department of Transportatio~ Federal Aviation Administration op. Cit. , fOOtnOte 9, p. 15. ‘Ibid. 24s0~~: Site visit t. D* [email  protected]% December 1$)90, and Homer [email  protected] Chief of Sedty, American Airlines, perSOIlal COmm~CatiO~ December 1990. 84 q Technology Against Terrorism: Structuring Security tated between looking at x-ray screens and interviewing passengers. Periodically, security systems are tested by contractors, who choose an American employee to play a terrorist.A specific scenario i s given to this impostor, and the reaction of the security personnel is noted. If they do not perform their functions, they may be subject to severe discipline, including termination. The result of the overall approach, using incentives and threat of discipline for negligence, appears to be a well-motivated and alert force. Box 5-A—UAL Hi-Tech Screening United Airlines is focusing on management practices in its program, called Hi-Tech Screening, to improve the quality of pre-departure screening and the public perception of this highly visible function.Begun in 1987 at Chicago O’Hare and San Francisco Airports, the program incorporated many of the selection and incentive steps later recommended in the ATA proposal, and also attempted to integrate technology and people by reconfiguring the screening environment to make it more pleasant for screeners and passengers as well as to improve operations. Although wages are still low, successful workers have the opportunity to j oin the UAL organization, instead of working as contract security personnel.Improvements include direct communication links to supervisors for oversight and advice to screeners, layout designed to minimize passenger delays, and multiple cues to passengers that security measures are being taken in a professional reamer (security supervisor in an elevated booth, passengers see themselves on video monitors as they go through metal detectors, signs describing procedures are clear and concise). United believes that the program has been successful to date in increasing public awareness and employee morale and competence.At Chicago, the employee attrition rate dropped by half and weapon detections and FAA test scores increased significantly (79 percent detection rate on FAA weapons tests prior to Hi-Tech and 92 percent subsequently). United has also installed Hi-Tech Screening systems in Denver, LOS Angeles, Seattle, and Washington Dunes, with plans for additional implementation in the fut ure. SOURCE: Site visit to O’Hare, April 1990, and Richard Davis, Operational Security, United Airlines, Jan. 3,1991.Security Equipment Currently, the FAA requires airlines to employ relatively few types of security equipment— primarily x-ray devices and metal detectors. The FAA established minimum performance standards for detecting weapons and explosives, and since these technologies are radiation-based, the FAA also requires that they meet Federal health and safety standards . 25 There are no standards governing operator interaction with the equipment, such as the layout of controls and display symbology options. At the time the FAA established x-ray and metal detector requirements (early 1970s), it had little expertise in human factors.Moreover, these technologies were relatively simple compared with aircraft cockpit and ATC consoles that the FAA had to certify without objective human-factors criteria, making humanfactors standards for security a relatively low pri ority. However, many behavioral experts argue that properly developed human-factors standards could improve system performance for aviation security as well as safety. In recent years, the FAA has issued regulations for security technologies-computer-controlled access at airports and explosive detection systems—that are considerably more complex and have wider system implications than x rays and metal detectors.As has is evidenced in the explosive detection system (EDS) regulations published in September 1989 26 and the subsequent performance of TNA, the only device to date that could meet the FAA standards. Beyond setting detection criteria, which are critical to the security system performance, the FAA also included requirements for throughput of the device (which is primarily an economics issue—see ch. 4) and a requirement for 100-percent automated detection decisionmaking. Several lines of reasoning could lead to a design goal of total automation, including lower o perating costs over the long run een commonly the case whenever new technology is used to solve a problem, attention is focused on the positive aspects of the technology—how effective it is—without giving full consideration to possible new human-factors problems caused by the technology. The lack of attention to man/ machine human-factors and system operating issues ~F~r ~xmple, ~. ray ~y~tms ~~~ P-Y for cW. on baggage must meet tie s~n~ds set by the Food and Drug Administration. x54 Federal Register 36938 (Sept. 5, 1989). Chapter 5-Human Factors in Aviation Security q 85 nd possibly removing human error from the operating loop. However, it maybe useful, and sometimes vital, to keep the human in the operating/decisionmaking loop, especially if he or she must respond during emergency or unusual conditions. As has been shown so far in TNA tests, the false alarm rate is well above earlier goals and human intervention is required quite often. While automation, in the conte xt of an EDS, is a useful tool, and total automation may be an understandable goal, requiring 100 percent automated functions in an EDS is not justified at this time.The E D S regulations provide an example of where input from a group such as the FAA’s Human Factors Coordinating Committee could help flag potentially troublesome human-factors aspects of security regulations. Airline passenger profiling, in most cases, must be fast (and consequently cursory) enough so as not to impose excessive delays. In other