Saturday, August 31, 2019

Iklan Petronas

BACKGROUND Petronas as a biggest company in Malaysia are well known to Malaysian people and when we mention about Petronas, normally people will think about petroleum, refineries, KLCC and many more products of Petronas. There are many advertisements involving Petronas in the market, such are LPG gas advertisement, Petronas petroleum fuel, Petronas Grand Prix and Formula 1. There are many advertisements to promoting the products of Petronas instead of branding. On the other hand, Petronas also did the contribution due their social corporate work whereby they have done a good social work with giving interesting short video clip on the commercial advertisement on the television. There are many commercial advertisements that have done by Petronas on the television and they make the advertisement as a compulsory to them and will come out during the certain period of celebrations in Malaysia for example on Hari Raya day, National day and other national celebration. There are also many social advertisements released by the other big company like Petronas such as Tenaga Nasional Berhad (TNB), PROTON, and Telekom Malaysia Berhad (TM). However, Petronas’ advertisements are more attractive and succeed to give an impact to the audiences. Its shows that advertisements are really creative and succeed to touch the people heart who are watching on it. One of the advertisement from Petronas that caught my interest was the advertisement about â€Å" Burung Murai†. This advertisement was released during Hari Raya celebration period on 2007. THE STRENGTHS General Petronas advertisements always been watching by the audience and there already have a trust on the Petronas’ advertisement. Petronas has succeed to put on the audience minds that their advertisements are unique from the other with clear story line, attractive ways of presenting the idea, and touched the heart with the feelings of emotion. Petronas always come out with new idea and do not lack of interesting ideas. The idea was fresh and suit on environment makes them acceptable to any background of audience. Consistent with their advertisements and never missed to come out with new advertisement in every single celebration in Malaysia makes their advertisements are wanted for their audience to see the new one. Focused on moral values instead of promoting the products makes the messages on the moral values are delivered to audience. The messages is clear and easy to understand References http://www. petronas. com. my/internet/corp/centralrep2. nsf/frameset_corp? OpenFrameset http://www. kujie2. com/perayaan/iklan-raya-petronas-yang-mana-paling-best. html

