.

Monday, September 30, 2019

Rice Cake Production

Rice cakes have only two critical ingredients—rice and water. The rice itself needs certain characteristics to produce the best quality cake and limit breakage. Sticky rice, whether white or brown, tends to work best, while long-grain varieties don't expand during cooking as vigorously. Water is important early in preparation. Other ingredients like salt (added before popping or sprayed on after) and various flavorings are important considerations to taste-and nutrition-conscious consumers but are not significant to the production process.Product ConceptEase of production and marketability are major concerns when a new type of rice cake is considered. The popping machines are expensive investments, so the product must be readily adaptable to the machine. Production trials have shown that additives greatly increase the likelihood of breakage, so spices, herbs, and seeds are not mixed with the rice before the cake is made although they may be added to the surface later.Similarly , salt and flavorings are now sprayed on; earlier methods of adding them to the rice were less than successful in the survival rate of whole rice cakes and in taste. Some manufacturers have also eliminated mini rice cakes from their product line. The novelty of the smaller cakes was more costly to produce than sales warranted. A constant stream of new flavor possibilities and other options are under consideration, but only careful assurance of a contented public and minimal production difficulties justifies a new product line.The Manufacturing Process1.The simple process of making rice cakes is based on the fact that rice subjected to the right combination of heat and pressure will expand to fill a given space.The rice cakes are sprayed and packaged.The manufacturer's specifically preferred type of raw rice (depending on stickiness, expansion potential, and taste) is soaked in water until the right moisture level is attained.2.The moist rice is fed into hoppers above popping machine s. A major producer of rice cakes may have 80 or 90 machines with one to three cooking heads, each of which produces one cake every 15 seconds.3.The rice is gravity-fed from the hopper into the  cast-iron mold or cooking head in the popping machine. The mold is heated to hundreds of degrees, and a slide plate opens to impose a vacuum on the moist rice mass. After 8 to 10 seconds of exposure to heat at this pressure, the lid of the mold expands, creating an even greater vacuum on the contents. In the last few seconds of heating, the mixture explodes to fill the given space. If the rice forms a large proportion of the exploded mass, it will be more satisfying, have a better texture, and be full of natural flavor. â€Å"Styrofoam†-or â€Å"hockey puck†-like rice cakes show that either too much air and not enough rice is in the mix (styrofoam) or that the moisturedensity relationship is wrong, causing solidity but no flavor (hockey puck). Given the proper chemistry, the bran and other components of the rice bond to each other so the popped mixture sticks together without gumming additives.4.After the cake has exploded in the popping machine, the cooking head opens and the cake falls gently on a conveyor belt. The belt carries the cake past one or more spraying heads where salt may be added or the cakes are flavor-enhanced. Natural flavors are preferred by consumers and include everything from strawberry, caramel, apple cinnamon, blueberry, and almond to salsa, nacho, taco, salt-only, or Tamari seaweed. Some rice cake manufacturers will accept orders for private-label flavors.5.The conveyor, now carrying flavored cakes, passes through a tunnel dryer where the moisture added by the flavor sprayers is driven off.6.The conveyor moves to the bagging area, where the rice cakes are removed from the conveyor by hand, inspected for any breakage, and stacked, sealed in shrinkwrap, and packaged in an overwrap bag printed with the product identification and se aled. The bags are then packed in cartons for bulk sale.Quality ControlQuality control at the rice cake plant is a labor-intensive process. Any breakage means lost revenue, and maintenance of moisture levels and popping machines are critical. Moisture throughout the process and the factory is monitored constantly. The ambient (naturally occurring) humidity may alter production; on a dry day, more moisture may have to be added to the rice. The finished cakes will absorb moisture, but this is avoided by completing the process from popping machine to bagging in a few minutes.The popping machines themselves are cleaned every few hours. If the molds collect  moisture or rice, the new cake will stick to the mold and become brittle and break. Because the cakes are individually hand-sorted prior to bagging, damaged rice cakes can be discarded before they reach a bag. Once they are ready for sale, the rice cakes have a remarkably long shelf life of over a year during which they retain tast e and texture. If rice cakes have lost their crispness, they can be quickly revived at home by reheating them in a toaster. Even the freshest cakes benefit from a little heat that tends to restore their flavor.Byproducts/WasteThere is essentially no waste in the process of making rice cakes except for breakage. Enterprising producers have created markets for the broken cakes by selling them as cold cereal and ingredients in candy bars as well as bags of broken rice cakes for snacking. Flavors that fall out of fashion are removed from the product line and replaced by new flavors that are in development constantly. Chips, crackers, and other snack foods often provide flavor guidelines for rice cake makers.The FutureIncreasing health consciousness bodes well for the future of rice cakes. As the treat has become popular as a snack, buyers have become more discriminating in rejecting Styrofoam/hockey puck products for those with better textures and flavors. The range of designer flavors offers something for every taste, and, of course, the consumer can top the rice cake of choice with fruit, peanut butter, or other enhancements to make an even more varied snack. In an age of energy, health, and time awareness, the 15-second rice cake seems to have harvested its long history.

Sunday, September 29, 2019

I’M Black You’Re White Who’s Innocent Essay

Summary: This paper is based on an article called â€Å"I’m Black You’re White Who’s innocent† by Shelby Steel. The article takes a position that is against affirmative action because it takes the independence away from people of color. The article â€Å"I’m Black, You’re White, Who’s Innocent?’ is an analysis of the black and white racist situation that America has been facing. It is a claim to the fact that both the groups have created the racist situation. Some whites accept that the racist attitude that enforced slavery was due to the fact that whites in ‘innocence’ felt they were superior to blacks. The pursuit of power-convinced them they were entitled to it. Once convinced it was easy to believed in innocence. Conversely, they were morally secure in their actions which led to centuries of subjugation. Their power was derived from the innocence, and that is why Steele called it ‘innocence is power.’ Thus, racial struggle becomes the struggle of innocence. In the 1960’s more whites began to realized they were not so innocent and so began the loss of power. With that realization there seem to be a transfer of power to black people, as they became the ‘innocents’. Guilt, shame, innocence, and power all became integrated to leaving behind the factor we call racism’. Shelby Steele is an English professor and widely read author who taught at San Jose State University for 20 years before taking a position as a fellow of the Hoover Institution at Stanford University. Steele claims that affirmative action is a double-cross of black Americans and he loathes affirmative action. Affirmative action presents a sense humiliation; a Faustian bargain presented to minorities, for the hypocrisy and shameless self-congratulation it brings out in its white supporters. Steel believes the victimized self-image of blacks, slows individualism, initiative, and diminishes one’s sense of possibility, while contributing to the demoralization of this ethnic group. In many ways Shelby Steele, makes a strong case against affirmative action . One testament of this, according to Steele is the good will of the whites towards the blacks whose effect can’t be seen until years later when it shows to be more harmful than beneficial. In the 1960s, whites were confronted with their racial guilt and blacks for the first time blacks felt empowered. In this stormy time, white absolution and black power coalesced into virtual mandates in the law. In the later 60s and early 70s these mandates escalated from simple anti-discrimination enforcement to social engineering by means of quotas, goals, timetables, set-asides, and other forms of preferential treatment. This shift was due to the white mandate to achieve a new racial innocence and the black mandate to gain power. In my opinion I believe Steel was saying that whites were trying to clear their guilt by repairing the damages from the past by allowing black the appearance of more access to white societies basics rights†¦ such as being able to get a good job , better educa tion and better housing. Conversely, many years later it allowed racism to fester within society causing more harm than good. One example Shelby Steele used was the rate of job advancement. He attributes the differences between black rates of advance and those of other minority groups to white folks’ pampering. Most blacks, Steele claims, make it on their own as voluntary immigrants have done–were they not held back by devitalizing programs that presented a picture of one’s self as as somehow dissimilar to and weaker than other Americans. The claim remains that progress depends upon recognition of black-white sameness. Steele argues, black America has adopted a model of morals in which it preserves the legacy of slavery and segregation in order to keep white America feeling guilty. I completely disagree with that comment because I feel that black people only want those would be oppressors to understand that it has been a struggle and by remembering where we have been will prevent things from going back that way. The oppression of blacks in the United States was the worst case of oppression in human history, and not discounting the American Indian. At the end of such a period, the formerly oppressed get busy building a new nation, and they develop a nation-building ethic. Those ethics value individuals who sacrifice for the good of the group and work hard to develop the talent and skills necessary to close the achievement gaps that naturally exists at first between the liberated groups and their former oppressors. Unlike other historical cases, blacks remain in the same society with their former oppressors. As white America faces past inequalities, they buffer it by making promises to eradicate poverty through large-scale federal programs. Steele does not dismiss the legacy of slavery and persecution, and the economic and social subordination of black people as a responsible force leading to affirmative action in the first place. If anything, he argues that affirmative action, is society’s repayment. Steele argues loudly that over the long run policies based on racial preference serve only to prolong the social and economic disparity between whites and minorities. His position is that blacks will have to lift themselves out of poverty by dint of hard work, perseverance, and patience. Some blacks would disagree with that comment, but I for one believe that is the only way. reveling in self- pity will get you nothing and nowhere fast. In his essay he states that today, most racism exists in the heads of people. They perceive themselves such that they become the perception. A white man sees a black and is immediately reminded of his guilt. The black remembers his innocence and the two combine to form a relationship that is ‘perceived’. Actions are based on imaginary perceptions prolonging the condition. The ‘victimization’ criteria that the blacks are so fond of is not an escape, rather, it is a bargain made that has recuperations that no one ever thought possible. The blacks in their victimization have become slaves to the guilt of the whites and thus, are still oppressed. The bargain they made was a necessary one at the time yet, today it chains the two segments of society in bonds of slavery making the bargain one that Steele calls ‘Faustian’. Seemingly powerful, it actually takes from them the power to be independent. It makes them lack the initiative to aim for something more than that which is handed out by the whites. I’m black, you’re white, who’s innocent? Race and power in an era of blame By Shelby Steele Retrieved June 1, 2012 http://www.harpers.org/archive/1988/06/0023431

