Saturday, December 28, 2019

The Prevalence Of Homelessness And Homelessness - 1699 Words

The Prevalence of Homelessness In this textual analysis, I’m going to discuss the prevalence of homelessness in the United States. I’ll be using three songs from popular culture that focus on homelessness. Different artists perform these three songs: Avril Lavigne, Bob Dylan, and Nirvana. I’m going to address the values that people who are homeless may have, according to what each artist conveys through their song lyrics. Throughout the lyrics in each song, it seems like the artists are attempting to communicate to the public that homelessness is a serious issue that nobody is immune to. The values that I have gathered are bravery, hope, and perseverance. I have chosen this topic because over half a million people are homeless, the government has limited resources to help those who are homeless, and some cities are making homelessness illegal. This topic is important to me because nobody is immune to homelessness, which is terrifying and unfortunate. This topic should be important to others because homelessness is a serious problem and it seems like we tend to treat people who are homeless like they re not human beings. Some people think that if a person who s homeless wants to truly change their situation, they would simply get a job. There’s clothing assistance available for people who are homeless; having access to a resource like this can help people who are homeless by providing them with appropriate clothing for job interviews. Approximately 44% of people who areShow MoreRelated How Many People are Homeless? Essay1591 Words   |  7 Pagesis misleading. In most cases, homelessness is a temporary circumstance -- not a permanent condition. A more appropriate measure of the magnitude of homelessness is therefore how many people experience homelessness, not how many people are homeless. Studies of homelessness are complicated by problems of definitions and methodology. This fact sheet describes definitions of homelessness, methodologies for counting homeless people, and recent estimates of homelessness. Additional resources for furtherRead MoreCauses Of Homelessness1405 Words   |  6 Pagesthey all share in common are the factors why a specific type of population became homeless. The interrelation of homelessness and mental illness are informed by many factors such as; the lack of support, extreme poverty, substance abuse, lack of affordable health insurance, and lack of affordable housing. The homeless population shares different struggles when dealing with homelessness and mental illnesses because there are not enough resources for them to be able to come back to their normal selfRead MoreEssay about The United States Homeless Population879 Words   |  4 Pagespopulation continues to grow rapidly. Homelessness has been a public health issue for many decades. Often times these individuals feel as though society has turned a blind eye to them. This at risk population is seen by society as lazy or chose to live a life on the streets, but if one would examine this population closely would see that there is more to this at risk population than what society has labeled them as. The forces, which affect homelessness, are multifaceted. Social forces such asRead MoreThemes Of Homelessness992 Words   |  4 PagesThe Problems and causes of homelessness are closely intertwined, with many of the problems of homelessness also sharing common source with the causes of homelessness. Narrative comments are included. There are three central themes that are highlighted in the cases. Mental health plays a large role in the cause and problem of homelessness as displayed by Stephanie’s experience as â€Å"her parents asked her to leave home. Stephanie had suffered from anxieties and bipolar†. Abusive relationships are alsoRead MoreThe Homel essness And Substance Abuse1436 Words   |  6 PagesRunning head: DIVERSITY​1 Diversity: Homelessness and substance abuse Centell Brown Kelley Peterson SW- 751 Perspectives/Chemical Dependency Professor R. Chaisson, PhD., LCSW, BACS Southern University at New Orleans December 10, 2014 Abstract ​Homelessness and substance abuse are often two problems that continue to be linked together. According to the Substance Abuse and Mental Health Administration (2011), research conducted in the past five years indicates thatRead MoreHomelessness Is Becoming An Epidemic1566 Words   |  7 PagesHomelessness in Persons with Persons with Schizophrenia Homelessness is increasingly becoming an epidemic in North America as many cities grabble with this menace. According to the Canadian Observatory on Homelessness, about 35000 Canadians are homeless on a given night, while 235,000 Canadians experience homelessness in a year. According to the Canadian Observatory on Homelessness Homelessness Research Network, â€Å"homelessness is described as the situation of an individual or family without stableRead MoreHomelessness Is The Issue And Problem Of Homelessness1567 Words   |  7 PagesHomelessness Defined: A key issue society currently faces is the issue and problem of homelessness. In January of 2016, approximately 549,928 American individuals were experiencing homelessness (HUD’s 2016 annual assessment, 2016). Most research concerning homelessness agrees that definitions of homelessness vary and that there are several challenges researchers encounter while attempting to study homelessness due the transient nature of homelessness along with other inconsistencies and barriersRead MoreThe Effects Of Homeless Conditions, Drug Abuse, And Mental Illness1464 Words   |  6 Pagesconditions, self-medication and Homelessness. Depending on the severity of the psychiatric disorder, circumstances can lead to a homeless situation or nomadic lifestyle. It will also cover issues like how these influences affect societal issues such as crime violence, abuse, health troubles and communication difficulties with others due to the problems that these individuals have with their thinking process. Key words: Drug abuse, Mental illness, Self-Medication, Homelessness We must bringRead MoreHomeless Veterans Are Becoming More Prevalent Of The United States886 Words   |  4 Pagesveteran is an individual who lives on the streets, in abandoned buildings, vehicles, encampments, shelters, or transitional housing (Veterans Today, 2013). As a matter of fact, homeless veterans do not have a permanent residence under their control. Homelessness in general includes those who fit what Martha Burt, et al. (2004) called â€Å"street homeless†, which they defined as single adults who spend a lot of time on the streets; and the â€Å"chronically homeless†, which they defined as â€Å"being disabled and eitherRead MoreThe Negative Effects Of Family And Family Homelessness1270 Words   |  6 PagesFamily and child homelessness has been a major social problem within the United states since the 1980s (Bassuk). According to the U.S. Department of Housing and Urban Development, it is a problem that affected 79,446 family households in January 2010, a nd over 1.5 million children between the years of 2005 and 2006. Family and child homelessness is a genuine issue that although has increased to 37% of the overall homeless, and is said to have reached an â€Å"historic high† (Bassuk), it has not been discussed