Friday, August 30, 2019

Plastic money: Indian Experience Essay

Introduction to Plastic Money Plastic money or polymer money, made out of plastic, is a new and easier way of paying for goods and services. Plastic money was introduced in the 1950s and is now an essential form of ready money which reduces the risk of handlings a huge amount of cash. It includes Debit cards, ATMs, smart cards, etc. Credit cards, variants of plastic money, are used as substitutes for currency. see more:what is plastic money MEANING Plastic money refers to credit cards, we use them whenever we want and pay later (with interest, of course). It makes it too easy for us to buy things we normally could not afford, which makes it easier to get into debt. DEFINITION A slang phrase for credit cards, especially when such cards used to make purchases. The â€Å"plastic† portion of this term refers to the plastic construction of credit cards, as opposed to paper and metal of currency. The ―money† portion is an erroneous reference to credit cards as a form of money, which they are not. Although credit cards do facilitate transactions, because they are a liability rather than an asset, they are not money and not part of the economy’s money supply. The History Of Credit Cards and Debit Cards InPlastic Money Credit cards have evolved into a safe and secure manner to purchase goods and services. The Internet has given credit card users additional purchasing power. Banks have options like cash-back rewards, savings plans and other incentives to entice people to use their cards. Debit cards allow people the convenience of cards without the worry of racking up debt. The convenience, security and rewards offered by credit and debit cards keep shoppers using their cards as opposed to checks or cash. Credit Card Origins The first credit cards were issued by individual stores and merchants. These cards were issued in limited locations and only accepted by the businesses that issued them. While the cards were convenient for the customers, they also provided a customer loyalty and customer service benefit, which was good for both customer and merchant. It was not until1950 that the Dinner’s Club card was created by a restaurant patron who forgot his wallet and realized there needed to be an alternative to cash only. This started the first credit card specifically for widespread use, even though it was primarily used for entertainment and travel expenses. Plastic Becomes the Standard The first Diner’s Club cards were made out of cardboard or celluloid. In 1959 American Express changed all that with the first card made of plastic. American Express created a system of making an impression of the card presented at the register for payment. Then that impression was billed to the customer and due in full each month. Several American Express cards still operate like this as of 2010. It was not until the late 1980s that American Express began allowing people to pay their balance over time with additional card options. Bank Card Associations In 1966, Bank of America created a card that was a general purpose card or â€Å"open loop† card. These â€Å"closed loop† agreements limited cards like Diners Club and American Express to certain merchants, unlike the new† open loop† cards. The new general purpose system required interbank cooperation and additional regulations. This created additional safety features and began building the credit card system of today. Two systems emerged as the leaders–Visa and Master Card. However, today there is little difference between the two and most merchants accept both card associations. Debit Cards Emerge The Visa association of cards took credit cards to a new level in 1989 when they introduced debit cards. These cards linked consumers to their checking accounts. Money was now drawn from a checking account at the point of sale with these new cards and replaced check writing. This helped the merchants check that money was available and made it easier to track the customer if the funds could not be obtained. Consumers liked the convenience of not having to write checks at the point of sale, which made debit cards a safe alternative to cash and checks. The Future There were almost 29 million debit card users as of 2006, with a projected 34.4 million users by 2016. However, online services like Pay Pal are emerging as a way for people to pay their debts in new, secure and convenient ways. Technology also exists to have devices implanted into phones, keys and other everyday devices so that the ability to pay at the point of sale is even more convenient. TYPES OF PLASTIC MONEY Different types:- Credit card A credit card is plastic money that is used to pay for products and services at over 20 Million locations around the world. All you need to do is produce the card and sign a charge slip to pay for your purchases. The institution which issues the card makes the payment to the outlet on your behalf; you will pay this ‘loan’ back to the institution at a later date. In short†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Cashless payment with a set spending limit Payment takes place after the purchase Great flexibility thanks to installment facility Most well-known credit cards: American Express, MasterCard, Visa Debit card Debit cards are substitutes for cash or check payments, much the same way that credit cards are. However, banks only issue them to you if you hold an account with them. When a debit card is used to make a payment, the total amount charged is instantly reduced from your bank balance. Don’t borrow on your credit card! Here’s why A debit card is only accepted at outlets with electronic swipe-machines that can check and deduct amounts from your bank balance online. In short †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Card is linked to the cardholder’s bank account Transaction is directly Debited immediately from bank account No credit or installment facility Most well-known debit cards: Maestro, Postcard Charge card A charge card carries all the features of credit cards. However, after using a charge card you will have to pay off the entire amount billed, by the due date. If you fail to do so, you are likely to be considered a defaulter and will usually have to pay up a steep late payment charge. When you use a credit card you are not declared a defaulter even if you miss your due date. A 2.95 per cent late payment fees (this differs from one bank to another) is levied in your next billing statement. In short Cashless payment without a set spending limit Payment takes place after the purchase No credit or installment facility Most well-known charge cards: American Express, Diners Club Amex card Amex stands for American Express and is one of the well-known charge cards. This card has its own merchant establishment tie-ups and does not depend on the network of MasterCard or Visa. Credit cards: Remember these dos and don’ts. This card is typically meant for high-income group categories and companies and may not be acceptable at many outlets. There are a wide variety of special privileges offered to Amex cardholders. Dinner club card Diners Club is a branded charge card. There are a wide variety of special privileges offered to the Diners Club card holder. For instance, as a cardholder you can set your own spending limit. Besides, the card has its own merchant establishment tie-ups and does not depend on the network of MasterCard or Visa. However, since this card is typically meant for high-income group categories, it may not be acceptable at many outlets. It would be agood idea to check whether a member establishment does accept thecard or not in advance. Global card Global cards allow you the flexibility and convenience of using a credit card rather than cash or travelers cheque while traveling abroad for either business or personal reasons. Co-branded card Co-branded cards are credit cards issued by card companies that have tied up with a popular brand for the purpose of offering certain exclusive benefits to the consumer. A debit card with a difference For example, the Citi-Times card gives you all the benefits of a Citibank credit card along with a special discount on Times Music cassettes, free entry to Times Music events, etc. Master card & Visa MasterCard and Visa are global non-profit organizations dedicated to promote the growth of the card business across the world. They have built a vast network of merchant establishments so that customers worldwide may use their respective credit cards to make various purchases. Smart card A smart card contains an electronic chip which is used to store cash. This is most useful when you have to pay for small purchases, for example bus fares and coffee. No identification, signature or payment authorization is required for using this card. The exact amount of purchase is deducted from the smart card during payment and is collected by smart card reading machines. No change is given. Currently this product is available only in very developed countries like the United States and is being used only sporadically in India. Photo card If your photograph is imprinted on a card, then you have what is known as a photo card. Doing this helps identify the user of the credit card and is therefore considered safer. Besides, in many cases, your photo card can function as your identity card as well. Customer card/store card (PLCC) Card with payment and credit function can only be used at specific retailers Well-known customer cards: my One, Globus, Media Markt. Prepaid card/gift card Card is topped up with credit before use No credit or installment facility Open system (American Express, Visa, MasterCard) or closed system (can only be used at specific retailers) CREDIT CARD INTRODUCTION A credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder’s promise to pay for these goods and services. The issuer of the card grants a line of credit to the consumer or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user. Usage of the term â€Å"credit card† to imply a credit card account is a metonym. When a purchase is made the user would indicate consent to pay by signing a receipt with a record of the card details and indicating the amount to be paid. Issuer agrees to pay the merchant and the credit card user agrees to pay the card issuer. DEFINITION The credit card can be defined as â€Å"A small plastic card that allows its holder to buy goods and services on credit and to pay at fixed intervals through the card issuing agency. MEANING A credit card is a card or mechanism which enables card holder to purchase goods, travels and dine in a hotel without making immediate payments. The holders can use the cards to get credit from banks up to 45days.The credit card relieves the consumers from the botheration of carrying cash and ensures safety. It is a convenience of extended credit without formality. Thus credit card is a passport to, â€Å"safety, convenience, prestige and credit. ADVANTAGES & DISADVANTAGES OFCREDIT CARD ADVANTAGES OF CREDIT CARD The benefits of credit card can be grouped as follows: (A) BENEFITS TO THE BANK a) A credit card is an integral part of banks major services these days. The credit card provides the following advantages to the bank: the system provides an opportunity to the bank to attract new potential customers. b) To get new customers the bank has to employee special trained staff. This gives the bank an opportunity to find the latent talent from among existing staff that would have been otherwise wasted. c) The more important function of a credit card, however, is simply to yield direct profit for the bank. There is a scope and a potential for a better profitability out of income / commission earned from the traders turn over. d) This also provides additional customer services to the existing clients. It enhances the customer satisfaction. e) More use by the car holder and consequently the growth of banking habits in general. f) Better network of card holders and increased use of cards means higher popularity and image of the bank. g) Savings of expense on cash holdings, i.e . stationery, printing and man power to handle clearing transactions while considerably is reduced. It increases. (B) BENEFITS TO CARD HOLDER The principal benefits to a card holder are: a) He can purchase goods and services at a large number of outlets without cash or cheque. The card is useful in emergency, and can save embarrassment. b) The risk factor of carrying and storing cash is avoided. It is convenient for him to carry credit card and he has trouble free travel and may purchase his without carrying cash or cheque. c) Months purchases can be settled with a single remittance, thus, tending to reduce bank and handling charges. d) The card holder has the period of free credit usually between 30-50 days of purchase. e) Cash can usually be obtained with the card, either on card account or by using it as identification when encasings a cheque at the bank. f) Availing credit with minimum formality. g) The credit card saves trouble and paper work to traveling business man. (C) BENEFITS TO THE MERCHANT ESTABLISHMENT The principal benefits offer credit card to the retailer is a) This will carry prestigious weight to the outlets. b) Increases in sale because of increased purchasing power of the card holder due to unbilled credit available to the card holder. c) The retailers gain from the impulse buying and trading up the tendency to buy the bigger or better article. d) Credit card ensures timely and certainly of payments. e) Suppliers/sellers no longer have to send reminders of outstanding debits. f) Systematic accounting since sales receipts are routed through banking channels. g) Advertising and promotional support on national scale. h) Development of prestigious clientele base. DISADVANTAGES OF CREDIT CARD The following are the common disadvantages of the credit card: a) Some credit card transactions take longer time than cash transactions because of various formalities. b) The customer tends to overspend out of immerse happiness. c) Discounts and rebates can rarely be obtained. d) The cardholder is responsible for charges due to loss or theft of the card and the bank may not be party for loss due to fraud or collusion of staff, etc e) Customers may be denied cash discount for payment through card. f) It might lead to spending habits and cardholders may end up in big debts i) Avoid the entire cost and security problem involved in handling cash. j) Losses to bad debts and reduced an additional