Monday, September 30, 2019

Fin Understanding

Understanding the Concepts Professor Ingrain P. Nelson Fin 100 Introduction to Finance December 1, 2012 1. Imagine you are a small business owner. Determine the financial ratios that are important to the business. Compare your ratios with those that are important to a manager of a larger corporation. As a business owner, financial understanding is something that has to be studied before you decide that you are going to open or even start a new business. Small businesses in general run the finance operations of their business in a different way than the larger corporations.Most of the small businesses must rely on the personal investors or personal resources to access money needed to be a successful business. It does not matter if it is a small business or a corporation; being a successful business depends on having the capability to make more than what is being paid out. Now that we have a little understanding of what it will take to start the business; we must have knowledge of the different types of ratios that will help us with this. The main three ratios that are used in the business world are the current ratio, total debt ratio, and profit margin.The current Asia is a measure of the company ability to pay off its short-term debt as it comes due (Melcher & Norton). This ratio is computed by dividing the current assets by the current liabilities. Total debt ratio is Just what you think it is; the total amount of debt the company has. The total debt ratios are total debt or total liabilities of the business and divide it by the total assets. Profit margin is simply how much profits (money) is made during the operation or while the business was open if you had to close it down.Net income is divided by sales in order to show the profit. All of the three ratios are used to no matter how big or small your company seems to be. 2. Explain the advantages and disadvantages of debt financing and why an organization would choose to issue stocks rather than bonds to gen erate funds. If you run into the problem of the current ratio showing that you have the inability to cover the costs of the business then, debt financing may be the best solution for this problem. As we know with all financial options, there are some advantages and disadvantages of any company or business.The first advantage for debt financing is that it allows the menders or the owners of the company to maintain control and ownership of the company. A second advantage would be that the interest paid on the loan may be tax deductible depending on the type of loan. The best part is the lenders you borrow money from do not share in your profits. The main disadvantage is the risk of credit ratings getting ruined or filing for bankruptcy (Palaver, n. D. ) As an organization; they can choose to either issue stocks or bonds to help generate funds for the company. Most of the time they prefer to issue stocks over bonds.Stocks are a form of winnowers; they represent participation in a compa ny's growth (Investigated). A between investors and institutions that, in return for financing, will pay a premium for borrowing, known as a coupon (Investigated). When it comes to the obligation of repay the principle on the stocks you have none; now for the bond you must pay it on the date of maturity. The inertest of the bond has dividends, but the company only pays the dividends when the company makes a profit. The stocks have a fixed interest rate that has to be paid at a specific time. 3. Discuss how financial returns are related to risk.We know that how the returns work is the greater the risk the greater the returns. The more you invest the more you will get back in returns. The relationship between financial risk and return is the gain or the lost from investments or securities. Just because you have chosen to take a higher risk does not mean that your return will be as high as the risk you took. There are five factors of model investment risk shows risks in terms of credit risk, term risk, market risk, size risk, and price risk. The return on an investment can be measured by a real rate which is what is earned after inflation has been figured into the value.The market, size, and price factors are the link between risk and return (Risk and return are related – Wealth Foundations, n. D. ). Now the beta stock is one factor that will help to determine the risk. 4. Describe the concept of beta and how it is used. A stocks beta is the measure of an asset's systematic risk and the relative risk (Melcher and Norton). Beta also measures the volatility or variability of an asset's returns relative to the market portfolio (Melcher and Norton). The assets of the company are more volatile than the market. If the company has a greater systematic sis than the market then the betas are greater than 1. . Even though the total risk and the sum of systematic risks are all measured by beta, they are equal and they are all measured in different units. Total risk i s measured in percentages and beta is unit less. The rules of how the beta works can be very easy to understand. The beta value will always be greater than 1 if a stocks price moves more than the stock market. If the value of the beta is less than 1, the stock market is moving more than the stocks price. Increased volatility of stock price equals higher risk for the investors ND a higher expected return, therefore betas over 1 are riskier.Betas under 1 are the exact opposite. These stocks have fewer risks, less volatility, and smaller overall returns. (Stock Beta and Volatility, n. D. ) 5. Contrast systematic and unsystematic risk. As mentioned in the above paragraphs, ownership of stock does not come without risks. The types of risks are categorized as systematic and unsystematic risks. The risks are very similar to each other; in that they are both affected by news and represent changes in a stocks return. The combination of these two risk types is noninsured the total risk. At th is point is where the similarities between the two risks end.Systematic risks, also known as non-diversified risks, are common risks that affect all stock. This risk is the portion of an asset that can be linked to market factors that influence all firms (Marina, 2010). The market for the systematic risk is the news, such as hurricanes, war, or an increase in interest rates, that links with the investments of the company. When things like this happen the investors do not have control; and now this presents a higher risk for the stockholders. Now that the hysteretic risks cannot be mitigated through diversification, they require a risk reward for buying a risky stock.The risky premium is determined solely by the systematic risks of a security. In addition to the risk premium, stockholders expect high returns because of the high risks posed by systematic risks. (Weakened, Kismet, ; Skies, 2011) Unsystematic risks or diversified risks are independent risks that only affect a single com pany or industry. The risk indicates a portion of an asset that is related to random causes that are linked to firm-specific events (Marina, 2010). The types of unsystematic events are to be made by the company or the industry specific news.When a merger happens between two companies this is what falls into the unsystematic risk category. Also other industry factors and events such as labor unions, strikes, lawsuits, and marketing strategies are a unsystematic risk. The changes that happen resulting from the independent risks are unrelated across investments. If the company has one unsystematic event that may happen, this will not have an effect on the entire outcome of the portfolio. Since the risk was so low this meaner that the stock will not be able to receive a risk premium. They can, however, diversify their portfolio to eliminate unsystematic risks.The elimination of the risks lowers the return an investor can expect (Weakened, Kismet, ; Skies, 2011). 6. Imagine your manufact uring corporation has Just won a patent lawsuit. After attorney and other fees, your corporation will have about $1 million. Explain how you plan to invest the money in order to diversify the risk and receive a good return. Support your decisions with concepts learned in this course. If my manufacturing corporation has Just won a patent lawsuit, I would have to take advantage the financial concepts that I have learned in this class such as financial management, stock and bonds, and the financial risk.I would use these concepts in order to diversify the risk and receive a good return. I am not for sure as to how much was awarded before the attorney and other fees but, only about $1 million will remain. This money will be invested into different portfolios that would help to diversify the risks that I will be taken not that I have money to do that with. Taking about half of the money to invest in multiple companies that have the potential to row and I can see where it would grow. I wo uld buy shares; this will give me the long term investments.