Saturday, September 28, 2019

Internal Rate of Return and Slab Casting Essay

1. What have been the sources of Nucor’s competitive advantage so far (namely, up until 1986)? Do you think â€Å"business as usual† is likely to continue generating the same profits for Nucor? Why? 2. What are the technological risks associated with thin-slab casting? (What could go wrong and how bad would it be? You may find the spreadsheet posted with these preparation questions helpful here.) 3. What are the market risks associated with thin-slab casting? (What could go wrong and how bad would it be? You may also find the spreadsheet useful here.) 4. What are the financial risks associated with thin-slab casting? (What could go wrong and how bad would it be? Use the financial information in the case for guidance.) 5. If thin-slab casting works, do you think it is likely to generate a sustainable competitive advantage for Nucor? 6. Should Nucor commit to thin-slab casting? Case Analysis Question Make a recom m endation r egarding w hether Nucor should go forward with the t hin – slab casting project. In developing your recommendation, you should a ddress s everal questions . 1 . First, what have been the foundations of Nucor’s com petitive advantage o ver the past decade? Which of those (if any) are likely to help them succeed in the thin – slab casting venture? 2 . Second, do you think that thin – slab casting will be a source of s ustainable com petitive advantage? In answering this, you must consider two things. a . One, do you think thin – slab casting will be a profitable investment? There is a spreadsheet available for download along w ith this project that will help you m ake an assessm ent. This s preadsheet calculates the internal rate of return (IRR) of the new p roject using cash flow projections. The projections are based on a ssum ptions detailed in the notes below the m ain spr eadsheet. Once you download the spreadsheet, you can exp erim ent with d ifferent values that correspond to different assum ptions regarding Nucor’s strategic concerns. Som e of these m ay have a l arge effect on the value of the project; others may not. Some of the issues raised in the case whose effect you m ay want t o c onsider include scrap prices, tim e to r each f ull capacity, and r esponses by com petitors in the new m arkets Nucor would be e ntering. b . T wo, do you think that the profits obtained by thin – slab casting w ould be sustainable? Why or why not? 3 . T hird, what are t he options that would be opened or close d if Nucor p roceeded with thin – slab casting? Your recom m endation should be based on both your calculations of cash flow projections and also on a m ore qualitative analysis about c om petitive advantage a nd p rofitabi lity, and t he extent to which they w ill be s ustainable (m eaning they cannot be easily im itated by other c om panies, etc.) .

Friday, September 27, 2019

Case Study of Robbery and Burglary Research Paper

Case Study of Robbery and Burglary - Research Paper Example On the other hand, Robert R. Simon was also serving his time in the prison on a death row for three murders. He also boasts of killing his prison inmate in the Pennsylvania State (Peters, 2007).   In September 1999, in the New State Jersey Prison, all the death row inmates had been moved to the recreational pen so that their cells could be fumigated. This was supposed to a brief and silent stay but it turned into one of the most brutal fights in the state history. It is during this short duration, the lives of Ambrose A, Harris and Robert R. Simon intertwined. Both believed to be violent and enemies started to fight. It ended with the death of the fellow inmate Robert R. Simon. Harris is believed to have no mercy. He stamped Simon’s face and then finally jumped off the table in the recreational pen to crush Simon’s skull. The officers in the recreational pen tried unsuccessfully to intervene and stop the fight. This was the first murder inside the prison in the state’s history (Peters, 2007).   A cell inmate, John Martini serving a death row for four murders, testifies that Simon started the fight. He stated that Simon entered the recreational pen after Harris and attacked him from behind (Peterson, 2001). He came in kind of -- not walking, almost running -- and he said, ‘Come on, let us get it on’.2 † The lawyer of the convict, Ambrose Harris, stated that the meeting of the two deadly prisoners was, in fact, a setup of the prison authorities. Harris had been declared dangerous after attacking the prison guard and was supposed to be kept in isolation at all times. The authorities also knew that the two of them were arch enemies and that there will be deadly consequences. He also stated that Robert Simon attacked first and that Harris was only defending himself (Peterson, 2001).   

Thursday, September 26, 2019

An Amplified Terms of Reference Essay Example | Topics and Well Written Essays - 2000 words

An Amplified Terms of Reference - Essay Example The paper evaluates the views in three articles to determine the probable choice for a small private physician. The articles cover the benefits and the challenges facing the implementation of EHRs. Key points covered include the probability of quality healthcare, and patients’ privacy. Evaluation of the articles results reveal that implementation of medical health records would be advantageous to a private physician. 1. Background, Sponsor and Problem AT& T organization is a very busy public hospital whose main business is to offer orthopedic services. Due to the large number of customers visiting the hospital every day, the medical records for all the patients continue to pile, considering that the same medical information is being filed manually. Because of this, the Front Office Receptionist continues to have a hard time each day trying to manually open the different folders carrying patients’ the files. Being as hard as that, it implies that the delivery of the serv ices in the hospital does not occur in a satisfactory manner (Selg & Rihel, 2007). The problem of doing the service delivery manually in the hospital has had far-stretching effects to both the hospital and the clients. For the hospital, the slow service delivery has constantly jeopardized the customer relations aspect of the organization. This is because when a client visits the hospital and takes the whole day waiting for the staff to retrieve his or her files and go through the records, next time, he or she will opt to a different hospital. For the clients on the other hand, someone with a critical health condition may not be saved just because his or her medical records are lost. Therefore, the absence of efficient medical coding can worsen the conditions of the patient. The problem resulting from the absence of medical coding system in the hospital mainly affects the Front Office Receptionist. This is because the front office receptionist is the person who is responsible for the production of the medical information for the different clients getting into the hospital. There are a lot of consequences if the problem is ignored. By ignoring the problem, it is very likely that the service delivery in the hospital will continue to be slow. The amount of work for the front office receptionist will continue to increase, and become too much for him or her. This means that the receptionist will be straining each day, trying to serve all the clients. This is not healthy for the receptionist. The hospital will generate less than the expected income. This is because it will not serve the clients in a proper rate (Heerkens, 2002). Voice of the Customer Analysis or Market Analysis is also evident as far as this problem is concerned. With the absence of the medical coding equipment in the hospital, the customers continue to complain that they do not receive the services in a satisfactory manner. Some complain that their records occasionally get lost. Others say that they have to queue for long hours before they can be attended to, while other still complain of their medical documents which have been torn or soiled. 2. Practical Outcomes for Client The research method used is the analysis of some case article evaluating the health sector in the United States. EHRs method of storing patient information will assist the medical institutions enhance their control over the revenue. Revenue enables organizations

Conceptual Map Essay Example | Topics and Well Written Essays - 500 words

Conceptual Map - Essay Example are business, system for reporting purposes, system for healthcare business intelligence for example data marts, data warehouses and online analytical processing (OLAP ) systems. Quality data collection enhances the quality of services offered as measured by a focus on patients’ needs, speed of response to enquiries and problems and accuracy of information. It also enhances quality of information as measured by timeliness, accuracy, accessibility, completeness, relatability, uniqueness and validity. Approaches for incorporating data quality into CRMs data warehouse include defining data quality expectations and metrics, which can be done by the use of metadata or data quality metrics, indentifying poor data and its limitations, assessing data quality limitation and improving data quality through human experts or state-of-the-art tools. Data integration is essential for unified view of the patients. It also allows combination o information on patients’ products and better understanding of patients’ needs and its findings are useful in planning, marketing and sales efforts. Data integration tools include statistical modeling, campaign management and data mining. All these lead to improved data quality and subsequently lead to improved results, reduced cost and informed healthcare decisions. They also improve patients’ acquisition and retention, enhance customer services, increase patients’ loyalty and preference and maximize the lifetime value of each patient. Alshawi, S. et al. (2003). Healthcare information management: the integration of patients’ data. Retrieved, February 26, 2009 from

Wednesday, September 25, 2019

Promise and peril Essay Example | Topics and Well Written Essays - 250 words

Promise and peril - Essay Example The article also notes there are challenges in implementing pay-for-performance programs by managers. One of such is seen on the negative impact on motivation, self-esteem, teamwork, and creativity (Beer, and Cannon 4). The second challenge is that the program may lead the employee to forego other things that would help the organization in pursuit of rewards. Merit has also been shown not to be based on performance. The proponent of the program believes the challenges can be overcome through intelligent design of the program (Beer, and Cannon 4). The article also highlights the role played by managers in pay for performance programs. The article notes managers may opt for adoption, modification, or discontinuation of the programs (Beer, and Cannon 13). The article shows reasons for managers coming up with any of the decision. One influence for decision is on pragmatic commitment to finding ways of improving performance (Beer, and Cannon 13). Their goals are just driven by ensuring there is an improvement in performance but not just desire to apply the new programs. They also viewed the new tool as a combination of other tools that could be used in solving some of the challenge they face. Moreover, failure to gain result of the new tool makes manager adopts other traditional tools. Such tools include close supervision, clear goals, coaching, and training (Beer, and Cannon 13). The manager’s view these tools as being fundamental in management hence change of decision. Additionally, the manager viewed the new program as requiring more time to implement and attracted difficulties in setting performance standards. The new program has been viewed as advantageous. However, it faces the challenges of implementation by

Tuesday, September 24, 2019

Management and Leadership Paper Research Example | Topics and Well Written Essays - 1250 words

Management and Leadership - Research Paper Example Creating a traditional style for chopper style motorcycles, the distinctive design which gives the brand its unique name (Nelson & Gregory).Also, Harley-Davidson is not involved in the sole production of motorcycles alone. Its industries spread to all aspects of the motorcycle manufacturing plant. The brand creates not only motorcycles under its own brand name but also accessories for these motorcycles. Licensing is also provided to the owners of the motorcycle. Harley-Davidson also produces customized bikes which create special editions of particular motorcycle models. This includes the Buell Motorcycle Company which is responsible for creating not only the sports bike but also the middle weight beginners bike (Kelly 2006). Harley-Davidson has also taken over other motorcycle companies including the MV Augusta and their Caviaga subsidiary (Superbike Planet). Thus along with their own market share, Harley- Davidson has also successfully industries of fellow competing motorcycle brand s. Along with its fame for the vehicles it produces, Harley Davidson is also keeps a strict check on environmental pollution emitted by its vehicles. By obliging to the rules set down by the Environmental Protection Agency, Harley-Davidson builds materials and crafts free of defects that can prove to be detrimental to the environment. Thus, the motorcycles and accessories produced by Harley-Davidson are renowned all over the world. This essay will discuss the leadership and management style that has protected this organization from takeovers or mergers. This is coupled with the essence of the two groups in keeping Harley-Davidson one of the most successful and lucrative markets today. For any organization to gain success as has done the Harley-Davidson model, a presence of good management and leaders is vital. The first aspect of this is the term used for employees working under both statuses. While managers hire subordinates as fellow workers, leaders claim

Monday, September 23, 2019

The balanced scorecard Dissertation Example | Topics and Well Written Essays - 7250 words