Friday, December 20, 2019

Asian Paints Global Expansion Strategy - 7628 Words

Global Expansion Strategy Executive Summary Asian paint is the market leader with 49% of market share in Indian decorative segment and maintains its position among the top ten players in the world. It is only Indian company operating in India having supply chain management supported by i2 technology. The report also talks about the market share of Asian paint in decorative as well as industrial segment and its growth.The report we made for demostration present condition of Asian paint market in India and new expantion of market accross border.we analysis asian paint Traget marketing and marketin mix and describe about the Global trend and present situations as well as divest and invest return from diffrent countrys.It†¦show more content†¦There are painting lips, online shades cards, cost calculation (based on floor area and number of rooms0 dealer locator and a short of other innovative ser vices. From the perceptual map we can understand that Asian paints, have wider range of products for all type of customers consisting of different income levels. It has a product range from Royal Emulsion, Priced 250-400 which is targeted for up market buyers. Hpcolilen is a product which is targeted for high income and upper middle class \ people. For lowers income group it has UTSAV, TRACTOR EMLSION which priced vary from 40-100 Rupees. These products are mainly targeted to Rural customers. In Industrial segment companies position is relatively weak here Werolac paints captured more than 50% market share. In this segment Asian paints have products like Apcomin synthetic enamel which is used for industrial coating, and Apco synthetic power which is used in automobile sector. In this segment also Asian paints faced stiff competition from Berger and ICI Paints. Bajaj automobiles in the main customer of Asian paints in automotive sector. Asian paints limited with its three business units decorative, industrial International business is one of the largest paint company in India. It has a sell over 300 million liters of paints in 2005-06. Significantly the group has crossed the Rs.3000 crores turnover mark a preset mile stone for the company. Products and itsShow MoreRelatedAnalysis of Asian Paints Limited Essay789 Words   |  4 PagesAsian Paints Limited is an Indian chemicals company which manufactures a wide range of paints for decorative and industrial use. Its vision is â€Å"to become one of the top five decorative coatings companies world-wide by leveraging its expertise in the higher growth emerging markets. Simultaneously, the company intends to build long term value in the industrial coatings business through alliances with established global partners.†2 Asian Paints is Asia’s third largest paint company, with a turnoverRead MoreEdmondson2139 Words   |  9 PagesASIAN PAINTS (INDIA) LIMITED The siege is over, and the time has come for the leader to sally forth into greener pastures. Even as the paints industry is emerging from the shadow of recession, Asian Paints (India) Limited (APIL), is mixing  new  shades to emerge with winning colors. Says their Managing director: With proper planning and a comprehensive approach to issues, we intend to keep pace with the growth of the industry. APIL is actually targeting a growth rate that is higher than the 9 toRead MoreEdmondson2152 Words   |  9 PagesASIAN PAINTS (INDIA) LIMITED The siege is over, and the time has come for the leader to sally forth into greener pastures. Even as the paints industry is emerging from the shadow of recession, Asian Paints (India) Limited (APIL), is mixing  new  shades to emerge with winning colors. Says their Managing director: With proper planning and a comprehensive approach to issues, we intend to keep pace with the growth of the industry. APIL is actually targeting a growth rate that is higher than the 9Read MoreMarketing Plan of Asian Paints Royale Emulsion5236 Words   |  21 PagesCOURSE: MARKETING PLANNING EVALUATION OF MARKETING PLAN OF ASIAN PAINTS Product: Asian Paints Royale Emulsion Prepared by: Abhishek Jain 10P122 10P134 Under the Guidance of Dr. Avinash Kapoor Debjit Ghosh Deepika Mangla 10P136 Kandarp Suchak 10P144 Kartik Luthra 10P147 Naveen Kr. Jindal 10P153 2 CONTENTS OF THE REPORT 1. Acknowledgement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 2. Objective†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦4 PAINT INDUSTRY IN INDIA.....................................Read MoreProject Report on Paint Industries12365 Words   |  50 Pagesâ€Å"A STUDY OF MARKETING STRATEGIES ADOPTED BY VARIOUS PAINT COMPANIES† A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF MASTER OF BUSINESS ADMINISTRATION (M.B.A.) SUPERVISED BY: - RESARCH SCHOLAR’S:- PROF. DEEPAK TALWAR NISHANT KARDA PARESH CHOURASIYA (MRead MoreSwot Analysis Of Holden And General Motors Group1632 Words   |  7 Pagesmanufacturing industry †¢ A swot analysis (strengths, weaknesses, opportunities and threats) of the company †¢ Marketing objectives and target market for Holdens various products and services †¢ Marketing strategies that Holden has implemented †¢ The Successes and failures of these marketing strategies †¢ Conclusion S.W.O.T. Analysis STRENGTHS: - domestic market - reduced labor costs - experienced business units - Strong backing of General Motors has added momentum to growth Read MoreCase Study On Indian Finance998 Words   |  4 Pagesto the Nifty hitting the record breaking point of reference of 10,000. Be that as it may, yesterday the organization detailed 12% decrease in merged net benefit to Rs 664 crore for the June quarter of the current monetary. HDFC Bank detailed 20% expansion in net benefit for the quarter finished June 30 yesterday remained the second pointwise benefactor in driving the file to record highs. One of the main household contract loan specialist Indiabulls Housing Finance yesterday announced a 25% bounceRead MoreProject Report on Consumer Behaviour and Satisfaction on Asian Paints10217 Words   |  41 PagesExecutive summary This project was done at â€Å"Asian paints ltd, Bangalore† gaining an in depth knowledge of marketing analysis of consumer behavior and satisfaction. Marketing is the widest term and can not be learnt in few days or years, many of the organizations before appointing the sales executives, check the ability of the candidates who are capable to sell the products/services, but still many of organizations fail in following their sales and loose grip on the market. If at allRead MoreHow Does Quality Enable Manfield For Be A Niche Player?1767 Words   |  8 Pages1. How does quality enable Manfield to be a niche player? Before we discuss quality as an enabler of Manfield s niche player strategy, we need to understand the essence of being a niche player. According to Porter s generic strategies, companies can create a competitive advantage and compete by strategically positioning itself as a cost leader slashing costs to achieve maximize value as customers perceive or as a benefit leader (differentiator) distinguishing its product/service offerings soRead MoreKh The Powerful And Efficacious General That Khan1401 Words   |  6 Pagesrose to power under the strong leadership of Kublai Khan. The powerful and efficacious general that Khan undoubtedly was, his led his troops to countless illustrious victories during his rule. These included Europe, Persia, and many Central / Eastern Asian entities, expanding along the Silk Road over a time spanning most of the 13th century (Prawdin). This close-to-manic thirst for land continued long after his death, carried on by his grandson Genghis Khan, to eventual ly create the largest empire known

