Friday, November 29, 2019

Bill Bowerman Essay Example

Bill Bowerman Essay In 1962 Bill Bowerman, the legendary University of Oregon track field coach, and Phil Knight, a University of Oregon business student and middle-distance runner, struck up a partnership to form a company called Blue Ribbon Sports (BRS). BRS imported shoes from Japan to the USA. First-year sales totalled $8,000, and in 1972 BRS changed its name to Nike, named for the Greek winged goddess of victory, and so began the birth of one of the modern worlds biggest and most famous companies. Nike employs 22,000 people worldwide, from Nike World Headquarters in Oregon and Nike European Headquarters in Hilversum, The Netherlands, to nearly every region around the globe, including Asia Pacific, the Americas, and Europe, Middle East and Africa. This includes manufacturers, shippers, retailers and service providers, and nearly 1 million people help to bring Nike to athletes and the public around the globe. Its this sheer scale and variety of operating bases that makes Nike a TNC, and a rather large one at that. Nikes main headquarters is in Portland, Oregon, USA. Yet very little, if any, of Nikes trainers and apparel are manufactured in the USA. Nike, like many large companies, has moved its production into areas of the world that are cheaper, in an effort to reduce manufacturing costs and therefore maximising profit margins. We will write a custom essay sample on Bill Bowerman specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Bill Bowerman specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Bill Bowerman specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Nikes HQ, based in an MEDC, is the centre for all Nikes research and development. In an MEDC the best, most intelligent, experienced and well-educated workers are available for Nikes development program. Being in a rich country also gives access to the latest in technological equipment and research techniques. This allows Nike to stay at the forefront of shoe and sportswear technology, developing shoe technology such as Max Air, Zoom Air, Tuned Air, Shox, as well as clothing technology and fabrics such as Dri-FIT, Clima-FIT, Therma-FIT and Storm-FIT. The increases in technology and innovation mean Nike keeps ahead of its biggest competitors both on the running track and the high street. MEDCs such as the USA and Europe are also Nikes biggest selling grounds, and keeping the HQ in these countries results in closer company-customer relations Nike can see what the consumer wants and needs, and alter its product line-up accordingly. Nike has an established market in the USA, and people like the idea that its a local American company, despite the fact that youll rarely if ever find a Nike product made in the USA. Nikes main production centres are in the far-eastern areas of the world, but in reality Nike would set up their production centres in the cheapest area possible, no matter where it was in the world. Communication and transport have improved so much in the 21st century that its financially cheaper to do this than to keep all your manufacturing and development together. The Internet, e-mail, telephones and fax machines mean that controlling production and retail centres from the HQ is cheap and easy. Cheap carrier ships and airlines means that no matter where in the world a product is made, it can be in a shop on the other side of the world within days. It started in the 1970s when Nike moved its production sites to South Korea and Taiwan. At the time these areas were desperately trying to develop further, and had welcoming governments and space for facilities. Above all they offered the cheapest labour available at the time. So Nike moved in, reducing their production costs vastly, and maximising profits. As TNCs move into these MEDCs they bring with them huge amounts of jobs, money and support industry. This results in these countries becoming more and more developed until they become NICs. Education, healthcare and living conditions will all improve. This is a tremendous benefit to the country in question, however this means that eventually the workers will demand more and more money to do the same job, bad news for Nike. Nike began to sense this back at their HQ and decided to move there main production factories into less developed areas, for the same reasons they moved into Korea and Taiwan in the first places. This is referre d to as Nomadic behaviour, and makes pretty good business sense really. So in the 80s and 90s they moved to China and Indonesia, where labour was cheap and governments keen (or gullible depending on your point of view). These are still Nikes main production bases today, but one day they will become ever-more developed, and Nike will predictably move out again, to somewhere cheaper and less developed (Afghanistan maybe?!) Nike now runs two main types of factory. It still owns the premises in the now developing areas of Taiwan and South Korea, and these produce Nikes high quality, statement products (they produce between 10,000 and 25,000 pairs of shoes a day.) While the newer, cheaper centres in China and Indonesia are Nikes bulk producers, producing well in excess of 70,000 pairs of trainers a day. The other reason Nike likes to have multiple production sites is to avoid trade barriers and tariffs. The best example of this with Nike is their factory in Greece. Greece is within the EU, and therefore Nike technically produces within the EU, preventing any sales quotas or taxes that could be imposed if they just imported all of their produce. Nike also has a secondary HQ within Europe. This is the HQ for all operations in Europe, the Middle East and Africa (shortened to Nikes EMEA HQ). The EMEA HQ is based in a state-of-the-art complex designed by William McDonough and Partners, opened in 1999 in Hilversum, The Netherlands. This allows Nike to change the specification of certain products and lines to fit specific needs within this area. For example in America people may have, on average, wider feet, while in Europe they may have thinner feet. Having two HQs and R;D centres means that Nike can tailor its products more to its consumers, hopefully increasing customer satisfaction and therefore sales. So weve established that, in terms of production, Nike is a global company, but it is just as important to realise that Nike is also one of the most global and universal brands in terms of sales and marketing. Nike sells its products in virtually every country in the world, an almost perfect example of globalisation. There is rarely a place on the planet where there isnt Nike produce available and where Nike products cant be found on any of its inhabitants. The Antarctic might have been an exception until recently, when they invented their Therma-FIT fabric for base layers and fleeces for outdoor explorers. Nike sells and markets its products in similar way throughout the world. Like most companies they use classic techniques such as television, radio, and billboard advertising, but Nike exploits one area more than virtually any other company on earth, sponsorship and role models. The formula is simple: pay a well-known sports celebrity or role model to wear your produce, or sponsor a popular team in a sport. Whenever people see the star or team in question they see the brand and associate it with the company. It enforces the if its good enough for you its good enough for me attitude and this endorsement strategy works wonders for Nike. The most famous of all Nike patrons is Michael Jordan, the worlds most famous basketball player, and he even had a range of Nike produce named after him. Other famous individuals include football players Ronaldo, Luis Figo and Eric Cantona, basket-ballers Kobe Byant and Michael Jordan, golfer Tiger Woods and runners Paula Radcliffe and Maurice Green. In fact Nike sponsors individual sportsmen and women in just about ever sport imaginable. They also make the official kits of many major teams such as Manchester United, Arsenal, the England and South African Rugby squads and many of the major American basketball and ice hockey teams. In fact, as with individuals, they sponsor or make kit for just about every sport imaginable, from socks to sunglasses, from trainers to t-shirts, on every continent. This method of marketing is, on the whole, very successful (if a tad expensive). However if a sportsman, woman or team that Nike sponsor performs poorly then it can all go horribly wrong, reflecting badly on Nikes company image. Nikes reputation is usually one of the highest quality and latest technology, being the best of the best, but all it take is a couple of high-profile slip-ups for this outstanding public image to be destroyed. When Tiger Woods emerged as one of the worlds brightest young stars Nike were quick to pay him huge amounts of money, and within months he was seen wearing Nike t-shirts, caps, sunglasses, jumpers, trousers, socks, golf-shoes, probably even underwear, while in the public eye. The man was a walking swoosh, and he was even playing with Nike golf clubs. Nike isnt seen as a classic golf club brand, like Titelist or Slazenger, but it pinned its hopes or Tiger Woods raising the reputation. Unfortunately for Nike, since he started playing with their clubs he h asnt won a single thing, and after a big tournament publicly destroyed his set of clubs. Whether it was Nikes clubs or Woods form that failed, it still reflected badly on Nike, so although Nikes form of marketing and advertising can work exceedingly well, it can also have some major drawbacks. So who are the major parties affected by Nikes often controversial business strategy? This can effectively be split into 3 groups: Consumers are subject to huge mark up prices, but are aware that they are getting a high quality, world famous product at the forefront of modern technology. They are happy in the fact that by wearing Nike clothes they are in someway closer to there sporting idols, and know that wherever in the world they are going to come across Nike products. They have huge brand confidence in Nike. The consumers are the main player in any business, without them Nike would not exist. Consumers can influence TNCs because they are so necessary to the company, what they require Nike must give them, or risk losing consumer confidence. Workers Many would say workers, especially in the poorer countries, are over worked and underpaid, treated misfairly and taken advantage of. However at the end of the day Nike is providing them with a job that they would otherwise not have, isnt it better to be paid 5p an hour than nothing at all? Unfairness in woman and child labour needs to be addressed, but at the end of the day Nikes strategy has its upsides for the workers, the consumer and the company. The real downside is that by moving production overseas, Nike is taking jobs away from its home country, the USA. There are often huge protests in Oregon by the large numbers of unemployed about the lack of jobs provided by Nike, but the question has to be asked if they really want the jobs or if the people are just so desperate for money that they would do anything. If the people dont really want the jobs, then work rates and quality may not be as high as required. Workers can also influence TNCs. If there are large presences o f keen workers, prepared to work for a fairly low amount of pay, then that could be a major attraction to a TNC. Countries/Governments The LEDCs into which Nike moves production are being assisted greatly by Nikes provision of money and jobs, and as was seen in South Korea and Taiwan, the effects can be colossal, turning them from LEDCs into NICs in a relatively short space of time. They can influence the movement of TNCs by providing grants and opportunities to avoid barriers or tariffs. Conclusions Nike is one of the worlds largest, most successful companies and they have achieved this through a ruthless business strategy, featuring nomadic manufacturing plants and hard-hitting expensive marketing techniques. At the end of the day Nike are prepared to do anything to maximise their sales and their profit margins, and its this hard-nosed, forward facing way of thinking that has worked so well for them.