Sunday, September 29, 2019

Cement Lifecycle Review

Life Cycle Review of Cement and Concrete Manufacturing Table of Contents Introduction3 Concrete Overview3 Life Cycle Stages4 Portland Cement4 Raw Material Extraction5 Crushing Process5 Kiln Processing6 Clinker Cooling and Storage7 Clinker Grinding7 Packaging and Shipping7 Concrete Processing8 Recycling and Landfill8 Environmental Considerations Throughout Life Stages9 Inputs: Consumption9 Outputs: Waste10 Air Quality and Pollution11 Land Quality and Biodiversity12 Alternative Suggestions in Minimizing Environmental Impact13Solutions for Minimising Ecological Footprint13 Solutions for Improving Air Quality13 Solutions for Minimising Land Degradation14 References15 Introduction A life-cycle assessment (LCA), as described by the US Environmental Protection Agency, is â€Å"a technique to assess environmental impacts associated with all the stages of a products life from cradle-to-grave†(USPA 2010). Therefore, an assessment of a product’s life cycle endeavors to analyze its existence from raw material extraction, to manufacturing, through to disposal.This report will not provide adequate data for the purpose of undertaking an LCA, however, it is aimed at â€Å"thinking† about the life cycle, and collecting information from past LCA studies to undertake a report on concrete production, particularly focusing on the life-cycle of cement, a critical component of concrete. Therefore, the following â€Å"life cycle thinking† review will endeavor to utilize previous LCA studies in order gain an insight about the major environmental impacts throughout each lifestage, chiefly centering on cement manufacturing.Correspondingly, it will also discuss alternative strategies of delivering cement and concrete as a building material with fewer environmental impacts. Concrete Overview Concrete is a multifaceted construction material, which is assembled mainly from cement, water and aggregate (Reding et al 1977). Concrete is one of the most durable buildin g materials, which allows it to exhibit many functions, including; precast elements, underwater construction, infrastructure formation and residential housing.In view of the fact that the life cycle stages and environmental impacts differ between manufacturing for each function concrete withholds, this report will focus on concretes function as a building material for residential housing and apartments (Anonymous 2012). Concrete is labeled one of the most durable building materials; therefore concrete structures withhold an elongated service life (Reding et al 1977. As a result of this, concrete is the most extensively used construction material in the world and has contributed momentously to the built environment throughout history. Life Cycle StagesIn a straightforward description, as mentioned above, concrete consists of three basic components, including cement, aggregates and water. Although there are various cement blends used for different purposes, this lifecycle review will focus particularly on Portland cement manufacturing, which is frequently utilized for industrial purposes (Anonymous 2012). In observing a life cycle of concrete manufacturing, the production of cement generally takes place separately, which is then transported to the selected building location, where water and aggregates are added to bind all components into one homogenous material – concrete (Anonymous 2012).Although there are obviously procedures in obtaining the water and aggregate for concrete production, the life-cycle discussed in this report will focus primarily on Portland Cement production (Reding et al 1977). Portland Cement The major raw materials extracted for cement production include limestone, sand, shale and clay. These feedstock ingredients provide calcium carbonate, alumina, silica and ferric oxide, which are critical elements of cement (Anonymous 2012). Figure 1: Proportion of cement components (CCAA 2010) Raw Material ExtractionThe initial stage of Portla nd cement production is the extraction of the raw materials by either quarrying or mining (Anonymous 2012). This withholds an adverse risk to land quality, potentially effecting fauna and flora within close proximity. Quarrying and mining are undertaken by operations such as drilling, blasting, excavating, handling, loading, hauling, and crushing (Reding et al 1977). The fragmented material, which can reach meters in length, is then transported via dump trucks to the cement plant, which is generally located nearby (Anonymous 2012). Crushing ProcessWhen transferred to the plant, the rock material is fed through a primary crusher, which breaks it down into smaller pieces up to six inches in size (Anonymous 2012). Subsequently, the rock is then transported via a conveyor to the secondary crushing stage, which accordingly, crushes the rock down to sizes of three inches or less. Following these essential crushing processes, all raw material undergoes a mixing and grinding process, where additional silica and iron may be added (Anonymous 2012). Within this stage, particulate emissions are profoundly emitted into the atmosphere.The mixing process can either be wet or dry, depending on the plant, however, the Cement Industry Federation states in their most recent Environmental Report that wet process plants in Australia now only account for less then 15% of total production, as wet processes have momentous water consumption (CIF 2010). In the instance of a wet mixing and grinding process, large impact dryers completely dry out the materials whilst grinding is undertaken, however if a wet process is embarked on, water is added during the grinding process which turns the mix into the form of a â€Å"slurry† (Anonymous 2012).Kiln Processing This process involves the slurry or the finely ground dry material to be fed into a high-temperature, cylindrical rotary kiln, heated to about 2700 degrees F (Anonymous 2012). Kilns are mounted with the axis slightly inclined f rom the horizontal and can reach up to 180m long, with a six meter diameter, thus it can take up to two hours for the material to travel through. The upper end of the kiln provides the entrance for the material, whereas the lower end comprises a roaring blast of flame, fueled by either coal or natural gas.During this process, any water contained in a â€Å"slurry† mix is lost through evaporation (Reding et al 1977). Ultimately, as the mixture travels through the kiln, it transforms both physically and chemically into grey pebble-like substances called clinker (Anonymous 2012). During kiln processing, particulate and GHG emissions are released. This stage also consumes the most energy, as fossil fuels are incinerated to provide extreme heat. Clinker Cooling and StorageThe clinker is expelled from the lower end of the kiln and is then transported onto a conveyer through a cooling system where large fans and water are utilized to cool the temperature (Anonymous 2012). The United Kingdom Environmental Agency state in their Environmental Performance Evaluation, that the vast majority of cement plants around the world now transfer the heated air from the coolers back towards the kiln as a means of saving fuel (UKEA 2010).Once the clinker is cooled, it is deposited into a storage area where it awaits until it is required for it’s final stage of grinding. Clinker Grinding The clinker is finally transported via a conveyor to its final crushing stage and is ground into a fine powder. This is carried out by steering the product through rotating tube mills with rolling crushers, which grind the cement into a fine powder. During this stage, other materials conveying analogous characteristics are added.Gypsum is also combined with the mix, as it assists in regulating the setting time of the final concrete product (Anonymous 2012). The continuous rolling assists in distributing the materials and gypsum throughout the cement evenly, and also separates the cement particles according to size (Reding et al 1977) . The material that has not been ground to the adequate size is deflected through the system again, however the final product is guided to the final storage silo (Anonymous 2012). Packaging and ShippingThe final product is either mechanically or hydraulically hauled out from its storage silo and is either packaged in paper sacks or supplied in bulk where it is then transported via truck, rail car or ship to the location of utilization (Anonymous 2012). Transportation must still be taken into consideration in contributing to the manufacturing air emissions. Concrete Processing Once transported to the building location, the addition of water to the cementitious material forms a thick cement paste, through the method of hydration (Anonymous 2012).Both fine and course aggregates; consisting of natural gravel, sand and soft stone are also commonly added to the cement paste, to create bulk and a strong, high resistant concrete (CCAA 2010). Aggregates are granular materials such as sand, gravel or crushed stone, which are usually dredged from a river, lake, pit or seabed (CCAA 2010). Prior to combining the aggregate in the cement, it undergoes a washing process to remove any unwanted silt, dust, clay or organic matter that could potentially interfere with the bonding reaction with the cement (Cement Industry Australia 2003).Similarly to the cement manufacture process, the aggregate is also sorted into different granular sizes (Anonymous 2012). This is undertaken by passing the material through a screen containing different size openings. Once arranged into adequate sizing, the aggregate is transported to the building site where it congregates with the cement (CCAA 2010). Thorough combining of cement, water and aggregate is crucial for the invention of high quality, uniform concrete, therefore equipment and methods such as cement trucks and on site mixers are utilized (CCAA 2010).Once all the constituents are thoroughly combined, it is molded or positioned as anticipated and then left to harden. Recycling and Landfill When a concrete building structure reaches the end of it’s life, either recycling or landfill is an option (CCAA 2010). The process of demolition of a concrete structure involves pulling it down either mechanically or manually through the utilization of excavators or bulldozers (Chen et al 2010). Larger buildings however, may require more powerful equipment.Following, the shattered concrete fragments are either transported by trucks to landfills for disposal or collected from the annihilation site and transported to a crushing facility, where it is fed through a crushing machine to be broken down and used for aggregate of new concrete (Cement Australia 2003). In conjunction with quarries, landfills also hold significant environmental consequences, as it can destroy or alter species habitat. Environmental Considerations Throughout Life Stages Inputs: ConsumptionThe Cement Indus try Federation (CIF) states in their 2003 environmental report, that the cement manufacturing process is extremely energy and resource intensive, therefore, it withholds a significant environmental footprint (CIF 2003). As displayed in the life-cycle diagram (figure 2), raw materials, energy and in some instances water, are the chief inputs associated with the manufacturing process, therefore, their consumption levels are predominantly to blame for the industries heightened environmental footprint (Anonymous 2012).Cement Australia (2010) states that on average, water utilization of a modern dry cement plant is between one hundred to two hundred litres per tonne of clinker produced (Cement Australia 2010). This water consumption is primarily used for cooling heavy equipment and exhaust gas. Although this appears quite high, Chen et al (2010) mentions that it is a dramatic improvement from earlier, yet still subsisting wet process