Thursday, December 12, 2019

Advantages and Disadvantages of Using Social Networking in Car Sales

Question: Discuss about the Advantages and Disadvantages of Using Social Networking in Car Sales. Answer: Introduction Social networking can basically be defined as the use of websites or other applications found on electronic devices to interact, share, and socialize with other people who have the same interest. Due to advancement in technology, social networking has been at its peak with many people using it daily to achieve different goals. Many people use social networking to sell or advertise their products while others use it to advertise their services. By use of social networking, many companies have achieved their goals and hence making it one of the best methods to use for any company to increase profits. There are many sites which teach how to carry out social networking and be successful and many people enroll in those sites to sharpen their skills. The first social media site was developed in 1997 and was in existence till 2001 and it was called the six degrees (Holmes and Oloughlin 2014). Since then it has experienced a gradual development and has advanced. This study is designed to evaluate the advantages and disadvantages of using the social media sites for car sales. Many customers who want to buy cars base their search on social media sites and in a research done it was found that many of their car buyers want the social media to evaluate the type they want and the cost associated with that type (TyreeHageman et al. 2014). This research will evaluate the advantages and disadvantages of using the social networking in car sales. Research objectives The main objective of this study is to evaluate the advantages and disadvantages of using social media for car sales. The following are the other secondary objectives of the study. To access the attitude of customers towards social networking in regard to car sales. To determine if there is an increase in car sales contributed by social networking. To research if many car dealers prefer the use of social networking to market the product or not To evaluate if the use of social networking has positively or negatively impacted the sales of cars. Project scope This study will be based on the use of social networking for car sales and will not include any other form of car sales. Also, the study will majorly focus on the advantages and disadvantages of this method of car sales. The study will be carried out globally by use of the online survey. Literature review The use of social media has impacted many businesses in the world. Since the development of social networking from 1997 many businesses have experienced development and have gained a lot of profit due to its use. From that time many companies have transformed from analog to digital marketing whereby they use the internet to market their products (Shaw 2014). Other companies like Amazon and Alibaba have based their sales on the internet only and hence becoming more successful. Also, social networking has not been left out in advertising the services many people or companies offer. The social network analysis This is the process of investigating the structure of networks based on the graph theory to know how well or bad the structures are (Scott 2017). It involves analysis of people or things in the network based on sociology to know the attitude or the perception of those people and the things present in the network at that time. This analysis has its origin from sociologists who lived many years ago like George Simmel and Emile (Mc Carty and Molina 2015). The method of analysis was used early 20th century and its main goal was to analyze the relationship between social groups. This analysis is also in existence today and it helps those people who want to use social networking understand the best methods to adopt for them to be successful. In addition, social network analysis makes it possible for any marketers to know the best market and the best buyers to target. It is done by qualified statisticians who have knowledge in sociology and who can understand the attitude of people in a goo d way. How to carry out Social marketing in the best way There are many factors which one should consider before they start social media marketing. The first factor is the social media measurement. Social media measurement includes the use of analysis tools like surveys to measure the available market before you engage into the marketing strategy. This helps in understanding the investment which should be included in the marketing strategy. Another factor is the social network aggregation which includes the measurement of the best sites which have the target population. This helps in understanding which site one should do more advertisements. Another factor to consider before you start social networking is the cost associated with the advertisements so as to avoid loss and other related unnecessary costs. This helps in reducing the losses which may occur. Advantages of social networking There are many advantages associated with social networking. The following discusions will highlight some of those advantages and explain how they are important. High speed and efficiency Social networking has made communication very easy since one can communicate with another person who is far away in just a few seconds. In a recent research, it showed that communication speed had increased more than three times due to the availability of social media sites like facebook, twitter, and emails among others (Chu and Du 2013). Due to the increased speed, many companies make sales very fast and also customers find it very easy to get the items they want. Reliability Many people value the use of social media for easy access to commodities. They argue that it is more reliable and less expensive as compared to other forms of travelling cost and other associated costs have been minimized. This makes it very easy and more reliable hence making many people and companies adopt the system of social networking. Disadvantages of social networking Social marketing also has some disadvantages. The first disadvantage is cybercrime. Due to development of technology cybercrime has also increased and this has led to the loss of confidence as many people fear to be victims of this crime. Many sites which do online marketing are viewed as scams and hence people dont want to be associated with them. Cyber security has failed to control cybercrime (Broadhust et al. 2014). Cybercrime is sometimes carried out by the people who also practice cyber security hence making it very hard to curb the vice. Another disadvantage of social networking is lack of knowledge in the field. Many people when they hear social networking they think that it is easy and that they should jump into it without even consulting (Carins and Rundle 2014). When they join and invest in it they end up getting loss due to lack of knowledge. The attitude of people is another disadvantage. Many people are ignorant and they believe that social marketing or anything related to the internet is not good and is composed of many vices which should not be accepted in the society. This makes it very hard to convince them to join social media platforms and hence those people may be the targeted customers for a certain commodity and if that happens then the dealers may lack customers if social marketing id the only method to advertise their products. In addition, many people may not be willing to join social media platforms because they dont have the instagramtime or they dont know how to join them. Others may not be willing to join them and hence making it hard to do the social marketing. Social media and car dealers Many car dealers have adopted the use of social networking to carry out their business. Many of them use social sites like Facebook, Instagram, twitter, and other sites to do advertisements. In the process of carrying out the advertisements, they are also able to know their competitors (Armstrong et al. 2014). They use these platforms to upload new models so as to attract customers (JelenChick et al. 2013). Though the networking is used to get customers it also makes them aware of the best seasons to carry out the marketing. The car dealers post pictures on those sites and the people who are attracted end up sharing those pictures on their pages hence making them visible to other people. Through this process, much people are reached and hence making the business grow at a high rate. In a situation whereby a customer buys, the dealers may ship the car to the customers residence area hence making it easy for him or her get the product fast. This leads the customer to recommend much more people to shop with that dealer. This is one of the most important factors which have made car dealers to be motivated to use social networking to carry out their business. The platforms also benefit from these transactions and they become popular hence they also grow and accommodate many customers. Based on this information, it is very important to carry out a study to access the advantages and disadvantages of social networking for car dealers and that is what the study is based on. Research questions The primary research question of this study is What are the advantages and disadvantages of using social networking on car sales? The following are