The balanced scorecard - Dissertation Example Research Methodology 16 Qualitative Research 16 Data Collection 17 Research Limitations 17 Research Findings- Empirical Evidence 17 Conclusion 30 Reference 33 Bibliography 36 Introduction 3 Literature Review 5 Overview of the Balanced Scorecard 5 Development of the Balanced Scorecard 8 Benefits of using the BSC 11 Balanced Scorecard Implementation in large enterprises and SMEs 12 Criticisms of the Balanced Scorecard Methodology- challenges of implementing the Balanced Scorecard 14 Research Methodology 16 Qualitative Research 16 Data Collection 17 Research Limitations 17 Research Findings- Empirical Evidence 17 Conclusion 30 Reference 33 Bibliography 36 Introduction Emerged as the most commonly used strategic performance management tool supported by proven automation tools and design methods, the balanced scorecard is extensively used by managers in organizations today for keeping track of activities undertaken by staffs and monitor and control the consequences resulting from these activities. Today’s organizations are amidst a revolutionary transformation in the business environment which is gradually transforming itself from industrially competitive structure into an information competitive one. Arising out of this cut throat competition organizations have been increasingly looking at improving their businesses further and thus the importance of initiatives like just-in-time system, total quality management systems, Re-engineering, employee empowerment etc have gained prominence. Even though such initiatives were successful in bringing about improvement in shareholders’ value, their disjointed structure primarily looked at short term growth and performance. The demand for creating long range competitive capabilities and improving the model of the historical cost financial accounting triggered the creation of the Balanced Scorecard. Widely used in industries and businesses the scorecard acts as a strategic management and planning system used the government and non profit organizations with the aim to align business activities of the organization with its strategic vision and mission, improve its internal and external communications and finally to monitor performance of the organization against strategic objectives. Originated by Dr. Robert Kaplan and David Norton this performance management frame successfully adds the no financial performance measures with the financial metrics and allows managers to have a comprehensive and balanced view of the organization performance. Kaplan (1994) has particularly used the example of Rockwater Company for explaining the developmental process of the balanced scorecard for ensuring that companies are able to realise their goals and objectives. Industries such baking and insurance have been particularly benefitted through the implementation of the process. Kaplan has explained the management structure of connecting the business units’ strategies with the entire interest of the company. Martinson (1999) has also made use of the case study method for exploring the impact on a corporate information system operation department through the adoption and implementation of the balanced scorecard in four different perspectives such as user orientation, corporate value, internal process and future preparation for the measurement and evaluation of the performance of information systems. The results have clearly shown that balanced scorecard can be effective in serving as a successful measurement system in a strategic information system (Chi & Hung, 2011, p.226). On the other hand Chia and Hoon (2000) has tried to study the procedures for the promotion of the balanced scorecard and the criteria establishment process in two of the largest merchandise circulation firms based in Singapore. The results have shown that the promotion of the system has been particularly effective in clarifying the vision of these companies and in the preparation of the strategy to be practiced. Numerous other empirical evidences have shown positive results with the implementation and use of balanced scorecard in organizations. The project brings forth an analysis of the effectiveness of the balance

Sunday, September 22, 2019

Work From Home Essay Example for Free

Work From Home Essay Are you tired of the common grind you must deal with on a daily basis? Does you current job leave you with limited career and salary opportunities? If so, have you thought of going into business for yourself and working from home? Now, some may assume that such an option is really not possible and that all those advertised work from home pitches are gimmicks and scams. Well, the reality of the matter is that working from home is the wave of the self-employed future and it brings with it a number of opportunities to earn significant income. One of the best resources for earning additional income working from home is Poly Promotions ProfitableJobs. com as it provides a multitude of ideas for wealth creation. Often, many of the ideas offered by ProfitableJobs. com are relatively simply concepts that are often overlooked, but are also consistently successful. In todays day an age, there are a number of options that are available to people that previously did not exist prior. Because of the great expansion of the internet and other forms of communication the ability to work from home has become a reality. Of society has shifted many times over the past centuries as it has gone from an agricultural based society to an industrial based society and now to a technological based society. In the past, there were no home computers, notebooks or iPods. Today, because we have such great access to a number of technological/communicative devices the ability to work from home differs very little from heading into the office to work. This has opened a plethora of financial opportunities for an individual to take advantage. Every week after initially signing up, ProfitableJobs. com will send you a series of email tips for work at home money making opportunities. Most of these opportunities involve very little start up money and are not complex ventures to take part in. As such, there is no reason not to take advantage of these opportunities as they bring a variety of benefits not the least of which may be financial independence.

Saturday, September 21, 2019

Female Education In Pakistan Theology Religion Essay

Female Education In Pakistan Theology Religion Essay Do you think education is important for the development of a nation? Napoleon Bonaparte said, Give me an educated mother, I shall promise the birth of a civilized nation. Education has a key role in the development of a country. As about half of the population of world is female, female education is as necessary as male education. We have seen in the history of the world that those nations are in the lines of leading developed nations who have educated their women and men equally. But unfortunately the situation of female education in Pakistan is not as good as it should be. Many organizations are working for its improvement. There are some major obstructions in the way of female education but the situation may be improved if some steps are taken with responsibilities. Importance of female education is obvious to everyone. Education of female is necessary for a society in many ways. Firstly educated mothers can educate children in a better way as compared to uneducated woman. She can understand the difficulties coming to students in seeking education. Secondly educated mothers bring up children with more care than uneducated woman. Moreover, Education gives girls and women power to decide about their life and life style. She knows how her right and can raise her voice for her right in the world. Lower female education has a negative impact on economic growth as it lowers the average level of human capital. If we look at the success of European countries, that is only because of their education system. They take education seriously the education of men and women equally. That is the only cause why they are developing so fast. But the situation in Pakistan is totally reversed people understand education necessary for men and not for women. The siFatuation of female education in Pakistan is not satisfying. According to Pakistan Social and Living Measurement survey 2008-2009, the literacy rate of women was only 45%. The rate was 41.75% in 2004. It means the rate was increased only by 3.25% in the duration of five years. It is very disappointing as compared to any other developing country for example India which has the female education rate of 74%. The ratio of female to male education which is 45 to 69 is not good too. The situation is worse in Khyber Pukhtunkhwa and Baluchistan in which female literacy rate is 31% and 23% respectively. The ratio of female to male education in these provinces is 31/69 and 23/62. The situation is alarming in the country especially in the provinces mentioned above. According to Pakistan educational statistics 2006-2007, there are total 64,309 and 46,270 schools for boys and girls respectively. The number of mixed schools is 36,112. While the situation of Khyber pukhtoonkhwa and Balochista n is especially worse. There are only 8,016 girl schools in KPK while the number of girls school is 2,898 in Baluchistan. The statistics shows that the situation is highly alarming for the development of Pakistan we should improve the situation otherwise the dream of success of Pakistan will not be fulfilled. There are some problems occurring in the way of female education in Pakistan. Religious misinterpretation is one of them. Some people consider female education against religion so they do not let their daughters get education. They are afraid that girls will become liberal when they are educated. In some areas of Pakistan extremism (so called Islamic extremists) badly affected female education. Many girls school were destroyed in the current wave of extremism in the country. Girls were not allowed to go to schools and colleges. Malala Yousafzai, a 14 year girl who raised her voice for the education of girls was attacked by the extremists. Lack of knowledge about the importance of female education is another obstruction. People dont consider education important for woman. They dont feel woman can take part in social life after getting education. They consider the job of woman limited to home. In some areas culture does not allow woman to seek education. For example, the tribal areas o f Pakistan where woman are not allowed even to go out of their home. Society does not allow girls/women to develop their human capabilities by precluding them from acquiring education. Lack of emphasis on the importance of womens education is one of the cardinal features of gender inequality in Pakistan. Chaudhry, I. Rahman, S. (2009). As for as Islam is concerned, it is the most accused religion about gender inequality. Dr. Raheeq Abbasi, secretary general Minhajul Quran International states that this is a sad accusation made upon Islam while knowledge is one of the basic pillars on which the building of Islam is raised. This is a fact that the first revelation upon the holy prophet contained the word read. There is no disagreement within Islam regarding the seeking of knowledge being binding and obligatory. He states that the there are more than five hundred verses in the Holy Quran which highlights the importance of seeking of knowledge. ( Abbasi, 2009 ). Islam has its clear concept about education. According to the Holy Quran, Say: Can those who have knowledge and those who do not be alike? So only the wise do receive the admonition. [Al-Zumar, 39:9.]. The Holy Prophet (S.A.W) said, Acquisition of knowledge is binding on all Muslims (both men and women without any discrimination). [Narrated by Ibn Maja in al-Su nan, 1:81 224.]. It is evident from the Holy Quran and Hadiths that there is no gender discrimination in seeking knowledge. Also study of the life of Holy Prophet shows that he made special arrangement for the education of women. But there are some conditions that Muslim women should follow while going out for education. In Islam woman is not allowed to go out without pardah. As stated in the holy Quran. And direct the believing women that they (too) must keep their eyes lowered and guard their chastity, and must not show off their adornments and beautification except that (part of it) which becomes visible itself. [Al-Nur, 24:31.]. In another place Allah says, O Prophet! Say to your wives, your daughters and the women of believers that, (whilst going out,) they should draw their veils as coverings over them. It is more likely that this way they may be recognized (as pious, free women), and may not be hurt (considered by mistake as roving slave girls). And Allah is Most Forgiving, E ver-Merciful. [12 Al-Ahzab, 33:59.]. Many organizations are working for the development of female education in the country. In government sector Federal and Provincial ministries are active to develop female education. Schools are being constructed for girls in the areas where needed. Some schemes are being evolved in girls schools to persuade girls to seek education. For example, books are distributed free of cost up to high schools. But this is not fulfilling the need. The announcements are often not brought to action. Education has only 2% in the total budget of the country. Moreover some Non-government organizations are also working. These NGOs are arranging seminars and functions all over the country in order to make people aware about the importance of female education in Pakistan. They are also distributing free textbooks, other general knowledge books, sports equipments and even food for in the school girls in order to persuade girls to schools. There are some difficulties for them to them. Some local religious leaders do not allow them to work in their areas. They think their policy is to make people away from religion. Therefore people are directed not to contribute with them in the cause as they are carrying people away from the religion. Some local organizations are also working for cause Alkhidmat foundation, a local Islamic NGO is working for female education. It gives scholarships to the needy students all over the country. The situation of female education can be improved if some bold steps are taken. First of all teachers and students should play their role in the cause. This may be done by making people aware about the importance of female education by arranging seminars and function around the country especially in the rural areas. Secondly religious scholars should take part in this cause. As religious misinterpretation is one of the major obstacles in the way. People do not have clear idea of religion about female education. They should tell the clear idea of religion about education especially female education and also the conditions for female to go outside home to seek education. Next, Government should take some steps to improve the situation. Government has to make awareness in people regarding female education. It should construct girls schools in the areas where there the number of schools is very low. As many people do not let their girls get education in co-education system. There should be complete separate schools and also female staff for the girls. As Education has only 2% in the annual budget. Government should spend more on education in their annual budgets. The non-government organizations working for female education also have to play their role in the cause by making awareness in such a way that people would not consider it against their religion. Special attention should be given to the areas where the situation is alarming. It is obvious from the above discussion that the situation of female education in Pakistan is much lower than the need of the time. Females are not given the right of seeking education. There are many obstructions in the way of female education which include religious misinterpretation, current wave of extremism in the country and lack of knowledge about the importance of female education, many organizations are working for the improvement of situation in government as well as non-government sectors. The situation can be improved if every individual play its role with responsibility. Teachers, students, religious leaders and scholars, government and non government organizations can make it better if they know and fulfill their responsibilities. Abbasi, DR. Raheeq, (2009). Women Education In Islam. 1st ed. Pakistan: Minhaj Ul Quran International. Chaudhry, I. Rahman, S. (2009). The Impact of Gender Inequality in Education on Rural Poverty in Pakistan: An Empirical Analysis. European Journal of Economics, Finance and Administrative Sciences, Issue 15, 2009.