cement plants (Chen et al 2010). The addition of water in cement to create the final product of concrete also consumes a large quantity of water.Similarly, the cement industry is highly energy intensive, especially during the kiln life stage (CIF 2003). Generally, cement plants today use natural gas, heavy oil and coal for fuel (Chen et al 2010). However, as coal accounts for almost 40 per cent of manufacturing costs, the utilization of fossil fuels in cement production has decreased since 1990 and has been partly substituted by alternative fuels (CIF 2003). The impact the high consumption of fossil fuels possesses on the environment is accelerated greenhouse releasement into the atmosphere, thus contributing to global warming (Chen et al 2010).Therefore, environmental consideration of adequate selection of alternative fuels is crucial in minimizing the environmental footprint. Outputs: Waste Furthermore, the outputs within each life stage also exhibit environmental issues throughout the entire cycle, from resource extraction through t o landfill (Chen et al 2010). The outputs fluctuate and vary between atmospheric emissions, waterbourne wastes, solid wastes and other co-product releases (CIF 2003).These outputs, in conjunction with the reasonably high input consumption, are the causes of the evident impacts the industry posses on the environment. Lemay & Leed (2011), mention in a broad perspective that air emissions leading to climate change, resource depletion, water consumption, ecotoxicity, eutrophocation, human health criteria, habitat alteration, smog formation and acidification are the main documented impacts that occur throughout the cement manufacturing process, whether it be instant or over time (Lemay & Leed 2011).Although there is clearly a vast array of impacts associated with cement manufacturing and concrete assembly, the impact on air quality and land quality appear to be considered by numerous LCAs to be a vital issue associated with manufacture, therefore they will be analyzed in more thorough de tail. Air Quality and Pollution Air pollution is highly likely to occur throughout each life stage of cement production, whether it is a result of fuel combustion or particulates from raw and finished materials (CIF 2003).Eco Tech (2011) mentions in its Cement Industry Report, that the uttermost crucial impacts associated with air pollution include; hydrocarbons and particulates which posses a threat to human health and environmental quality, and greenhouse gas emissions accelerating climate change (EcoTech 2011). In relation to Greenhouse gas emissions, Chen et al (2010) scrutinized in his Cement Plant Evaluation, that different Portland cement plants around the world is under close inspection these days because of the large volumes of CO2 emitted (Chen et al 2010).The report also continues to address that almost one tonne of CO2 is released for every one tonne of cement produced in the industry, which appears to be momentous considering in the year 2010, the world produced approxi mately 3. 6 billion tonnes of cement (Rosenwald 2011). Contrary to greenhouse gas emissions, dust emissions are at their highest peak at the initial quarrying stage and the final building demolition stage, as a result of forceful blasting and obliterating (Chen et al 2010).Other sources of dust emissions, however, are raw mills, kilns/ clinker coolers and cement mills. The Cement Industry Federation (2003) states that transportation of raw materials from the quarry to the site and stockpiles of raw materials contribute significantly to dust emissions (CIF 2003). Overall, the dust emissions released throughout the different life stages impact momentously on air quality, thus it threatens human health and overall environmental quality. Dust is the most common and extensive air pollutant from a quarry (CIF 2010).It has different origins in a quarry site such as mechanical handling operations that include crushing and grading process; haulage with which is related to the vehicle, and th e nature and condition of the way; blasting; additional manufacturing operations and wind blow from paved areas, stockpiles (Chen et al 2010) . Land Quality and Biodiversity The central issue of cement production upon land quality comes from quarrying, atmospheric deposition, disposal of wastes and storage of raw material (CIF 2003).These issues, predominantly atmospheric deposition, arise from merely every life stage of cement manufacturing; therefore it is an issue that must be taken into great consideration (Chen et al 2010). Quarrying and landfill have both direct and indirect environmental impacts on land and its surrounding biodiversity (Chen et al 2010). The direct impacts include habitat destruction thus biodiversity loss, dust inhalation and noise from rock drilling and blasting (CIF 2010). Subsequently, the effects of cement works on habitats are difficult to quantify, however the potential harm is much greater in vulnerable areas.The US Environmental Protection Agency (20 02), states in their report that two large operating cement plants in England are located on the edge of National Parks, therefore site selection must be considered in depth prior to implementation (USEA 2002). On the other hand, indirect impacts can potentially cause different catastrophes such as landslides and flashfloods in and around quarry sites (Chen et al 2010) . Furthermore, dust particulate has physical effects on plants, such as damage and blockage to the leaf surface, which may lead to death if photosynthesis is unable to occur (Chen et al 2010).Chemical effects on the other hand, can potentially produce changes in soil chemistry, which ultimately leads to changes in the long term associated with plant chemistry alterations, species competition and community structure (CIF 2010). Dust particulates from quarrying and wastes also affect waterways, as supplementary sedimentation may cause nearby reservoirs to dry out or flood (Chen et al 2010) . Alternative Suggestions in M inimizing Environmental Impact Solutions for Minimising Ecological FootprintDue to the significant amount of energy consumed in cement manufacturing, the cement industry has considerably focused over a long period on escalating plant efficiency and decreasing energy consumption. Cement Australia (2010) affirms that the Australia Cement Industry has seen a 23% decrease in CO2 emissions in the period between 1990-2009 (Cement Australia 2010). Although this is a significant decrease, further methods could potentially be utilized to further cutback consumption. Firstly, energy could be more efficiently recycled and transferred within the plant system.For example, excess heat from the clinker cooler being transferred back to the kiln stage to prevent energy waste should be implemented in all modern cement plants (Lemay & Leed 2011). Secondly, alternative fuels should be enhanced, especially in clinker manufacture. Alternative fuels may include items such as tyres, oils and tarrow. Soluti ons for Improving Air Quality As mentioned earlier, air emissions for GHG release has improved over the last decade as a result of utilization of alternative fuels.This however, has the potential to be further improved, therefore complete replacement of fossil fuels to alternative fuels could potentially take place to completely eradicate GHG releasement (Lemay & Leed 2011). In addition, the Cement Industry Federation (2010) asserts that improvement techniques for dust collection such as baghouse dust collectors has also been implemented over the past century (CIF 2010). Although there have been improvements, likewise, the potential for further development still remains. Perhaps aspects of the layout design could be improved, as a means of stockpile design and transportation throughout the system.Containment of conveyors could be implemented and perhaps pipelines, which substitute transport to and from the quarry to the plant, could be considered to prevent particulate emissions bei ng released (Lemay & Leed 2011). In addition, the moistening of the raw material throughout the crushing stages via sprays could also potentially to instigated to minimize dust release (CIF 2010). Filters and collectors could also be applied within each stage so the dust gathered can be sent through to the kiln for clinker production Solutions for Minimising Land DegradationUnfortunately quarrying and landfill in any form will impact on land quality, however methods such as buffer zones between workings and alternative habitats for defined species could be considered in an attempt to conserve biodiversity within or around the sites (Lemay & Leed 2011). Rehabilitation programs to restore once existing biodiversity on site could also be considered when the quarry material is completely exploited. Additionally, as displayed in the life cycle review, recycling of the final concrete material is an option as opposed to landfill.Perhaps the promotion of further cement and concrete recyclin g could be considered to avoid the amount of quarrying required. This would also minimize the amount of product discarded into landfill, thus retaining natural habitat. References Abdul-Wahab S. 2006. â€Å"Impact of fugitive dust emissions from cement plants on nearby communities†. Ecological Modelling. Vol: 195. Issue: 3-4. Page 338-348. Anonymous. 2012. â€Å"How Portland Cement is Made†. Portland Cement Association. Available: www. cement. org/basics/howmade. asp. (Last Accessed 7/10/12) Cement Australia. 2010. Environmental Performance†. Cement Australia. Available: www. cementaustralia. com. au/wps/wcm/connect/website/cement/home/sustainable-development/environmental-performance (Last Accessed 10/10/12) Cement Concrete and Aggregates Australia (CCAA). 2010. â€Å"Sustainable Concrete Materials†. CCAA. Available: www. concrete. net. au/sustainability/documents/documents2. pdf. (Last Accessed 7/10/12) Chen C, Habert G, Bouzidi Y, Jullie A. 2010.  "Environmental impact of cement production: detail of the different processes nd cement plant variability evaluation†. Journal of Cleaner Production.Vol: 18. Issue: 5. Page 478-485 Lemay L, Leed A. 2011. â€Å" Life Cycle Assessment of Concrete Buildings†. Concrete Sustainability Report. Available: www. nrmca. org/sustainability/CSRO4%20-%Life%20Cycle%20Assessment%20Concrete. pdf (Last Accessed 10/10/12 Nisbet M. 1996. â€Å"The Reduction of Resource Input and Emissions Achieved by Addition of Limestone to Portland Cement† Research and Development Information. Portland Cement Association. Canada Obajana Cement Project. 2005. â€Å"Social and Environmental Impact Assessment† Obajana Cement Project. Available: www. jaspers. uropa. eu/attachments/pipeline/1191_social_eia_en. pdf (Last Accessed 10/10/12) Park L, Tae S, Kim T. 2012. â€Å"Life Cycle CO2 Assessment of Concrete by Compressive Strength on Construction Site in Korea† Renewable and Sustainabl e Energy Reviews. Vol: 16. Issue: 5. Pages 2940 – 2946. Reding J, Muehlberg P, Shepherd B. 1977. â€Å"Industrial Process Profiles for Environmental Use† The Cement Industry. Chapter 21. Available: http://www. inece. org/mmcourse/chapt6. pdf. (Last Accessed 7/10/12) Rosenwald M. 2011. â€Å"Building a Better World with Green Cement†. Science and Nature.Available: http://www. smithsonianmag. com/science-nature/Building-a-Better-World-With-Green-Cement. html (Last Accessed 10/10/12) The Energy Conservation Center (ECC). 1994. â€Å"Output of a Seminar on Energy Conservation in Cement Industry†. United Nations Industrial Development Organisation (UNIDO). Available: www. unido. org/fileadmin/import/userfiles/puffk/cement. pdf. (Last Accessed 10/10/12) US Environmental Protection Agency (USEPA). 2010. â€Å"Defining Life Cycle Assessment (LCA). US Environmental Protection Agency. Available: www. gdrc. org/uem/lca/ (Last Accessed 11/10/12)