Monday, November 25, 2019

Eco 100 †Principles of Economics Essay Example

Eco 100 – Principles of Economics Essay Example Eco 100 – Principles of Economics Essay Eco 100 – Principles of Economics Essay Essay Topic: Economics ECO 100 – Principles of Economics Week 9 Articles – The Federal Reserve Federal financial regulation in the United States has evolved through a series of piecemeal responses to developments and crises in the markets. This report provides an overview of current U. S. financial regulation: which agencies are responsible for which institutions and markets, and what kinds of authority they have. United States banking regulation is largely based on a quid pro quo that was adopted in the 1930s in response to widespread bank failures. The government provides deposit insurance, to reduce customers’ incentive to withdraw their funds at the first sign of trouble, and in return the banks accept direct regulation of their operations, including the amount of risk they may incur. Bank regulators can order a stop to â€Å"unsafe and unsound† banking practices and can take prompt corrective action with troubled banks, including closing the institution. There are five federal bank regulators, each supervising different (and often overlapping) sets of depository institutions. Reference: http://bespacific. com/mt/archives/020771. html Moral hazard occurs when one side of an economic relationship takes undesirable or costly actions that the other side of the relationship cannot observe. 1 Adverse-selection problem is a situation in which the uninformed side of the market must choose from an undesirable or adverse selection of goods. Congress created the Federal Reserve System to be a central bank, or a banker’s bank. When it was crated, on of the Fed’s primary jobs was to serve as a lender of last resort. When banks need to borrow money during a financial crisis, they can turn to the central bank as â€Å"a last resort† for these funds. Reference: Textbook Principles of Economics The real key to what was going on is revealed by the components of the monetary base. It consists of reserves held by the banks and other depositories, either in their accounts at the Fed or as vault cash, plus currency in circulation among the general public. The annual growth rate of the monetary base, the magnitude over which the Fed has the most control, fell from 10% in 2001 to below 5% in 2006. Nearly all of the growth in the monetary base went into currency, an increasing proportion of which is held aboard. The Fed controls overnight interest rates, but not â€Å"long-term interest rates and the home-mortgage rates drove by them†; and a global excess of savings was â€Å"the presumptive cause of the world-wide decline in long-term rates. The Fed only determines the overnight, federal-funds rate, but movements in that rate substantially influence the rates on such mortgages. 2 Maturity-mismatches abounded and were the source of much of the current financial stress. Short-dated commercial paper funded investment banks and other entitles dealing in mortgage-backed securities. Global savings and investment as a share of world GDP have been declining since the 1970s. Reference: http://vizedhtmlcontent. next. ecollege. com/(NEXT(1 e41df9156)/Main/CourseMode/Vized

Thursday, November 21, 2019

Different Types of Chronic Bronchitis Essay Example | Topics and Well Written Essays - 1250 words