liquidity is. k) It also allows him to delegate spending power to add on members. l) Credit card is considered as a status symbol. Parties Involved Cardholders: The holder of the card used to make a purchase, the consumers. Card-issuing Bank: The financial intuition or others organisations that issued the credit card to the cardholder. Acquiring bank: The financial institution accepting payment for the products or services on behalf of the merchant. Merchant Accounts: This could refer to the acquiring bank or the independent sales organization, but in general is organization that the merchants deal with. Credit Card Association: An association of card-issuing banks such as Discover, Visa, MasterCard, American Express, etc. that set transaction terms for merchants, card –issuing banks, and acquiring banks Transaction network: The system that implements the mechanics of electronics transaction. May be operated by an independent company, and one company may operate multiple networks. Affinity Partner: Some institutions lend their names to an issuer to attract customers that have a strong relationship with that institution, a nd get paid a fee or a percentage of the balance for each card issued using their name. Insurance Providers: Insurers underwriting various insurance protections offered as credit card perks. Transaction Steps Authorization: The cardholder presents the card as payment to the merchant and the merchant submits the transaction to the acquirer (acquiring bank). The acquirer verifies the credit card number, the transaction type and the amount with the issuer (Card-issuing back) and reserves that amount of the cardholders credit limit for the merchant. An authorization will generate  an approval code, which the merchant stores with the transaction. Batching: Authorized transactions are stored in â€Å"batches†, which are sent to the acquirer. Batches are typically submitted once per day at the end of the business day. If a transaction is not submitted in the batch, the authorization will say valid for a period determined by the issuer, after which the held amount will be returned to the cardholders available credit. Clearing and Settlement: The acquirer sends the batch transactions through the credit card association, which debits the issuers for payment and credited the acquirer. Essentially, the issuer pays the acquirer for the transaction. Funding: Once the acquirer has been paid, the acquirer pays the merchant. The merchant receives the amount totalling the funds in the batch minus the â€Å"discount rate†, â€Å"mid-qualified rate†, or â€Å"non-qualified rate† which are tiers of fees the merchant pays the acquirer for processing the transactions. Charge backs: A Chargeback is an event in which money in a merchant account is held due to a dispute relating to the transaction. Charge backs are typically initiated by the cardholder. In the event of charge backs, the issuer returns the transaction to the acquirer for resolution. The acquirer then forwards the chargeback to the merchant, who must either accept the chargeback or contest it. Costs Credit card issuers (banks) have several types of costs: Interest Expenses Operating Costs Charges offs or Bad Debts Rewards Fraud Promotion Revenues Offsetting the costs are the following revenues: Interchanges fee Interest on outstanding balance Over limit charges Fees charged to customers Late payments or overdue payments Charges that result in exceeding the credit limit on the card (whether done  deliberately or by mistake), called over limit fees Returned cheques fees or payment processing fees (e.g. phone payment fee) Cash advances and convenience cheques Transactions in a foreign currency. A few financial institutions do not charge a fee for this. Membership fees (annual or monthly), sometimes a percentage of the credit limit. Exchange rate loading fees. ADVANCTAGES OF PLAST MONEY Plastic is very useful in the building and construction, electronics (laptops wouldn’t work well if they were made from glass), packaging (glad wrap), transportation industries. Very easy to make – water bottles, plastic bags, pens, cups etc. The main advantages of plastic materials are also the reason why plastic is such a problem. It lasts forever and it is very cheap to make. When I say it last forever, I mean it does not biodegrade. There is a flotilla of plastic the size of Texas in the Pacific Ocean. It gradually photo-degrades into tiny pieces that enter the marine food chain. Plastic is good, light, strong and cheap to produce. There are many advantages to using plastic. It does not decompose but it can instead be recycled. This is done more easily than producing more plastic. Unlike aluminum cans, plastic bottles can be re-used and stored over and over again. Plastic is usually not breakable and it is see-through. It’s light-weight and odourless. Plastic comes from a natural resource (oil) but CAN’T be re-made into bottles (but they can be re-made into other items- WEIRD!) It takes a long time to break down†¦ Customer having poor credit worthiness can opt for debit card. Instant finalization of accounts less identification and scrutiny than personal checks, thereby making transactions quicker and less intrusive. A debit card may be used to obtain cash from an ATM or a PIN-based transaction atnoextracharge. DISADVANCTAGES OF PLAST MONEY it is a compound that is indestructible, even when it is melted the compound gas that is gives off is very harmful to our heath and environment; it weakens the ozone layer. Most plastic is produced from oil. The world is gradually running out of oil. Scientists are now developing plastics that are made from vegetable oil and other organic matter. This means that the plastic is more likely to be degradable, so it will be less of a problem in future. Another Disadvantage is pollution Plastic accumulation in the environment is a looming catastrophe. It is cheap but it is not easily disposable so it is in a lot of landfills. plastic bags can kill the marine animals and destroy the soil Limited to the existing funds in the account to which it is linkedÊ Banks charging over-limit fees or non-sufficient funds fees based upon pre-authorizations, and even attempted but refused transactions by the merchantÊ Lower levels of security protection than credit cardsÊ More prone to frauds. Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past,this type of fraud was not very common. Today, it is a big business for criminals. Plastic cards bring new convenience to your shopping and banking, but they can turn into nightmares in the wrong hands. This pamphlet describes credit and debit cards and some common schemesinvolving card fraud with tips to help you avoid them. The following are the types of frauds 1.Stolen Cards at the Office 2.Extra Copies of Charge Slips 3.Discarded Charge Slips 4.Unsigned Credit Cards 5.Loss of Multiple Cards 6.Strange Requests for Your PIN Numbers 7.Legitimate Cards 8.Altered Cards 9.Counterfeit Cards TECHNOLOGY AND INFRASTRUCTURE One of the most important features that Plastic Money offers is thetechnology associated with this business. Credit card businesses rely on very reliable and secure technology anddemands very Strong connectivity backbone. Although a third world country, with lot of insecurities and almost noinfrastructure, Pakistanhas no exception when it comes to credit card business. There is approximately 3000 Point of Sale Terminals (POST) presenton merchant’s sites connected with bank host system. Inter-city connectivity is accomplished through X.25 networks. Perhaps, it is the most important time in the history of Pakistan as the parameters of its Infrastructures are coming into existence. There is an immense need of reliable wide area connectivity and thismarket is so huge and lucrative that it can accommodate many moreindustry giant CASE STUDY What Happens in Credit Card Fraud Cases? The Basics A variety of crimes constitute credit card fraud. The term candescribe a person using a stolen credit card to purchase goods or services posing as the person named on the card. It can also describe illegally andfraudulently withdrawing funds from an account that is not yours. Identitytheft, which is the act of posing as an individual to make purchases, is oftenclassified together with credit card fraud. A victim of credit card fraud cansometimes see bank accounts emptied of all their funds or negative marksgoing on her credit report for things she had nothing to do with. Many banks will monitor transactions made with a credit card and alert the personnamed on the account of any potentially suspicious activity. This is to protect the bank or Credit Card Company just as much as it is to protect thecustomer. Investigation Exactly what happens during a credit card fraud case depends a great deal on the actions of the Credit Card Company or bank involved. If fraudulent transactions are proven to have been made on a person’s account but the amount of the transactions is lower than the cost of an investigate on the company can credit the money back to a person and then close the account to protect from further farm. If the amounts of fraudulent charges are so great that an investigation is warranted, the police will be notified. The credit card company can look at a list of the fraudulent charges and determine where they were made. At that point an officer can question witnesses and review security camera footage in an attempt to identify suspects. If a suspect isarrested he can be tried in a court of law. Felony Credit card fraud is considered a felony by the courts of the United States. As a result a person convicted of credit card fraud could face jail time (the exact amount of which depends on the extent of the crime). A felony conviction stays on a person’s record and can prevent the person from getting hired for a job. Having a felony on a criminal record will also take away a person’s eligibility in terms of running for public office. If a person who is not a natural- born citizen of the United States commits credit card51 fraud and is convicted of a felony the result could be being deported to their country of origin CONCLUSION 21STCentury banking has become wholly customer-driven &technology driven by challenges of competition, rising customer expectations & shrinking margins, banks have been using technology to reduce cost & enhance efficiency, productivity & customer convenienence. Technology intensive delivery channels like net banking, mobile banking, etc have created a win-win situation by extending great convenienence. &multiple options for customer. From educating customers about credit cards there is a need to educate them about the differentiating factors of the cards. Because visa and master card are advertising regularly and thereby increases awareness. The strategy should be to emphasize on its differentiating characteristics. They also need to identify potential customers and target those using mailers. As internet is growing at a fast rate the net users can be targeted by having interactive sites. The prospective company’s card personality could also be used in the home page to solve c ustomer queries in the ‘Best Possible Manner The Indian Plastic Money Journey Citibank and HSBC were the pioneers in the Indian credit card market in the 1980s. Over the next two decades, the number of players increased to more than ten in 2000. The credit card market registered a healthy annual growth rate of over 25% during 1987-2001†¦ While companies were putting in place various measures to address security issues, the debit card market was having a smooth run in India. After being introduced in the mid 1990s, debit cards acquired popularity  and user acceptance at a rapid pace. A major reason for the quick popularity gained by debit cards was the absence of the credit component that resulted in elimination of interest charges or monthly card bills†¦ Plastic Money: the Currency of Modern India Indian consumers have never had it so good. The soiled notes are definitely out. Carrying cash is no more `a pain in the neck’ as consumers are relying more on the `plastic card’ which gives them money on credit. Plastic money basically means debit cards and credit cards which is having a magnetic stripe, logo, signature of the cardholder made of plastic. Credit Cards have finally arrived in India. The card industry which is growing at the rate of 20% per annum is flooded with cards ranging from gold, silver, global, smart to secure†¦.the list is endless. From just two players in early 80s, the industry now houses over 10 major players vying for a major chunk of the card pie. Currently four major bishops are ruling the card empire—Citibank, Standard Chartered Bank, HSBC and State Bank of India (SBI). The industry, which is catering to over 3.8 million card users, is expected to double by the fiscal 2003. According to a study conducted by State Bank of India, Citibank is the dominant player, having issued 1.5 million cards so far. Stanch art follows way behind with 0.67 million, while Hongkong Bank has 0.3 million credit card customers. Among the nationalized banks, SBI tops the list with 0.28 million cards, followed by Bank of Baroda at 0.22 million. OBJECTIVE OF STUDY Primary objectives †¢To know the perception of people towards plastic money Secondary objectives †¢To know the importance of plastic money in the daily life of consumers’ W.R.T creditand debit cards. †¢To study the benefits of debit card and credit cards. †¢To find out the market leader among the various banks/companies issuing credit anddebit cards †¢To know the problems faced by respondents using plastic money. †¢To study the satisfaction level of consumers towards plastic money. NEED AND SCOPE OF THE STUDY Need of the study It is rightly said the plastic money is need of hour. People are using these cards on a vastscale. But after considering the review of literature it is seen the whole payment process of processing these cards is not safe and customer are facing many problems relating to plasticmoney. That’s why study is focused on consumer perception regarding the plastic money. Need of the study is to get to know about the comparative analysis of plastic money. Thereare many ethical issues and challenges in the market of plastic money which is required to bestudied. This study is concerned with the Seven perks of plastic money Convenience,Budgeting technology, Reputation boosting, Corporate might,Cops and robbers, The float,Openness,to negotiations.