the other research questions of the study. What is the attitude of customers towards the use of social networking in regard to car sales? Is there an increase in car sales contributed by social networking? Do many car dealers prefer the use of social networking to advertise their cars? Has social networking positively or negatively impacted car dealers? Research hypothesis H0 customers have negative attitude towards social networking in regard to car sales Ha customers have a positive attitude towards social networking in regard to car sales H0 there is no increase in car sales contributed by social networking Ha there is increased car sales contributed by social networking H0 many car dealers do not prefer the use of social networks to advertise their cars Ha many car dealers prefer the use of social networks to advertise their cars H0 social networking has negatively impacted car sales Ha social networking has positively impacted car sales Research methodology Research methodology is the process which is used to collect data and analyze it so as to be able to make business decisions based on the data (Mackey and Gass 2015). This methodology should be scientific and verifiable. Also, it should be empirical and based on mathematical and statistical models. The following discussion will explain the methodology of this study. Research type This research will be a quantitative research. There are twelve steps which should be followed while carrying out a quantitative research. The following is a discussion of the twelve steps of a quantitative research. The first step is the formulation of the research problem. The researcher comes up with the problem which he or she wants to base the study on. The problem should be empirical and researchable (Brihla 2016). It should also be a real problem and which when researched on can benefit people. The second step is the formulation of the research objectives. In this step, the researcher comes up with the objectives he or she wants to meet after the research (Ramdhani et al. 2014). There follows the step of the scope of the study. in this step, the researcher explains well where the research will be conducted and gives a justification as to the chosen area to carry out the study is of interest. There follows the step of developing the research hypothesis which will be proved either wrong or correct by the data collected in the process of carrying out the research. The research hypothesis should match with the literature review and the objectives of the study so as to make them scientific hence making the research verifiable and reliable. The hypothesis should also be testable. The next step is the literature review. In this step, the researcher critically evaluates the existing literature under the topic of study. This gives the researcher a solid background of the topic and also enables him or her to be able to identify the gaps in the literature (Abbatielo et al. 2015). Then it follows the step of coming up with a research design which will be used in the study. In this step, the researcher comes up with the design of the study and explains why he chose to use it. The next step is the selection of sample size. The researcher explains the participants who will be included in the study and why they will be included. He or she also explains why the sample size has been decided to be a given number (Hesse-Biber 2013). The sample size is the main determinant of a study and should be selected carefully. Then it follows the process of data collection. In this step, the researcher collects data in the defined rules of the study. The data is then presented for analysis. in the step of analysis it where the data is transformed to digital and analyzed to make its information and get insights from it. The last step is the communication of the findings and recommendation. The researcher in these steps communicates the findings of the research and gives recommendations of what should be done. Research design This is the conceptual framework within which the study is carried on. It includes a blueprint of data collection and analysis (Harrison 2013). This study will use descriptive design where data will be collected by use of a questionnaire based on an online survey. The target population The target population of this study will be online car dealers. The researcher will conduct different sites which sell cars through networking and request them to fill survey questions which will be used for analysis. There will be a designed questionnaire which will be used to carry out the survey. Sampling procedures and sample size The research will include a sample size of 300 participants who will fill the survey questions. However, there will be no sampling method which will be used because the data will be collected online by use of a survey and hence there will be no sample selection. But there will be rules which will guide the participants to be included. Their participants must be car dealers and specifically doing the business online. They should also be willing to fill the survey. The survey will only be posted on sites which are composed of car dealers. Instrumentation The questionnaire will be the only tool for data collection and the questionnaires will be posted online on the sites which are composed of car dealers. The researcher will request them to fill the questionnaires. Once the limit of 300 participants will be reached, the researcher will collect the data and make it ready for analysis. Research limitations This research, has few limitations. The first limitation is that some of the car dealers may not be willing to participate in the study hence important information may be lost. The second limitation is that the data may not be more reliable since it will be collected online and some people may fill the questioners and they are not car dealers. Time schedule This research will be carried on for a period of two months. the following is the time schedule of the study. the first month first week understanding theoretical part of the study second week designing the questionnaire third week uploading the questionnaire to sites of car dealers fourth week monitoring the progress of the data collection online the second month first week retrieving the data for analysis second week data analysis third week communications of the findings fourth week communication of the recommendation Conclusion In conclusion, this study will be scientific and its main goal will be to determine the advantages and disadvantages of social networking for car dealers. The research will be carried out in the car dealers sites so as to get legit information and make it reliable. Car dealers will be requested to fill out the questionnaires so as to get genuine data for the study. References Abbatiello, S.E., Schilling, B., Mani, D.R., Zimmerman, L.J., Hall, S.C., MacLean, B., Albertolle, M., Allen, S., Burgess, M., Cusack, M.P. and Gosh, M., 2015. Large-scale interlaboratory study to develop, analytically validate and apply highly multiplexed, quantitative peptide assays to measure cancer-relevant proteins in plasma.Molecular Cellular Proteomics,14(9), pp.2357-2374. Armstrong, G., Kotler, P., Harker, M. and Brennan, R., 2015.Marketing: an introduction. Pearson Education. Brilha, J., 2016. Inventory and quantitative assessment of geosites and geodiversity sites: a review.Geoheritage,8(2), pp.119-134. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B. and Chon, S., 2014. An analysis of the nature of groups engaged in cybercrime. Carins, J.E. and Rundle-Thiele, S.R., 2014. Eating for the better: A social marketing review (20002012).Public Health Nutrition,17(7), pp.1628-1639. Chu, S.K.W. and Du, H.S., 2013. Social networking tools for academic libraries.Journal of librarianship and information science,45(1), pp.64-75. Harrison, R.L., 2013. Using mixed methods designs in the Journal of Business Research, 19902010.Journal of Business Research,66(11), pp.2153-2162. Hesse-Biber, S.N., 2013. Feminist approaches to mixed methods research.Feminist Research Practice: A Primer, p.363. Holmes, K.M. and O'loughlin, N., 2014. The experiences of people with learning disabilities on social networking sites.British Journal of Learning Disabilities,42(1), pp.1-5. Jelenchick, L.A., Eickhoff, J.C. and Moreno, M.A., 2013. Facebook depression? Social networking site use and depression in older adolescents.Journal of Adolescent Health,52(1), pp.128-130. Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Routledge. McCarty, C. and Molina, J.L., 2015. Social network analysis.Handbook of methods in cultural anthropology. Second edition. Rowman and Littlefield, Lanham, Maryland, USA, pp.631-657. Ramdhani, A., Ramdhani, M.A. and Amin, A.S., 2014. Writing a Literature Review Research Paper: A step-by-step approach.International Journal of Basic and Applied Science,3(1), pp.47-56. Scott, J., 2017.Social network analysis. Sage. Shaw, M., Team Deal LLC, 2014.Internet based e-commerce platform for use by consumers using social networks. U.S. Patent Application 14/334,534. TyreeHageman, J., Kurani, K.S. and Caperello, N., 2014. What does community and social media use look like among early PEV drivers? Exploring how drivers build an online resource through community relations and social media tools.Transportation Research Part D: Transport and Environment,33, pp.125-134.