Friday, September 20, 2019

Placement Reflection On Caring For The Dying Nursing Essay

Placement Reflection On Caring For The Dying Nursing Essay When I told people that I was going to do my practicum with people who are dying I felt like an alien. And yet death is a part of the life process. Death is something that touches every individual and family but the reality is that we live in a contemporary death denying culture. To confirm this fact, numerous expressions are used to describe dying. To conceal fear of death people use euphemisms like, gone to meet his or her maker, gone on to a better place, passed on and numerous other expressions that do not engage the word died. The idea of doing my practicum at a hospice excited me because it was a new domain for me. I was ready and eager to apply theories learned into a practical setting. My placement experience provided me insight that as a social worker one is never better prepared to deal with death of a client or even ones impending death. I watched clients grapple with mental and emotional turmoil that comes with having a terminal illness and my religious perspective shifte d. While working with individuals who are dying can be complicated and stressful, it provided potential to bring countless personal and professional rewards which helped me challenge my own mortality. Philip Aziz Centre is a home hospice created as an alternative discourse addressing service users needs beyond gender or medical diagnosis. Services provided include practical, physical, emotional and spiritual support for people living with HIV/AIDS, cancer and other life threatening illnesses. Because bureaucracy is one of the tools of development that organizes and structures operations of any efficient agency, my placement is no exception. Autonomy of both worker and client is carefully regulated in relation to specific rules of behaviour. Hence, the importance of analyzing the potential impact organizations may have to exert power and influence on employees and clients (Handy, 1997). My placement agency like any other hierarchical bureaucracy provides both social care and social control. During my first few weeks, I recall being sceptical and uncomfortable about the spiritual component. This was because of an incident that happened a few weeks into my placement. I was assigned to work with the Chaplain to organize a retreat for a group of terminally ill clients who access spiritual care services from the agency. I started to increasingly feel uncomfortable when the Chaplain started to make unreasonable demands on me; that she wanted to pray for me. Ogbor (2001) contends corporate culture can be used to reinforce informal norms and can become an expectation on the part of employees that would be otherwise lost (p.594). Indeed, I felt lost in this religious dilemma and felt like I was in what Ogbor refers to as psychic prison. A mechanism often constructed by individuals to protect against internal tensions. It occurred to me that I was not only losing my sense of self but my identity was being manipulated through the prayer rituals. Couzen (2005) citing Foucault states that through norms individuals can be programmed by social institutions. This is because once there is dominance normalization makes dominance invisible. Hence, I found myself assimilating into the assigned organizational religious cultural values and norms. When I reflected on the theories of corporate hegemony, I became aware of the intersections of whiteness and the cultural imposition that was taking place. Why was I succumbing to what appeared as religious indoctrination? Was I being manipulated? Institutional patterns operate as techniques of power and domination (Ogbor, 2001). The imbalance of power was emotionally unsettling. Using Foucaults work to examine self-regulation, I take full responsibility for self-regulating and being complicit in my own domination. My failure to be critical about ideological practices that went against my personal beliefs and values gave the Chaplain permission to legitimize and enforce the prayer rituals. Thu s, techniques of domination intersect with self to produce what Foucault describes as governmentality. . The self-imposed surveillance constituted a form of internalized panopticon (Ogbor, 2001). As a result, self-oppression and conformity was hindering my project of freedom. My consciousness was provoked by this realization. The harboured angry feelings turned me into an ugly person. Unable to contain the anger, the situation exploded into a nasty confrontation with the Chaplain. Imagining that the Chaplain perceived me as a transgressor requiring to be saved by religion, I became what Zimbardo (1971) describes as a dangerous prisoner. I lashed out at the Chaplin; yelling and accusing her of trying to be self-righteous and ethnocentric. I regret this verbal altercation because it was not professional on my part. In retrospect, I realize that the factors influencing my angry reaction ran deeper and were political. I felt that as a person of colour, the Chaplain was using the historical colonial weapon of religion to save me from myself. I grew up during the apartheid and religion was sh oved down my throat from childhood until high school. Religion then was used as an ideological tool to teach Africans morals and civility. Thus, the very idea that the Chaplain may have been reproducing my painful colonial past made my blood churn. It is through such learning processes that my individual colonial past and fears manifest into a defence mechanism. This defence mechanism often times projects the deep colonial scars that lie deep inside. Now, I am aware that the residue of what happened in the past can mar my social interactions. For the most part, I have spent my life focussing on my painful colonial experiences of being treated as the Other and reacting negatively. I am aware that when a white person speaks I find myself analyzing every single word just to ensure that there are no racial connotations. This is a problem because it means that I enter into this conversation with strong biases and prejudice. I realize the need to look beyond my physical and psychological trauma in order to move forward. Nonetheless, I am encouraged by Bell Hooks (1990) thesis in Choosing the margin. Through practice, I have learned that we choose our marginal identities but are not confined to these rigid positions. I admit that I ha ve to change the way I speak. My language should not bind or fence in my dominator. Because words have meaning, I have to engage in meaningful and respectful dialogue. When the conflict with Chaplain escalated, I recalled the words of one of my professors in College that: conflict was healthy and a normal part of any human relationship. I knew that allowing conflict to escalate can limit opportunities to engage in open and respectful dialogue. But, for some strange reason, I allowed the conflict to fester for too long. I lost the learned key conflict resolution principles of using the I statements rather that you statements. In fact, I cast blame on the Chaplain and turned myself into a victim; a principle we learned in the first year that it did not exist because power is everywhere. A fact I later disproved by exercising negative power through yelling at the Chaplin. Lessons from Foucault came into focus that power is not always repressive because it is relational. Eventually, I took ownership of my role in this particular conflict, an opportunity that enabled me to step back from the emotional attachments that went with the religious disagreemen t. This introspection allowed me to seek help from my Faculty Field Supervisor. It was after my meeting with my Faculty Supervisor that I began to reflect on my own behaviour in the whole process. I took ownership and apologized to the Chaplain for behaving in an unprofessional manner. I was able to convey to her my feelings about the situation and the matter was resolved amicably. She in turn apologized because she had not realized the implication of her behaviour. She immediately stopped bringing the idea of praying for me in our work relationship; a decision that I appreciated because it allowed my individuality and growth in my practicum. I must admit that this conflict was a driving force for my improved performance in my practicum. My relationship with the Chaplain turned into a healthy and positive experience which led to better team decisions and more creative ideas. My Faculty Adviser helped me realize the importance of taking a step back before reacting. In our meeting, I recall him advising me to use a critical reflective approach as a tool to resolve practice dilemmas in a constructive way. This useful advice was turned a somewhat poisoned environment into an amenable situation. Through dialogue this situation was resolved and my relationship with the Chaplain became cordial. In fact, she became one of the people I sought advice from as I encountered my clients struggling with the meaning of life after a terminal diagnosis. Through this experience, I gained insight into my workplace, my colleagues and myself. I was able to identify my own assumptions and biases about religion which was interfering with my professional practice. I have learned that spirituality is an essential component of the bio-psycho-social framework particularly in palliative care. Identifying spiritual assets and strengths can help clients cope with or solve problems. The conflict with the Chaplain was pivotal in my self-awareness and consciousness raising as I pursued my journey with Grace, a fifty year old woman battling terminal cancer. My journey with Grace (pseudonym) gave me prose to think about the meaning of life. As a social worker, my client taught me that when a life threatening illness such as cancer confronts us, it is the realities of death and questions about life that prompt us to step back from our lives including theory. Ironically, my perspective on realities of implications of a terminal illness emerged from spiritual and philosophical orientation. It became evident that the end of life was one of the most important times for a social worker to address spirituality. In this process, I discovered that spirituality is an essential yet undeveloped component of cultural competence. My interaction with my client led me to examine spirituality as a form of cultural competence. Spirituality represents a potential influence on emotional well-being of the cancer patient as well as the family members or caregivers. As Graces cancer progressed she confronted me with a myriad of questions. When Grace said why me? Why now? My social work textbooks could not provide practical solutions. What do you tell someone asking you why she is dying? At that moment, I realized that cancer causes not only physical but mental, emotional and spiritual suffering. I discovered that some clients find safety in discussing spiritual issues with a social worker because of the professions lack of alignment with a specific religious or spiritual base (Healy, 2001). However, as a social worker, I felt challenged because my training does not incorporate the topic of spirituality as part of service provision. But, through our interactions, Grace was able to teach me that spirituality was in fact a significant part of ones cultural identity and can be a source of healing. Healy (2001) provides helpful account of benefits of spirituality in palliative care. My experience at Philip Aziz made me aware of the importance of spirituality in social work practice. Healy argues spiritual issues are often apparent in palliative care and require social work to extend practice which may at times be limiting because of opposition by some proponents who argue that religious and spiritual care are incompatible with the image of modern profession (p.85). The incident described above, allowed me to reflect on my own practice and confusion arising from my failure to understand the difference between spirituality and religion. Working with Grace raised my consciousness in understanding that spirituality refers to search for meaning and mutually fulfilling relationships. Religion on the other hand is often an organized activity for the expression of faith. This distinction helped me to be reflexive and draw on social work theory to come up with creative solutions to help my client. I was able to explore a broad range of practice options for my client. For example, conducting a needs assessment helped to identify my clients strengths and capacities that were evidently invisible because of my resistance to spirituality as a form of intervention. Despite the fact that cancer was ravaging her body, Grace was able to let me know that her priority need was working on spiritual distress she was experiencing. Integrating spirituality in my work practice presented incredible effective cross cultural communication techniques in palliative care. Using the strength perspective framework, she was able to articulate her hopes for the future in our relationship. I discarded my idea of seeking to remedy her personal cancer pathology and focussed on her need. Our relationship blossomed until Grace died peacefully on February 26, 2010. Because Grace was Jewish, I had the honour to be invited by the family to what is called a Shiva, an occasion for family and close friends only. I learnt that in Judaism, a person mourns for a relative in seven stages. The mourners sit on low stools throughout that period to symbolize the mourners awareness that life has changed. The low chairs shows desire to be close to the earth in which the loved one was buried. Finally, I concluded that social work and spirituality had much to learn from each other. I learnt that death is central to the meaning of human life and provides a backdrop against which life is lived. Throughout this process, my greatest learning outcome came from understanding that as a social worker my role is not to work miracles but to provide support and actively listen. To help people discover their own strength rather than an attitude of rescuing them. I will value taking fifteen minutes of my every day to reflect on how my actions negatively or positively impact everyone I come into contact with. This reflective process will enable me to avoid pointing fingers to other but at myself and find ways to change whatever needs to be improved.