security contexts, such as screening for the â€Å"insider threat† profile within an organization where time is not so critical, much more detailed background data and questioning is possible.A different, although overlapping, form of profiling is used by law enforcement and investigatory agencies. Given pertinent data and evidence from a crime scene or threat, experts compile a profile of likely social, psychological, and physical characteristics of the criminal. However, much of the work and methodology could be transferred from one of the broad profiling regimes to the other. FAA Requirements for Profiling-Under Federal regulations, U. S. airlines must apply a relatively simple form of passenger profiling for international flights (e. g. questions regarding electronic devices), although airlines are not prohibited by FAA/DOT from conducting any form of profiling at any time. Whether or not a passenger is selected for closer scrutiny, such as a manual baggage search, depends on where his passport was issued (a factor that varies based on threat intelligence) and on responses to a series of questions aimed at identifying potential terrorist â€Å"dupes. † Additionally, airlines must conduct random baggage inspections on a small percentage of otherwise unselected passengers for each flight.These requirements do not apply to domestic flights or to foreign airlines, which results in an obvious gap in protection for Americans. The fact P assenger Profiling In-depth questioning of all airline passengers and detailed examin ation of each of their personal belongings and baggage is impossible in a modern transportation system. Since most of the millions of passengers that fly on U. S. airlines each year pose no security risk, targeting security resources on the small number of passengers who exhibit some elements of the threat â€Å"profile† is one way to increase security without clogging transportation flows. rofiling can be a valuable component of a transportation security system, providing an independent complement to hardware-based (and often more expensive) explosives and weapons detection technologies. Successful profiling depends on a large support system including comprehensive intelligence networks and threat analyses, information system technology to process large databases, behavioral research and analysis, and trained and motivated screening personnel.There are two general approaches to operational profiling. One compares passenger demographic and other background data (age, sex, nationality, travel itinerary, etc. ) to historic or recent intelligencederived â€Å"threat profiles. † The other is based on the examiner’s psychological assessment of the passenger, taking into account nervousness, hostility, or other suspicious characteristics. Most profiling systems currently use elements of both approaches to varying degrees. that foreign airlines that compete with U.S. airlines on international routes do not have to satisfy these requirements imposes an economic penalty on domestic carriers and weakens their ability to compete successfully with foreign carriers, which, in addition, are usually statesubsidized. Domestic airlines complain, with justification, that a â€Å"level playing field† should be established to avoid this unfair disadvantage. An option would be to compensate U. S. airlines for the additional costs, either from Federal subsidies or from the Airport Trust Fund. 7 Alternatively, foreign carriers could be required to apply similar security measures on flights landing in the United States to those demanded of U. S. carriers. The United States has forced better security practices in foreign 2% l$)7(j, Congress estiblishedaprecedent for compensating U. S. air carriers forsecuritymeasures incurred in international operatiombyautioritig nearly $10 million for fiscal years 1976-78 (Public Law 94-353, sec. 24). In 1982, Congress extended the authorized limit to $15 million (Public Law 97-248, sec. 24(d). Nearly this much was actually disbursed to four U. S. carriers. 84 q Technology Against Terrorism: Structuring Security revocation of landing rights of carriers from those countries in the absence of improvements. airports by threatening coordinating security management decisions and for providing a conduit for a detailed database. 30 The FAA is considering making CPSP mandatory, but a number of carriers oppose it, citing se curity officer vigilance problems caused by distraction by computer keyboard and display.Knowledgeable FAA and airline personnel claim that airline opposition stems mainly from the increased oversight capabilities that such a system would give the FAA CPSP would provide a detailed record of all airline profiling actions (and errors or failures) that could be used for civil penalty proceedings. Presently, the FAA oversees airline profiling procedures through random or scheduled field visits. The FAA counters that if a would-be malefactor sneaks through, CPSP also can provide documented proof that the airline followed FAA-required procedures, shifting some liability for a profiling failure to the FAA. 1 Additionally, there is substantial U. S. airlines operating on European routes have been permitted to substitute their own profiling programs for FAA requirements. 28 Most U. S. airlines and many foreign carriers conduct more extensive profile screening than minimum FAA requirements at foreign airports and some U. S. international gateways. Some airlines train their international employees in profiling techniques while others hire contractors to handle security for their international flights.Proprietary profiling procedures used by these airlines are modeled generally on the Israeli El Al method of profiling which is more comprehensive (and intrusive) than FAA requirements and reportedly includes psychological, social, and political factors. Complaints by certain groups, such as Arab-Americans, claiming harassment, stem from carrier-initiated profiling, not Federal requirements. 