Wednesday, December 4, 2019

Security Management And Migration Platformsâ€Myassignmenthelp.Com

Question: Discuss About The Security Management And Migration Platforms? Answer: Introducation Most modern IaaS infrastructure will offer adequate security features, however, the leasing organization (like Webb) should enforce them in their own resources rather than expect the service providers to do so. Nevertheless, there are key types of security measures to implement: Data encryption its outlined as the main and most important methods of protecting data as it meticulously manages security systems including the access keys as they are thoroughly encrypted. Network encryption most cloud service providers (CSP) will empathize on the encryption of the communication channel to deter interception threats that prey on the vulnerabilities of data transportation. Access control to create accountability, Webbs Stores, must know the people accessing their critical database hosted in the IaaS resources. This accountability is enforced using access control measures that manage users activities. Finally, a security access brokers known as CASBs, these are tools that help administrators to identify and locate risks within the database thus providing a high-end level encryption (Walker, 2015). Benefits and issues of the security features Benefits: First, protection against attacks more so, denial of service attacks that intercept cloud services. Security of the data the features would protect the critical database and its data. Flexibility with good security the users do not worry about server crashes or excessive down time due to traffic congestion. Regulatory compliance these features would ensure Webbs Stores meet the regulatory requirements for financial and personal data (Walker, 2015). Issues: Data privacy most of these procedures would require the users to surrender their personal data which could infringe on their personal and privacy rights. Ambiguity in security roles challenges may arise between the CSP and the store because of the considerations of access control and data ownership. Conflict of security features some security measures may identify others as intrusion thus may regularly disable or slow the entire IaaS infrastructure (Mehtra, 2014). Risks of cloud migration Database risks Security although most CSPs will have better security features than in-house facilities, migrating an entire database to a foreign infrastructure raises the concerns of its security. Furthermore, the database will operate in a different environment where the physical accountability is non-existence on behalf of the owner (leasing party, Webbs Stores). Migration moving an entire database resource to the cloud is a daunting task that requires project-like considerations. Therefore, it requires implementation procedures that might fail. Advanced change the database will have many changes that may affect its functionalities more so, to the end users (Healy, 2015). IaaS infrastructure Security problems IaaS offers excessive control to the user who may fail to implement the necessary security features thus expose the entire structure to attacks. For one, access may be given to unknown and unverifiable parties. Control having excessive control does not necessarily guarantee complete control and thus the subscriber may lose control over the resources hosted in the cloud infrastructure. Downtime when all is said and done, the IaaS platform will require IT resources to operate more so the internet which may fail or have downtime periods. Therefore, it will subject the infrastructure to delays and downtime periods (Healy, 2015). Communication between IaaS (CSP) and Webbs Stores Data security any communication conducted between the IaaS resource and the store may be intercepted through various attack methods such as malware intrusions. Therefore, the subscriber must be aware of this risk and apply the necessary solutions. Data privacy having hosted the data online, the communication between the two parties will mostly involve the access of confidential information stored in the cloud resource. Moreover, the subscriber will regularly update this resource with confidential information which is a serious risk. Record retention the communications are subject to retention requirements which can also be used to compromise the infrastructure if they fell into the wrong hands as they may contain sensitive data including access procedures (Romes, 2013). Backup and archival of records Risks of cloud backups Backing up data Large backup window on-premise backups take shorter windows as the process is conducted using LAN speeds. In fact, the only limitation is on the tapes throughput, however, cloud backups are limited by the internet resources i.e. speeds, bandwidth, and throughput. Therefore, congestions and delays will put the backup procedures at risk particularly when faced by a time sensitive scenario. Small restoration window consequently, when faced with a disaster, the subscribing organization will require all its data at once, an outcome that will be delayed by the access factors i.e. speeds, throughput and bandwidth. Loss of data with the onsite resource (tapes) the user can backup data based on a certain framework e.g. weekly, monthly and yearly. This outcome can help retrieve certain archives based on the users needs, however, with cloud resources, backups overwrite the previous versions. Therefore, older versions of data cannot be accessed if needed (Manes, 2012). Storage of data in the cloud Access risk with on-site resources, storage is closely monitored which ensure the right personnel accesses it. However, with cloud storage, the subscribers depends on the CSP to ensure the data is secure and that the storage is only accessed by them. Storage management consider the number of subscribers supported by a single CSP. Now, due to the number of subscribers, the CSP may fail to isolate the data properly thus leak information from one subscriber to another. Moreover, misconfiguration is a notable risk that may expose the storage facilities to the public at large. System outage unlike in-house resources, a subscriber storage resource is usually subject to downtimes and outages just like any other online resource. Therefore, despite the advantages offered by cloud storage, there is always the possibility of losing access to the data. This outcome can be caused by many factors including the existence of system breaking bugs (Healy, 2015). Retrieval of data Retrieval time the critical concern as the retrieval process may be time sensitive thus delay the application of the said data. While using the cloud resource, the subscribers retrieval process is subject to the factors of accessing online resources which are quite extensive. Cybercrime several serious attacks have occurred in the recent past which outline the risk of using cloud infrastructures. Now, while retrieving data from a compromised cloud facility, the process can be tracked back to the subscriber to infect the in-house facilities. Therefore, a subscriber can deliberately grant access to intruders while having the false assumption that they are retrieving their original data (Sovetkin, 2017). How DR plan is affected by the cloud resource In general, the DR plan considered by Webbs Stores will change into a cloud DR having a virtualization approach. In this approach, the entire server which includes the operating systems, Softwares and system patches will be combined to form a single virtualised structure. Therefore, in case of a disaster, the entire copy including the data lost will be required in a matter of minutes if the single virtual structure is physically acquired from the CSP. This outcome will drastically affect the companys DR plan as it will use fewer resources while meeting the same objectives. Moreover, the virtualization tools and resources will be independent of the hardware resources. Therefore, the software resources such as OS, applications and patches will be transferred from one data centre to another without reloading each and every operational component. Again, this outcome will reduce the overall recovery time used to restore resources in case of disasters. In all, with cloud resources, Webbs backup and restoration strategy will become more cost effective while having a better recovery time. These outcomes will be facilitated by the benefits outlined above and also by the ability to tune the performance of the cloud resources based on the immediate needs (tech, 2017). Cloud access protection IaaS infrastructure AAA strategy IaaS offers excessive control to the user which means there are a lot of resources disposed to the subscriber. The AAA strategy would require the authentication, authorization and accountability of resources. This can be done using verifiable all-inclusive tools available in the market including some that are provided by CSPs. Resource management the organization should monitor all the resources exchanged between them and the CSP in order to verify the security of the IaaS structure. In essence, the resource should not alter in operation (Mehtra, 2014). Ms SQL cloud server instance SQL authentication when the logical server is created for the SQL instance, specific access resources are given including username and passwords. Now, these resources should me made using the best security procedures, for instance, they should be unique having strong and undetectable characters. Firewall this security feature will manage the access given to the cloud instance. This process will be conducted using the access information presented by the users more so, the IP addresses (Microsoft, 2017). Cloud network structure Network management intrusion detection systems should be used to monitor the services offered by the cloud infrastructure. These systems would alert the administration of any access problems/threats thus help mitigate them before they cause any substantial damage. Firewalls similar to the cloud instance, the network structure should only be accessed by verifiable members. This consideration would be made using the firewalls which would also manage the data streams based on a verifiable checklist (Microsoft, 2017). Cloud back-up and restoration structure CASB backup and restoration procedures will involve two different systems and in this case, two different parties will be used. Now, the CASB as outlined before will offer end to end access protection based on the user's considerations. Furthermore, this platform will offer endpoint protection using proxies and verifiable APIs. Encryption also known as tokenization, encryption would ensure that the backup procedures are conducted safely despite that nature of the channels used. Cloud resources will operate within the online platform where security is never guaranteed. Therefore, by tokenizing the backup and restoration data, the integrity and authenticity of the resources are maintained more so after the occurrence of a disaster (Symantec, 2017). References Healy, R. (2015). The Top 5 Risks of Moving to the Cloud. Retrieved 09 September, 2017, from: https://www.annese.com/blog/top-5-risks-of-moving-to-the-cloud. Manes, C. (2012). What are the risks of backing up your business data in the cloud? Disaster recover journal , Retrieved 09 September, 2017, from: https://www.drj.com/articles/online-exclusive/what-are-the-risks-of-backing-up-your-business-data-in-the-cloud.html. Mehtra, H. (2014). Issues and Standards in Cloud Security. Retrieved 09 September, 2017, from: https://www.cse.wustl.edu/~jain/cse571-14/ftp/cloud_security/index.html. Microsoft. (2017). Azure SQL Database access control. Microsoft Azure, Retrieved 09 September, 2017, from: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-control-access. Romes, R. (2013). The Benefits and Risks of Cloud Computing. Cla connect, Retrieved 09 September, 2017, from: https://www.claconnect.com/resources/articles/the-benefits-and-risks-of-cloud-computing. Sovetkin, M. (2017). IaaS Security: Threats and Protection Methodologies. eSecurity planet, Retrieved 09 September, 2017, from: https://www.esecurityplanet.com/network-security/iaas-security-threats-and-protection-methodologies.html. Symantec. (2017). Symantec Cloud Data Protection Security. Symantec, Retrieved 09 September, 2017, from: https://www.symantec.com/products/cloud-data-protection-security. tech, O. (2017). Benefits of Disaster Recovery in Cloud Computing. Retrieved 09 September, 2017, from: https://www.onlinetech.com/resources/references/benefits-of-disaster-recovery-in-cloud-computing. Walker, S. (2015). 5 Benefits of a Cloud Computing Security Solution. TBCONSULTING, Retrieved 09, September, 2017, from: https://www.tbconsulting.com/blog/5-benefits-of-a-cloud-computing-security-solution/.