Thursday, September 19, 2019

Emily Dickinson: Life And Her Works :: essays research papers

Emily Dickinson: Life and Her Works Emily Dickinson made a large influence on poetry, she is known as one of America's most famous poets. With close to two thousand different poems and one thousand of her letters to her friends that survived her death Emily Dickinson showed that she was a truly dedicated writer. Emily Dickinson was born in Amherst, Massachusetts on December 10,1830 to a prominent family, her father Edward Dickinson was both a lawyer and the Treasurer of Amherst College. Emily's mother was Emily Norcross Dickinson. Emily had one older brother, William Austin and a little sister, Lavinia. She was educated at the Amerherst Academy, the institute that her grandfather helped found. She also spent a year at Mount Holyoke Female Seminary in South Hadley, but had left because she did not like the religious environment. For a woman of this time, this much education was very rare.1 Emily Dickinson was a very mysterious person as she got older she became more and more reclusive too the point that by her thirties, she would not leave her house and would withdraw from visitors. Emily was known to give fruit and treats to children by lowering them out her window in a basket with a rope to avoid actually seeing them face to face. She developed a reputation as a myth, because she was almost never seen and when people did catch a glimpse of her she was always wearing white. Emily Dickinson never got married but is thought to have had a relationship with Reverend Charles Wadsworth who she met in the spring of 1854 in Philadelphia. He was a famous preacher and was married. Many scholars believe that he was the subject of her love poems. Emily probably only saw Wadsworth an additional three times after their first encounter which was only done by him going to Amherst, where she lived. In 1861 Wadsworth moved to San Francisco. It is after this time that Emily really started to produce hundreds of poems. Emily Dickinson submitted very few poems to publishers. She felt that her poetry was not good enough to be read by everyone. Eight of her poems were published during her life time either by her friends who submitted them to a publisher without her consent or Emily Anonymously. (Emily Dickinson 1996,1) In 1862 she told a friend "If fame belonged to me I could not escape her...My Barefoot-Rank is better." It is also thought that Emily Dickinson had a passionate relationship with Susan Gilbert. Emily wrote three times more poems to Susan then to any one

Wednesday, September 18, 2019

The Battle of the Bulge :: World War II History

The Battle of the Bulge The purpose of this speech for the class is to gain better knowledge of one of the most tragic and devastating battles of World War II, the Battle of the Bulge. To Better understand The Battle of the Bulge I will explain to you the cause of the battle, location of the battle, when it took place, who was the battle fought between, the number of soldiers involved, and the number of casualties. The prelude to the Battle of the Bulge began on a winter day in mid-December of 1944. Three powerful German divisions, were the last German offensives in the west at that time during World War II. They began after the Normandy invasion in June 1944. Allied had forces swept rapidly through France but became stalled along the German border earlier that year in September. On December 16, 1944 taking advantage of the weather, which kept the Allied aircraft on the ground, the Germans launched a counteroffensive through the semi-mountainous and heavily-forested Ardennes region in Germany, and advanced 31 miles into Belgium and northern Luxembourg near the Meuse River. Their goal was to trap four allied armies, divide the Americans and the British to force negotiated peace along the western front, and retake the vital seaport of Antwerp in Belgium. Thinking the Ardennes was the least likely spot for a German offensive, American staff commander chose to keep the thin line, so that manpower m ight concentrate on offensives north and south of the Ardennes known as the "bulge" in the Allied lines. These American lines were thinly held by three divisions in the Allied Army and part of a forth division, while fifth division was making a local attack and the sixth division was in reserve. Division sectors were more than double the width of normal defensive fronts, therefore there were more men scattered along a larger area. The German advance was halted near the Meuse River in late December. Even though the German Offensive achieved total surprise, nowhere did the American troops give ground without a fight. Within three days, the determined American stand and the arrival of powerful reinforcements insured that the ambitious German goal was far beyond reach. In snow and sub-freezing temperatures the Germans fell short of their interim objective- to reach the rambling Meuse River on the edge of the Ardennes. But they managed to avoid being cut off by an Allied Pincer movement.

Tuesday, September 17, 2019

Dean Moriarty in Jack Kerouac’s on the Road

In Jack Kerouac’s novel, On The Road, main protagonist Dean Moriarty symbolizes an â€Å"almost† immortal flame of youth that embodies the rebellious generation of uncertainty that describes 1950s Beat culture. Desirable of everything at the same time, from his numerable fixations with drugs, his incalculable romantic entanglements with women, or his superficial preoccupation to be seen as an intellectual, we get to know Dean's liberating and pioneering personality as the â€Å"Holy Goof† as well as an apparent figure of Beat culture.Though it is not until a series of passages at the commencement of the novel that the â€Å"crucifixion† of Dean Moriarty's youth takes place, forcing upon him a revelation; forcing him to relinquish his naive, rebellious ways into a life of real uncertainties and real problems. In one of these passages, at what first seems to be a light hearted conversation between Dean and Sal in a restaurant bathroom, soon evidently becomes a foreshadowing of Dean's diminishing youth: â€Å"We were both exhausted and dirty†¦I was at a urinal blocking Dean's way†¦ and said to Dean, â€Å"Dig this trick. â€Å"Yes, man,† he said, washing his hands at the sink, â€Å"it’s a very good trick but awful on your kidneys because you’re getting a little older now every time you do this eventually years of misery in your old age, awful kidney miseries for the days when you sits in the parks. † It made me mad. â€Å"Who’s old? I’m not much older than you are! † â€Å"I wasn’t saying that, man! †Ã¢â‚¬Å"Ah,† I said, â€Å"you’re always making cracks about my age. I'm no old fag, you don't have to warn me about my kidneys†Ã¢â‚¬ ¦I said to cap my anger, â€Å"And I don’t want to hear any more of it. And suddenly Dean’s eye grew tearful and he got up and left†¦Dean stood outside the restaurant for exactly five minutesâ₠¬ ¦ â€Å"Well,† I said, â€Å"what were you doing out there? †¦Go ahead tell me†¦Ã¢â‚¬  â€Å"I was crying,† said Dean. â€Å"Ah hell, you never cry. † â€Å"You say that? Why do you think I don’t cry? † â€Å"You don’t die enough to cry. † Every one of these things I said was a knife at myself. Everything I had ever secretly held against my brother was coming out†¦ (Kerouac 215)Here, for the first time and only time in the novel, do we see the hero, Dean, reach his threshold, and break down to cry. It is a symbolic point in the novel in that we are witnessing Dean beginning to change; we see his â€Å"eternal flame† begin to wither away. When Sal says, â€Å"You don't die enough to cry† he is basically telling Dean he does not experience true life. A life that is filled with lows and highs, easts and wests, positives and negatives; a life that isn't always â€Å"Ah! Whee! † (Kerouac 119) moments in which until this point Dean's life as we know it had evolved around.Opposed to the Dean we know in the beginning of the novel, â€Å"mad to live, mad to talk† and would â€Å"never yawn or say a commonplace thing but burn, burn, burn†¦Ã¢â‚¬ (Kerouac 291), we now see a growing sense of distress and misfortune through this passage. We can even detect a sense of maturity through Dean's actions. He has hit rock bottom, his body gives up and he allows himself to cry. While Sal, previously inspired by Dean’s unknowing nature, is for the first time realizing all of his time spent searching for life has in actuality been time spent running toward death with Dean as to escape his own life.All this time, Sal has been desiring to be with Dean, craving his eternal madness, and it isn't until now that he realizes by following Dean, he's been ignoring reality and altering the way in which he experiences the world. Dean's crying scene is the death of his youth and the birt h of this novel's martyr. This passage embodies the not-so-immortal flame of youth that defined both Sal and Dean's generation. It is here, through Dean's â€Å"martyrdom† that we see Dean begin to accept life as a â€Å"risen hero† of the road, his old philosophies and ways of life serving no longer an inspiration for those lost, or soon to be lost.Upon finishing this novel, I concluded that this passage's reference to Dean's immortality is also manifested in the book's ending in that there is no true closure to this novel. There is no closure to the ideas, beliefs, or the â€Å"eternal flame† that Dean represents. An open ending to his life and what happens to Dean Moriarty allows him to remain immortal. Even through Sal's dialogue at the very end, we are left with the sense that Sal will eternally be thinking of him as he walks away â€Å"across the land. † The book itself, much like Dean's character, has embodied the uncertainty of what ies ahead, and has manifested Dean's personality into the story itself. Sal's description at the end of the novel of a star in the distance becoming less bright as its â€Å"sheds across the night† sky represents the eternal legacy of Dean Moriarty becoming less bright and the diminishment of his naive and rebellious youth. This image of the shedding star, along with the novel's absence of a resolution, resonates with his entire philosophy and way of life, a life of spontaneity, a life of never knowing your future – and loving it.