Thursday, August 29, 2019

A Sudden Silence By Eve Bunting English Literature Essay

A Sudden Silence By Eve Bunting English Literature Essay A Sudden Silence By Eve Bunting Eve Bunting, born in the small village of Maghera in Northern Ireland, 1928, is an author with more than 250 books. Her books are diverse in age groups, from picture books to chapter books, and topic, ranging from Thanksgiving to riots in Los Angeles. She has won several awards. She went to school in Northern Ireland and grew up with storytelling. In Ireland, â€Å"There used to be Shanachiesà ¢Ã¢â€š ¬Ã‚ ¦ the shanachie was a storyteller who went from house to house telling his tales of ghosts and fairies, of old Irish heroes and battles still to be won. Maybe I’m a bit of a Shanachie myself, telling stories to anyone who will listen.† This storytelling began as an inspiration for Bunting and continues with her work. In 1958, Bunting moved to the United States with her husband and three children. A few years later, Bunting enrolled in a community college writing course. She felt the desire to write about her heritage. Bunting’s f irst published story, Two Giants, focused an Irish folktale about Finn McCool who out smarted Culcullan, a terrible Scottish giant. The first published work gave Bunting confidence and passion to pursue a writing career. explanation: ‘A sudden silence’ is a good title for this story because they don’t know who Bry has killed. And so this is a sudden silence. Place: I have no idea in which place this story is set. Because, they don’t tell it in the book. Time: This story can be set in any time, they don’t tell it. ‘It was Saturday the 20th of June at 11.30 P.M.’ The time that is covered in the story is like two months. Because it all happens very quickly. I can’t quote from the book. Main characters: Jesse: He’s the main character of the book. His personality is: he is shy but he is quick irritated. I don’t know how he looks. Jesse doesn’t change in the book. Bry: He is the brother of Jesse and he is killed by a car accident. He is deaf and I don’t know how he looks. He can’t change because he dies in the beginning of the book. Plot: Bry and Jesse are walking home from a party of Wilson Eichler. They’re walking along the highway, against the traffic, so they can see if there a car was coming. After a while, they crossed over the highway, because they were almost home. There was no traffic on the highway, but then a car came out of nowhere. Jesse dived into the bank and he yelled to Bry, that he has to jump too, but he can’t hear him. Bry is deaf. The car hit him. First, Jesse thought that the car stopped, but it didn’t, he rode on. Bry was dead. Sirens were coming. Shortly after that, a policeman asked Jesse questions about the accident. But Jesse forgot everything. Nobody was going to bed that night. Jesse’s dad called the family: the grandparents, aunt Lila and uncle Fred.

Wednesday, August 28, 2019

Discuss the view presented by Nasim and Sushil (2011) that managing Essay - 1

Discuss the view presented by Nasim and Sushil (2011) that managing change invariably involves managing paradoxes and in partic - Essay Example However, the most critical aspect of the adoption of such change is its management. The management of change in organizational culture poses multiple challenges for any organization. There are various scholars who have embarked on describing different concepts related to organizational culture. Sushil and Nasim highlighted that managing organizational culture involves the management of paradoxes, and more specifically the paradox of continuity and change. This paper will develop a critical argument from the idea posited by these two scholars. It has become evident that change is inevitable. Organizations face the urgency of adopting change, although the course of change presents new complexities. Apparently, only a third of all ventures aimed at fostering change are likely to succeed. The failure of two thirds of all projects seeking to foster change emphasizes the urgency of new strategies for managing change. However, different scholars have posited opinions on whether managing cha nge is a possibility (Collin, 2004:560). One school of thought opines that through management, it is possible to exert a form of control on organizational culture. A different group of scholars has highlighted that organizational culture change can only occur under certain conditions that act as preconditions for the change. The third school of thought is pessimistic concerning the potential of controlling cultural change through management. For these scholars, managing cultural change in an organization is an unlikely venture. Nasim and Sushil (2011:186) highlighted the numerous paradoxes that have been used by different scholars to describe organizational change. The term paradoxes in this context denote the contradictions surrounding organizational change. One of the described paradoxes is the arising debate on whether cultural change in an organization takes place in an orderly preplanned manner or just emerges depending on the prevailing environmental conditions. The planned vi ew of cultural change introduces the ideology that cultural change occurs in episodes that involve a shift from a fixed state to the next. However, this ideology has received a challenge from the perceived dynamism of change as defined by prevailing conditions. Other scholars view change as an incremental process that takes place under the orchestration of the executives in an organization. On the other hand, other scholars describe cultural change as a radical event (Currie and Brown, 2003:572). An additional paradox revolves around the focus of cultural change. Whereas some theorists view cultural change as a narrowed focus either on the context or process, there is the argument that cultural change occurs in a holistic approach that views all aspects comprehensively. In addition, there is a prevalent ideology that organizational culture change takes place on a macro scale. However, a counter opinion highlights that the organizational change occurs on a micro scale, which highligh ts a focus on individual perceptions. There is a surging debate on whether organizations should adopt an epistemological approach in reorganizing the management practices or whether they should shift focus to exploitation and exploration (Nasim, and Sushil, 2011:188). Beer and Nohria described the contradictions between the theoretical archetypes E and A that seek to explore the reasons behind organizational ch