Different Types of Chronic Bronchitis - Essay Example Chronic bronchitis can easily be prevented by not smoking and avoiding second-hand smoke, as well as pollutants such as too much dust. Many argue that the recurrent incidences of acute bronchitis can most definitely lead to the development of chronic bronchitis. Methods of treatment include the use of steroids and bronchodilators, as well as PDE4 inhibitors. Alternative treatments include antibiotics, pulmonary rehabilitation, supplemental oxygen therapy, home remedies and over-the-counter cough suppressants.   According to the Marshall Cavendish Corporation, â€Å"bronchitis is an inflammation of the bronchi, the main airways in the lungs† (2008, p. 128). Bronchitis can be acute or chronic. Chronic bronchitis is one of the major forms of COPD (Chronic Obstructive Pulmonary Disease). It is more serious than acute bronchitis. According to Arcangelo and Peterson (2006) â€Å"chronic bronchitis is a productive cough and sputum production for 3 months per year for at least 2 years, and an acute exacerbation of chronic bronchitis is defined as worsening of respiratory symptoms such as a cough, sputum, and dyspnea† (p. 327).   Arcangelo and Peterson (2006) add that chronic bronchitis may be caused by a number of abnormalities of the bronchial mucosa. Chronic bronchitis patients are vulnerable to respiratory infections. This is due to the irritating substances they inhale and due to the fact that the substances are chronic, they lead to impaired mucociliary clearance. As nonciliated metaplastic cells replace ciliated epithelium and the mucous secreting goblet cells become proliferated, the result is impaired mucociliary clearance (Arcangelo & Peterson, 2006).

Wednesday, November 20, 2019

Sexual studies biology assignment 1 Essay Example | Topics and Well Written Essays - 1250 words

Sexual studies biology assignment 1 - Essay Example Hormonal changes The menstrual cycle is determined by the functioning of four organs namely; the hypothalamus, the anterior pituitary gland, the uterus and the ovaries. It consists of phases identified as the follicular, ovarian and luteal. The beginning of the cycle is marked by a decrease in estrogen and progesterone levels. These are primary female hormones. This decrease stimulates the hypothalamus to produce Follicle Stimulating Hormone Release Factor (FSHRF). The FSHRF triggers the anterior pituitary gland to produce Follicle Stimulating Hormone (FSH). FSH is responsible for the release of estrogen in the ovaries which leads to the formation of the Graafian follicles in the cortex of the ovaries. These follicles are cells which cannot be fertilized. Increasing levels of estrogen cause the growth of uterine wall in preparation for possible implantation of the fetus after fertilization. This marks the follicular phase (Ferin, Jewelewicz, and Warren 5). The ovarian phase begins wi th the production of Luteinizing Hormone Releasing Factor (LHRF). This is initiated by the hypothalamus in response to low progesterone levels. LHRF then activates the production of Luteinizing hormone in the anterior pituitary gland. This hormone causes the production of progesterone from the ovaries. ... The luteal phase is characterized by the change of color to yellow of Graafian follicles to form the corpus luteam. The hormone progesterone also called the hormone of pregnancy is identified as responsible for this. The hormone further leads to the thickening of the uterus lining and increased blood supply in readiness for possible fertilization. If fertilization does not occur, progesterone levels start to drop. This decrease and eventual decline causes the shedding of the uterine wall, tearing of blood vessels and ejection of the contents through the vaginal tract. This is menstruation and marks the end of the cycle. The low levels of progesterone and estrogen effectively stimulate the hypothalamus to begin the next cycle (Ferin, Jewelewicz, and Warren 10). Fertile period of the cycle The period of the menstrual cycle when fertilization is most likely is identified as mid way through the cycle. A female whose cycle takes twenty eight days for example would be fertile on the fourte enth day. This is when ovulation takes place. The fertile egg (ovum) has a lifespan of twenty four hours and the fertile period lasts as much. The male sperm however has a longer lifespan of three to five days once released into the female. This means sperms released three to five days before ovulation can fertilize the egg. The twenty four hours immediately after ovulation however remains the most fertile period (Edin, Golanty, and Brown 170). Physical and emotional changes during cycle The hormonal variations during the cycle are identified as the cause of physical and emotional changes over the period. Studies show that contraction of the uterus (cramps) is inevitable. Lower back pain, fatigue and pelvic

Monday, November 18, 2019

Guilds Contribution in the Feudal Society Research Paper

Guilds Contribution in the Feudal Society - Research Paper Example In general, a feudal society incorporated the obligations of the clergy, the nobility, and the peasantry who were governed by manorialism system. Various discussions have revolved around historians based on the role it played in the formation of the medieval society (Heilbroner & Milberg, 2012). This paper will explore the functions, roles, and rationale for the guild in the feudal society to determine whether it can be considered a precursor to industrial manufacturing and as a basis for capital accumulation. In the feudal society, some of the greatest contributors in the system were the guilds. The guilds played a vital role in the political and social structure of the feudal society. They were considered a vital element during the middle ages. The feudal system encouraged individuals to become members of the guild since membership to the group would help them acquire a higher social position in the society. Individuals who became guild members realized several benefits unlike in the case of those who were not. Every guild either served as a type of merchant or crafts guild. The term guild originated from the word ‘gilden,’ which meant ‘paying.’ The guild members subscribed to their particular guilds in order to be considered active in the groups (Heilbroner & Milberg, 2012). The feudal society became dominant in Europe when the Roman Empire collapsed. The knights, barons as well as other nobility members taxed and took rent from peasants and serfs in their jurisdiction. To help them avoid excessive taxation, as well as avoid the various forms of tyrannical situations they were subjected to, ordinary men deemed it necessary to gather and give their opinions together since no individual had sufficient power to oppose the feudalistic system (Heilbroner & Milberg, 2012).