Saturday, September 28, 2019

Cj 216 Uncle Bob Assignment

How the Police Access Data to Obtain Criminal Information Tammy Mills CJ216-01 November 15, 2011 Carter Schoenberg How the Police Access Data to Obtain Criminal Information Law enforcement communicates between every state in the United States. Each state uses different programs which makes up different types of databases, and keeps track of just about everyone who has some sort of identification. A drivers license is the most common form of identification, and everyone in the United States is suppose to obtain a up-to-date drivers license to drive a vehicle legally.Tammy is going to the state of Florida with her Uncle Bob and her uncle is driving because she does not have a valid driver’s license. Tammy has only an identification card. Bob has a criminal record because he spent five years in San Quentin Penitentiary for auto theft and armed robbery with a firearm. The Trip On August 5th 2006 Bob calls Tammy to see if she is available for a two-week trip to Miami Florida to see the sights. Bob lives in San Diego California and Tammy lives in Moxee Washington. Tammy will fly to San Diego on August 12th 2006 to meet with uncle Bob, and they will start the trip to Miami from San Diego.The trip is set to start August 13th 2006. Bob and Tammy hope to be back in San Diego California on or around the 27th of August. Today is the day of departure. Bob fills the silver blazer with gas at the local AM/PM convenient store. Bob also decides the blazer needs to be washed. Right next door to the convenient store there is a car wash. Tammy offers to wash the vehicle and notices the license plate number. The license plate number is 448 UZO. The road trip has officially started. Tammy and Bob have to travel through Arizona, New Mexico, Texas, Louisiana, Mississippi, Alabama, and Florida.Arizona is hot so the windows are down, and the radio is blaring with country music. Tammy and Bob are laughing and having a great time catching up on old memories. In Texas, during the ni ght driving Tammy has questions about Bob’s five-year incarceration. Tammy does not want to bring up bad memories for Bob but she just wants to know what happened to explain why Bob disappeared. Bob explains that he did time for stealing a car and robbed a bank with a firearm to satisfy Tammy’s curiosity. After this conversation Bob pulled over at the next rest stop to obtain some sleep.Tammy awakens suddenly to the sound of a semi-truck passing by, she is a little shaken so she wakes up Bob, and they start on the road again. As time goes by Tammy and Bob become dazed by the trees and the scenery that they did not notice that they were running low on food and gas. Luckily they had just entered a small town in Louisiana where they can fill up and obtain some food. While Tammy is in the restroom, she overhears a conversation about a bank robbery and a stolen car and how they were never able to find who did it or where the car is. Tammy brushes if off and continues with h er day on the road with Bob.More time flies by and Tammy mentions something about her back hurting from sleeping in the car so Bob offers for them to stay in a hotel for the night. When Bob awakens he notices that Tammy is gone and there is a note left by the door. â€Å"Bob I will be back, I have to obtain some female things from the drug store. Love you, Tammy. † Bob is ready to hit the road and waits for Tammy to return. Tammy returns with some food for the road. As they hit the road Bob seems a little cautious and Tammy notices that he is thinking about something, but she cannot put her finger on it.Tammy begins to wonder what happened to him in prison. What has him so uptight that he is on guard? Tammy eventually gives up and falls asleep. Bob wakes up Tammy as they are entering the county lines of Mississippi and Bob offers to get some breakfast and an opportunity to stretch from sitting in the car so long. As they pull up and get out of the car Tammy walks around the c ar and again notices the license plate number 448 UZO. They get done eating and the set off for the road again, they stop at a river to cool off since Mississippi has a high humidity level they decide to stop and look at the scenery.After they have spent enough time cooling off Bob and Tammy hit the road again for the millionth time. As Bob and Tammy pass the miles by Tammy begins to doze off, she eventually passes out and awakens just as they enter a small town 50 miles from the county lines of Alabama. Bob and Tammy decide to stop at a rest area for the night and obtain some more sleep. When Tammy awakens she discovers that Bob has stopped to obtain food and gas. Tammy finds out that they are halfway through Alabama, and she slept 10 hours. Bob returns to the car, Tammy eats, and they are on the road again close to their destination.Tammy obtains excitement when she sees the sign for Florida, but what she does not know is that everything is about to turn upside down when they pull up into a Dairy Queen in Miami Florida. The Initial Traffic Stop The whole trip, the speed limit was 70 miles per hour. Bob is used to the speed and forgot the speed limit decreases to 35 miles per hour. When Bob and Tammy entered Miami city limits Tammy noticed a patrol car behind them. The patrol car followed them for about a minute before she saw the red and blue lights come on. Bob noticed the patrol car also and pulled into a Dairy Queen parking lot. Bob’s behavior changed in an instant.Bob starts to sweat, and he is gripping the steering wheel. The police officer walks up to the driver side window and asks Bob for his proof of insurance, drivers license, and registration. Bob gives the officer everything the officer asked for. Tammy thinks this is just going to be a routine traffic stop. The officer walks back to his vehicle and runs everything through the computer. The officer seems to taking longer than usual and the more time the officer takes Bob seems to be uneasy . Tammy looks behind the patrol car, and sees another patrol car pulling into the parking lot and wonders why another law enforcement officer is assisting.Tammy sees the two officers talking but she cannot hear what they are saying to each other. The officer finally comes back to the car window to talk to Bob. The officer asks both Tammy and Bob to exit the vehicle. Tammy removes herself from the passenger seat and Bob removes himself from the driver seat. Both of us are asked to come to the rear of blazer. The assisting officer escorts Tammy to her patrol car to ask her some questions and the other officer has a conversation with Bob. The assisting officer asks Tammy if she has any identification and she says â€Å"yes† and hands the officer her identification card.The officer asks Tammy if she would consent to a search. Tammy says â€Å"yes† again. After the quick search the assisting officer explains to Tammy that she is not under arrest but she has to be placed in handcuffs for both Tammy’s and the officers’ safety. As Tammy is in handcuffs and leaning on the patrol car, the assisting officer is running her identification card through the Department of Motor Vehicle database. This will to take some time because Tammy is from Washington State and not from Florida. The Miami-Dade Police Department has to contact the Department of Motor Vehicles in Yakima Washington to verify Tammy’s identification.Communication Methods One communication method between each officer and the Miami-Dade Police Department is the walkie-talkie. Officers are linked through a radio frequency to the police department’s dispatcher. The second method is the use of the laptop computer, but Tammy and Bob are not Florida residences. The computer’s database in the patrol car may be limited to specific types of information. If the computer has a malfunction the best way to confirm information is through the local dispatcher. The third method of communication between the officers and the Miami-Dade Police Department is the Automated Fingerprinting System. The police officer is using Cross Match Technologies’ MV-5 Mobile Wireless Capture Device† (Foster, 2005, P. 128). When Bobs fingerprint is scanned his criminal history comes to light. Tammy’s fingerprint is also scanned and the results show no criminal history. The fingerprint also confirmed Tammy’s identification. Bob is arrested because of some information on the vehicle from the Department of Motor Vehicle shows that the car was stolen. Tammy is arrested for the suspicion of auto theft. Once at the Miami-Dade police station Tammy and Bob are put into different rooms.The arresting officer wants to look into Bob’s criminal past a little deeper. Collecting and Analyzing the Information from California to Florida Knowing that Bob is from California, the officer taps into the National Law Enforcement Telecommunication System (NLETS). Acc ording to (Dempsey, n. d. P. 101) this system is â€Å"linked to all the states and many federal agencies together for the exchange of criminal justice information. † The officer can obtain information on the vehicle, Bob’s driver’s license, criminal record, prison information, and parole information.Even though the officer has enough information needed to arrest Bob. The officer wants to cross reference the information with other systems to make sure the information is correct. The second system the officer taps into is the Department of Motor Vehicle (DMV) in California. The DMV record shows that the silver blazer license plate 448 UZO is stolen. The record shows the vehicle was reported stolen on August 12th 2006 at 3:00 a. m. The officer calls the San Diego Police Department and talks to the officer who wrote the auto theft report. The officer is told that the blazer is in the impound yard in Miami Florida.The officer in San Diego updates the report to refle ct that the vehicle is found and inquires the officer in Miami about information on a 9mm handgun. The officer in Miami does not know anything about a firearm but remembers that the blazer was never searched. The 9mm handgun and the blazer are registered to a Linda Andersen. The California police officer informs the officer in Miami that the blazer was involved in a robbery with a firearm and will fax the report right away and that Bob is on parole. The third system that the officer taps into is the National Crime Information System (NCIC).According to (The FBI Federal Bureau Investigation, n. d. P. 1) â€Å"The NCIC database has 19 files† to choose from. The two files of interest are the vehicle file and the gun file. When the fax comes in from California, the officer cross references the 9mm handgun and the blazer. The information from the NCIC also shows that the 9mm handgun and blazer are both registered to Linda Andersen. The gun file shows where she bought the firearm a nd that she has no criminal record. With everything cross referenced and copies of all information collected, it is time to talk to Bob.Uncle Bob Confesses The police officer walks into the room to talk to Bob. All the information that was collected from the NCIC, FBI, and the San Diego Police Department is true. Bob confirms stealing the blazer and the handgun. Bob also admits to the robbery with a firearm and the parole violation. Bob tells the police officer that the 9mm handgun is in a little compartment on the driver side in the back of the blazer. Bob also ensures the officers that Tammy was in no way involved nor had knowledge of the stolen car or the robbery.Bob explains that he just wanted Tammy to take the trip with him to get to know her. The police officer explains to Bob the seriousness of involving Tammy in this trip and has Bob write down his confession. The officer also explains to Bob that California police is asking for extradition back to California on the parole violation. The officer leaves the room to go talk to Tammy. Officer explanation to Tammy and Bob’s Charges Tammy has no idea why Bob is arrested. The officer explains that the car was stolen and that Bob is linked to a robbery with a firearm that occurred August 12th 2006 at 3:00 a. . Tammy cannot believe what she is hearing. Tammy tells the officer that her flight on this day did not arrive until 6:00 p. m. Tammy thought that Bob was done living a criminal life. The officer believes that Tammy did not have anything to do with the crimes committed. The officer explains to Tammy that she is free to leave but Bob has to stay in custody and wait for extradition back to California. The officer also explains to Tammy that Bob will be charged with theft of a vehicle, a parole violation, and a robbery with a firearm by the state of California.Bobs extradition is set for August 23rd 2006. Bob is back in California by August 30th 2006 and his trial is set for September 10th 2006. Mean while, Tammy has flown home without incident. Day of Trial The day of the trial has come. The judge reads the charges of grand theft, violating parole, and robbery with a firearm. Bob pleads guilty to all charges and is sentenced to 25 years back in the San Quentin Penitentiary. Bob receives five years for grand theft, 10 years to finish his last conviction term, and 10 years for the robbery with a firearm.Bob and Tammy never talk again because Tammy feels that she cannot trust her uncle any more. Bob writes a letter to Tammy to apologize, but Tammy burned it. Conclusion In conclusion, most technologies overlap. With the use of index cards, computers cross reference information so law enforcement saves time by not having to search for files individually. The Miami-Dade Police Department cross referenced a large amount of information just to make sure the information provided to them by the state of California was accurate and correct.Without the use of different agencies being able to communicate with each other, criminals would have an easier time hiding from law enforcement. To this day Uncle Bob is still in prison and Tammy is continuing her education. References Dempsey, J. X. (n. d. ). Overview of Current Criminal Justice Information Systems. Retrieved from http://www. cdt. org Foster, R. E. (2005). Police technology (1st ed. ). Upper Saddle River, NJ: Pearson/ Prentice Hall. The FBI Federal Bureau Investigation. (n. d. ). Retrieved from http://www. fbi. gov/about-us/cjis/ncic

Friday, September 27, 2019

Nummi Essay Example | Topics and Well Written Essays - 500 words

Nummi - Essay Example However, even after sending 16 top managers to learn on the best ways to induce change in the organization in order to produce high quality cars, the managers were unable to bring changes. Majority of them opted to quit. This is because General Motors had a change resistant culture. For instance, workers liked things the way they were. This is because they were highly paid despite having not to work very hard for their compensation. Therefore, they did not see any need for change. The managers who were sent to NUMMI wanted to maintain a status quo. The compensation in General Motors was linked to hierarchy. As a result, the subordinates had to wait for years before they are promoted to management levels. Therefore, the managers did not want any change that would reduce their powers. This is because more people were reporting to them, an aspect that meant that they had more power. The Toyota approach would highly affect the hierarchical structure in General Motors. This would mean that power would be distributed to many managers in order to improve the levels of supervision. This created resistance from the above. There was an internal culture that branded teamwork as telling on each other rather than working with each other. This culture acted as a major barrier because the employees could not work as a single unit. The conflicts that remained unsolved made it hard for them to relate with each other. Therefore, even after the attempts to introduce Toyota’s culture in the organization, the level of resistance was very high because the subordinates could not put their differences aside and work together towards a common objective. General Motors was departmentalized. Therefore, there was lack of internal connection between the departments. This culture created an interdepartmental competition, an aspect that made it hard for the organization to work as a unit. When plants tried to implement the methods that were used by Toyota, they ended up failing because

Thursday, September 26, 2019

Drunk Drivers Should Have Their License Revoked Essay

Drunk Drivers Should Have Their License Revoked - Essay Example Most of the drivers who cause accidents because of driving under the influence of alcohol do not get the punishments that they deserve. In most cases, they have their licenses suspended for a few weeks and have to pay a fin. In some cases, they do not even get their licenses suspended. This means that they are legally allowed to go out and drive again. This increases the chance that they will repeat the drunken driving offense. It is interesting to note that most of those who cause accidents while driving drunk have previously committed the offense. The only way to ensure that people who have been found to be driving under the influence do not repeat the offense is revoke their licenses permanently. The permanent revocation of the license is punishments that will make people avoid committing the offense, as they do not want to lose their licenses. Driving while under the influence of alcohol is a choice that the driver makes, and it is a choice that puts him and other people at the risk of injury or of death. As such, it is necessary to harsh penalties to be imposed on those found to be guilty of the offense. The harsh consequences of the action should not have to wait until a person has committed the offense repeatedly. A penalty as strict as the revocation of a license is enough to make people avoid committing the offense. It therefore acts as a deterrent measure (Ross and Gonzales 380). ... The permanent revocation of the license is punishments that will make people avoid committing the offense, as they do not want to lose their licenses. Driving while under the influence of alcohol is a choice that the driver makes, and it is a choice that puts him and other people at the risk of injury or of death. As such, it is necessary to harsh penalties to be imposed on those found to be guilty of the offense. The harsh consequences of the action should not have to wait until a person has committed the offense repeatedly. A penalty as strict as the revocation of a license is enough to make people avoid committing the offense. It therefore acts as a deterrent measure (Ross and Gonzales 380). Another reason as to why people found to be driving while having alcohol levels that exceed the legal limits should have their licenses revoked is that suspension of licenses has not been found to work. The temporary suspension of licenses does not achieve the intended purpose as most drivers find it too lenient and are therefore likely to repeat the offense. The permanent revocation of the license is a stricter penalty and will deter people from drunk driving. If one is allowed to have their license after driving under the influence of alcohol, it is likely that they will cause an accident that may lead to the loss of life. Some people argue that permanent revocation of a license will not work as people may still drive even without the license. It is also argued that despite the strict penalties for drunken driving people still drink and drive. This assertion is however incorrect as it has been seen that penalties for drunken driving are