Tuesday, August 27, 2019

International Strategy Research Paper Example | Topics and Well Written Essays - 750 words

International Strategy - Research Paper Example Literature review This is a vital section of this project but while conducting the literature review, care should be taken so that only the relevant information is discussed. This will keep the literature review section specific and to the point. While starting the literature review section, a well defined definition of international strategy will be discussed. For example, with time how the concept of international strategy got modified (Root & Visudtibhan, 1992, p.44). The research conducted by different scholars on multinational companies regarding international strategies used by them will be discussed (Frankenberger, 2006, p.2). In the literature review section, some vital international strategies used by the firms will be explored (Mcfarlin & Sweeney, 2008, p.266). Some of the common mode used by companies to enter in international market will also be discussed (Hitt, Ireland & Hoskisson, 2009, p.225). The information strategy regarding related as well as unrelated diversificat ion will be discussed with help of some vital case studies (Johnson, Scholes & Whittington, p.285-295). Research methodology Being a descriptive research, in this project secondary research will be conducted. Data will be collected from different authenticated sources. As for example, the company website, books from renowned authors, journals and online data base will be used. The research will be a mixed one where quantitative as well as qualitative data will be collected. The aim of this research is to collect information that explains the international strategy used by the fast food industry. As for example how the company decided to avoid beef and pork products in India as these products raised religious issues. Again,... This essay streeses that Being a descriptive research, in this project secondary research will be conducted. Data will be collected from different authenticated sources. As for example, the company website, books from renowned authors, journals and online data base will be used. The research will be a mixed one where quantitative as well as qualitative data will be collected. The aim of this research is to collect information that explains the international strategy used by the fast food industry. As for example how the company decided to avoid beef and pork products in India as these products raised religious issues. Again, considering the preference of rice products over wheat product in Japan, McDonald introduced rice burgers. These are some of the unique international strategies followed by McDonald to cater unique requirement of its highly diversified customer base. The business strategy used by McDonald will be compared against other commonly used international entry model. The advantages as well as disadvantages associated with McDonald’s international business model will be discussed. This report makes a conclusion this will be closing part of the research; hence almost whole of the project will be briefed in this section. The vital finding will also be discussed once again. Finally, considering the analysis and finding of the research, some recommendation will be suggested.

Monday, August 26, 2019

CRIMINAL EVIDENCE AND PROCEDURE ONLINE WRITTEN ASSIGNMENT

CRIMINAL EVIDENCE AND PROCEDURE ONLINE WRITTEN - Assignment Example Hymon identified himself as a police officer and ordered the suspect to stop. The young man crouched at the fence ignored the officer's command and attempted to over the fence. While the suspect was going over the fence, the police officer fired at the suspect hitting him in the head. The burglary suspect was a fifteen-year-old named Edward Garner who consequently died as a result of the shooting. The officer who shot Garner was acting pursuant to the law of Tennessee and the Memphis police department policy. The Memphis police policy authorizes a police officer to use deadly force to apprehend a fleeing suspect. It provides that where all other means to apprehend that suspect have been exhausted. The police are taught to shoot to kill and not trained to shoot to wound, therefore, it is apparent that Garner's death was not accidental. Thereafter the suspect’s father brought a civil rights action against the Director of Police, the Memphis Police Department, the City, the mayor and officer Hymon. Legal point of issue The action was founded on the claim that when Hymon shot and killed Garners he violated his constitutional rights as under the fourth, eighth and fourteenth amendments. The other defendants in the case were enjoined in the suit on the basis that they failed to exercise due care in the employment, training, and supervision of officer Hymon and, therefore, they were equally responsible for Garners death. Decision of the court The court decided that the using deadly force to seize a fleeing and unarmed felon is unconstitutional as indicated by the mandates of fourth, eighth and fourteenth amendments. Additionally the court found that the rule of the fleeing felon does not violate the provisions of either the fourth or the eighth amendments. Reasoning of the court In arriving at its decision, the court reasoned that a police officer could arrest an individual if there is the probable reason that the individual has committed a crime. The fourth am endment does not make any provisions concerning how the seizure is made. The seizure should have a balance of the extent of intrusion as against the reasonableness of the manner the arrest is made. To determine the reasonability of an arrest, there must be a balance of both nature and the quality of the intrusion on the individuals interests as provided for by the fourth amendment against the importance of the interests of the government to justify the seizure. The court referred to the case of Michigan v summers where it was held that the key principles of the fourth amendment are balancing competing interests. Furthermore, the court found that reasonableness depends on when the arrest is made and how it is executed. In view of this and in light of the current case, the court found that irrespective of the probable cause to apprehend a suspect the officer apprehending the suspect must not always do so by killing him. The use of such deadly force by an officer in conducting an arres t is unmatched (Kevin, Rick, & Betsy 2007). The fundamental interest of the suspect is his life and the use of lethal force in effecting an arrest frustrates the interest of the individual (Gino 2003). The use of lethal force also frustrates the interest of the society in judicially determining the guilt of the suspect and

Sunday, August 25, 2019

Steve Jobs Essay Example | Topics and Well Written Essays - 2250 words

Steve Jobs - Essay Example Steve jobs was associated with a purely electronic industry which later transformed into a technological mobile phone and other gadgets specialized industry. Roadmap: The paper looks into the early life of Steve jobs, the early days of professional career, the hiccups faced, the rise afterwards and the building of empire in form of Apple Inc. this is followed by the analytical and professional specialization analysis and the manner in which he under took the innovations and novelty. Thesis statement: The man who brought about revolution in the field of electronic devices and other gadgets. Early Life: Born in San Francisco, United States of America in 1955 lived a considerably ordinary life in early days. But it was this ordinary life that was to be transformed into a more explorative one in times ahead. His childhood traces find no evident traces of being an extra ordinary student, and he mostly preferred being low profile and the famous garage where he would explore the electronic devices and think on imaginative lines. He was brought up in the Silicon Valley and he was sent to Crittenden Middle School (Imbimbo, 22). He had his affiliations and interest in the electronic devices and the other electronic means that were available to him at that time. Sign of events to come: One habit of Steve Jobs that could possibly had been taken as a sign of events to come was in form of his exploration and working with the neighbor in the garage. In their limited capacity yet imaginative mind and ideas they would work on the radio transistors that were available to them and would open them to check its working and design. The first experience with the device (computer) that would become an integral part of his life was when he was only 11-12 years old. It was at the Hewlett- Packard organized gathering of similar devices where he got a touch on this electronic device called computer. This was the turning point and that set the precedence for investigation and intrigue abou t the electronic devices and this quest would go on till the end of his life in form of innovations and novel inventions of electronic devices and ideas. The first break through: The first formal breakthrough was achieved in 1974 when he got associated with the makers of Atari and contributed in his capacity (Shea, 26). This venture did not last too long and he took temporary refuge from his ambitions.1976 was the year when he formally started working on making a computer with his close partner Steve Wozniak. The two would go on to make an empire of digital gadgets in longer run. They took the initiative of designing a computer that would provide better features against the conventional computer that was in place and produced by IBM and Microsoft. Steve Wozniak decades after their first meeting explained the reason behind their collaboration and the secret behind the secret of innovation. To him, the work always worked wonders because both had strong longing for innovations and work ing with the new devices in a unique manner. This held the interest of both and allowed them exploring new horizons. It was at the local garage where they undertook the task of developing computer on small scale and they went on to achieve success in their endeavors. The development of computer did not come without a cost and two of them had to sacrifice their then beloved pieces of possession with one selling out his car and other his

British Involvement in Arabic Peninsula Dissertation

British Involvement in Arabic Peninsula - Dissertation Example However, the interest into the Arabic Peninsula is motivated by the beautiful landscape of the place. The terrain and climate of the Peninsula had successfully kept away any adventurers for years. The British contact into the area was just on the individual level and not on governmental level at all (ROGERS, 2006). These individuals were mainly explorers who were visiting the place, and many other places around the world, for adventure. It is through the activity of these explorers that the world came to know about the Arabic peninsula. Some of the outstanding explorers were Charles Doughty and Richard Burton who get the credit for opening up this place to the western world. The peninsula’s location in the Arabic region was the spark to the British interest. For a long time, traffic from between the Orient and Europe used to pass through a corridor which bordered the Sahara on the south-west, and the mountains of turkey and Persia on the north-eastern region. It is along this corridor that the Arabic peninsula stretches. The corridor was, therefore, completely not penetrable. Explorers and people on adventure had to pass around the region by either going through Syria towards the Euphrates and then down to the Gulf, or across the Red Sea through Egypt. Even though Vasco da Gama had discovered the Cape route in the 15th century, the all-sea route was still preferred by many who sought to go around Africa. In the beginning of Britain’s interests in the Middle East, the main objective was commercially motivated. It was in the 17th century that the British government started to show interest in the Arabic Peninsula. During this time, the East India Company opened new offices in locations around the region such as the Red Sea, Basra and the Persian Gulf coast. The company main objective was to seek for new markets in the Middle East region. Although the intention of the British was purely economic at first, it started to take a political perspective towards the end of the 18th century (BALFOUR-PAUL, 1994). During this time, the British had already consolidated the Indian empire and, therefore, cared less about the local trade ventures. Consequently, they turned their interests to the strategic location of the Gulf because it was a major route into India. Because of this, the British administration turned all the offices in the region outside India from trade centers into political and diplomatic hubs. These centers were now used for purposes preservation and protection of the British’s interests in the region. The British notably coined some clever treaties that enabled them to preserve and protect their presence in the region. In these treaties, the British offered to protect the local Arabian rulers from their rivals in return of the Britons dominance in the region. The British, therefore, achieved the command of the Indian Ocean gateways. In this way, they were able to deny any other international powers the ports of the sea. When the British learnt of a Napoleonic entry into Egypt, they sought an agreement with the Sultan of Muscat so that they can prevent the French from expanding their territories towards the Arabic Gulf region. In other measures to protect their interests in the Arabic Peninsula region, the British signed numerous treaties with the surrounding kingdoms. These treaties were aimed at reducing piracy in the Gulf region and to safe guard trade. British have been consistent in fighting off other colonies that posed a threat to the Britons’ supremacy in the Gulf region. Among these are the Egyptians, French and Russians who have posed threat to the Ottoman Empire. The British are much concerned with the interference of the Russians, who have showed increased