29 During the past 5 years, the FAA has developed and tested a computer-based profiling tool aimed at potential terrorist hijackers and saboteurs.The Comprehensive Passenger Screening Profile (CPSP) is both a checklist and decision aid for field officers and a data collection system to support profiling enhancements. It encompasses the current FAA required profiling procedures plus addit ional factors based on a data profile of terrorists, using historical and intelligence sources. The decision process for selecting a passenger for further examination is automated through a series of mathematically weighted yes/no questions (some of which do not require passenger interviews), that the security officer responds to via a keyboard.CPSP is designed for easy modication if intelligence or data analysis indicates a need. In early 1990, the FAA offered CPSP as an option for airlines to meet profiling requirements. Continental Airlines and United Airlines have tested versions of CPSP at a few locations, and have been generally pleased with its performance, especially as a tool for centrally ~ho [email  protected] FAA htelligence, personal communication Oct. 1*, 1990%llid. analytic value to the large data set that would come from CPSP.As discovered during TNA testing, little is known about the baseline average passenger and baggage; therefore, general background data, regar dless of how well CPSP works operationally, would be valuable for security planning. No names of passengers are (or legally can be) included in such a data set maintained by the Federal Government. 32 However, as private entities, airlines can and do maintain such lists. Other Issues for Human Factors and Profiling Research and Development Due to security and proprietary concerns, profiling systems in place today are shrouded in secrecy.The technical aspects of their development and quantitative measures of their performance are difficult to obtain, although the widespread use at airports across the world attest to airline confidence in profiling Given industry acceptance of profiling technology, the unregulated environment in which profiling systems were developed, and the potential enhanced capabilities and future needs, there is a ~JO~Be~~l~q Director, Comorate s~~~, COntinenM fi~es, ~rson~ commtication, od. 15, 1990 and Glen W- Director, @XtitiOI. Ud Security, United Airlines, p ersonal communication, Oct. 6, 1990. 31c)P. cit. , footnote 27. qzfiid. Chapter 5-Human Factors in Aviation Security q 87 role for a concerted Federal (DOT) effort in profiling R. The primary research fields of interest are in the behavioral sciences and in large database collection and analysis. A useful but neglected approach would be to investigate the role of cultural differences in establishing profiles. Since patterns of behavior considered anomalous in one culture are normal in others, understanding cultural effects better could lead to more effective and, possibly, less discriminatory use of profiles. 3 Relevant behavioral research with applications for profiling is being conducted by a number of Federal agencies, although they generally do not coordinate these research efforts. There is a need to coordinate research and experience in developing terrorist profiles among concerned agencies. Also, some work is going on to establish databases of past incidents and known terrori sts in order to help develop profiles. The FAA conducts a modest profiling research effort that produced the CPSP and is analyzing profiling field tests.However, this effort is housed in the in aviation security. It has worked with in-house experts, with other agencies, and with behavioral scientists under contract. There should be steps taken to guarantee that this institutional knowledge is not lost, due to needed secrecy or personnel turnover. There should also be an effort to bring together knowledge on profiling from the Intelligence Community, from the Federal Bureau of Investigation, from the Immigration and Naturalization Service, and from the FAA, so that all agencies may profitably pool their knowledge.One way of helping assure such interagency communication would be the institution of annual interagency conferences on the topic (see ch. 3). Profiling techniques and related technologies are being added to current security R plans at the FAA Technical Center. The operationa l aspects of using automated profiling systems, such as data entry and human/computer interaction, are similar to those of many other technologies, and could benefit from further research and development. intelligence section under the Assistant Administrator for Civil Aviation Security with no direct link to FAA’s R division.Historically, the FAA pioneered the use of profiles in aviation in the late 1960s and early 1970s during the upsurge of hijackings to Cuba. A team of experts under the leadership of the FAA Office of Aviation Medicine was involved in the development of the initial profiles. Limited use of profiles was made during the early 1970s and again in 1980, when immigrants from the Mariel Boatlift began hijacking aircraft to Cuba. [Profiles were employed on a limited basis to help stem the wave of hijackings to Cuba by some â€Å"Marielitos†. In the 1970s, the FAA also developed a profile for domestic use to identify persons who might be carrying explosives or incendiary devices in checked baggage. This â€Å"checked bag† profile included several objective elements and was intended for use by airline personnel at ticket counters. This profile was never applied rigorously, although some of its elements were automated by at least one U. S. air carrier. Thus, the FAA has had substantial experience with developing and implementing profiles for useA near-term research need is how best to combine profiling systems with the new security technologies now in the pipeline. In fact, arguments have been made that the