Thursday, November 28, 2019

Public Safety free essay sample

Session I: Regional Initiatives on Tourist Safety and Security THE CENTRAL AMERICAN EXPERIENCE PRESENTATION BY Jorge Rojas Vargas, General Director OF THE JUDICIAl investigation ORGANISATION OF Costa Rica AND CHAIRMAN OF THE cOMMISSION OF POLICE CHIEFS AND DIRECTORS OF CENTRAL AMERICA AND THE CARIBBEAN [pic] Historical account Creation ? November 1994 as the Association of Police Chiefs of Central America. ? July 1998 the Dominican Republic is incorporated. ? September 23, 2001 no longer referred to as the Association but instead as the Commission of Police Chiefs and Directors of Central America and the Caribbean. At present Comprises the following countries: ? Panama ? Judicial Technical Police ? National Police ? Costa Rica ? Judicial Investigation Organisation ? Police Force (Ministry of Security) ? Nicaragua: National Police ? El Salvador: National Civil Police ? Honduras: Preventive Police of Honduras ? Guatemala: National Civil Police ? Belize: Belize Police Force ? Haiti: National Police ? Dominican Republic: National Police ? Puerto Rico: Puerto Rican Police Observers ? Mexican Federal Agency of Investigations (AFI) ? Preventive Police of Mexico ? BKA of Germany ? AECI Spanish Agency for International Co-operation ? Association of Caribbean Commissioners of Police (ACCP) ? French Police ? Interpol (Sub-headquarters in El Salvador) Overall Objective Strengthen relations among the various Police bodies in Central America and the Caribbean, other police bodies in observer countries and others, for the purpose of pooling efforts in the fight against crime and organised crime both nationally and internationally. We will write a custom essay sample on Public Safety or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Specific Objectives ? Ensure the wellbeing of the Police officers that form part of the various police institutions in the Region, providing and promoting co-operation and mutual assistance, particularly in cases of emergency and disasters. Promote the prevention, repression and neutralisation of crime in Central America and the Caribbean in all its aspects, which by its very nature and action, affects the society within the Region. ? Facilitate international technical assistance, training, equipment and the exchange of information. REGIONAL TOURIST SAFETY PLAN FOR CENTRAL AMERICA AND THE CARIBBEAN (HAITI, DOMINICAN REPUBLIC AND PUERTO RICO) Presentation of Motives Central America including Panama and Belize, covers an area measuring 522,299 square kilometres and has an estimated population of 33 million. Tourism is currently the primary source of foreign exchange revenue in half of those countries (1/3 of the regional GDP). A lack of tourist safety leads to an absence of tourists, particularly international tourists, thereby affecting the economy of a specific country, since it contributes to the elimination of goods or resources for tourists or service providers; the loss of markets for service providers; losses for insurance companies; the loss of jobs for employees of the tourism industry; reductions in State revenue and sometimes the loss of human life. Internationally: Cancellation of contracts between wholesalers and providers; serious warnings on the consular websites of tourist generating countries; the perception of a lack of security that persists even though it has been reversed; high investments to reverse the perception of a lack of security. Today’s tourist demands safety regardless of the variety of destinations visited. If there is no safety analysis conducted in advance, a tourist is likely to refrain from visiting a specific country or place. Therefore, the safety analysis in the tourism sector, from the point of view of the institutions responsible for public safety, must be based on the realities encountered by the tourism industry at the moment a tourist safety plan is being implemented. Background ? First Regional Tourist Safety Congress held in Costa Rica on October 10 to 12, 2006. Experts and representatives of the police bodies of the region. Conclusion reached: â€Å"Tourism has been one of the primary sources of revenue and foreign exchange in the countries of the region, an aspect that warrants the strengthening of capabilities in tourism industry infrastructure and other ervices that would facilitate tourists’ stay, in addition to selling and promoting the region as a tourist destination, creating conditions of public safety that would generate the confidence necessary†. ? 18th Extraordinary Meeting of the Commission in Puerto Rico ? 16th Ordinary Meeting of the Commission in Nicaragua ? 1st Touri st Safety Congress ? 19th Extraordinary Meeting of the Commission in Costa Rica Courses of Action suggested at the Tourist Safety Congress ? Training ? Prevention ? Handling of complaints and following up of serious cases (offences, homicides, others) ? Information and advice for tourists ? Verification of services Purpose By formulating this Regional Plan, the following is pursued: A. Be able to provide the tourist with effective safety. B. Implement police actions that would allow the identification, prevention, repression and investigation of any type of crime against tourists and service operators. C. Consolidate the Tourism Industry so that the region could be perceived as a reliable destination, at both the national and international levels, guaranteeing tourist safety. Overall Objective Strengthen tourist safety within the region, protecting national and foreign tourists, their belongings, tourist routes and tourist destinations, assisting and advising them when emergencies arise, by planning and executing tactics, methods and effective techniques. Specific Objectives According to their region, each participating country must: 1. Reduce the rate of crimes committed against national and foreign tourists (creation of Tourist Police units or divisions). 2. Reduce the crime rate on tourist routes and at tourist sites. . Improve the national and international perception of Tourist Safety in the region. 4. Consolidate the tourist police model with participation from all sectors of the tourism industry of the region. 5. Expand police coverage in the various tourist destinations of its region. 6. Acquire the means, technical equipment and human resources necessary to efficiently carry out the police efforts involved in tourist safety. 7. Continually train the personnel dire ctly involved in tourist safety. Strategic Objectives 1. Periodically exchange experiences among the tourist police of the region through seminars, conferences and workshops. 2. Prepare and obtain a regional budget for the effective functioning of the tourist police, by seeking financing with international agencies and organisations. 3. Implement rapid communication mechanisms between the Tourist Police Divisions of the region and the tourism sector (companies and others). 4. Conduct regional studies to identify the critical areas in tourist destinations, which would guide decision making based on the respective assessments. Regional Policies 1. Tourist safety is recognised as a priority objective that is of both national and international interest and which helps to raise the region’s level of development. 2. Co-responsibility is promoted as well as participation from the private sector and the population in general, in the fight against crime in tourist destinations. 3. Efforts are undertaken to develop and coordinate inter-institutional projects aimed at improving the effectiveness of tourist safety within the region. Courses of Action 1. In the area of training: ? Tourism Culture. Tourism Legislation. ? Police Doctrine and Ethics. ? Human Rights. ? Relations with the community. ? Human Relations and Communication Techniques. ? Foreign Languages. ? Manifestations and Evolution of Organised Crime. ? Safety on Roadways. ? Tourist Safety. ? Gender Policy. ? History and Geography of Central America and the Caribbean. ? Generalities of the free movement of persons and their belongings. ? Care in the event of Natural Disasters. ? Intelligence and Police Investigations. ? First Aid. ? Use of computer equipment and the Internet 2. In the area of prevention: Promote information and dissemination campaigns targeting tourists, in order to provide them with all aspects related to prevention so that they could avoid falling victim to any type of illicit activity; incorporate into said campaigns aspects associated with traffic rules and road signage and include agents in the training. ? Prepare brochures on procedures and preventive guidelines for the tourists who visit the region so as to provide them with information of interest. ? Include in national plans, the allocation of the resources necessary for effective tourist safety in places with a large tourist presence. . Handling of complaints and reports: ? Improve the quality of the service provided when receiving complaints or reports made by Tourists, striving for the interview to be done in a speedy and timely fashion. ? Incorpor ate common variables into the report forms so as to facilitate the exchange of information among police bodies, in addition to which said forms should be in both Spanish and English. ? Coordinate with the judicial authorities in order to give continuity to the following up of the report, complaint or action filed by tourists when they have been victims of a crime. Ensure that the statement of the victim is received as evidence taken in advance, in his/her language and place of lodging. ? In order to provide the tourist with an efficient service when affected by crimes or traffic accidents, the relevant coordination efforts must be carried out with the bodies necessary and prompt procedures established so that the tourist feels satisfied and in cases where he/she has left any country that is participating in this plan, alternatives must be sought with the embassies of origin in order for feedback to be provided. 