Saturday, November 16, 2019

A Diagram For Railway Management Systems

A Diagram For Railway Management Systems Summary: I have prepared use case diagram for the given scenario. Along with the use case diagram, I have prepared specification for individual use cases. Besides, I have prepared an activity diagram. (a) Class Diagram -Staff ID Staff +Create new staff -Staff Name +Delete existing staff +Update staff Clerical Assistant -Clerical Assistant ID -Clerical Assistant Name Clerical Assistant Contacts -Join Date + Print address label +Record customer details +Print ticket and sale ticket Station Master -Station Master ID -Station Master Name -Station Master Contacts -Join Date + Provide hand to hand ticket +Record ticket type details Rail way manager -Manager ID -Manager Name -Manager Contacts -Join Date + Record time details +Record engine details Ticket Booking -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Customers -Customer ID -Customer Name -Customers contacts + Give Tickets + Give requirements + Get booking Booking via mail -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Booking over telephone -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Booking In person -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Figure 2.1: Class Diagram (b) Attributes and methods: Class Name: Staff. Attributes: Staff ID Staff Name Method: Create new staff() Delete Existing Staff() Update existing Staff() Class Name: Railway manager Attribute: Manager ID Manager Name Manager Contacts Join date Operations: Record time details() Record engine details() Class name: Station Master Attribute: Station master ID Station master Name Station master contacts. Join date Operations: Provide hand to hand tickets() Record ticket type details() Class name: Clerical Assistant Attribute: Clerical Assistant ID Clerical Assistant Name Clerical Assistant contacts. Join date Operations: Print address labels() Record customer details() Print and sales ticket () Class name: Customer Attribute: Customer ID Customer Name Customer contacts. Operations: Give tickets() Give requirements() Get booking() Class name: Ticket Booking Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking in person Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking over telephone Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking via mail. Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Summary: I have prepared a class diagram and described the attributes and methods for each of the classes. Task 3 Introduction: In this task, I have to prepare three different diagrams based on analyzing the system. These three diagrams will be behavioral models using object oriented method. Sequence diagram: A sequence diagram is a model showing sequences of events and interactions that happen within several layers and persons within the system. In need of behavioral modeling, sequence diagram helps to understand relevant behavior of the potential system. Following diagram shows the sequential diagram for the suggested system. Sequence Diagram Customers Staffs Ticket Booking Request for ticket booking Check Booking Info Check customer info Request customer details Give customer detail Choose ticket Confirm ticket booking Figure 3.1: Sequence diagram State Machine: State machine is close to activity diagram. Whereas in activity diagram, interactions are displayed, here the state of the different layers of the system is displayed. Following diagrams demonstrates state machine diagrams for ticket processing and providing it to customers hand to hand, to address or via mail. Requesting ticket booking Checking ticket availability Ticket not available Cancel Provide ticket information Make choice of ticket Ticket not chosen Confirm ticket booking Cancel Print ticket Provide ticket to customer Figure 3.2: State Machine Diagram Communication Diagrams: 2. Select customers () 2.1. Show customers () 3. Select Ticket Availability () 3.1. Show ticket availability () 4. Choose ticket () 4.1. Show ticket () 1. Start UI {} : Ticket booking : Ticket booking 3.2 Get ticket information ()Staff 4.2 confirm ticket booking 2.2 Get customers details () : Ticket booking : Customers Figure 3.3: Communication Diagram Summary: I have prepared three different diagrams representing behavioral modeling of the proposed system. Task 4 Introduction: In this task, I have to demonstrate the data protection laws available in the locality. Besides, I have to describe how they can be implemented. This discussion has to be practical enough in contrast with the real scenario. Some words on data protection laws: Data protection laws deal with the intellectual property of any organization. In a general sense, this talks about how the intellectual property should be protected and what will be happened if the data is damaged. And if it is deliberate, then what procedure will be used to prevent any further approach. Data protection laws in a sense is a vital approach that establishes promise to protect any companys intellectual property. (a) Our countries scenario with data protection laws: Unfortunately, in our country there are no governmental data protection laws available. Since protecting intellectual property is the major thing for any organization, organizations use their own protocol for protecting data. Big IT dependent companies across the country have their individual data protection laws. Following sections cover data protection management available in our country- Accessibility Restriction: Accessibility within a particular system area is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior knowledge on any advance part of a system can cause damage to it even though unintentionally. Within the area of confidential data sources, not everyone should be allowed to access. User Authentication: After ensuring minimal user restriction, establishing user authentication allows the system to be protected from unauthorized activity. A system is bound within limit; users are bound with limits of usage or activities, which lead into the necessity of user authentication. Distribution of level: This is another major approach by which it is ensured that there are multiple levels of the system within which multiple levels of users are allowed to do activity. System Security: System must be protected both physically and logically. Tickets room must be preserved from free access. Data stored should be encrypted. Disk partitions usage should be restricted to bare minimal. (b) Implementation of protection laws against the railways system: The computer system being developed can be secured by implementing one of the above-mentioned ways. Following points cover some of the ways that would be sufficient for the railway: The most usable way is user authentication method. To access the system, user has to enter the username and password. The password should match length and complexity requirements. This authentication procedure can protect the system from any unauthorized access of the system. Different level of authentication can be implied. While somebody is trying to breach the system, he may find one of the passwords, but not likely will get all to breach all the data. Level of accessibility is another approach highly effective for the new system. Administrator will have the full access when other will have limited access within their usage limitation. (c) Ensuring data protection in the current system: Testing: Testing all the security procedure potentially available and planned for the current system. Validation: Validation procedures would be set for the system. When users will try to enter the system with passwords and usernames, system will check for validity and permission limitation. Encryption: System will have the capability to encrypt potential sensitive data. This will protect data from being unveiled to a wrong hand. Summary: I have gathered information on security and protection laws and application of the laws with the current system. Possible details of methods that can be implemented for the current system are also given. Task 5 Introduction: In this task, I have to demonstrate the systems capability of preparing tickets. Along with preparing tickets, I also have to describe that how the