Main Development in American Literature, Art, and Culture Essay

Main Development in American Literature, Art, and Culture - Essay Example As the report declares over the period 1820 to 1860 there was strong advocacy for abolition of slavery in America. The print media was a strong tool used to highlight the evils of slavery among abolition activists. However, it was never going to be an easy task to convince most white Americans that slavery was wrong and immoral because it was so much engraved in the history of the country. There was key debate to ratify constitution to put an end to slavery. The abolitionist movement was boosted second great religious revival that swept across America. Other issues debated around this time involved equality, morality of slavery, welfare of slaves and the agrarian way of life perpetuated by slave trade. The period often referred to as antebellum era was also marked by condemnation and victimization of slave abolition activists like Garrison of the Liberator newsletter both from the south and north of America.From this paper it is clear that  the war of 1812 coincided with the remova l of Indians in the areas of Georgia and Alabama. But even before their removal could be complete, mass movements of immigrants started moving to the west mainly due to availability of cheap land and easy credit. First to arrive in the west included drifters and squatters.  Mass settlement in the west continued and by 1820 population in western states of Illinois, Ohio and Indiana had soured.  The westward flow was slowed down by financial panic in 1819.... The period often referred to as antebellum era was also marked by condemnation and victimization of slave abolition activists like Garrison of the Liberator newsletter both from the south and north of America. Outline significant developments in American westward expansion from the war of 1812 to the Mexican-American war. The war of 1812 coincided with the removal of Indians in the areas of Georgia and Alabama. But even before their removal could be complete, mass movements of immigrants started moving to the west mainly due to availability of cheap land and easy credit. First to arrive in the west included drifters and squatters. Mass settlement in the west continued and by 1820 population in western states of Illinois, Ohio and Indiana had soured. However, the westward flow was slowed down by financial panic in 1819. Road construction and the Erie Canal in 1825 shifted the direction of migration with Detroit, Cleveland and Chicago becoming major ports. The same expansion was also b eing witnessed in the southern gulf plains fuelled by excellent climate for cotton and availability of slavery (Billington and Ridge, 41-42). By 1824, Americans and Mexican used to live together in Texas. By 1836, some Texans wanted to be on their own and free from Mexico and wanted to make their own laws. As a result, the Republic of Texas was formed. However, General Santa Anna, the leader of Mexico did not want Texas to be independent and free resulting in massive killing in Alamo in San Antonio. This sparked retaliation from America with Mexico being overpowered and Texas become part of America (Raabe, 6). In your understanding of Francis Frederic’s life experience, what were the most revealing episodes and

Wednesday, September 25, 2019

First Presbyterian Church of Coral Springs Dissertation

First Presbyterian Church of Coral Springs - Dissertation Example The Presbyterian Church is a church whose roots originate from the Protestant Christian denomination having started in the United States. The church has developed its standards based on the doctrines that govern its followers with an indication of respect for God almighty that they serve. The church relies heavily on the doctrines to educate the people. These have worked in successfully revealing the needs and lives of Christians in a moral approach. The church established in 1983 through a merger of two churches has survived over the years and slowly created its own space that it fills each time. The church has a grown membership that has seen over 1667767 members present in the book while 20383 represent the number ordained ministers (Summary of Statistics). Despite the decline in membership in the church, many other factors have influenced the need for the church to vigorously apply management skills and understand the aspects that will play a role in describing the ideal cloth. T hese form the basis of the research. The literature review below provides support on the application of strategic planning and other formal approaches in planning for the success of the church. The first article seeks to detail the approach that many churches seek to employ in their strategic planning process. The author provides an exploratory approach to detailing the application of strategic planning by the churches in a bid to improve their business position.

Tuesday, September 24, 2019

Reflection about a Book A Tale of Two Indians Essay

Reflection about a Book A Tale of Two Indians - Essay Example Having been born in India, he underwent different cultural experiences during his childhood that saw him through to his campus life. This section brings to the attention of the reader the rich family backgrounds of the author. After departing India when he was still young, his parents moved to England where he spent most of his childhood years. He undertook the British educational system in elementary education. After a pronounced stay in the United Kingdom, his family then moved again into the United States. Here is where his teenage life began. During his high school education coupled with college and university life, he underwent harsh realities in new environments. Consequently, he was caught up in great confusion, dilemma and inability to make further progress. This section, however, presents the challenges that face many people in life. Some of them become unwilling to continue with life while others, like the author continue to find the slightest implication of solution to con tinue surviving. On the same note, Patel continues to narrate on how the realities were difficult when a new education system does not provide the appropriate channel for success in educational life. Great confusions in addition to hardships in campus make it a great trial in life. After he was expelled from Duke University for cheating, he underwent desperation and, thus, almost succumbed to suicidal thoughts. At the moments of near-death, he recalled a small village in India where he used to make frequent visits as a child during his stay in India. He sought for a reconnection to the past. When he makes the visit to his country of origin, some big differences that include demographical, economical, social and political emerge. These events bring in a contrast of two generations separated miles apart and with different reaction tendencies. His worst scenarios involve his university education where he was considered unfit for long-term stay after allegations of exhibition of dishone sty in his studies. Although he remarkably instills that the American perception of immigrant Americans was not welcoming, his life in America was also not appealing. This view is, however, not reflective of conventional perception of American citizens. This, therefore, becomes a line of defense for his challenged life. Events that lead to a recall of the past. The author chronologically narrates about the events that lead the main character to make a decision to visit his ancestral home. After Patel faced so many challenges in his life (since this book is taken as a recount of the past) some of which he could not handle, depression crept in. Among the challenges included his expulsion from Duke University and continual solitude that resulted to reduced levels of motivation. After continual stress and depression, he experienced trivial life challenges that led him to a land of the lost. He became indulging and sunk into substance abuse. His decision to engage in drugs and alcoholism did not seem to make any situation better. Instead, things continued to worsen. After several failed attempts, his final thoughts of committing suicide almost convinced him to take his own life. Just before committing suicide, he recalled one of his close relatives back in India who as he remembers was tough and faced reality with stiffness. Memories convinced him that perhaps sharing a word with this old man would lead to better

Monday, September 23, 2019

TopShop - The Marketing Story Essay Example | Topics and Well Written Essays - 1500 words

TopShop - The Marketing Story - Essay Example Fashion customers are ever demanding for something new, original and creative for a marketer it is very tough and demanding to provide for. TopShop a leading UK chain of fashion clothing and accessories which caters for this need for the highly fashion conscious market. This store has risen to cult status and is one leading brand name in high street fashion. What makes TopShop click? TopShop implements aggressive marketing strategies. It is constantly there in the minds of people. The positioning is extremely strong. Marketing strategies have to be designed and modified according to the market conditions.This is required for the success of the strategies. We are going to analyse the designing and implementation of various marketing strategies as per the changing external environment. Let us look into history of TopShop. TopShop was launched in 1964. It is a branch of Arcadia group. It started with a concept of high end fashion. Today TopShop doesn’t attract only high end shopp ers. It is a fashion destination for ramp and catwalk fashion seekers as well. It is an excellent example of high end meets catwalk. The flagship store is located at oxford circus with a whopping 90,000 square feet area where the daily footfall is 200 000 and more customers and almost more than half of them shop something or the other in the other. Marketing Strategies implemented by TopShop: 1. Logic of high end meets catwalk: Catwalk fashion is inaccessible, not wearable and expensive for a common fashion seeker. Combining the cost and the cuts makes TopShop click. This enables to provide for maximum fresh looks in a given season for the shop and increases sales. 2. Cost: TopShop costs are perfectly balanced, not being cheap and not being expensive either. 3. All in one shopping experience: TopShop provides accessories, bags, shoes, etc. under one roof. For men’s shopping it provides game zones, relaxing zones etc. So shopping is not perceived as a cumbersome and compulsory activity as usually perceived by men. 4. Supply matching with the demand: Fashion marketer needs to cater the market at a top speed. TopShop keeps pace with the demand by aggressive supply to the shops and chain it has set up. 5. Personalised services: TopShop has set up personalised advisors for guiding fashion seekers. Topshop takes pride in the fact that these style advisors are like walking catalogues on the shop and are available for help. 6. Celebrity branding: TopShop has always roped in celebrities like Kate Moss, Beyonce, Victoria Beckham for its promotion adding to the glamour quotient of the shop 7. Supporting new designers: TopShop supports upcoming designers to showcase their work. This gives the shop an advantage of setting new trends in the market with fresh cheerful designs PEST Analysis for TopShop This analysis is used for analysing external factors affecting an organization. All the marketing strategies mentioned above have helped TopShop set up in the domestic e nvironment. As confirmed by SWOT analysis and life cycle curve, TopShop now needs to look beyond the national boundaries. TopShop with its aggressive expansion plan has already stated that it intends to move abroad for an excellent growth opportunity. Let us analyse TopShop’s current marketing strategies with respect to the external environment of emerging economies where TopShop is set to expand: 1. Political factors: Description: For business to survive, sustain and grow a stable political environment is required. The degree on intervention a government will have in businesses and economy also makes a difference for the business. Political decisions make or mar the businesses. What is also needed to be seen is the development of infrastructure and education of the workforce, both directly connected with the political factor in PESTEL affecting businesses. UK: Political environment is stable. TopShop has seen various governments coming from the headquarters of Conservative o r Labour Party. However the government has managed to provide excellent