Saturday, August 24, 2019

Cellular Phones and Cancer Case Study Example | Topics and Well Written Essays - 1250 words

Cellular Phones and Cancer - Case Study Example Studies to understand the relation between rf and biological tissue have been conducted since the early 1940’s. The epidemiological studies performed were inconclusive due to the large number of uncontrolled variables such as the amount of power emitted by different models of phones used. Furthermore, studies performed on laboratory animals also resulted in insignificant increase in health problems. Though in February 2011, the New York Times reported a study conducted by the researchers at the National Institute of Health which found that cell phone usage caused 7 percent increase in brain activity. This increase in brain activity was confined to the area of the brain that was near the rf antenna of the cell phone. The results of this study indicated that the use of cell phones did have measurable effects on the brain activity. The role of the engineer when confronted with ongoing debate of the relation between cellular phones and cancer is vague. The engineer could move towards redesigning of cell phones that reduce rf emission. However, this action would not be scientifically proven as the adverse effect of cell phone usage resulting in cancer has yet to be noted. The ethical procedure to be followed by the engineer in this case is discussable. The Utilitarianism, moral theory, states that those actions are acceptable and good which serve to maximize human wellbeing. Utilitarianism stresses that maximizing the potential of the whole society is more important than maximizing the importance of an individual. The theory aims to balance the needs of the society with the needs of an individual, with an emphasis on the action that would provide maximum benefit to the people. In respect to engineering, the moral theory is particularly important in risk-benefit analysis and cost-benefit analysis. The invention and mass production of the cell phone can be regarded as one of the foremost inventions of the 20th

Friday, August 23, 2019

Are Ethnic Minorities Treaded Equally and Justly in the Allocation of Essay

Are Ethnic Minorities Treaded Equally and Justly in the Allocation of Social Housing - Essay Example A further quarter of a million social homes are currently overcrowded. Over recent decades, Rutter and Latorre (2009) indicate that there has been a large reduction in social housing stock in many parts of the UK. This is due to existing tenants exercising their right to buy their properties, and a reduction in the building of new social houses. These changes have also occurred at a time when there has been an increase in the number of households in the UK, caused by greater longevity, marital breakdown, and immigration. For example, UK Census data indicates that the UK’s foreign born population rose from 2.1 million (4.2% of population in 1951) to 4.9 million (8.3% of the population) by 2001. Labour Force Survey (LFS) data from 2007 suggests that the current percentage of foreign born UK citizens stands at around 10.7%. The highest percentage of foreign born people currently residing in the UK come from India (approximately 568,700) according to LFS data. All these factors ha ve contributed to larger social housing waiting lists across the UK and the increase in the rise of migrants and different ethnic minority groups immigrating into the UK has led to a debate surrounding the issue of social housing allocation amongst ethnic minority groups. ... The need for adequate social housing allocation policy is therefore necessary to not only reduce inequality between ethnic groups, but to also promote harmony and a peaceful multicultural society in which people from all ethnic backgrounds can coincide. Before identifying existing evidence of (in)equality, I believe it is important to identify this very term. According to Ratcliffe ‘the notion of (in)equality can relate to objectives, forms/degrees of access and outcomes to particular social structures within society’ (1999:5). For example, in order to get good quality housing, people must also have good access and high achievement in other institutional areas, e.g. education and employment. This suggests that housing allocation and inequality between ethnic groups can be determined by wider socio-demographic factors, i.e. the better grades a person achieves at school, the better likelihood they are to get a well paid job, and as such, the increased likelihood they are t o live in adequate and safe residential neighbourhoods. In order for local authorities and the government to tackle racial inequality within the housing sector, it appears a holistic approach will be needed. Rutter and Lasorre (2009) highlight that attempts to create fair systems for allocating social housing date back to the Housing Act of 1936, in which local authorities were required to give reasonable preference for social housing to applicants who met ‘certain criteria’. After 1945, there was a strong notion that social housing should be provided for the most vulnerable in society. However, it is this ‘certain criteria’ which people had to meet in order to be eligible for social housing which has

Thursday, August 22, 2019

Coloplast Organizational Structure Essay Example for Free

Coloplast Organizational Structure Essay Coloplast went from a production structured organization to a functional structured organization. In the production structure the focus was on the products wish were divided into 3 product divisions. In the functional structure the company focus on specialization of tasks. Before: the production organization The production organization structure also called Division Structure is divided into 3 production division; skin, wound care and continence care, and ostomy care. Each division beyond having its department for research, development, sales and marketing, contains all the necessary resources and functions. By applying the production organization, a company gains the followings benefits: A structure where it’s easy to define the objectives and word work assignments can simply be coordinated, within each division. Another Benefit Coloplast can gain on this structure is the flexibility among workers. Workers from one department can be put on assignments in another department within the same division, if needed. This’s made possible by the fact that most of the workers are not specialist in any specific field. Should any problem occur in the division structure the causes are quickly detected and solved. This type of structure allows local leaders to make small locale adjustments to meet the challenges in there division. But this system holds its own weaknesses. It can harm communication flow between different divisions. This may result in loosing the overall focus on the objective of the organization. It may happen that each local division create its own culture witch may not necessarily be compatible with the company’s culture as a whole. The limited communication between divisions makes it hard for them to exchange experience and expertize. This system by nature is heavy and costly. In order for the company to have all the necessary resources and functions within each division, they can’t afford the best expertize on every field. After: the functional organization The new organizational structure focuses more on functions. Unlike the previews structure that focused on the product. This new structure pulls functions out of the different divisions and put them in centralized units, each specialized in respectively Globale Maketing, R and D and Global Operations. As a consequence, the former divisions are reduced to production units and subsidiaries; that receives instructions from the top. To assure communication between top and bottom, Coloplast place Commercial Excellence above the whole new structure. With the three functional divisions, Coloplast makes sure that there a clear purpose that goes all the way through the whole company, when it comes to their global marketing, innovation and how new products should be developed. As a result Coloplast becomes a unified company with no duplications of tasks. The greatest advantages of this functional centralized structure is its lightness and affectivity. It gives the opportunity to hire highly specialized staff. As Coloplast CEO puts it; â€Å"The subsidiaries have a huge, but simple, responsibility: they ? ll have to sell like the dickens† meaning that Coloplast now can headhunt exact talents for each function. The workforce those talents brings is not only promoting a single product but the company as a whole. Employees have the opportunity to learn from their superiors. They also have the opportunity to work alongside colleagues who relate to their professional interests and abilities, thus making for a more productive and enjoyable environment. By moving the production responsibility from all division to the Global Operation in cheap-labor countries, it’s possible for Coloplast to reach the point of an Economical of scale. Like any other organization structure, the functional organization has weaknesses. Because of the decision-making within the functional works from top to bottom, it’s a constant challenge to make sure that the organizations objectives are integrated at the bottom. Another disadvantage is that units may have limited flexibility in problem solving, making changes or responding quickly to customer demands and needs, since the final decision-making authority rest with the top level of management. So how does Coloplast solve these challenges? Commercial Excellence/Business Excellence For solving the challenge of implementation of the organizations objectives and assurance of a two-way communication, Coloplast places â€Å"Commercial Excellence† above the entire new structure, which acts like the strong arm, that’ll prepare budgets and make sure that objective are achieved. Commercial Excellence or Business Excellence is the systematic use of quality management principles and tools in business management with the goal of identifying improvement opportunities, area of strength and ideas for future organizational development. It’s a support function that’ll help ensure â€Å"best practice† so that the organization can avoid those complications. Conclusion This new organizational structure is a natural step for the entire group, not only does it outsource to cheaper-labor countries but it has also given Coloplast improved profitability and an organic growth of 7%. The sustained competitiveness Coloplast has gained is due to the change of organization structure where they went from a production organization to a functional organization. With the transformation came the opportunity of standardization of tasks, this leads to efficiency and expertise in the related fields. This was something they lacked in the production organization. By implementing the Business Excellence, Coloplast shows that it’s aware of the weaknesses of the new organization design and intent to avoid them. Lars Rasmussen, Coloplast CEO, emphasizes how important it’s that this supporting system doesn’t end up like a police maneuver, keeping subsidiaries in an iron grip. â€Å"Instead it shall ensure â€Å"best practice† and set such high standards, that where that is difficulty, it’ll become natural to draw on headquarters†. It’s all about motivation, contributing to people and relying on each other. This serves as a great factor for self-actualization for the individual employee witch is not only contributing to the fulfillment of personal potential but also to the work-environment. The new organization has great potential; they have cut production time by half, they went from 13 factories to 10, constantly stimulating innovation by supporting Coloplast Incubator. Coloplast current strategy placed a great deal of responsibility on the shoulders of their employees, as well as implementation of some standard guidelines and the right motivation. There are no doubt about the new structure is more complex than the previews one. Annex