system will be able to prepare tickets that cannot be copied easily and will be easy to print with cost effective printing medium. Besides, I also need to describe the hardware related with printing by researching available options. New system will mainly deal with the tickets. Preparing tickets is one of the major jobs with protection features from being copied. Following section demonstrates some methods by which tickets cant be copied- Copy prevention methods: In each ticket, ticket creator will give a 12 digit number as a barcode. Each time tickets barcode will be checked by checker software or barcode scanner. Ticket must not be printed on any typical paper. Each ticket will be printed on specialized printing paper that is not likely to be copied or available. Each ticket will carry individual customers identification along with the seat number. Every detail must be unique within all the tickets. Practically watermarks are given with conventional software. So, specialized watermark should be printed on the ticket. Specialized hologram is another way to protect ticket from being copied. Allowing customers to select multiple tickets of different types: There are several procedures here to allow customers to make choice from different types of ticket. In person: When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically look through available tickets and make choice that suits them the most. Via telephone: When a client will get connected through a telephone, then clerical assistant will provide with enough information. When customers will ask clerical assistant for ticket booking, assistant will provide available options after knowing the destination of the customers. Via email: When customers will request for a ticket via email, clerical assistant will record the email. Then he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed. Printing hardware and media details: For printing the tickets, several system components will be necessary. Printers, printing servers, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets. Details of suggested conventional product for printing Device Vendor Price ($) Computer HP 500 Ticket Printer HP 150 Computer maintenance 250 Application software Atlas developer ltd. 250 Power Supply 200 Printing Server 1000 Figure 5.1: Hardware details Brief details of some components: Application Software: Application software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass market software, its better to have one specifically made for specific purpose. This will also be a better option for security issue Ticket printers: Rather than installing general purpose printers, ticket printers are suggested to be used. Ticket printers are specially made for printing tickets. Following image shows a typical ticket printer- Figure 5.2: Ticket Printer Printing Server: Printing server is a typical server installed for printing purposes. This server is established by computers. Summary: I have demonstrated several issues on printing and printing media for ticket serving purposes. I have also discussed about the hardware that could be set to establish system for printing those tickets. Task 6 Introduction: In this task, I have to prepare several normalized table with relevant information within different levels. After completing normalization tables, I have to prepare data dictionary entries for all items included in the database design. Task 6 (a) Ticket booking normalization: Normalization refers to dividing a database into several tables to determine their relationship among each other. Data Aggregation: Serial No. Booking Type Customer ID Customer Name Customer Address Date Staff Type Staff ID Staff Name Seat No. Total. 2. Choosing key: Serial No. 3. Converting to 1NF (Removing repeating data): Serial No (PK) Booking name Booking type Customer Id Customer name Customer address Date Staff type Staff Id Staff name 4. Converting to 2NF (Removing Partial Key Dependency): Serial No (PK) Booking name Booking type Customer Id Customer name Customer address Date Staff type Staff Id Staff name 5. Converting to 3NF (Removing non-key dependency): Ticket Booking Serial No (PK) Booking name Booking type Customers: Customer Id Customer name Customer address Date Staff Staff type Staff Id Staff name Task 6 (b) Data Dictionary for Customer: Data dictionary Railway System: S5D Type: structure Name: customer Alias : Client Definition: Customer= customer Id+ customer name+ Customer contacts+ Occurrence: Picture: Author: Rajan Khan Date 10.2.2011 Figure: Data dictionary for customers. 2. Data dictionary for staff Data dictionary Railway System: S5C Type: structure Name: Staff Alias : employee Definition: Staff: Staff Id+ Staff name+ Staff Contacts Occurrence: Picture: Author: Rajan Khan Date 10.2.2011 Figure: Data Dictionary for Staff 3. Data dictionary for ticket booking. Data dictionary Academic theater System: S8c Type: structure Name: Ticket Booking Alias Ticket Booking Definition: Ticket booking : Ticket serial No+ Ticket Booking date+ Ticket Booking rate+ Occurrence: Picture: Author Rajan Khan Date 10.2.2011 Figure: Data Dictionary for ticket booking Summary: I have completed normalized data tables and dictionary entries for all the items that will be included in the database. Task 7 Introduction: In this task, I have to remark the objected oriented methodology for designing system or developing system. Besides, I have to relate my remarks with the system design that I have done for the previous tasks. Then, along with describing object oriented methods, I also have to remark structured methods. Differentiation between both methods: For Task 1: Object Oriented: For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. Structured: As per the requirements stated in structured diagram, DFD (Data Flow Diagram) could solve the problems of task 1. For task 2: Object Oriented: Since object oriented methods are practically dependent on object-class architecture, here class diagram is used. Structured: In structured methodology, ERD (Entity Relationship Diagram) is used. For task 3: Object Oriented: Here the sequence and communication diagram are used. Structured: Here the ELH (Entity Life History) would be used. Object Oriented Methods: Advantage: System can be very large. In object oriented method, modularization divides whole system into several manageable smaller parts or objects. In that way, when parts are developed, they can be synchronized to make the whole system working. Object oriented applications are more scalable than the structured tools. With looking at the modules of the system, it is possible to make an overview on how the system is going to be. Disadvantage: Legacy Systems are built in structured programming languages. So when it is necessary to convert those systems, it becomes a tough job. Object Oriented Database Management Systems are not available. Since there are many choices with object oriented methodology, sometimes unexpected confusion can rise. Structured Methods: Advantage: In structured programming, system requirements are defined much before programming starts. With proceed of development, amount of necessary changes starts to decrease. Disadvantages: Every detail should be planned and structured. Without any direct link, its impossible to go in a random manner, unlike the object oriented. Overview of a system before it is developed is not likely to be available. Summary: I have remarked advantages and disadvantages of both the structured and object oriented methodology. Besides, I have remarked the application of both the methodology with task 1 to task 3. Task 8 Introduction: In this task, I have to produce a comprehensive report with detailing all the tasks that I have completed. Then I will have to make an appendix reviewing my works. Executive Summary Preparing functional modeling: This includes two diagram and one specification details for one of the diagrams. Use case diagram (With Specification) Activity Diagram. Structural Modeling: Class Diagrams. Detailed attribute and operations. Behavioral Modeling: Sequence diagram State machines Communication Diagrams. Data Protection issues: Available data protection laws. Implementation of the issues with the system. Safe ticket