Sunday, September 22, 2019

Canadian Wood Toys INC. Essay Example for Free

Canadian Wood Toys INC. Essay I will begin by highlighting the importance of the audit in assessing the risk and identifying the steps in reducing and mitigating the risk that our company is facing. The impact of the risks on global business it is dramatic in our days, changing the entire look of the industries and financial services. Some risks could be anticipated and identified but some could not. Companies now are using more and more key steps and principles to better manage the risks by; *** identifying the risks relevant to the organization *** assess the significance and implications of those risks to the business *** identify and establish a process for collaboration on risk mitigation with other organizations and partners *** integrate Enterprise Risk Management into the organization *** focus resources on key risks in order to achieve the organization’s objectives (Source – PricewaterhouseCoopers – effective ERM) Under IAA Standard 2120 – Risk Management: â€Å"The internal audit activity must evaluate the effectiveness and contribute to the improvement of risk management processes. † Practice advisory 2120.C1 states: –â€Å"During consulting engagements, internal auditors must address risk consistent with the engagement’s objectives and be alert to the existence of other significant risks. In manufacturing companies, production is usually the most important aspect of the entire process mostly due to the high cost incurred, the staffing and the complexity of the departments involved – Production is of vital concern to management because of the important risks associated with the process. I have identified some of the most important risks and how to manage the risks to minimize the impact. Along with the  production process, other areas can be identified as posing risks; distribution, finance, human resources †¦ I have identified below some of the risks with the highest impact in our company: KEY RISKSMITIGATON (examples) The risk of manufacturing defective or substandard products Determine the cause of the quality defect (human error or machine) Trend analysis reports to address the recurrence of the defects The risk of missing deadlines for toys deliveries at Christmas time Review the production scheduling to agree with the specific job orders to avoid overproduction of toys that are not scheduled for delivery The risk of labor insecurity; potential strikes Review labor contracts and minimum wage government regulations; negotiations with union and labor boards The risk of unknown competition on international markets Use various econometric and statistical analysis to monitor the movement of market interest The risk of foreign exchange Use a foreign exchange contract Accept payment in one currency only (US) Hedging of foreign exchange Risk of unanticipated or sudden changes in regulations, codes or standards in regards to the exploitation of the wood and equipment and machineries used The company has to be actively involved in the development of regulations, codes and standards to further improve the safety of the equipment The risk of damage to ecology, scenery – due to over exploitation of forestry Use environmental mitigation programs able to protect and restore the forest Government fire protection programs The risk of accidents in the process of transportation of the logs Regular monitoring of the vehicles Checking drivers hours of work – implementing special schedule of hours Risk of loss of licensing for cutting and harvesting the trees Renewal in advance of the licenses, request from government of auditing the harvesting areas The risk of logging and lumbering fire damage and vehicle damage Forestry and timber Insurance that focuses on logging and lumbering, sawmills, automobiles and equipment The risk related to the liquidity and payment schedules which could lead to credit losses Establish rules for tendering, levels of approval authority and rules for credit control The risk of reporting erroneous financial information for internal and external decision Use external appraisers to evaluate fair value of assets and properties Senior managers should assess their financial reports to determine when they require estimates based on significant judgment; And ensure that independent expertise is applied in deriving the reports The risk mitigation step involves development of mitigation plans designed to manage, eliminate, or reduce risk to an acceptable level. Once a plan is implemented, it is continually monitored to assess its efficacy with the intent of revising the course-of-action if needed. I would like to reiterate as stated in the IAA Standards that the organization should fully understand that management remains responsible for risk management. As Internal auditors, we should provide advice, and challenge or support managements decisions on risk, as opposed to making risk management decisions. Below are some of the responsibilities that will not fall under the audit team: †¢ Setting the risk appetite. †¢ Imposing risk management processes. †¢ Management assurance on risks. †¢ Taking decisions on risk responses. †¢ Implementing risk responses on managements behalf. †¢ Accountability for risk management. Question 4 MEMO To: Director of Internal audit Department From: †¦. Assistant Director Internal audit Date: October 06, 2014 CC: As requested, I have prepared a plan for auditing the division of Student Services as part of the Central College Institution. I will detail 6 steps in the audit process but firstly I want to highlight the Standard 2200, Practice Advisory 2200-1 that states the requirements for the engagements planning and outlines the steps. â€Å"Internal auditors must develop and plan for each engagement, including the engagement’s objectives, scope, timing and resource allocations†. â€Å"The Internal auditor plans and conducts the engagement, with supervisory review and approval† 1. The first step is: To obtain specific knowledge of the unit to be audited. In this stage of the process we will gather and review the specific documentation that will help us getting more familiar with the division of food service – residential and campus. Some of the documents we will be reviewing: The annual budget; we have information about how much the overall budget is (8.9mil.); need to know how much is allocated to the food service program and how is spent. Policies and procedures Previous internal audit papers and reports List of the staff; org charts Contracts with food suppliers Documented projects and how the implementation process took place Upon reviewing of the documents we will be able to assess the problems that incurred; it will help us identify any managerial mistakes, any miscommunication between suppliers and management; if there is enough staffing 2. The second step in the audit plan is to: Establish the audit objectives and the scope of the audit. At this stage we need to review all the activities involving food service program step by step. This is to identify areas of weakness, why there are negative reviews; why there is such a small budget allocated to such important segment in the student’s activity in the campus. Also we will be  able to identify whether the appropriate policies and procedures were followed. Is the part time staff working in the 6 food service facilities skilled for the specific job they do? Why there is only part time staffing and no full time jobs; if there are enough employees considering the large division of food service included 6 cafeterias and restaurants plus residential food service. 3. The following step is: The audit methodology. In this stage of the audit process we will be able to gather additional information by interviewing individuals involved in all aspects of the student services division. We will be asking questions in order to determine if there are possible weaknesses that can have a major impact of the effectiveness of the operating and managing the 6 restaurants and cafeterias as well as the residential food service. We will be interviewing the part time staff about the schedule they have, if there are any complaints, if there is enough coverage at specific time of the day i.e. morning and lunch for the cafeterias and the restaurants. We will be interviewing the students and teachers about the hours of operation of the locations of the food service – they should be open late and they are actually closing early. We will be asking questions about the meal plans and find out if there is anything to improve on 4. The next step is: Determine the audit criteria. This very important step in the audit program will help us identify some of the criteria we can use in order to better assess the practices in the food service division. Budgeting The food service division must have a well established budget and a cost control in place and overseen by qualified staff. Price Management There should be a price verification policy in place to manage better the price of meals provided by the restaurants and the cafeteria – in comparison to other food providers around the campus (beat the price) Staffing there must be a criteria that analyze and conform with the labor standards –  achieve and surpass the minimum wage for the part time employees Food Quality and diversity there should be put in place a more divers meal plan based on the requirements and suggestions from the customers (students –divers ethnicity) new standards for nutritional meals are put in place and need to be followed Food locations management the standards for cleanliness and sanitation that are put in place need to be followed surveys will be handed out or on line surveys to measure the customer satisfaction 5. The following step is: Preparing staffing plans and time budgets At this stage in the audit plan we are dealing with establishing the budget necessary to accomplish the audit scope and the staff required to accomplish the plan in a timely manner. Since we are dealing with specifics in food industry – we have identified areas where there is not enough expertise from our team; therefore we require an additional external consultant (possible a nutritionist that possess the necessary knowledge). For the satisfaction survey we will be using the expertise of the actual marketing staff from the service department to create and implement the survey. 6. The next step is: Communication with management Subsequently, the audit plan needs to be discussing with the management. We will set up time for a meeting with the management to discuss the details over the purpose of the audit. We need to discuss further about the time allocated to the audit plan and go over each proposal for the relevant criteria that was chosen. In the meeting we will highlight the importance of the management active contribution and support to the audit process.