Wednesday, August 21, 2019

Human Resource Management System for Resume Processing

Human Resource Management System for Resume Processing Introduction 1.1 Purpose of the System The main aim of is HUMAN RESOURCE MANAGEMENT SYSTEM is automating the resume processing for organization that is applied by the candidates. With this project organization can add the resume to the database and track the resumed to various rounds and it provides reports on jobs. The objective is to develop customize software package for organization. The Human Resource Management System is developed using ORACLE as back-end and HTML, JSP as front-end. The operating system being used is the Windows 2000 prof. The automation of the above mentioned system reduces human dependences and avoids errors in data storage, analysis and retrieval. The time taken for searching candidate details is also drastically reduced due to the automation process, thus reducing the whole cycle time. This project performs three major roles: Registration Junior level management Senior level management 1.2 Scope Of The System Human Resource Management System is accessible to the HR Department of the organization â€Å"GIT Solutions †. The functional scope of the system is to provide the user friendly environment in the process of recruitment and it provides search based on particular search criteria to update resume and so scheduled and up to interview rounds. It provides reports based on job positions search. 1.3 Objectives and Success Criteria Objective: The main objectives of the Human Resource Management System are as follows: To automate selection process. To facilitate high graphical user interface to the user. To provide better functioning and accurate information in time. To provide data maintenance features. To improve the efficiency and to reduce the overload of work. To generate appropriate and concerned information to the user using dynamic queries. To generate appropriate reports. To provide security. Success Criteria: It provides security to the application through login check of the user of this system through this web-based application maintenance of the recruitment process is being done in less time and add efficient manner. The module will be built using Oracle and html and jsp to allow for future enhancement and additions. 1.4 Definitions And Abbreviations Definitions: Applicant: An Individuals that is looking for career GIT Solutions Interview: A meeting between any Executive of GIT Solutions and applicants, where GIT Solutions determines if the employees skill set matches the job that they are trying to fill. Resume: A document containing the applicants Personal details, job details Education, Skills, Past Employment, Reference information. Test: An exercise to measure quantitatively the aptitude for specified job requirements. Posting: Feeding of information of applicant into Application or storing of application into the database. Abbreviations: HRMS: Human Resource Management System JSP: Java Server Page JDBC: Java Data Base Connectivity ODBC: Oracle Data Base Connectivity. HTML: Hyper Text Markup Language HTTP: Hyper Text Transper URL: 1.5 Overview: The main aim of is HUMAN RESOURCE MANAGEMENT SYSTEM is automating the resume processing for organization that is applied by the candidates. With this project organization can add the resume to the database and track the resumed to various rounds and it provides reports on jobs. The objective is to develop customize software package for organization. 2. CURRENT SYSTEM No proper dynamic search method is available to immediately access a particular record. Fast retrieval of required data is not possible thus causing delay and unnecessary search of the entire list. FoxPro under Novel NetWare version is not a graphical user interface based application. User interaction with the system is minimized because of the DOS environment, unlike the windows environment where the user interaction with the system is high. PROBLEM DEFINITION: Handling of large databases effectively is not possible with the above software. Creating dynamic queries is difficult in FoxPro, So dynamic report generation is not possible. Security feature, which is very important aspect of NFCL, already exists but needs to be enhanced and need to be foolproof. Online reports and graphical representation of reports do not exist. 3. PROPOSED SYSTEM Keeping in view of growth that has been envisaged, it may not be practical and economical to continue with the current system. To facilitate a more efficient Recruitment System and to increase the responsiveness, it is necessary to have better Recruitment System integrated with the enterprises Information System. Proposed system is Computerized Recruitment Processing System. A Computer based system is usually needed for the following purposes: Greater processing speed: Using computers inherent ability to calculate, sort, retrieve data with greater speed than that of the human doing we can get results in less time. Better Accuracy and Improved Consistency: The computer carries out computing steps including arithmetic accurately and consistently from which really human is escaped which yields more fatigue and boredom. Cost Reduction: Using computerization we can do the required operations with lower cost than manual process. Hence by computerization we can reduce the cost drastically. System Objectives: To automate selection process. To facilitate high graphical user interface to the user. To provide better functioning and accurate information in time. To provide data maintenance features. To improve the efficiency and to reduce the overload of work. To generate appropriate and concerned information to the user using dynamic queries. To generate appropriate reports. To provide security. 3.1 Overview: Proposed HRMS is Computerized System. HRMS mainly deals with the activities taking place in an organization to process the resume details forwarded by the candidates. There are three main modules in this system, they are REGISTRATION JUNIOR LEVEL MANAGEMENT SENIOR LEVEL MANAGEMENT Registration Module: In this module, HR Manager can give access rights to some of the employee of the organization by giving UserId and password. Generally in the organization there are five interview rounds. Namely: Preliminary Interview Written Test Group Discussion Listening Comprehension Final Interview The persons who have access rights to this system, they can define the interview rounds form the above five rounds and their order for recruiting of particular job. They can Add new Positions for recruiting, Add Departments, Add Marital Status, Add Skill Type, Add Source, Add Languages Add Certifications, Add Rounds, Add Role of the employee who can access this application. They will send the intimation letter for the written test to the selected applicants. Junior Level Management Module: In Junior Level Management the candidates who were called for written test will be conducted the different tests like written, technical, psychological organizational awareness and so on In this module they generate reports depending on the applicants performance related to test results. Junior Level Management allows the applicant for the next level depending on their performance. After conducting all tests we will mail the intimation letter for the interview to the candidates who were selected in the module. Finally they will assign the applications to the interviewers for interview. Senior Level Management: In this module senior level management interacts with the database for getting the details of selected applicants in the previous module. They will go through the applicant details and their Skill-sets reports. Again this management deals with the selected applicants in Jr level management selection process. Here senior level management conducts interview for these selected candidates. With these two modules details they will prepare the final candidates list for appointment and they will send the appointment letters to the selected applicants. 3.2 Functional Requirements: Functional requirements describe the high level functionality of thee system. It describes the interaction between the system and its environment independent of its implementation. Environment includes the user and any other external system with which the system interacts. The following are the functional requirements of the HRMS: The hr manger with the userid and password will create the normal user. The user authentication can be created checked based on userid and password. The user can define the job interview rounds. The user can add new list items to database. The application shall support unlimited profile details to be fed. The user can add new resume to the database and can update resumes based on search criteria. The application shall support integrity and check of redundancy of data posting of a profile. The application shall allow for the modification of resumes. The application shall allow intimation to the aspirant about the status of selection. The application shall allow the user to view the details of employee resume from the search results. Resumes can be tracked among the defined job rounds in the interview process and scheduling, updating the interview round for particular applicant. Generating summery report based on the position of the job and changeable to Excel form. Generating the snap short report based on the Name of the applicant from summery Report and changeable to Excel form. 3.3 Non-Functional Requirements: Non-Functional requirements describe user -visible aspects of the system that are not directly related with the functional behavior of the system. The following are the Nonfunctional requirements of the HRMS: 3.3.1 User Interface and Human Factors: On the portion of the Application Assessment screen, you have the main menu, where various tabs are shown that form apart of each of the modules. Application Assessment Maintenance of resumes Test Reports Maintains Performance of the applicant in various test and interview levels. Reports Generates reports depending on their performance in various test and interview levels Click the Application Assessment tab. It shows the following links Personal information Details Screen In this screen User enter the Personal details of the applicants. Educational Details In this screen User enter the Education details of the applicants. Address Details In this screen User enter the Address details of the applicants. Experience Details In this screen User enter the Skills and Experience details of the applicants. Click the Test Assessment tab. It shows the following links Interview Assessment Junior Level Management Interview Assessment Senior Level Management Click the Interview Assessment Junior Level Management tab. It shows the following links Interview Assessment Junior Level Management Screen In this screen User enter the marks of the applicants who wrote the tests in the second module. Interview Assessment Senior Level Management Screen In this screen User enter the marks of the applicants who attended for the interview in the third module. Click the Reports tab in the main menu. It shows the following links Selection list report It contains the following tab links Selection list for Written Test In this Report we will get the applicants list who were selected for the written test. Selection list for Interview In this Report we will get the applicants list who were selected for the Interview. Overall Performance list report In this report we will get the Overall performance in all the test and interview rounds. Intimation list report In this report applicants will be got their status in each round in which they participated. It will shows the following links Call letter for written test In this call letters will be send to the applicants who selected for the written test. Call letter for Interview In this call letters will be send to applicants who selected for the Interview. Call letter for Intimation In this call letters will be send to applicants who selected for the Job. 3.3.2 Documentation In the HRMS the following documentation are provided: Requirement Document System Design Document Database Design Document 3.3.3 Software and Hardware Requirements: Software requirements Operating system ::::: Windows 2000/NT, MS-DOS. Backend ::::: ORACLE 8i Front end ::::: HTML Language ::::: Java, JDBC Web Technologies ::::: Servlets, JSP Web Server ::::: Tomcat 4.1 Application Server ::::: Weblogic 7.1 Driver ::::: ODBC for oracle. Documentation Tool ::::: Microsoft word 2000 Hardware requirements CPU ::::: Pentium IV. Speed ::::: 800 MHz Ram ::::: 1 GB. Hard disk ::::: 20 GB. Monitor ::::: SVGA color monitor. Keyboard ::::: 105 Standard Mouse. Mouse ::::: Logitech 3.3.4 FEASIBILITY STUDY: All projects are feasible, given unlimited resources and infinite time. But the development of software is plagued by the scarcity of resources and difficult delivery rates. It is both necessary and prudent to evaluate the feasibility of a project at the earliest possible time. Three key considerations are involved in the feasibility analysis. Economic Feasibility: This procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. Otherwise, further justification or alterations in proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. Technical Feasibility: Technical feasibility centers on the existing computer system (hardware, software, etc.,) and to what extent it can support the proposed addition. If the budget is a serious constraint, then the project is judged not feasible. Operational Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. It is understandable that the introduction of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. FEASIBILITY STUDY IN THIS PROJECT Technical Feasibility Human Resource Management System is the project that is designed mainly on Java. The main reason behind choosing the Java environment is that, keeping in mind the needs of the users. The activities that go on in this particular phase are acceptance of applicants profiles with the help of well designed web based forms and storing the information in the database and retrieving for future use. The usage of JSP facilitates the dynamic page generation. This is the main reason behind the usage of JAVA for the development of this project. Since it is multi platform environment that supports web Browser where as other languages lack these features. In order to maintain continuously communicate between client and server he/she needs a reliable protocol i.e., is TCP/IP protocol. This protocol frequently transfers messages between client and server. Communication Standards such as HTTP is used .An HTTP is a client/server interaction consists of a single request/reply interchange, it user-friendly environment. Economic Feasibility The Human Resource Management System is a system that maintains the information regarding the various applicant details. The entire system is designed to maintain information regarding the applied candidates and those candidates who are recruited. It also maintains information regarding the various tests conducted and the short listed candidates. Once candidates have been selected the left over candidates information is deleted from the database. Operational Feasibility The Human Resource Management System efficiently manages the information coming into the database sends the list of eligible candidates that need to appear for scrutiny very fastly. Also it enables results to be processed in a very time saving and effective manner and short lists the names of all candidates selected and present details about their performance in a well organized, easily understandable manner. Various reports regarding the selected candidates performance and pay scale are also generated to provide minute details regarding the entire system. 3.3.5 Performance Characteristics HRMS was developed as a IAVA web application. It works efficiently; less time it generates web page when it works on Pentium IV Processor with RAM 1 GB. It works up to ten concurrent users. 3.3.6 Security Issues Initially HR Manager assign authentication rights to employee of the organization by giving usreid, password. The authentication of the user is should verify by checking userid, password when ‘Login. Only authenticated users of the organization can access the system. DESCRIPTION OF THE SOFTWARE USED: HISTORY OF JAVA Java language was developed by James Gosling and his team at sun Micro systems and released formally in 1995. Its former name is oak. Java Development Kit 1.0 was released in 1996. to popularize java and is freely available on Internet. Overview of Java Java is loosely based on C++ syntax, and is meant to be Object-Oriented Structure of java is midway between an interpreted and a compiled language java programs are compiled by the java compiler into Byte Codes which are secure and portable across different platforms. These byte codes are essentially instructions encapsulated in single type, to what is known as a java virtual machine (JVM) which resides in standard browser. JVM verifies these byte codes when downloaded by the browser for integrity. JVM is available for almost all OS. JVM converts these byte Codes into machine specific instructions at runtime. FEATURES OF JAVA Java is object-oriented language and supports encapsulation, inheritance, polymorphism and dynamic binding, but does not support multiple inheritances. Every thing in java is an object except some primitive data types. Java is portable architecture neutral that is java programs once compiled can be executed on any machine that is enabled. JAVA is distributed in its approach and used for internet programming. Java is robust, secured, high performing and dynamic in nature. Java supports multithreading. There for different parts of the program can be executed at the same time JAVA AND INTERNET Java is strongly associated with internet and known as internet programming language. Internet users can use java to create applet programs and run them locally using java enabled browser search as hot java. Applets can be downloaded from remote machine via internet and run it on local machine. JAVA AND WORLD WIDE WEB World Wide Web is an open ended information retrieval system designed to be used in the distributed environment. This system contains web pages that provide both information and controls. We can navigate to a new web page in any direction. This is made possible worth HTML java was meant to be used in distributed environment such as internet. So java could be easily incorporated into the web system and is capable of supporting animation graphics, games and other special effect. The web has become more dynamic and interactive with support of java. We can run a java program on remote machine over internet with the support of web JAVA ENVIRONMENT Java environment includes a large no. of tools which are part of the system known as java development kit (JDK) and hundreds of classes, methods, and interfaces grouped into packages forms part of java standard library (JSL). JAVA ARCHITECTURE Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the java virtual machine which are then interpreted on each platform by the runtime environment java also provides stringent compile and runtime checking and automatic memory management in order to ensure solid code. JAVA VIRTUAL MACHINE When we compile the code, java compiler creates machine code (byte code) for a hypothetical machine called java virtual machine (JVM). The JVM will execute the byte code and overcomes the issue of portability. The code is written and compile for one machine and interpreted all other machines. This machine is called java virtual machine. PARADIGM OF JAVA Dynamic down loading applets(small application programs); Elimination of flatware phenomenon that is providing those features of a product that user needs at a time. The remaining features of a product can remain in the server. Changing economic model of the software Up-to-date software availability Supports network entire computing Supports CORBA DCOM ABOUT HTML HTML (hyper text markup language) is a language used to create hyper text documents that have hyper links embedded in them . it consists of tags embedded in the text of a document with HTML. We can build web pages or web document s. it is basically a formatting language and not a programming language. The browser reading the document interprets mark up tags to help format the document for subsequent display to a reader. HTML is a language for describing structured documents. HTML is a platform independent. WWW (World Wide Web) pages are written using HTML. HTML tags control in part the representation of the WWW page when view with web browser. The browser interprets HTML tags in the web document and displays it. Different browsers show data differently. Examples of browsers used to be web pages include: Netscape Internet Explorer JAVA SCRIPT Java script is a general purpose, prototype based, object oriented scripting language developed jointly by sun and Netscape and is meant for the WWW. It is designed to be embedded in diverse applications and systems, with out consuming much memory. Java script borrows most of its syntax from java but also inherits from awk and perl, with some indirect influence from self in its object prototype system. Java scripts dynamically typed that is programs dont declare variable types, and the type of variable is unrestricted and can change at runtime. Source can be generated at run time and evaluated against an arbitrary scope. Typical implementations compile by translating source into a specified byte code format, to check syntax and source consistency. Note that the availability to generate and interpret programs at runtime implies the presence of a compiler at runtime. Java script is a high level scripting language that does not depend on or expose particular machine representations or operating system services. It provides automatic storage management, typically using a garbage collector. FEATURES: Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent JavaScript is an interpreted language that can be interpreted by the browser at run time . Java script is loosely typed language Java script is an object based language. Java script is an Event-Driven language and supports event handlers to specify the functionality of a button. ADVANTAGES Java script can be used for client side application Java script provides means to contain multiform windows for presentation of the web. Java script provides basic data validation before it is sent to the server. Eg : login and password checking or whether the values entered are correct or whether all fields in a from are filled and reduced network traffic It creates interactive forms and client side lookup tables. JavaDataBaseConnectivity (JDBC) It is a java data base connectivity having database as a back-end of java as front end. Database is a collectivity of related data. A data base management system (DBMS) controls the storage or retrieval of data in the database. The main use of this JDBC is the database connectivity. Using drivers we can get connection to the back-end: Which drive we are going to connect back-end. Create a data source name (dsn). Create a statement for connection. The package we use here is java. Sql. Interfaces of jdbc include Driver, Connection, Statement, Prepare Statement, CallableStatement, ResultSet, and ResultSetMetaData. Classes of JDBC are DriverManages, DriverPropertyInformation, Date, Time, Timestamp, and Type. The driver defined by the class JdbcOdbcDriver in package sun.jdbc.odbc. Class sun.jdbc.odbc.JdbcOdbcDriver represents the jdbc to odbc bridge driver. Overview of New Features Result set enhancements The JDBC 1.0 API provided result sets that had the ability to scroll in a forward directionally. Scrollable result sets allow for more flexibility in the processing of results by providing both forward and backward movement through their contents. In addition, scrollable result sets allow for relative and absolute positioning. For example, its pos-sable to move to the fourth row in a scrollable result set directly, or to move directly to the third row following the current row, provided the row exists. The JDBC API allows result sets to be directly updatable, as well. Batch updates The batch update feature allows an application to submit multiple update statements (insert/update/delete) in a single request to the database. This can provide a dramatic increase in performance when a large number of update statements need to be executed. Advanced data types Increased support for storing persistent Java programming language objects (Java objects) and a mapping for SQL99 data types such as binary large objects, and structured types, has been added to the JDBC API. An application may also customize the map-ping of SQL99 structured types into Java programming language classes. RowSets As its name implies, a rowset encapsulates a set of rows. A rowset may or may not maintain an open database connection. When a rowset is ‘disconnected from its data source, updates performed on the rowset are propagated to the underlying database using an optimistic concurrency control algorithm. RowSets add support to the JDBC API for the JavaBeans component model. A RowSet object is a bean. A RowSet implementation may be Serializable. Rowsets can be created at design time and used in conjunction with other JavaBeans components in a visual builder tool to construct an application. JNDI for naming databases The Java Naming and Directory Interface (JNDI) API can be used in addition to a JDBC technology-based driver manager (JDBC driver manager) to obtain a connection to a database. When an application uses the JNDI API, it specifies a logical name that identifies a particular database instance and JDBC driver for accessing that database. This has the advantage of making the application code independent of a particular JDBC driver and JDBC technology URL. Connection Pooling The JDBC API contains ‘hooks that allow connection pooling to be implemented on top of the JDBC driver layer. This allows for a single connection cache that spans the different JDBC drivers that may be in use. Since creating and destroying database connections is expensive, connection pooling is important for achieving good performance, especially for server applications. Result Set Enhancements This chapter discusses the new functionality that has been added to result sets. The goal of the enhancements is to add two new basic capabilities to result sets: scrolling and updatability. Several methods have also been added to enable a JDBC driver to deliver improved performance when processing results. A variety of examples are included to illustrate the new features. Scrolling A result set created by executing a statement may support the ability to move backward (last-to-first) through its contents, as well as forward (first-to-last). Result sets that support this capability are called scrollable result sets. Result sets that are scrollable also support relative and absolute positioning. Absolute positioning is the ability to move directly to a row by specifying its absolute position in the result set, while relative positioning gives the ability to move to a row by specifying a position that is relative to the current row. The definition of absolute and relative positioning in the JDBC API is modeled on the X/Open SQL CLI specification. Result Set types The JDBC 1.0 API provided one result set type—forward-only. The JDBC 2.1 core API provides three result set types: forward-only, scroll-insensitive, and scroll-sensitive. As their names suggest, the new result set types support scrolling, but they differ in their ability to make changes visible while they are open.A scroll-insensitive result set is generally not sensitive to changes that are made while it is open. A scroll-insensitive result set provides a static view of the underlying data it contains. The membership, order, and column values of rows in a scroll-insensitive resultset are typically fixed when the result set is created. On the other hand, a scroll-sensitive result set is sensitive to changes that are made while it is open, and provides a ‘dynamic view of the underlying data. For example, when using a scroll-sensitive result set, changes in the underlying column values of rows are visible. The membership and ordering of rows in the result set may be fixedà ¢â‚¬â€this is implementation defined. Concurrency types An application may choose from two different concurrency types for a result set: read-only and updatable. A result set that uses read-only concurrency does not allow updates of its contents. This can increase the overall level of concurrency between transactions, since any number of read-only locks may be held o