Monday, September 16, 2019

Is Banning School Soda Machines A Good Idea

Is banning school soda machines a good idea? It's not the government's Job to make decisions about what we drink and where we drink it. That's why I think it's a bad idea to ban soda machines from schools. Taking away soda machines will take away the students ability to learn how to make healthier decisions for themselves. If they don't learn how to make healthy choices as a kid, they won't be able to make those good choices as an adult.The New York Times states that anyone who has tried to lose weight is likely to tell you that going â€Å"cold turkey' and avoiding tempting foods and drinks is setting ourselves up for failure, and that is exactly what banning particular foods and drinks will do. Removing unhealthy choices is setting you up for failure, and it's not a way to teach students on how to make healthy choices. Keeping soda machines in schools will allow students to ask themselves, â€Å"Is this a good choicer, â€Å"Is this healthy? Soda machines in schools will teach t hemselves on how to make good and healthy choices. Although soda is high in calories and sugars, there Is no evidence that it Is the direct cause of obesity. If schools carry only diet and zero calorie sodas such as diet eke and coke zero, the students would be drinking calorie free sodas with less sugar. That would allow the schools to still make profit and the students to get a healthier version of their favorite sodas.Another more beneficial way to decrease childhood obesity Is by dally exercise. This way your lungs and heart will get In better shape, while you are losing weight. Nobody wants to set kids and students up for failure. Banning soda machines In schools will set them up for that failure. That's why I believe that schools shouldn't ban their soda machines from students. Source The New York Times Upfront. † The New York Times Upfront I The News Magazine for High School. N. P. , n. D. Web. 4 Novo. 2012. Is Banning School Soda Machines A Good Idea By crimsoning will allow students to ask themselves, â€Å"Is this a good choice? â€Å", â€Å"Is this healthy? † Soda Although soda is high in calories and sugars, there is no evidence that it is the Another more beneficial way to decrease childhood obesity is by daily exercise. This way your lungs and heart will get in better shape, while you are losing weight. Nobody wants to set kids and students up for failure.