Saturday, September 21, 2019

Factors Contributing to Cultural Identity

Factors Contributing to Cultural Identity Cultural identity is assumed to be multidimensional and multifaceted due to cultural diversity and globalization. The concept of cultural identity is relational and constantly evolving. However, it can also be ambiguous, fragmented, paradoxical, and problematic. In resolving these challenges, immigrants undergo self and cultural identity transformation in order to achieve understanding, harmony, and balance within themselves, their environment, and their connection with others . It is necessary to address the definition of culture before discussing cultural identity. Nieto states that culture consists of an ever-changing system of values, traditions, social and political relationships, and world views created and shared by a group of people bound together by a combination of factors that can include shared history, geographic location, language, social class, and/or religion, and how these are transformed by those who share them. In everyday social situations, we use culture to express and give meaning to our identity, which in turn is used to construct affiliations with and boundaries between other individuals and groups . Many historians provided different definitions of cultural identity; some important definitions are given here: According to Lustig and Koester, cultural identity is a sense of belonging to a particular culture or ethnic group. It is formed in a process that results from membership in a particular culture, and it involves learning about and accepting the traditions, heritage, language, religion, ancestry, aesthetics, thinking, patterns, and social structures of culture . Stuart Hall gave two different ways of thinking about cultural identity: the first in terms of one, shared culture, a sort of collective one true self, hiding inside the many other, more superficial or artificially imposed selves, which people with a shared history and ancestry hold in common. Cultural identity, in the second sense, is a matter of becoming as well as of being. It belongs to the future as much as to the past. It is not something which already exists, transcending place, time, history and culture. Cult ural identities come from somewhere, have histories. However, like everything which is historical, they undergo constant transformation. Far from being eternally fixed in some essential past, they are subject to the continuous play of history, culture and power . Culture and cultural identity in the study of intercultural relations have become umbrella terms that subsume racial and ethnic identity. This means both racial identity and ethnic identity lead to the development of the concept of cultural identity. However, these terms have different meanings. For example, race is a classification of the humans, usually by genetic similarities passed hereditarily. Ethnicity has a range of distinctive features, passed by socialization from one generation to another. There are never clear boundaries, cultural or geographic, that mark the limits of ethnic groups, but a group usually shares common culture, language, religion, and behaviors . In this paper, the term ethnic identity is more often synonymously used to refer to cultural identity. However, as I discussed in the previous chapter acculturation is different from ethnic identity. These two are related but separate constructs. Acculturation refers to how ethnic minority individuals adapt to the dominant culture and the changes in their beliefs, values, and behavior that result from contact with the new culture and its members. By contrast, ethnic identity involves an individuals self-identification as a group member, a sense of belonging to an ethnic group, attitudes toward ethnic group membership, and degree of ethnic group affiliation or involvement . For Asian Indians, family is the main element which influences the development of cultural identity. Mainly the parents transmit ethnic identity to their children using a process of enculturation or ethnic socialization. Parents directly and indirectly model and reinforce ethnic behaviors to their children about the traditions, beliefs, and values associated with their cultural background . Children are socialized to be obedient, and are expected to bring honor to their families by exhibiting good behavior, maintaining high academic achievement, and contributing to the well-being of the family. Furthermore, because Indian self-identity is defined by the family and is established by a surname that affiliates individuals to a religion, social class, language, and a state in India, second-generation immigrants face an added challenge of creating a sense of self based on conflicting cultural allegiances. Therefore, the process of adolescent self identification may involve a refusal to ac cept the choice of being either American or Asian Indian and an attempt to create a new self-definition by finding out how to be an Asian Indian on ones own terms rather than on the parents mode of acculturation or preferred ethnic identity . A second important difference between the parents and children is that the phenomenon of adolescence, as it is broadly conceptualized in Western society, rarely exists among traditional Asian Indian families. Although all Asian Indian cultural communities have rites of passage associated with the onset of biological puberty, there is no corresponding change in adolescents roles, status, responsibilities, or autonomy in decision-making . Thus, given the differences between the belief systems of Western and Indian societies and the fact that most immigrant parents expect their children to maintain the traditional values and lifestyles of Indian culture, misunderstanding, miscommunication, and conflict are likely to occur in Asian Indian families . The common pattern for first-generation Asian Indians is to affirm their ethnicity, generally by reinventing Asian Indian culture on foreign soil (Dasgupta, 1998, p. 965-966). Often, Asian Indian immigrants are more Indian than the people they left behind, and they may retain a sense of a culture that no longer exists on the Indian continent. Despite the influence of social class and generation on their cultural identity and world view, many maintain a traditional value system many years after immigration . However second-generation Indian Americans, who do not maintain the traditional value system of their parents, understand the influence of their new culture also affects their ethnic identity development. Uba noted that there are three aspects of Asian American ethnic identity that can be distinguished. These aspects are 1) consciousness of ethnicity, 2) adoption of an ethnic identity; and 3) application of that ethnic identity. Some Asian Americans will strongly identify with many aspects of Asian American ethnicity, but some will only acknowledge that they belong to an Asian American ethnic group. Furthermore, they may deny that they have anything in common with members of their ethnic group . Some may identify with their ethnic group to the extent of knowing the history of the ethnic group and still see the ethnic group as irrelevant today, and some others may identify socially with the ethnic group but have no knowledge of its history . Formation and Development of Cultural Identity The process of identity formation has received much attention in literature. Many models have been proposed to explain the process of identity formation in various ethnic and cultural minority groups. A common feature of these models is that identity formation of ethnic and cultural minorities in the United States occurs in the context of the dominant culture. Phinney maintained that the process of identity formation does not proceed in a linear direction. He proposed a bi-directional model based on an ethnic persons affiliation with his or her ethnic group and his or her acculturation in the mainstream White culture. This model allows an ethnic person four possibilities: a) a strong bicultural identity, b) a strong ethnic identity but a weak identification with mainstream culture, c) a weak ethnic identity but a strong identification with mainstream culture, and d) a weak identification with both cultures. Most educated South Asian immigrants probably fall in category a) with a relatively small number in b) and c), and only a few in category d) . Nieto states individuals growing up in a multicultural environment may develop multicultural and hybrid identities. That is, race, ethnicity, gender, social class, ability, national origin, religion, and other differences combine to influence who immigrants are and how they identify themselves. I mmigrants identify in multiple ways, based on such factors as family structure, race, sexual orientation, and national origin. In spite of these differences, they share a need to belong and to feel free to explore who they are. According to this, identities also change in response to the sociopolitical contexts in which people live. Further, Nieto states that identities have been shaped and continue to be influenced by the people with whom one interacts and the material and social conditions of ones lives . This is, in fact, what Lessinger found in her study, which indicates that people have developed what she calls a transnational identity . Another influence on identity formation that is important to consider is the identity that the dominant White society assigns to members of the visible racial and ethnic groups. The degree to which this affects individual members of a particular group varies from person to person. The whole question of ethnic identity becomes more complex. In the case of biracial children, the numbers seem to be increasing. Sodowsky et al. have identified certain cultural value variables for Asian Indian Americans to some extent. Counselors may find them useful in trying to understand the attitudes and values of South Asian clients . Cultural identity development could involve three stages according to Phinneys model: unexamined cultural identity, cultural identity search, and cultural identity achievement . Unexamined cultural identity is the phase in which immigrants are not aware of ethnic, cultural, or racial differences between themselves and others. (During an unexamined cultural identity stage, immigrants do not typically examine or question their cultural, ethnic, or racial identity). Instead they tend to take their cultural values, norms, beliefs, customs, and other characteristics for granted and are not aware of ethnic, cultural, or racial differences between themselves and others. They rarely show any interest in discovering their backgrounds. However, over time immigrants are confronted with cultural, ethnic, and racial conflict that creates difficulty and confusion in their lives. During this time, they begin their cultural identity search regarding self and others. The immigrants may experience a personal event, hear a comment made by a friend or neighbors or see a message through mass media such as television, the internet, a newspaper, a magazine, or a billboard that triggers a question about their ethnic, cultural or racial identity. They become aware of cultural, ethnic, and racial differences and begin to explore and discover aspects of identity. They may pursue social interaction with cultural and ethnic groups with which they identify, and they may participate in ethnic, cultural, social, and service organizations. In this continuous process, they also reflect and evaluate themselves, others, the world, and how they fit within the various groups. The individuals values, morals, ethics, and beliefs are being influ enced and shaped . In extending Phinneys second phase of cultural identity development, some immigrants experience an identity crisis during this stage. Immigrants struggling with an identity crisis often perceive themselves as belonging to a particular ethnic, cultural, and racial group, but their peers are communicating to them that they do not belong to their group because they do not have similar physical and behavioral characteristics. An immigrant as a minority in a dominant group who denies their ethnic, cultural, and racial identity is known to have an identity crisis. In addition, if the person is exposed to cultural events, activities, educational material, and friendships from the same cultural/ethnic group, this will help him or her to develop a healthy ethnic/cultural identity . When Asian American Indian immigrants suffer a crisis, they revert to their Asian heritage and reject all mainstream and other ethnic minority assumptions and values. Sue explained about this stage that, they may seek out and set up tentative alliances with other minority groups that have been similarly oppressed. Sue further noted that these alliances can be fragile and may disappear when Asian Indian Americans have conflicts with other minorities . The final phase is a cultural identity achievement, where individuals have developed a fairly solid grasp of their own cultural identity. They have reached a state of clarity, confidence, understanding, appreciation, and acceptance of that identity. If they are confronted with discrimination and stereotypical comments, these individuals are able to avoid internalizing the negative communications. This does not mean that negative comments by others are not hurtful to the individual, but that he or she does not question his or her cultural identity. The immigrant generation accepts cultural differences in this stage. There is no pre-encounter or conformity stage as postulated by the models of minority ethnic identity models. The acceptance of cultural differences is a reality of life for this group. In this stage, most Asian Americans are proud of their identity and do not consider it a hindrance. They have completely bought into the American dream that hard work will overcome all diff erences . All these stages of identity formation and development differ for the first, second or third-generation of Asian Indian Americans. The cultural identity development of Asian Indian Americans depends on different elements such as gender, age, class, spiritual, national, regional, and personal identities, which will be considered in more depth below. Elements of Cultural Identity There are various elements of cultural identities such as race, gender, age, class, spiritual, national, regional, and personal identities. Some of these elements are discussed with respective of Asian Indian Americans. Race Research on Asian Americans has assumed race as the most significant, or salient, aspect of identity. Racial identity refers to a sense of group or collective identity based on ones perception that he or she shares a common heritage with a particular racial group . Racial identity most often categorizes individuals based on skin color. Furthermore, people tend to focus on the most visible characteristics, usually regarding race and sex. South Asians are generally regarded as part of visible racial and ethnic minorities. However, Indian immigrants come in all skin colors, from fairest to darkest, and have different facial features. Indian college students, despite their relatively higher educational and occupational status, struggle with an idea of an exclusive racial identity . Gender Gender identity deals with the feminine, masculine aspect of identity. Gender may be a variable in cultural identify in those cultures in which men are more likely to get jobs in the mainstream culture while the women remain at home. There may also be different cultural expectations for men and women, such as the assumption that women are the carriers of ethnic traditions. The very little research that addresses this issue suggests a greater involvement in ethnicity by women than by men. Gender roles are clearly demarcated in Asian Indian American cultures. Obviously, the migrating generation would be most rigid in its definition of gender roles . According to Indian culture, men and women would be strictly bound by the demands of their ethnic culture and their host culture. For instance, men manage business outside the home, while women manage the home. This practice is more widespread in India; to a certain degree it reflects attitudes in the United States as well, though this cust om has slowly been losing its appeal. The role of men and women among Asian Indian Americans varies with generational and educational level, as well as with social class, and economic stability. Men experience a great deal of stress in regard to their role, especially in cross cultural contexts. As immigrants, their family expects them to display their authority in order to make clear to other cultural groups that they are in control of their family. Also, men make the final decision on major topics such as career and property matters, however, women participate in the decision making process, only through private conversations with their husbands. Accordingly, this separation of gender roles also creates a considerable social segregation between the two genders . This however does not mean that the men were able to make decisions without regard for the opinions of others. In actuality, the power and control in the family reside with the oldest person, regardless of gender, and even when the oldest person in the family is far away . Woollett et al. noted that among Asian Indian women, the social construction of gender and ethnicity is fluid and changing, based on the maternal status of the woman. They also state that ethnicity and ethnic identity are not homogenous categories, but operate across gender. The experience of marginality, and being on the outside of the host culture, creates stronger bonds within a family and less rigid gender identification and boundaries . Age Age is the dimension where interactants may identify themselves as young, middle-aged, and old based on actual age, appearance, and how they feel. Parents are to be honored and revered. It is assumed that the older a person gets, the more maturity and knowledge he or she has. Older people are respected for these attributes. Families go to elders to resolve familial conflicts. They also turn to older family members for advice and support when they are in a crisis or when relationships are disrupted in social or work relationships . Children of South Asian immigrants are socialized into two cultures, the culture of the family and the culture of the larger American society. Most parents try to inculcate ethnic pride and awareness of their cultural heritage in their children. For young school-age children, this sometimes poses a problem. They stand out because of their physical appearance and for that reason are often teased or rejected by other children. Most young children lack the inner resources to deal with such hostility and to base their self-esteem on their ethnic heritage. They want to be like everyone else so they can fit in with the crowd and shed any cultural trait that sets them apart.