TNA device can only function effectively when combined with profilebased selection of baggage to inspect, since false alarm rates are high. This is, in fact, being done at the Gatwick tests. Presently, the profiling process results in binary decisions—let the passenger pass into the normal security process (more than 95 percent of passengers) or conduct a manual search of the passenger and his baggage. One possibility w ould e to expand and refine the decision outcome from profiling to provide multiple screening paths for passengers depending on the level of threat and the availability of advanced detection equipment (see ch. 4). A longer term research option is to investigate new technologies to enhance profiling. Rapid access in the field to Federal, international, and, possibly, private databases (i. e. , hotel, credit card) could greatly enhance capabilities. Remote sensing of respiration and heart rates and other biological parameters, combined with large population databases, automated facial-recognition systems, andSsCustom offici& in the Northern ~ Islands, a U. S. -flag territory, incorporate cultural characteristics in looking for anomalies for profding. â€Å"a 88 q Technology Against Terrorism: Structuring Security biometric passports, all offer new possibilities for on-the-spot psychological and physiological assessments. From past experience, cultural factors particular to the countr y where the event is taking place frequently influence decisionmaking by local authorities. Some observers report that U. S. fficials who were involved would, on occasion, have benefited by a more detailed knowledge of the dynamics of local social systems. For example, in some cases, although crisis management officials were supposed to be in charge of handling an incident, local cultural or political factors have resulted in the crisis being directed instead by senior office holders, who are untrained for the purpose and unable to provide the rapid decisionmaking that is often required. Some research into systematizing knowledge of relevant aspects of different social systems would be useful.In this area, as in profiling, the construction of appropriate databases would be of use to U. S. officials who may be called on to participate in resolving a crisis. At present, there appears to be little coordination among agencies in understanding behavioral aspects of incident management. T his lack provides another argument for strengthening interagency coordination in counterterrorism (see ch. 3). Civil Liberties Security systems in general, and profiling methods in particular, trade certain freedoms (e. g. privacy) for safety. profiling methods, based on specific individual characteristics, may be derived from historical experience (e. g. , the large number of Cuban refugees who hijacked aircraft to Cuba in the early 1970s or the examples of hijacking engaged in by members of various Middle Eastern terrorist groups). These characteristics sometimes include physical and cultural features, since these traits are the easiest indicators to verify. Often such subjects belong to readily distinguishable minority groups.Therefore, people who possess the characteristics in question but who have no ill intentions (obviously, the great majority) could be subjected to scrutiny that could be considered to encroach on individual freedoms. This study describes measures to meet com pelling public safety interests. It is, however, beyond the scope of this study to discuss the many legal and societal civil liberties issues involved (e. g. , how much intrusiveness on privacy is countenanced by a compelling interest of the state? ).It is certain that the technical ability to investigate and record personal histories and characteristics and the demand for the use of such ability will greatly expand, thereby increasing the potential for crossing the fine line protecting constitutionally guaranteed individual liberties. Legislative attention will have to address the tradeoff between public safety and welfare and civil liberties. Policy Options The following policy options address human factors and aviation security. 1. Enhance FAA attention to human factors in security: 34 qExplicitly address aviation security in agencywide human-factors planning. The FAA has taken measures to move in this direction. Bolster human-factors expertise under the Assistant Administrator f or Civil Aviation Security and the Aviation Security Research and Development Service at the FAA Technical Center by adding professionals to their respective staffs, especially in light of plans to increase staff levels of both sections significantly during the next few years. One such professional has already been added. Incident Management Human factors also play a role in managing incidents abroad.When U. S. citizens are held hostage in a foreign country, the United States often plays a role in resolving the incident. Some foreign security officials are trained in the United States under assistance programs. But the United States also may participate actively, as it did in responding to a number of airline hijackings in the 1980s. q ~~e follo~ r=omenhtiom included in earlier drafts of this repofi has already been implemented by tie FAA q Add a designee of the Assistant Administrator for Civil Aviation Security to the FAA’s Human Factors Coordinating Committee.Chapter 5-Hum an Factors in Aviation Security q 89 2. Consider conducting R on combining passenger profiling techniques with other security technologies. 3. Give consideration to methods for â€Å"leveling the playing field† when imposing requirements on U. S. carriers but not on competing foreign ones. 4. Give consideration to civil liberties issues 5. stemming from Federal aviation security requirements. Coordinate behavioral research into profiling and incident management being conducted in the Federal Government. Arrange periodic interagency conferences on related topics.