Sunday, September 15, 2019

Human Profile

Chapter 5 Human Factors in Aviation Security Contents Page INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background on Human Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA AND HUMAN FACTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA Policy and Plans for Human Factors and Aviation Security . . . . . . . . . . . . . . . . . . 80 FAA Requirements for Aviation Security: Human-Factors Implications . . . . . . . . . . . . . 82 Other Issues for Human Factors and Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Box Box Page 5-A. UAL Hi-Tech Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter 5 Human Factors in Aviation Security factors in these cases can greatly improve the utilization of technology for airline security. Dramatic accidents caused by human errors in the nuclear power, chemical, and transportation industries have increased public attention to human performance issues during the past decade. Additional training requirements, revised operating procedures, warning devices, and expanded government oversight are typical recommendations following accident investigations.However, these stopgap measures address only the surface of problems that are rooted in the complex interactions of people and equipment within the larger system and the institutional and organizational structures and procedures that drive the planning, design, and management of these systems. Following the ground collision of two jetliners in Detroit in December 1990, Dr. John Lauber, a member of the National Tr ansportation Board, said that â€Å"basically the [aviation] system, the way we’re operating it, almost demands nearly error-free [human] performance. Similar concerns can be echoed for the aviation security system—a number of successful airline terrorist events have been traced to a human failure. 2 â€Å"The challenge is to design a system. . which is tolerant of those errors when they do occur and which detects and traps them before we have [a catastrophe]. †3 Multilayered defenses are employed at many commercial airports and airline terminals, and security managers and government authorities are turning to new technologies to buttress these systems. Heretofore, Federal requirements and industry use of security technologies have usually been with specific functions in mind.As long as the technical goals could be met effectively, the equipment was considered satisfactory and human performance problems related to the technology were resolved through revised tr aining and procedures. Technology use in counterterrorism will likely increase dramatically over the next decade, but if early and INTRODUCTION Human resources are critical to aviation security. Security personnel—passenger and baggage screeners, guards and law enforcement officers, and airport and airline employees in general-are important elements of a system that prevents and deters hostile acts against air carriers.Technology can enhance, but cannot replace, the capabilities of these people and the many services they provide. Moreover, management practices based on behavioral research findings can further improve human performance. This chapter considers the function of screeners in weapons and explosives detection, and the role of guards, officers, and other aviation employees in discovering (and deterring) suspicious individuals or situations. Within the past 20 years, technology has greatly increased the capability and productivity of these security people.Metal detect ors and x-ray devices are faster, more accurate, and more socially acceptable tools for screening passengers and baggage than manual searches. Remote television and other monitoring devices, computer-controlled access to restricted areas, and communication and data systems allow comprehensive surveillance and threat assessment. While these technologies raise the capabilities of a security system to new levels, their ultimate success and actual performance depend on the people who design, operate, and maintain them.Many security assignments require repetitive tasks and close monitoring for rare events— functions that humans perform poorly. Selecting well-suited individuals, training them properly, designing their work environment and rotation schedule to elicit the best possible performance, and providing motivating incentives are fundamental requirements for successful operations, regardless of the type of technology in place. These functions involve human performance; applic ation of human p. A17. IJohn Lauber quoted by John H. Cushmau Jr. , â€Å"Test for Aviation: Coping with Human Shortcomings,†The New York Times, Dec. 0, 1990, ~ne example was the destruction of a Korean Air Lines flight over the Andaman Sea by a bomb planted by North Korean agents. The device, in a carry-on bag, was ahnost detected at a security checkpoint in Baghdad at an earlier stop. When a security guard wished to remove the batteries from a radio, one terrorist turned the radio on, proving it operated, and then raised a hue and cry, yelling and complaining. Instead of using this as a reason to stop the two suspect individuals and to examine their belongings minutely, the security forces decided to avoid trouble by allowing them to proceed. Lau~r, op. cit. , footnote 1. –79– 80 q Technology Against Terrorism: Structuring Security methodic attention is not given to human performance issues, we may expect that system efficiency and effectiveness will be substa ntially impaired. Background on Human Error The human role in a security system is complex; thus the nature of human errors, from mental to physical, varies widely. Mental or cognitive errors can include improper judgment or decisionmaking, while physical errors may stem from motor skill deficiencies or faulty equipment design.A combination of physical and mental processes may influence other kinds of errors, such as those involving communication, perception, or alertness. Human factors, a discipline combining behavioral sciences and engineering, focuses on improving the performance of complex systems of people and machines. Designing and operating a system so that it does not induce human error (in fact, designing it so that human error may be minimized) is one critical component of human factors and limiting the impact of a human error once it occurs is another aspect.Many types of human error are systematic, following certain predictable patterns; once these patterns are identifi ed, countermeasures can be developed. For example, poor location of switches or dials can induce manual or perceptual errors. For those types of human error that do not follow predictable patterns, mitigation techniques are difficult to develop. Some examples of mitigation techniques include automatic monitoring and warning devices. These subsystems, when properly designed and implemented, can be invaluable tools for negating human error.Employee selection—allowing into the system only those people least likely to make mistakes— and continued quality control maintained through training and monitoring are basic steps for minimizing human errors. Potential errors can be forestalled by the use of standard procedures and checklists for routine and emergency tasks, planning work shifts and assignments so as not to induce inattention and 4EM1 L. hlC. , fatigue, and properly designing the work environment. â€Å"If human factors engineering is done properly at the conceptual and design stage, the cost is high, but paid only once.If tranin g must compensate for poor design, the price is paid every day. † 4 According to one expert, there does not appear to be a strong need for new basic research in human factors related spectifically to security-behavioral science findings in general and experience with human performance problems in other industries are probably sufficient to enhance current security operations. 5 For example, such knowledge is being used to upgrade security screener selection by airlines, and to improve training standards.However, the mechanisms to identify early on and to address effectively the human performance issues stemming from new security technologies, such as explosives detection systems, are not yet in place in industry or the Federal Government. Shifting boring and repetitive tasks that people perform poorly to machines is an approach that can reduce errors. However, automated devices (or any new technology) may create new sources of human error. 6 Excessive false alarms unnecessarily distract operators and may lead to the device being ignored or disabled.During unusual or emergency circumstances, the lack of flexibility in many automated systems can be a serious limitation and the human backup may not be mentally or physically prepared (or possibly even capable) to take over. Consequently, a full system approach is required for reducing total human errors. FAA AND HUMAN FACTORS FAA Policy and Plans for Human Factors and Aviation Security In a report released in July 1988, OTA concluded that FAA attention to the spectrum of human performance problems in commercial aviation fell far short of the level warranted, since human error is the leading cause of aviation accidents. Later that same year, Congress passed the Aviation Safety Nagel wiener, $~cw~it Automation’ Hu~n ~ac~or~ in Aviation, Eu1 L. wiener and David c. (eds. ) (Sm Diego, CA: Academic PESS, 1988) p. 454. SH. c~fion FoUShee, c~ef scien~lc and Tec~~ Advi,qor for Human FaCto~, FAA p~so~ wmmunimtio~ 1991. 6see wiener, op. cit. , f~~ote 4, Ch. 13 for a discussion of new and subtle types of human error that have resulted from the introduction of automation into aircraft cockpits. W. S. Congress, OffIce of Technology Assessment Safe Skies for Tomorrow: Aviation Safefy in a Competitive Environnzent, O’E4-SET-381 (Washington, DC: U.S. Government Printing Offke, July 1988). Chapter 5-Hurnun Factors in Aviation Security q 81 Research Act, which directed the FAA to expand its research efforts on human performance in aviation and authorized funds specifically for that purpose. 8 The FAA responded by creating the position of Chief Scientific and Technical Advisor for Human Factors, responsible for coordinating for the FAA various human-factors research efforts within the FAA NASA, and the DOD and for opening lines of communication within the FAA and industry.Communication among Federal agencies is critical, since decisions made by the aviation industry and the operational and regulatory sections of the FAA often drive the need for new human-factors research and could benefit from an understanding of humanfactors research findings and products. The FAA has made progress in addressing the earlier criticism of its human-factors programs and understanding in aircraft and air traffic control (ATC) equipment and operations.However, the key shortcomings in FAA human-factors efforts that OTA cited in its 1988 study-insufficient agency expertise, uncoordinated research efforts, and regulations and certification standards that do not reflect human-factors principles-still exist within FAA civil aviation security programs. During the course of its study, OTA examined closely many of the technology development programs and regulatory efforts underway in the security sections of FAA and found a general lack of awareness and understanding of the human-factors issues involved with possible new security te chnologies.An exception to this situation, however, and a hopeful indicator of a new trend, has been the hiring of a human-factors expert at the FAA Technical Center to oversee human-factors research as it relates to airline security. However, at present, it appears that the FAA is ill-prepared to identify and address possible human-factors concerns with the increasingly complex and diverse security technologies now under development. The dearth of trained humanfactors specialists in areas of the FAA responsible for civil aviation security is a serious deficiency.Until recently, the Aviation Security R&D Service of the Technical Center would have merited similar concerns, but this shortcoming is being redressed, at least in part. Some of the expertise that the FAA is developing on human factors for other uses could also be applied to security issues. One potential vehicle for bringing human-factors knowledge into aviation security efforts is the National Plan for Aviation Human Fact ors (HF Plan), the first major product of the heightened FAA attention to human performance issues following the enactment of the Aviation Safety Research Act.The HF Plan identifies significant human performance issues and lays out a 10-year blueprint for establishing and coordinating research programs and conveying the results across Federal agencies and industry. The HF Plan’s development depended strongly on advisory committees composed of a cross-section of research, operational, and regulatory representatives from government and industry and approximately 50 of the nation’s leading human-factors researchers. The good news for aviation security is that the Plan appears to provide a strong foundation for multi- and cross-disciplinary efforts and understanding in human factors and has begun to institutionalize and focus consideration of human-factors issues in FAA decisionmaking. The bad news is that nowhere in the Plan is security mentioned—the Plan addresses the following five aviation environments only: aircraft flight deck, air traffic control, aircraft maintenance, airway facilities maintenance, and flight deck/ATC integration.This should not be construed as criticism of the general thrust of the HF Plan—the human-factors categories considered have historically been more critical to aviation safety and are considerably more complex than human performance issues in security-and it is beyond the scope of this study to analyze in detail the specifics of the HF Plan. However, some objectives and products of the HF Plan maybe directly transferable to aviation security, provided that lines of communication are established and security experts are included in committee structures.The Plan has eight objectives, all of which can apply to aviation security, but the following two are especially pertinent, given the present attention to technologies for countering terrorism: . to encourage the development of principles of ‘human-ce ntered’ automation and the design of SAviation Stieu Research [email  protected] I%blic bW 100-591. %J. S. Department of Transportation Fedeml Aviation Administratio~ â€Å"The National Plan For Aviation Human Factors,† vol. I, draf~ November 1990. 82 q Technology Against Terrorism: Structuring Security dvanced technology that will capitalize on the relative strengths of humans and machines; . to develop human factors-oriented validation and certification standards for aviation system hardware and personnel that will enhance both safety and efficiency . 10 The HF Plan is designed to be reexamined and revised periodically and aviation security could be added explicitly as a focus area if need and resources warrant. Crucial to the development and future success of the HF pian is the Human Factors Coordinating Committee (HFCC), formed by the FAA administra11 tor in September 1989.HFCC has representatives from each major division of FAA and serves as ‘‘an adv isory body for senior management of FAA in all matters involving human performance and [is] intended to assure that human factors issues are represented in all FAA activities. ’ ’12 Until very recently, the Assistant Administrator for Civil Aviation Security was not represented on this committee. However, this omission has since been recti13 critical-flight safety is at risk only when security performance fails at the same time that a threat occurs.Moreover, FAA staff and the agency â€Å"cul- ture† are predominantly interested in aviation technology and operations and protecting facilities and countering terrorism are not an inherent part of aviation, l4 However, the increasing Complexity of screening technologies and the continuing (possibly increasing) terrorist threat make the performance of aviation security systems more critical to flight safety. fied. Aviation terrorist events in the 1980s made apparent the shortcomings of the minimum Federal security req uirements.The FAA and the airlines both focused attention on screener selection and training, detection and screening technologies, and airline management of security programs and systems. The FAA has increased requirements and oversight of security personnel (selection, training, and management) and equipment (weapons and explosives detectors), but has not yet addressed how security personnel and equipment perform as components of a system. Screener Selection and Training For years, the people who screened airline passengers and baggage for domestic flights generally received little training, low wages, and few benefits.Consequently, alarmin g numbers of domestic 15 FAA Requirements for Aviation Security: Human-Factors Implications Aviation security personnel and equipment have received (and have not needed) the same level of regulatory and certification attention that the FAA places on flightcrew, air-traffic controllers, and ground support personnel and their respective aviation equipment. The FAA has focused its regulatory efforts on elements of the aviation system essential to flight safety. For example, the performance of pilots and aircraft systems are continuously critical for maintaining safety-a failure could cause an accident.On the other hand, the performance of the security system (other than as a deterrent) is rarely not screeners failed unannounced FAA tests (22 percent failure rate in 1988). 16 Since there has not been a severe domestic terrorist threat against aviation in the United States, these shortcomings have not resulted in life or property losses. 17 In light of public pressure following the Lockerbie disaster and costly fines stermming from FAA inspections, the Air Transport Association (ATA) developed an extensive set of screener selection, training, and compensation standards.ATA pro- 1%id. , p. 3. lllbid. , p. 28. l%id. , p. 28. lsundm tie FAA ~rga~tio~ s~c~e fi plaW in 1988 [email  protected] 1990, tie Office of Aviation Security wu represented @ the Executive Director for Regulatory Standards and Compliance, to whom it reported. 14fiowl~ge of aviation tw~olow ~d Operatiom i5 impo~t to fic~t ad @ofi s~ty. For e~ple, spec~ characteristics of aviatio~ Such as large volumes of people and luggage that must be screened quickly, drive the security system design and functions.IsHowever, ~~es ~ustom~y ~ve ~gher s~n~ds for security personuel working h ktWtEitiOlld OpelZitiOllS. 