Friday, September 20, 2019

Criminology Research Methods

Criminology Research Methods Using examples from published research, critically consider that way that choice of study design might influence research findings and conclusions.   A study design is a fundamental component of any piece of research, providing a structure within which to implement a suitable methodology for the collection and analysis of information and data. The choice of study design employed in criminological research will inevitably influence the findings and conclusions drawn, which may subsequently be used to shape the direction of future policies and interventions within the sphere of criminal justice. This is particularly the case in relation to domestic violence, which remains a socially and politically contested area with regards to the extent to which it merits and requires criminalisation. I therefore intend, with reference to published research, to critically examine how choice of study design may yield different findings and contributions to contemporary understandings of domestic violence. Before considering the various types of study design, it is necessary to provide a brief account of the nature and context of domestic violence. Academics highlight that it is a distinct phenomenon from other forms of conventional violence, often characterised by a series of ongoing violent episodes as opposed to one discrete event and a typical reluctance on the part of victims to recognise and voice their victimisation (Mirrlees-Black, 1999). Criminological research in this area has assumed heightened importance in recent years due to shifts in Government policy towards criminalisation  [1]  . It is therefore vital that any research in this area necessitates an appreciation of the contextual circumstances within which perpetrators and victims operate. A number of study designs are available for the purposes of criminological research, the primary distinction existing between experimental and non-experimental designs; which include randomised control trials, quasi-experiments, cross-sectional and longitudinal designs as well as ethnographic studies. The choice of design will affect the strength of both the internal  [2]  and external  [3]  validity of the findings and conclusions. Bryman notes that the study design chosen reflects a decision about the priority being given to an array of dimensions. These include articulating causal connections, generalising the findings, understanding behaviour in a specific context and having a temporal awareness of social phenomena (2008:35). In addition, certain designs may lend themselves more easily to quantitative or qualitative data, which may impact upon a researchers choice of design given the fundamentally diverse characteristics of both.  [4]   The true experimental design is often referred to as the gold standard (Bryman, 2008:38), despite being rarely employed in criminological research (Wesiburd, 2000:181) due to its potential to yield findings with strong internal validity, particularly if randomised control trials are employed. The experimental design involves the manipulation of the independent variable in order to elicit variation in the dependent variable, a classic example being Bushmans (1995) investigation into the impact of violent films on those pre-disposed to aggression. In randomly assigning subjects to control and experimental groups, he was able to control for rival causal factors, resulting in findings with strong internal validity. True experiments may be either laboratory experiments  [5]  or field experiments  [6]  , although it can be argued that conclusions drawn from laboratory experiments may not have the same level of generalisation due to their artificial setting. However, it is argued th at it is the theoretical principles that are being generalised, not the specific characteristics of the sample, setting or measure (Anderson and Bushman, 1997:22). The experimental design was utilised by Sherman (1984) in investigating the specific deterrent effects of arrest on perpetrators of domestic violence, whereby three types of police response (arrest, mediation ad separation) were randomly assigned to legally eligible cases. The dependent variable, in this case recidivism, was measured over the course of 6months following police intervention using both official data and victim reports. The studys conclusion, that swift imposition of a sanction of temporary incarceration may deter male offenders in domestic violence cases (Sherman, 1984:270), is often cited in support of mandatory arrest policies. However, given that experimental designs are notorious for their weaker external validity  [7]  , it is questionable whether Shermans findings lend themselves to such a sweeping generalisation. Indeed, follow up studies in other US cities revealed more mixed results, with some concluding that arrest had negative effects for victims (Garner et al. 1995). The findings and conclusions by Sherman have been attacked on a number of grounds. Dobash contends that the experiments were designed and carried out with little knowledge of existing and theoretical positions regarding violence against women (2000:254). Indeed, it can be argued that the failure to appreciate the possibility that the reason the arrest of perpetrators resulted in lesser recidivism was not due to its deterrent effects but a result of the victim failing to call the police again or to report their victimisation to interviewers due to fear of a repeated retaliation by the perpetrator that might have followed the initial arrest. This is particularly since qualitative studies have revealed the extent to which victims reluctance to involve the police are a direct product of their fear that an arrest will lead to an escalation of the violence (Felson et al.2002). In addition, Fagan highlights that the short follow-up period of 6months failed to take into account the episodic and cyclical patterns of family violence (1989:382). It therefore appears that Shermans pre-occupation with experimental form, in this case a randomised control experiment, precluded a proper consideration of the nature and contextual characteristics of domestic violence. A variation of the true experimental design is the quasi-experiment, commonly employed in the evaluation of criminal justice interventions due to the ethical difficulties associated with random assignment. Such experiments have been used to research the effect of rape law reforms on the number of rapes reported to the police.  [8]  However, due to the absence of random assignment, such a design may not yield findings that are considered as strong in terms of their internal validity due to the lack of control over intervening causal variables. The Violent Men Study (Dobash, 2000) employed a non-equivalent control group design to evaluate the impact of different criminal justice sanctions on domestic violence, involving the matching of subjects within the different groups. The qualitative data revealed much higher rates of re-offending than the quantitative arrest records portrayed, leading the authors to remark that these stark differences cast grave doubt on the veracity of criminal justice statistics as indicators of the levels of violence or of the effectiveness of interventions (Dobash, 2000:267). In addition, in contrast to the experimental study of arrest that merely speculated the reasons for reduced levels of recidivism following arrest (Sherman, 1984), the Violent Men Study was able to contribute to an understanding of both how and why certain interventions could lead to a cessation of violence (Dobash, 2000). Such findings were arguably facilitated by the fact that the study design was more attuned to the context and dynamics of domestic violence, such as the fact that it was longitudinal in nature, tracing victims experiences and perpetrators criminal involvement over a period of 12months at regular intervals and drawing a comparison between the two sets of data  [9]  . The advantages associated with this design have led to a replication of it in subsequent research.  [10]   An example of a non-experimental study design is the cross-sectional, involving the collection of information and data relating to a designated phenomenon at a particular instance in time. A classic example is the investigation of the effects of visible public and social order on evolving crime rates in Chicago (Sampson and Raudenbush, 2001). However, the problems associated with such a design relate to both the internal validity and the ambiguity of the direction of causality, which may therefore significantly influence any conclusions drawn, as was the case in the Chicago study which could not establish whether the high crime rates resulted before or after a variation in social control (Bachman and Schutt, 2007:154). A study by Hoyle and Sanders (2000) of victims within Thames Valley police force areas utilised a cross-sectional non-experimental design to investigate victims perceptions of the value of various criminal justice interventions. The non-experimental dimension facilitated a more in-depth exploration of victims experiences and beliefs and a deeper contextual understanding of the nature and effects of domestic violence, with the authors highlighting that the more powerful the controlling behaviour of their partners, the less likely it is women will seek to involve the criminal justice system (2000:21). However, a significant drawback of the cross-sectional design is that it results in findings that inevitably fail to capture the recurring and ongoing nature of domestic violence. By contrast, a longitudinal design, involves the collection of information and data at several points in time, which can also resolve any ambiguity concerning the direction of causal influence. Thus, academics assert that the value of longitudinal data is so great that every effort should be made to develop longitudinal research designs whenà ¢Ã¢â€š ¬Ã‚ ¦appropriate (Bachman and Schutt, 2007:155). A study by Sullivan and Bybee (2004) interviewed 278 women, who has just left a domestic violence shelter, at various intervals for three years. By collecting and analysing data over a substantial period of time, the study was able to provide a greater understanding of the unique trajectory of domestic violence. However, the problem of attrition is particularly salient for longitudinal designs, with Bachman and Schutt highlighting that those in greatest need are often the most likely to drop-out (2007:159). This has obvious implications for the validity of findings, since a drop-out of the most domestically victimised subjects could mask the extent and seriousness of domestic violence. An interesting study design that is rarely employed, but could nevertheless provide a valuable insight into the phenomenon of domestic violence, relates to ethnography. The purpose of which is to look more in-depth at the mechanisms underlying a social process and to gain an insight into the interpretations and perceptions of actors (Crow and Semmens, 2008:37). Such an approach was taken by Websdale, who provided a critical ethnography of how rural patriarchy shapes the perpetration and policing of domestic violence (Adelman, 2004:135). Although such findings and conclusions cannot obviously be generalised, ethnographic designs serve to reveal important details about the experiences of particular sub-groups of the population, which may not be adequately reflected in the findings of more conventional study designs. In conclusion, it is apparent that choice of study design in criminological research can have a marked influence on the findings and conclusions drawn. In relation to domestic violence, whilst it appears that true experiments yield results with the strongest internal validity, they nevertheless fail to account for the dynamic processes operating which trigger the variation in the dependent variable. The context-specific approach taken by other designs may have the potential to fill this gap by affording a greater emphasis on process as opposed to outcome. In addition, longitudinal designs are vital in capturing the intrinsic trajectory nature of domestic violence which is often ignored by cross-sectional designs. However, it is apparent that a deeper and proper understanding of domestic violence, in order to implement effective policies, necessitates the exploitation of the various strengths of both experimental and non-experimental study designs. To conclude otherwise would be to ig nore the inherent nature of domestic violence and to relegate it to the status of any ordinary violent crime, from which it is clearly distinct. Word Count: 1992