4. Information, guidance and advice for the tourist: . Implement a touri st support call centre in each Country (only number in the national domain). 2. Establish a common technological platform at strategic points that would facilitate quick and timely access to information of interest, as well as the exchange of such information. 3. Intensify campaigns to disseminate safety conditions within the region. 5. Verification of tourist services ? Boost sanitary surveillance in tourist destinations and the monitoring of food and beverages, especially during peak seasons and at places with greater tourist presence. Verify tourist service and complementary operations regarding the information and safety provided to the tourist. Specific courses of action of the Tourist Police 1. Posting of tourist police officers at all tourist destinations in each participating country. 2. Exchange of information online among the tourist police within the region, via the Internet. 3. Tourism training by police institutions for the social media, for the purpose of reporting con stantly on the positive results achieved in the area of tourist safety. . Immediate feedback provided to the police prevention system and in the area of investigation regarding cases of crimes against tourists. 5. Implementation of a 24 hour telephone number for each Tourist Police department in the Region. 6. Application of the concept of Community Police, by the Tourist Police. 7. Coordinate with each country’s investigating units, the investigation of crimes committed against tourists regardless of the degree of severity of the crime, in addition to the respective follow up of cases. 8. Gathering of information by the tourist police to be transferred to investigators. 9. Protect, assist and advise tourists and ensure the protection of their belongings, which may be jeopardised for any reason. Regional Insurance Programmes 1. Return of items and valuables taken. 2. Payment of accommodation and meals due to a lack of resources. 3. Travel assistance as well as legal, medical and telephone assistance, in addition to assistance in terms of methods of payment (debit card). Technical police instructions 1. Maintain and re-establish as the case may be, order and public safety. . Prevent crimes from being committed and prevent them from yielding further consequences. 3. Apprehend persons by legal order or in cases of flagrant crimes, place them at the disposal of the competent authorities. 4. Ensure compliance with general laws and provisions pertaining to tourist safety, executing the orders received from the competent authorities in their respective countries. 5. Promote c o-responsibility and participation from the population of each country in the fight against crime that affects national and international tourism. General Guidelines 1. The President of the Commission of Police Chiefs and Directors of Central America and the Caribbean is appointed as the individual directly responsible for coordinating and implementing this Regional Plan. 2. The Heads of the Tourist Police Divisions in each country shall include in their NATIONAL TOURIST SAFETY PLAN objectives and policies that would facilitate effective coordination with this plan, independent of the socio-cultural characteristics and particularities of each participating country. 3. There must be synchronisation between national plans and the regional plan, which would allow the region to be offered as a tourist destination that would help to generate sound levels of safety for tourists from outside the region as well as national tourists. 4. In order to periodically evaluate the results of this regional plan, at least two statistical models must be prepared that would compile regional information on the tourists affected or involved in crimes, with said models being linked to particularities of interest such as nationality, location, etc. 5. All participating entities shall ensure the safety of tourists, preventing any attempted crimes against them. 6. Respect for Human Rights shall prevail as well as strict compliance with the laws in force in the Countries of the Region. 7. In order to counteract the reaction of criminals, techniques shall be applied in police operations to record and partially immobilise criminals and suspects. Said techniques are outlined in the manuals on police methodology. 8. The officials responsible for enforcing the law shall not commit acts of corruption and shall be rigorously opposed to all of such acts and shall fight against them. . Any aspect not included in this plan shall be resolved by the Commission of Police Chiefs and Directors of Central America and the Caribbean. General Mission for each country Following the approval of this plan, each participating country, with the human and logistical resources at its disposal, will formulate and execute its respective national plan taking int o account the objectives and courses of action outlined in this plan, as well as the geographic and sociological characteristics and criminal modus operandis. Approval of the plan Was presented and discussed during the 20th Extraordinary Meeting convened in Guatemala, on March 26-29, 2007 and was again submitted for consultation once the changes proposed by each member country of the Commission were incorporated. The plan was duly approved on June 1, 2007. Organisational Structure of several Tourist Police Departments in Central America Guatemala: Honduras: ? Personnel and equipment: [pic] ? Location: [pic] El Salvador: Tourist Police Division Projection of Resources for Tourist Safety | |Currently |Projection Dec. 008 | |Expense Headings |May 2006 | | |Operating Personnel: |92 |99 |740 |830 | |Administrative Personnel: |7 | |90 | | |Transport Equipment (various types) |3 |   |223 | |Staff Training: |99 |   |830 | |Care and Security Centres on Beaches: |0 |10 |10 | |Care and Security Centres on Mountains |1 |9 |9 | |Mobile Tourist Security Posts: |2 |   |26 | |Police Units on Wheels: |0 |18 |18 | |Total Centres, Posts and Security Units |   |63 |63 | | Financial Resources Required to Develop the National Tourism Project of the Millennium, | | |2006 to 2008 (for 3 years). |$11,581,045. 6 | |Annual Average:=====( $3,860,348. 39 | | |Monthly Average:===( $ 321,695. 70 | | |ANNUAL BREAKDOWN OF |2006 |2007 |2008 | |RESOURCES |$3,976,682. 08 |$7,737,811. 48 |$11,581,045. 16 | Costa Rica: ? Organisational Structure [pic] ? Regional Offices: Total: 10 Regional Offices 91 Police Delegations (DELTAS) ? Regionalisation: Plan and execute regular prevention and response strategies and operations, according to regional needs, so as to maintain public order and the safety of inhabitants, their belongings and respect for their fundamental rights and freedoms. [pic] Nicaragua: Proposed Organisational Chart for the Nicaragua Tourist Police [pic] OFFICE OF THE ATTORNEY GENERAL OF THE REPUBLIC JUSTICE DEPARTMENT OF COSTA RICA THE JUDICIARY PILOT PLAN TO REDUCE IMPUNITY IN TOURIST ZONES Procedures Established in the Pilot Plan to reduce impunity in the tourist zones of Costa Rica 1. Unless another more serious crime needs to be handled, the vehicle of the Justice Department assigned to the Office of the Attorney General of Bribri, will be used on weekends to transport the Judge, the Prosecutor and the Public Defence Attorney available, to Puerto Viejo, Cahuita or Manzanillo, as is necessary, to take the report and – in applying the procedure for pre-trial evidence – take the statement of the tourist offended and the tourists appearing as witnesses to the offence, so as to have valid evidence for future debate. 2. CATUR will donate a video camera to the Court of Bribri, for the specific purpose of documenting the pre-trial evidence in cases of crimes against tourists. 3. In Puerto Viejo, Cahuita as well as Manzanillo, the members of CATUR will provide the facilities to carry out the task of obtaining pre-trial evidence, with the privacy and security necessary. 4. CATUR will donate to the Justice Department, a specific amount of gasoline to cover the cost of transporting judicial officials in said conditions on weekends. However, as long as needs can be met with a suitable budget, then those resources will be used. The use of the fuel provided will be adjusted to the regulation issued for that purpose. 5. In order to follow up the advancements made and the results achieved, the authorities involved will issue a report every two months to the Office of the Attorney General, so that the Supreme Court could in turn be notified. San Jose, March 8, 2007. San Carlos Group Uniformed (12) Intelligence (02) Coordinator Intelligence Operations and Analysis Logistics and Liaisons Coordinator Staff and Training Coordination of the Tourist Police Regional Offices Police Force Head Office Head of the Tourist Police Office Tourist Safety Dept. District Tourist Police Tourism Operations Dept. Sub-Office Prevention Area Limon Group Uniformed (12) Intelligence (02) Charotega Group Uniformed (26) Intelligence (02) Punta Arenas Group Uniformed (12) Intelligence (02) San Jose Group Uniformed (12) Intelligence (02) Patrulla de Caminos Group Uniformed (14) Intelligence (02) COVERAGE OF DISETUR-PNC TOURIST POLICE ORGANISATIONAL CHART, HONDURAS Presence of Tourist Safety Delegations 1. JEFATURA 22 ELEMENTS . MOVIL, 24 ELEMENTS 3. ANTIGUA GUATEMALA 40 ELEMENTS 4. SAN VICENTE PACAYA 18 ELEMENTS 5. LANQUIN 15 ELEMENTS 6. PANAJACHEL 36 ELEMENTS 7. CHICHICASTENANGO 17 ELEMENTS 8. MONTERRICO 15 ELEMENTS 9. RIO DULCE 13 ELEMENTS 10. LIVINGSTON 15 ELEMENTS 11 REMATE 33 ELEMENTS 2 3 4 5 6 7 8 10 11 1 9 SECRETARIA DE SEGURIDAD SAFETY SECRETARIAT . DIRECCION POL. PREV. . PREVENTIVE POLICE OFFICE SUBDIRECCION POLICIA COMUNITARIA COMMUNITY POLICE SUB-OFFICE TELA TELA LA CEIBA LA CEIBA I. DE LA BAHIA I. DE LA BAHIA S. P. S . S. P. S . DIVISION POLICIA DE TURISMO TOURIST POLICE DIVISION TEGUCIGALPA TEGUCIGALPA COPAN COPAN COMAYAGUA COMAYAGUA