Tuesday, August 20, 2019

Elderly Sex Offenders: Causes, Crimes and Punishments

Elderly Sex Offenders: Causes, Crimes and Punishments Introduction In the recent years, the number of reported crimes involving geriatric offenders has increased, especially in sex related offences. Although there is a recent spate of sex offences, there has been minimal discussion with regard to sex offenders who commit their crimes in their golden years. Furthermore, the media has been seen to portray the elderly as feeble and delicate targets for criminals, more than a perpetrator of crimes. This essay will firstly define the ground rules and establish a common understanding of the age range of the elderly. Part II of the essay will examine and discuss the types of offences committed by elderly sex offenders, follow by the reasons for committing the sexual crimes. Part III of the essay will delve at the current punishments and treatments for geriatric sex offenders based on classical and positivist approach. Finally, Part IV will offer some recommendations on the way forward of elderly sex offenders. Definition of an Elderly Person According to the World Health Organization (WHO), most of the countries worldwide have accepted the chronological age of 65 years as a definition of elderly person (WHO, 2010). This definition also coincides with the definition of elderly in United States. In Singapore, however, the elderly, or otherwise known as senior citizen, own their status once they have reached the age of 55. Although senior citizenship starts from the age of 55, it is worthy to note that Singaporeans retired at the age of 62 and statistics from the government actually delineate age 65 and above from the others when determining the age structure for the purpose of statistics (Statistic Singapore, 2010). Ironically, criminals whose age are 50 and above are not subjected to canning regardless of the offences committed, though the average life expectancy of Singaporeans is 81.4 (Male: 79 and female: 83.7). For the purpose of this essay, we will define age 65 and above to qualify as elderly. Offenses Perpetrated by Elderly Sex Offenders While the majority of the sex offenders are still committed by younger men, statistics show that nearly 4 percent (2858 persons)of the sexual crimes in United States in 2006 were age 60 and above (Sullivan, 2007). Whereas in Singapore, there were 50 over sexual crimes in 2009 and out of the 50 over cases, less than 5 cases are elderly offenders. Generally, sex offences committed by elderly are more passive sexual activities as compared to younger sex offenders. Research has shown that elderly sex offenders are more likely to commit non-violent sexual offences such as pedophilia, fondling or molest, statutory rape, exposing of the genitals and other acts of exhibitionism (Eysenck Gudjonsson, 2000). For example, a recent case of 90 year-old Australian arrested and charged for raping four young sisters (age 5 to 7) whom he allegedly lured to his home in Thailand with imported chocolates and English lessons (Suchaovanich, 2010). In Singapore, a 68 year-old magician was arrested and char ged for molesting a 12 year-old apprentice (SSN, 2009). Although there are many different scenarios of elderly sex offenders, these 2 incidents seem to suggest that elderly sex offenders frequently choose children as their victims and are more likely to do so than younger offenders. Potential reasons postulated that the elderly men have lost their charisma and are generally unattractive to females. Also, the fact that grandfather image tend to be more trust worthy than younger men and this increases the opportunity of committing sexual crimes. Besides, young victims are less able to defend themselves and easier to bribe and less likely to report such incidents (Hucker, 1984). Possible Reasons for Sexual Crimes Other possible reasons seem to indicate that elderly sex offenders may be suffering from a lost sense of masculinity. Furthermore, sexual crimes are committed by elderly offenders who are feeling less potent and less active in their golden age. It is postulated that by victimizing someone less powerful, the elderly is able to recover his lost self-esteem (Benett, 1987). Another postulation by Hucker and Ben-Aron (1987) seems to suggest that they are unable to physically live out their fantasies and hence, only capable of performing their desires in a limited sexual capacity. Additionally, it is also hypothesized that the elderly sex offenders are overwhelmed by typical problems such as social isolation and loneliness due to separation from grown up kids, death of spouse or even poverty. One of the prison psychologists, Susan King felt that elderly offenders are still sexually driven. However, due to their health condition and potency, they become frustrated and therefore acted on chi ldren simply because they are easy targets. Moreover, elderly sex offenders do not want to seek counseling or treatment (Rayburn, 2007). Punishment or Treatment of Elderly Sex Offenders According to the Penal Code (Chapter 224, Section 375 and 376), the penalty for sex offences is imprisonment of not less than 8 years and not more than 20 years, and shall also be punished with not less than 12 strokes of cane. Most of the countries have average sentence of 12 years for rapists but caning is not commonly used in some countries such as United States and some African nations. Usually, a criminal justice system is more inclined towards the classical approach as this theory is very policy oriented and concentrates on establishing and operating a criminal justice system that is rule-based, consistent and predictable (Joyce, 2006). Punishments meted out by such system are usually acted as a form of deterrence to members of public from committing crimes. Other than the classical approach, positivist theory is another approach to deal with crimes. Rather than focusing on the law and the offence committed, this approach looks into the contributing factors leading to the crime . It advocates treatment and rehabilitation over punishments. However, more often than not, when elderly sex offenders are convicted of their crimes, the question that will be normally raised, what to do with these criminals? Which approach to be used? While there is a strong disinclination of locking the feeble and frail elderly into the prison and spend his final years, nobody would allow a sex offender to be roaming in the streets and inflicts harm on the children. In United States, sex offenders are banished from the towns and they are restricted from living 750 meters within the streets and schools. They were forced to live under bridges and homeless (Kelley, 2010). In fact, many of these elderly sex offenders are first timer with no prior criminal record of any sexual or other offense (Hart, 2008). If Singapore were to impose such restrictions, we will see sex offenders congregating outside the city and this would have other repercussions and inadvertently create other social problems in the society. Another important aspect that influence and shape the publics perception is the power of media as it exerts an imperative influence on the popular perception of the nature and effect of crime. Just because sex, violence and controversy sells newspaper, it actually enables profit-run mass media companies to publish and sensationalize stories that the public would generally be interested in reading and watching so as to boost the sales and advertising revenue. However, the media is not providing an accurate portrayal of the news and allows deviance amplification and moral panic to set in. In essence, the members of public forms their opinions of the offences and crimes based on what they read and watch. Take it for instance, the media in Singapore has always portrayed the elderly as frail and frightened, being the victims of robbery rather than perpetrators of crimes. Recommendations Besides the usual classical system meted to punish elderly offenders, the system should advocates for a sympathetic treatment of elderly sex offenders because the elderly offenders tend to be non-aggressive in their acts, possess low recidivism rate and deprived of notable social, health and mental problems (Hucker, 1984). In fact, evidence from Steffensmeier (1995) seems to imply that elderly sex offenders receive more lenient sentences than the younger offenders. One possibility for reconciling the differences in sentencing might be due to the fact that elderly sex offenders are generally less aggressive towards their victims and are more likely to commit non-violent sexual offenses when compared to younger sex offenders. Some of the elderly sex offenders suffer from sicknesses such Parkinson disease, Alzheimers, dementia and other elderly illnesses. As such, by sending the elderly sex offenders to the prison may aggravate their health condition because the prisons are geared prima rily for young offenders and it has little emphasis placed on special problems of incarcerating the elderly offenders. Moreover, increased numbers of elderly offenders will equate to an increased in the medical cost and facilities required for the elderly. With the increase in elderly offenders, setting up an elderly prison might be worthwhile considering as the prison can be tailored to the elderly offenders special needs such as medical and psychological facilities and equipment available for the offenders. In the state of Nevada in United States, the governor implemented a special needs program for different groups of offenders such as the elderly offenders, pregnant offenders, sex offenders and etc (NDOC, 2007). The Ministry of Home Affairs could perhaps set aside certain percentage of the allocated funds to run such program when elderly offenders have increased substantially. For a stronger deterrence message to prevent elderly offenders from committing sexual crimes, the government should also review the Penal Code and relook into the caning requirements, if the countrys law and order is based on classical approach. As brought up earlier, caning for age 49 and below does not coincide with the life expectancy as well as the criteria age for elderly. The government should revise the mandatory caning requirement to age 64 and below for serious offences and caning can still be carried out for age 65 and above subjected to medical examination. In this way, the punishment meted can transmit a stronger deterrence signal to future elderly sex offenders. For a justice system to be more effective and encompassing, the government should consider a mixture of both the classical and positivist approaches. Conclusion While elderly sex offenders only account for a small percentage of sexual crimes committed, it is definitely alarming that an elderly who has lived within the norms of society for their entire life can commit such horrendous acts at such a late stage in their life and turn into a dirty old man. Nevertheless, elderly sex offenders are generally less violent and their intention is never to harm their victims, the crime is committed purely out of personal gratification. With the increase in elderly offenders, dedicated prisons are recommended for elderly offenders and they can make use of the medical facilities for their health and mental treatment.