management: How to create safe tickets. How the customers will be able to select multiple choices. What hardware will be used to print the tickets? Relational database designing: Creating normalized tables. Creating data dictionary. Evaluating object oriented method: Advantage and disadvantages of object oriented methods. Contrasting with structured method. Report Within all the phases of the tasks, several designing and evaluating have been done. In this report, all of them will be included for a better demonstration. Following section covers comprehensive details of task 1-7 respectively. Task 1: Functional Modeling Use case diagram for railway management system: Use case diagrams are useful to understand the system from the viewpoint of user. In this part there are three objects. There are customers, clerical assistant and ticket booking. Customers request for the ticket booking then clerical assistant check ticket information and clerical assistant get booking information. Clerical assistant request to customer their information then customer give details information and customer choose ticket set. At a last customer confirm ticket booking to clerical assistants. Several use case diagrams could be set into the scenario. But one compact use case diagram is used to cover potential features of the system rather than creating multiple diagrams. This has saved a lot of time. Activity Diagram for Railway Management System: Railway managements potential activities are shown in this diagram. Railway manager will record the time information and hauling engine information, station master will sale ticket hand to hand and clerical assistant will serve through mail or telephone- everything is covered in this activity diagram. Task 2: Structural Modeling Class Diagrams: Several classes can be found from the proposed system. Class diagrams are drawn based upon those classes found from the railway management systems scenario. These classes include attribute and operations details within each of the class. Task 3: Behavioral Model Sequence Diagram: This diagram outlines the sequential presentation of occurrence within the system. By the help of this diagram, expected behavior of the system can be understood. Comprehensive presentation of all the persons interacting with the system in a flow based order; this really helps to understand the system State machine diagram: This diagram demonstrates the states of the processes. From recording time details to processing ticket booking, every state is defined in this diagram. This clearly shows the end of activity. Communication Diagram: In this top order diagram, only the main operation and interacting persons are displayed in a comprehensive and technical way. Task 4: Data Protection Issues Our countries scenario: Big IT dependent companies across the country have their individual data protection laws. Accessibility Restriction: Accessibility within a particular system area is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior knowledge on any advance part of a system can cause damage to it even though unintentionally. Within the area of confidential data sources, not everyone should be allowed to access. User Authentication: After ensuring minimal user restriction, establishing user authentication allows the system to be protected from unauthorized activity. A system is bound within limit; users are bound with limits of usage or activities, which lead into the necessity of user authentication. Distribution of level: This is another major approach by which it is ensured that there are multiple levels of the system within which multiple levels of users are allowed to do activity. System Security: System must be protected both physically and logically. Tickets room must be preserved from free access. Data stored should be encrypted. Disk partitions usage should be restricted to bare minimal. (b) Implementation of protection laws against the railways system: The computer system being developed can be secured by implementing one of the above-mentioned ways. Following points cover some of the ways that would be sufficient for the railway: The most usable way is user authentication method. To access the system, user has to enter the username and password. The password should match length and complexity requirements. This authentication procedure can protect the system from any unauthorized access of the system. Different level of authentication can be implied. While somebody is trying to breach the system, he may find one of the passwords, but not likely will get all to breach all the data. (c) Ensuring data protection in the current system: Testing: Testing all the security procedure potentially available and planned for the current system. Validation: Validation procedures would be set for the system. When users will try to enter the system with passwords and usernames, system will check for validity and permission limitation. Encryption: System will have the capability to encrypt potential sensitive data. This will protect data from being unveiled to a wrong hand. Task 5: Evaluating ticket processing procedure Copy prevention methods: In each ticket, ticket creator will give a 12 digit number as a barcode. Each time tickets barcode will be checked by checker software or barcode scanner. Ticket must not be printed on any typical paper. Each ticket will be printed on specialized printing paper that is not likely to be copied or available. Each ticket will carry individual customers identification along with the seat number. Every detail must be unique within all the tickets. Practically watermarks are given with conventional software. So, specialized watermark should be printed on the ticket. Specialized hologram is another way to protect ticket from being copied. Allowing customers to select multiple tickets of different types: There are several procedures here to allow customers to make choice from different types of ticket. When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically look through available tickets and make choice that suits them the most. When a client will get connected through a telephone, then clerical assistant will provide with enough information. When customers will ask clerical assistant for ticket booking, assistant will provide available options after knowing the destination of the customers. When customers will request for a ticket via email, clerical assistant will record the email. Then he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed. Printing hardware and media details: For printing the tickets, several system components will be necessary. Printers, printing servers, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets. Device Vendor Price ($) Computer HP 500 Ticket Printer HP 150 Computer maintenance 250 Application software Atlas developer ltd. 250 Power Supply 200 Printing Server 1000 Brief details of some components: Application software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass market software, its better to have one specifically made for specific purpose. This will also be a better option for security issue Rather than installing general purpose printers, ticket printers are suggested to be used. Ticket printers are specially made for printing tickets. Task 6: Normalization and data dictionary Normalization: Here database is scattered into several tables to determine relationships within each of them. Data Dictionary: Data dictionary is build with entries from all the items that will be included in the database. Task 7: Evaluating Object Oriented Methodology Differentiation between both methods: For Task 1: For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. As per the requirements stated in structured diagram, DFD (Data Flow Diagram) could solve the problems of task 1. For task 2: Since object oriented methods are practically dependent on object-class architecture, here class diagram is used. Structured: In structured methodology, ERD (Entity Relationship Diagram) is used. For task 3: Here the sequence and communication diagram are used. Here the ELH (Entity Life History) would be used. Object Oriented Methods: Advantage: System can be very large. In object oriented method, modularization divides whole