Sunday, November 24, 2019

Civil War Admiral David G. Farragut

Civil War Admiral David G. Farragut David Farragut - Birth Early Life: Born July 5, 1801, in Knoxville, TN, David Glasgow Farragut was the son of Jorge and Elizabeth Farragut. Jorge, a Minorcan immigrant during the American Revolution, was a merchant captain as well as a cavalry officer in the Tennessee militia. Naming his son James at birth, Jorge soon moved the family to New Orleans. While residing there, he aided the father of future Commodore David Porter. Following the elder Porters death, the commodore offered to adopt young James and train him as a naval officer in gratitude for the services rendered to his father. In recognition of this, James changed his name to David. David Farragut - Early Career War of 1812: By joining the Porter family, Farragut became foster brothers with the other future leader of the Union Navy, David Dixon Porter. Receiving his midshipmans warrant in 1810, he attended school, and later sailed aboard USS Essex with his adopted father during the War of 1812. Cruising in the Pacific, Essex captured several British whalers. Midshipman Farragut was given command of one of the prizes and sailed it to port before rejoining Essex. On March 28, 1814, Essex lost its main topmast while leaving Valparaiso and was captured by HMS Phoebe and Cherub. Farragut fought bravely and was wounded in the battle. David Farragut - Post-War Personal Life: Following the war, Farragut attended school and made two cruises to the Mediterranean. In 1820, he returned to home and passed his lieutenants exam. Moving to Norfolk, he fell in love with Susan Marchant and married her in 1824. The two were married for sixteen years when she died in 1840. Moving through a variety of posts, he was promoted to commander in 1841. Two years later, he married Virginia Loyal of Norfolk, with whom he would have a son, Loyall Farragut, in 1844. With the outbreak of the Mexican-American War in 1846, he was given command of USS Saratoga, but saw no major action during the conflict. David Farragut - War Looms: In 1854, Farragut was at dispatched to California to establish a naval yard at Mare Island near San Francisco. Working for four years, he developed the yard into the US Navys premier base on the west coast and was promoted to captain. As the decade drew to a close, the clouds of civil war began to gather. A Southerner by birth and residence, Farragut decided that if a peaceful separation of the country were to occur, that he would consider remaining in the South. Knowing that such a thing would not be permitted to happen, he declared his allegiance to the national government and moved his family to New York. David Farragut - Capture of New Orleans: On April 19, 1861, President Abraham Lincoln declared a blockade of the Southern coast. To enforce this edict, Farragut was promoted to Flag Officer and sent aboard USS Hartford to command the West Gulf Blockading Squadron in early 1862. Charged with eliminating Confederate commerce, Farragut also received orders to operate against the Souths largest city, New Orleans. Assembling his fleet and a flotilla of mortar boats at the mouth of the Mississippi, Farragut began scouting the approaches the city. The most formidable obstacles were Forts Jackson and St. Philip as well as a flotilla of Confederate gunboats. After approaching the forts, Farragut ordered the mortar boats, commanded by his step brother David D. Porter, to open fire on April 18. After six days of bombardment, and a daring expedition to cut a chain stretched across the river, Farragut ordered the fleet to move forward. Steaming at full speed, the squadron raced passed the forts, guns blazing, and safely reached the waters beyond. With Union ships in their rear, the forts capitulated. On April 25, Farragut anchored off New Orleans and accepted the citys surrender. Shortly thereafter, infantry under Maj. Gen. Benjamin Butler arrived to occupy the city. David Farragut - River Operations: Promoted to rear admiral, the first in US history, for his capture of New Orleans, Farragut began pressing up the Mississippi with his fleet, capturing Baton Rouge and Natchez. In June, he ran the Confederate batteries at Vicksburg and linked up with the Western Flotilla, but was unable to take the city due to a lack of troops. Returning to New Orleans, he received orders to steam back to Vicksburg to support Maj. Gen. Ulysses S. Grants efforts to capture the city. On March 14, 1863, Farragut attempted to run his ships by the new batteries at Port Hudson, LA, with only Hartford and USS Albatross succeeding. David Farragut - Fall of Vicksburg and Planning for Mobile: With only two ships, Farragut began patrolling the Mississippi between Port Hudson and Vicksburg, preventing valuable supplies from reaching Confederate forces. On July 4, 1863, Grant successfully concluded his siege of Vicksburg, while Port Hudson fell on July 9. With the Mississippi firmly in Union hands, Farragut turned his attention to the Confederate port of Mobile, AL. One of the largest remaining ports and industrial centers in the Confederacy, Mobile was defended by Forts Morgan and Gaines at the mouth of Mobile Bay, as well as by Confederate warships and large torpedo (mine) field. David Farragut - Battle of Mobile Bay: Assembling fourteen warships and four ironclad monitors off Mobile Bay, Farragut planned to attack on August 5, 1864. Inside the bay, Confederate Adm. Franklin Buchanan had the ironclad CSS Tennessee and three gunboats. Moving toward the forts, the Union fleet suffered the first loss when the monitor USS Tecumseh struck a mine and sank. Seeing the ship go down, USS Brooklyn paused, sending the Union line into confusion. Lashing himself to Hartfords rigging to see over the smoke, Farragut exclaimed Damn the torpedoes! Full speed ahead! and led his ship into the bay with the rest of fleet following. Charging through the torpedo field without any losses, the Union fleet poured into the bay to do battle with Buchanans ships. Driving away the Confederate gunboats, Farraguts ships closed on CSS Tennessee and battered the rebel vessel into submission. With Union ships in the bay, the forts surrendered and military operations against the city of Mobile began. David Farragut - End of the War and Aftermath In December, with his health failing, the Navy Department ordered Farragut home for a rest. Arriving in New York, he was received as a national hero. On December 21, 1864, Lincoln promoted Farragut to vice admiral. The next April, Farragut returned to duty serving along the James River. Following the fall of Richmond, Farragut entered the city, along with Maj. Gen. George H. Gordon, just prior to President Lincolns arrival. After the war, Congress created the rank of admiral and immediately promoted Farragut to the new grade in 1866. Dispatched across the Atlantic in 1867, he visited the capitals of Europe where he was received with the highest honors. Returning home, he remained in the service despite declining health. On August 14, 1870, while vacationing at Portsmouth, NH, Farragut died of a stroke at the age of 69. Buried at Woodlawn Cemetery in New York, over 10,000 sailors and soldiers marched in his funeral procession, including President Ulysses S. Grant.

Thursday, November 21, 2019

Question Essay Example | Topics and Well Written Essays - 250 words - 6

Question - Essay Example Among the knowledge hoped to be acquired by the student are engineering, technology, design, mechanics, mathematics and physics. This knowledge also encompass as many theoretical and practical areas as possible. Bearing the prestige of acquiring the above skills and knowledge comes with a number of responsibilities. As the adage goes, to whom much is given, much is expected. This means that the mechanical engineering graduate is expected to give back to society by exhibiting and appropriately applying the acquired skills and knowledge. In today’s contemporary society where technology revolves round almost all industries, the mechanical engineer is expected to apply his or her knowledge by incorporating advanced technology into solving some of the key problems and challenges that come with the basic functions and operations of mechanical parts of machines. More importantly are automobiles. As the mechanical engineering graduate apply the knowledge in the field, it is expected that certain core values would be exhibited along side the ordinary exhibition of skills and knowledge and these include values like recognition, achievement, independence, trust and cordial interpersonal