Wednesday, November 13, 2019

Crime in America Essay -- essays research papers

Parole (early release from prison) is often referred to as the back door to the US corrections system. The concept of parole dates back to the establishment of the Elmira Reformatory. The goal of the Elmira Reformatory was to rehabilitate and reform the criminal instead of following the traditional method of silence, obedience, and labor. Parole was originally set up to encourage prisoners to do well, keep their noses clean, and become model prisoners. Once a prisoner had shown rehabilitation and reform they were released prior to the execution of their full sentence. Before a prisoner can be released on parole he/she must meet before a parole board. Each prison with a parole system is set up with one of two types of parole services. Service one is the independent model. Like its name says it is independent, independent from any other state agency. Meaning that it’s parole officers do not work for the corrections system. This enables them to be more bias and fair with their decisions. Service two is the consolidated model. This model is ran by the corrections system and is under the direction of the commissioner of corrections. The consolidated model does not give its members the ability to be bias. They have to bite their tongues in some instances as to not ruffle the feathers of those appointed over them. No matter which model is in place if not used correctly it is a failure. In most states the members of the parole board are appointed by the governor and serve a term of...

Monday, November 11, 2019

Convenience Store and Freedom Writers Assignment Essay

The character I’ve chosen is Eva Benitez , is a 18 year teenage Mexican American girl short wave hair , tan skin wears red lipstick and hoop earrings has that tomboyish look . Life changes during her childhood. The first day of school for Eva she was waiting for her dad to take her to school , when it turn out to be the day she saw a friend die right in front of her eyes . Eva’s dad got arrested for the death of Roberto that was a crime he didn’t commit . A while after the situation with her dad she had an initiation to join a gang and be part of what they called â€Å"familia†. Then after that she fighted for her life , but in the inside she was scared and terrified of what could of happened. One night Eva and girl named Sindy go to a convenience store , when all of a student a drive by happens , it was Eva’s boyfriend Paco intending to kill a student named Grant rice . Accidently misses killing Sindy ’s boyfriend . Eva has to testify in court what happened since she was the only witness . During time passes and she goes to school and learns that there is still hope and decides what to do if right or wrong. Eva goes through a lot , trying to figure what to do ether protect her own skin or save a person that didn’t commit a crime . Eva is a girl who has taken a lot of abuse over the years , and has a rough life , she repeatedly goes through violence everyday to get what she needs , whether that is simply going to school or going into a convenient store. She sorts out her problems with anger and hate she’s a very strong , pretty , independent , scared , confused teenaged Mexican American girl.

Friday, November 8, 2019

Analytical Essay Sample on Suicide in #8220;Thirteen Reasons Why#8221; Book Vs. Film

Analytical Essay Sample on Suicide in #8220;Thirteen Reasons Why#8221; Book Vs. Film Analytics implies the ability to reason and search for logical truth, proving theories and assumptions with the help of valid and relevant arguments. As a rule, the object of an analytical essay is an in-depth analysis of a certain problem of opinion, which is based on a specific fact. This type of paper is often used to consider a literary work or film where it is necessary to evaluate the arguments of the author or the main idea of the text, giving worthy evidence. It is necessary to draw up a work plan and break it into interrelated paragraphs, which will create a complete understanding and appreciation of a literary work or another fact. An analytical essay is a laborious and deep work that requires the utmost care and knowledge of the topic or question. ‘The Thirteen Reasons Why’ Essay Sample The topic of suicide is becoming an acute problem in the modern world, and its victims are teenagers who cannot live with moral trauma and constant pressure from the outside world. The book â€Å"The Thirteen Reasons Why† written by Jay Asher reveals the topic of suicide and shows its consequences. The victim in this story is a girl named Hannah, who took her life by recording 13 tapes on which she told the story of her life and the people who are guilty of her death. The book describes the cruel events in the life of Hannah, which can often cause a significant amount of negative emotions among the readers. The main idea of the author of the book is to show that suicide is not a way out of difficult situations, and such selfish action destroys the lives of other people, bringing them serious moral trauma. In 2017, Netflix filmed a series on this book, which quickly became one of the most popular among teenagers. Moreover, the organizers have created a website to support people with injuries who can share their stories and reduce the level of despair, which can save them from rash decisions. However, â€Å"The Thirteen Reasons Why† is a tragic story that can be considered romantic by the audience, which can harm the primary goal of the author and contribute to the continuation of the theme of suicide. The romantic line in the book is its central part, and the readers or the viewers can forget the main idea of the story, focusing on the development of relations between the characters. Adolescence is characterized by heightened sensitivity and the search for real love, and this theme is the main one for them, and suicide intensifies the manifestation of love feelings and sufferings of the main character, whose name is Clay. He is forced to listen to all the stories of Hannah, which he madly loved but could not confess these feelings. Every day he heard her voice on the recordings and represented her standing next to him, which certainly is romantic and gentle to the public. Moreover, the love line is also seen in other heroes who were Hannah’s friends and influenced her decision to commit suicide. The series reveals more details and describes the life of each story participant, making â€Å"The Thirteen Reasons Why† more vital and aimed at a younger audience. The book also describes love, but not to the same extent as the series does, dipping the public not only into the consequences of suicide but also into a close relationship between the characters. The directors sought to create a film that would be acceptable to most of the population, and romance has a significant role in the perception of the entire plot and the search for morality. Each chapter and tape was accompanied not only by the story of Hannah but also by her relationship with Clay, who worked with her at the same place. Their relationship was not fully disclosed, which is a frequent topic of discussion and fantasy of adolescents. Her suicide broke Clays heart, but the tapes created the illusion of her presence, which allows readers to understand Hannah’s thoughts and not take death as something real and severe. The characters are romanticized, and their behavior does not correspond to reality, which also contributes to a wrong perception of the story. An example of this fact is Clay, who is a closed, modest, and kind-hearted person who always defends justice. His actions are contradictory because he loves Hannah, but he continually ignores her requests for help and attempts to have a closer relationship. However, after her death, Clay suffers constant suffering and drives aimlessly through the night streets of the city, listening to her tapes and seeing her silhouette. In addition to Clay, such characters as Alex and Jessica, who appear to be Hannas friends, set her up in different situations, but after her suicide, they change their behavior and experience a deep depression, which leads to Alexs death. It is necessary to understand that the real world is crueler, and people do not regret their actions for a long time. However, Hannah accused them of her death, which is sufficient punishmen t and proves that death can restore a certain justice, contrary to the motives of the author. The story ends with the realization of all the mistakes of people who were guilty of the death of a girl, which also cannot be carried out in the real world, giving readers and viewers hope for justice. The musical accompaniment in the series contributes to deeper penetration into the plot and atmosphere, which creates additional interest among the viewers. Each cruel or tragic scene is filled with sad songs that can influence the mood of the public, causing people to be depressed and have negative thoughts. Despite the fact that such events are revealed in the book and the series is serious enough and do not intend to cause a positive reaction, teens get some pleasure from them and want to watch the next series and read other chapters. Such a tragic story delays as it is vividly described and well taken down and every impressionable person unwittingly thinks about life, death, justice, trust, and friendship. The real world is much more positive, but after realizing this story, people may not notice all the benefits and opportunities, which is also the negative side of â€Å"The Thirteen Reasons Why.† One of the main factors that contradict the author’s good intentions is the end of the book and the film. The story is based on the desire of its heroes to restore justice, and suicide is one of the ways to achieve the goal. Cassette recording is Hannah’s revenge for a broken life, and this action leads to a positive result, where the characters begin to understand their mistakes and start to change their lifestyle for the better, becoming more conscious people. This result automatically leads the public to the idea that Hannah’s death was decent, and the girl was able to reach the hearts of many people, showing them the other side of life. Moreover, Hannah’s decision to kill herself has many explanations, and this fact may justify its action, which contradicts the book’s main morality. The author wants Hannah to be an example of the fact that suicide is not the solution to all problems. However, in her case, all her schemes and thoughts led only to this thought, and her plan was successful. The cassettes helped all participants understand their mistakes and behavior, which always has consequences. Both the book and the series show the problem of misunderstanding of parents and their children as well as the indifference of teachers, the cruelty of students. Such an atmosphere can lead to the fact that the young public will begin to delve more deeply into the problems of the heroes. Every reader and viewer can find issues that are especially close to him or her, increasing the risk of being prone to depression. An important aspect is the fact that the scene of a suicide in the series is also romanticized, and it does not disgust the audience despite the beliefs of the creators of the series. It can be seen that Hannah was able to open the veins the first time, and many people might think that this action is simple and fast. This aspect is not obvious, but it can affect peoples minds, creating stereotypes about suicide and its consequences. Thus, analyzing all the factors, it is possible to say that the book â€Å"The Thirteen Reasons Why† written by Jay Asher as a TV series can negatively influence the young public, instilling people with a false idea of suicide. Despite all the attempts of the author to create a tragic story that will carry a deep morality to readers, his work has gained popularity, where teens romanticize a significant number of events and do not consider suicide as an immoral and selfish act. On the one hand, Hannah’s suicide led to the suffering of a significant number of people, the main victims of which were her parents and people who did not want to harm her. Her death and tapes led to the suffering of many heroes who did not think about their actions. The book shows that every action has its price and consequences, and each person has a different reaction to jokes and insults. However, from the reverse aspect, it is possible to notice that each character in the book and the series is romanticized, and their behavior often does not correspond to reality, misleading the younger generation. Moreover, the suicide of the main character was part of her revenge, and her actions helped to restore justice, which proves to the public that death can be the solution to the problems. Therefore, â€Å"The Thirteen Reasons Why† has a significant amount of hidden aspects that contradict the author’s motives and may be misunderstood by a young audience. Post-writing Tips We hope that this example of an analytical essay will help you write the quality paper that will display a clear idea of how an analytical essay sample looks like. With this analytical essay example, you’ll see that such work should analyze an unobvious fact using a significant number of arguments. The topic of this paper may be provocative, but it displays a detailed analysis of the thesis, where each paragraph proves the main idea. Thus, an analytical essay is the type of research where you should analyze and consider every element of a book, film, or other work.

Wednesday, November 6, 2019

Evolution of Civil War Weapons essays

Evolution of Civil War Weapons essays The American Civil War brought many changes, especially in weaponry. On the battle field, officers sought to improve warfare strategies. At home, politicians attempted to reshape the political view of the war. Finally, in the industries, engineers worked to improve the performance and cost of the weapons they wished to sell to their respective government. Weapon changes occurred in two basic areas: firearms (also known as small arms, which are anything that can be carried by a soldier), and cannons/projectiles (artillery). Sword and bayonets, though were important, saw little action in the war. The relative importance of sound weaponry resulted in an accelerated evolution of weapons that sparked the dawn of modern warfare. Firearms were perhaps the most basic unit of weaponry used in the civil war. There are five general categories of firearms used in the civil war: musket, smoothbore musket, musket rifle, carbine, and the revolver. Loading and firing these weapons, one of the most important lessons a soldier could learn, consisted of many steps: prepare to load, load, handle, tear and charge cartridge, draw rammer and ram cartridge, prime, shoulder arms, and fire. These firearms were usually implemented in effective groups and were loaded and shot to rhythm of music. In general, 400 men could fire 1,200 LBS per minute until there was no ammunition left. (Museum Experience) Muskets were the most widely used firearm during the Civil War (Bilby, 1). Foremost among these was the Springfield, which was manufactured at the U.S. Armory in Springfield, Massachusetts. By the end of the war, the total production of this single-shot, muzzle-loading musket approached 1.5 million. A musket in good condition was fairly accurate when firing at a block of men, no farther then 100 yards. Alas, in the battlefield, the conditions and effectiveness was far from perfect. The rifle was another significant weapon used in the war. Although the rifl...

Monday, November 4, 2019

Personal ethics inventory Essay Example | Topics and Well Written Essays - 250 words

Personal ethics inventory - Essay Example If one limits these two factors then this world would be uproar of disputes and war. Therefore, prudent choices and tolerance makes us survive and live with each other. My blind spot includes the fact that I cater to my own needs and prioritizes myself over others who are reliant on me, which is true as a person living independently free of responsibilities tends to adapt this behaviour which is commonly seen in the society. Although, my strength, free will enables me to pursue my aims and achieve my objectives as an independent soul. Though, I analyze racial differences and stereotype notions in the light of my experience, but consequently I do tend to incline to the idea which is usually profitable to all, either politically or materially. However, it is not always a fair and just decision. Through this ethnical inventory, I have learnt that intuition and sensibility are vital for reflective process, thus, it enables us to see what lens we use to judge others and simultaneously how others see us through their ethnical

Saturday, November 2, 2019

Examine the ways in which attempts are being made to address the Essay

Examine the ways in which attempts are being made to address the problem of cyber bullying in the criminal justice system of England and Wales - Essay Example There are various criminological theories that have been proposed to help in understanding the mind of the criminal. Some of these theories suggest that the society is to blame for creating criminals while other theories base their arguments on the view that criminals are born and not made. With Face book and Twitter being the most popular social networking sites in the UK, cybercrime is on the increase. In England and Wales, cyber bulling is considered an offence under law. The choice theory helps in explaining the way a criminal’s mind operates in leading him to commit a crime. The bully’s reasoning is thereafter transferred on to the victim who believes whatever the bully says. The insufficient regulation of social networking sites has led to more cases of cybercrime in the UK. Children have committed suicide following the cyber bully’s opinion about the child. This essay seeks to examine how the rational choice theory can help the justice system in England an d Wales against cybercrime. Every victim of crime wonders why people commit crime. Studying criminology helps an individual understand why people commit crime. This helps in understanding how the criminal thinks and come up with ways in how to assimilate the criminal while controlling crime. There are several theories of why people commit crime. Others propose that the individual decides to commit crime consciously while some believe that the community is responsible for crimes committed. With all the varied theories of crime available, an agreement are made that, fairness should be available in any society. In this essay, the rational choice theory will guide in understanding a criminal’s mind and ways of combating crime in England and Wales using this theory. The rational choice theory proposes that an individual chooses to commit crime once the pain and punishment