16Lpe Osmus, office of Aviation Security, FW, personal COllMIluIlktitiOIL Feb. 22, 1991. [email  protected] on tie deffitio~ he des~ction of a PSA ftight in 1987, caused by a disgruntled ex-emPIOYW Who Shot tie flying Crew in [email  protected] @@t aircraft be considered a terroris4 as well as criminal, act. In this case, theex-employee had an identifkation card with which he gained access to the so screener training was not an issue. Chapter 5-Human Factors in Aviation Security 83 posed that airlines (or their security contractors) 18 co nsider education and health criteria, the ability to speak English, and aptitude test results before hiring screeners, and that they offer competitive wages, benefits, and incentives and follow a comprehensive training curriculum. In March 1990, the ATA asked the FAA to adopt its proposal as requirements for all airlines. Based on this cooperative industry effort, the FAA has required some of these suggested upgrades in training measures for screeners. (Most U. S. irlines have adopted at least some of the ATA recommendations; the failure rate on random checks has since dropped significantly. )19 The FAA decided not to include selection and wage standards because such a change would require public comment (i. e. , through the Federal Register), thereby calling attention to perceived or actual security weaknesses. rewards to those who detect test weapons and explosives (and even higher rewards to those who find the real thing); and increasing wages to at least the â€Å"local prevail ing rate. For comparison, in Israel, screeners are paid at a level considered a â€Å"good† salary, far higher than minimum wage. In Switzerland, they are paid at the rate of about $lOper hour. In the United States, rates are often near minimum wage. Management Practices and Human Performance The FAA mandates certain positions in an airline’s organizational structure, such as a security director for the airline and security coordinators at each airport, but airline management practices and philosophy usually fall outside the scope of FAA 20 regulatory authority.In Safe Skies for Tomorrow, OTA found that the effect of airline operating or management practices on airline safety, and changes in those practices, were rarely addressed in FAA safety analyses. 21 The FAA's Human Factors plan cites the influence of management â€Å"culture† on human performance as one area where basic research is needed. 22 If the organizational â€Å"climate† (i. e. , working co nditions, wages, management, organizational culture, etc. ) does not allow an individual to perform at his or her peak, it may not matter how well he or she is trained or how well designed the technology is. 3 The ATA proposal for upgrading screener standards suggests giving screeners employee benefits common in many industries (vacation, holiday, medical) that contractors often don’t receive); offering to contractors the advantages of airline employment (e. g. , low-cost travel) and career opportunities to top performers; providing monetary The United Airlines’ approach to improving screener performance on all flights from selected airports delineates one set of management techniques (box 5-A). Another approach has been undertaken by American Airlines, lthough only for its international flights. 24 American treats its international screeners as part of the American team. They are hired as full-fledged airline employees, not employees of a contracted security agency, a nd enjoy the same salary levels and benefits that ticketing agents do. The educational level of entrants appears relatively high, with a few individuals having advanced degrees. There appears also to be a real opportunity for advancement within American Airlines, and not just in the security division.Before starting work, the entrants are brought to Dallas (from across the world; many screeners are hired from the countries in which they will be working) for 2 weeks of training at American’s headquarters. The training includes emphasis on the screening questions as well as on what to look for on the x-ray screens. The screeners ask the standard questions as to who packed the baggage and whether anyone could have placed contraband in it. But they also ask general questions regarding destination and travel plans, somewhat akin to the lines of questioning performed by El Al.Indeed, American has used Israeli security consultants in designing their security system. The screeners lo ok for a number of specific characteristics, which remain proprietary to the company. If too many of the characteristics match a passenger, the individual’s baggage will receive much closer inspection. Screeners are ro- 18Most scree~g for domestic flights in the United States is conducted by security Contractors, nOtairhe employC%S. l~we Osmus, op. cit. , footnote 16. ~u. s. Conwss, OffIce of Technology Assessment, op. it. ,fOOtiOte 7. 211bid. , p. 88. 22U. S. Department of Transportatio~ Federal Aviation Administration op. Cit. , fOOtnOte 9, p. 15. ‘Ibid. 24s0~~: Site visit t. D* [email  protected]% December 1$)90, and Homer [email  protected] Chief of Sedty, American Airlines, perSOIlal COmm~CatiO~ December 1990. 84 q Technology Against Terrorism: Structuring Security tated between looking at x-ray screens and interviewing passengers. Periodically, security systems are tested by contractors, who choose an American employee to play a terrorist.A specific scenario i s given to this impostor, and the reaction of the security personnel is noted. If they do not perform their functions, they may be subject to severe discipline, including termination. The result of the overall approach, using incentives and threat of discipline for negligence, appears to be a well-motivated and alert force. Box 5-A—UAL Hi-Tech Screening United Airlines is focusing on management practices in its program, called Hi-Tech Screening, to improve the quality of pre-departure screening and the public perception of this highly visible function.Begun in 1987 at Chicago O’Hare and San Francisco Airports, the program incorporated many of the selection and incentive steps later recommended in the ATA proposal, and also attempted to integrate technology and people by reconfiguring the screening environment to make it more pleasant for screeners and passengers as well as to improve operations. Although wages are still low, successful workers have the opportunity to j oin the UAL organization, instead of working as contract security personnel.Improvements include direct communication links to supervisors for oversight and advice to screeners, layout designed to minimize passenger delays, and multiple cues to passengers that security measures are being taken in a professional reamer (security supervisor in an elevated booth, passengers see themselves on video monitors as they go through metal detectors, signs describing procedures are clear and concise). United believes that the program has been successful to date in increasing public awareness and employee morale and competence.At Chicago, the employee attrition rate dropped by half and weapon detections and FAA test scores increased significantly (79 percent detection rate on FAA weapons tests prior to Hi-Tech and 92 percent subsequently). United has also installed Hi-Tech Screening systems in Denver, LOS Angeles, Seattle, and Washington Dunes, with plans for additional implementation in the fut ure. SOURCE: Site visit to O’Hare, April 1990, and Richard Davis, Operational Security, United Airlines, Jan. 3,1991.Security Equipment Currently, the FAA requires airlines to employ relatively few types of security equipment— primarily x-ray devices and metal detectors. The FAA established minimum performance standards for detecting weapons and explosives, and since these technologies are radiation-based, the FAA also requires that they meet Federal health and safety standards . 25 There are no standards governing operator interaction with the equipment, such as the layout of controls and display symbology options. At the time the FAA established x-ray and metal detector requirements (early 1970s), it had little expertise in human factors.Moreover, these technologies were relatively simple compared with aircraft cockpit and ATC consoles that the FAA had to certify without objective human-factors criteria, making humanfactors standards for security a relatively low pri ority. However, many behavioral experts argue that properly developed human-factors standards could improve system performance for aviation security as well as safety. In recent years, the FAA has issued regulations for security technologies-computer-controlled access at airports and explosive detection systems—that are considerably more complex and have wider system implications than x rays and metal detectors.As has is evidenced in the explosive detection system (EDS) regulations published in September 1989 26 and the subsequent performance of TNA, the only device to date that could meet the FAA standards. Beyond setting detection criteria, which are critical to the security system performance, the FAA also included requirements for throughput of the device (which is primarily an economics issue—see ch. 4) and a requirement for 100-percent automated detection decisionmaking. Several lines of reasoning could lead to a design goal of total automation, including lower o perating costs over the long run een commonly the case whenever new technology is used to solve a problem, attention is focused on the positive aspects of the technology—how effective it is—without giving full consideration to possible new human-factors problems caused by the technology. The lack of attention to man/ machine human-factors and system operating issues ~F~r ~xmple, ~. ray ~y~tms ~~~ P-Y for cW. on baggage must meet tie s~n~ds set by the Food and Drug Administration. x54 Federal Register 36938 (Sept. 5, 1989). Chapter 5-Human Factors in Aviation Security q 85 nd possibly removing human error from the operating loop. However, it maybe useful, and sometimes vital, to keep the human in the operating/decisionmaking loop, especially if he or she must respond during emergency or unusual conditions. As has been shown so far in TNA tests, the false alarm rate is well above earlier goals and human intervention is required quite often. While automation, in the conte xt of an EDS, is a useful tool, and total automation may be an understandable goal, requiring 100 percent automated functions in an EDS is not justified at this time.The E D S regulations provide an example of where input from a group such as the FAA’s Human Factors Coordinating Committee could help flag potentially troublesome human-factors aspects of security regulations. Airline passenger profiling, in most cases, must be fast (and consequently cursory) enough so as not to impose excessive delays. In other security contexts, such as screening for the â€Å"insider threat† profile within an organization where time is not so critical, much more detailed background data and questioning is possible.A different, although overlapping, form of profiling is used by law enforcement and investigatory agencies. Given pertinent data and evidence from a crime scene or threat, experts compile a profile of likely social, psychological, and physical characteristics of the criminal. However, much of the work and methodology could be transferred from one of the broad profiling regimes to the other. FAA Requirements for Profiling-Under Federal regulations, U. S. airlines must apply a relatively simple form of passenger profiling for international flights (e. g. questions regarding electronic devices), although airlines are not prohibited by FAA/DOT from conducting any form of profiling at any time. Whether or not a passenger is selected for closer scrutiny, such as a manual baggage search, depends on where his passport was issued (a factor that varies based on threat intelligence) and on responses to a series of questions aimed at identifying potential terrorist â€Å"dupes. † Additionally, airlines must conduct random baggage inspections on a small percentage of otherwise unselected passengers for each flight.These requirements do not apply to domestic flights or to foreign airlines, which results in an obvious gap in protection for Americans. The fact P assenger Profiling In-depth questioning of all airline passengers and detailed examin ation of each of their personal belongings and baggage is impossible in a modern transportation system. Since most of the millions of passengers that fly on U. S. airlines each year pose no security risk, targeting security resources on the small number of passengers who exhibit some elements of the threat â€Å"profile† is one way to increase security without clogging transportation flows. rofiling can be a valuable component of a transportation security system, providing an independent complement to hardware-based (and often more expensive) explosives and weapons detection technologies. Successful profiling depends on a large support system including comprehensive intelligence networks and threat analyses, information system technology to process large databases, behavioral research and analysis, and trained and motivated screening personnel.There are two general approaches to operational profiling. One compares passenger demographic and other background data (age, sex, nationality, travel itinerary, etc. ) to historic or recent intelligencederived â€Å"threat profiles. † The other is based on the examiner’s psychological assessment of the passenger, taking into account nervousness, hostility, or other suspicious characteristics. Most profiling systems currently use elements of both approaches to varying degrees. that foreign airlines that compete with U.S. airlines on international routes do not have to satisfy these requirements imposes an economic penalty on domestic carriers and weakens their ability to compete successfully with foreign carriers, which, in addition, are usually statesubsidized. Domestic airlines complain, with justification, that a â€Å"level playing field† should be established to avoid this unfair disadvantage. An option would be to compensate U. S. airlines for the additional costs, either from Federal subsidies or from the Airport Trust Fund. 7 Alternatively, foreign carriers could be required to apply similar security measures on flights landing in the United States to those demanded of U. S. carriers. The United States has forced better security practices in foreign 2% l$)7(j, Congress estiblishedaprecedent for compensating U. S. air carriers forsecuritymeasures incurred in international operatiombyautioritig nearly $10 million for fiscal years 1976-78 (Public Law 94-353, sec. 24). In 1982, Congress extended the authorized limit to $15 million (Public Law 97-248, sec. 24(d). Nearly this much was actually disbursed to four U. S. carriers. 84 q Technology Against Terrorism: Structuring Security revocation of landing rights of carriers from those countries in the absence of improvements. airports by threatening coordinating security management decisions and for providing a conduit for a detailed database. 30 The FAA is considering making CPSP mandatory, but a number of carriers oppose it, citing se curity officer vigilance problems caused by distraction by computer keyboard and display.Knowledgeable FAA and airline personnel claim that airline opposition stems mainly from the increased oversight capabilities that such a system would give the FAA CPSP would provide a detailed record of all airline profiling actions (and errors or failures) that could be used for civil penalty proceedings. Presently, the FAA oversees airline profiling procedures through random or scheduled field visits. The FAA counters that if a would-be malefactor sneaks through, CPSP also can provide documented proof that the airline followed FAA-required procedures, shifting some liability for a profiling failure to the FAA. 1 Additionally, there is substantial U. S. airlines operating on European routes have been permitted to substitute their own profiling programs for FAA requirements. 28 Most U. S. airlines and many foreign carriers conduct more extensive profile screening than minimum FAA requirements at foreign airports and some U. S. international gateways. Some airlines train their international employees in profiling techniques while others hire contractors to handle security for their international flights.Proprietary profiling procedures used by these airlines are modeled generally on the Israeli El Al method of profiling which is more comprehensive (and intrusive) than FAA requirements and reportedly includes psychological, social, and political factors. Complaints by certain groups, such as Arab-Americans, claiming harassment, stem from carrier-initiated profiling, not Federal requirements. 29 During the past 5 years, the FAA has developed and tested a computer-based profiling tool aimed at potential terrorist hijackers and saboteurs.The Comprehensive Passenger Screening Profile (CPSP) is both a checklist and decision aid for field officers and a data collection system to support profiling enhancements. It encompasses the current FAA required profiling procedures plus addit ional factors based on a data profile of terrorists, using historical and intelligence sources. The decision process for selecting a passenger for further examination is automated through a series of mathematically weighted yes/no questions (some of which do not require passenger interviews), that the security officer responds to via a keyboard.CPSP is designed for easy modication if intelligence or data analysis indicates a need. In early 1990, the FAA offered CPSP as an option for airlines to meet profiling requirements. Continental Airlines and United Airlines have tested versions of CPSP at a few locations, and have been generally pleased with its performance, especially as a tool for centrally ~ho [email  protected] FAA htelligence, personal communication Oct. 1*, 1990%llid. analytic value to the large data set that would come from CPSP.As discovered during TNA testing, little is known about the baseline average passenger and baggage; therefore, general background data, regar dless of how well CPSP works operationally, would be valuable for security planning. No names of passengers are (or legally can be) included in such a data set maintained by the Federal Government. 32 However, as private entities, airlines can and do maintain such lists. Other Issues for Human Factors and Profiling Research and Development Due to security and proprietary concerns, profiling systems in place today are shrouded in secrecy.The technical aspects of their development and quantitative measures of their performance are difficult to obtain, although the widespread use at airports across the world attest to airline confidence in profiling Given industry acceptance of profiling technology, the unregulated environment in which profiling systems were developed, and the potential enhanced capabilities and future needs, there is a ~JO~Be~~l~q Director, Comorate s~~~, COntinenM fi~es, ~rson~ commtication, od. 15, 1990 and Glen W- Director, @XtitiOI. Ud Security, United Airlines, p ersonal communication, Oct. 6, 1990. 31c)P. cit. , footnote 27. qzfiid. Chapter 5-Human Factors in Aviation Security q 87 role for a concerted Federal (DOT) effort in profiling R. The primary research fields of interest are in the behavioral sciences and in large database collection and analysis. A useful but neglected approach would be to investigate the role of cultural differences in establishing profiles. Since patterns of behavior considered anomalous in one culture are normal in others, understanding cultural effects better could lead to more effective and, possibly, less discriminatory use of profiles. 3 Relevant behavioral research with applications for profiling is being conducted by a number of Federal agencies, although they generally do not coordinate these research efforts. There is a need to coordinate research and experience in developing terrorist profiles among concerned agencies. Also, some work is going on to establish databases of past incidents and known terrori sts in order to help develop profiles. The FAA conducts a modest profiling research effort that produced the CPSP and is analyzing profiling field tests.However, this effort is housed in the in aviation security. It has worked with in-house experts, with other agencies, and with behavioral scientists under contract. There should be steps taken to guarantee that this institutional knowledge is not lost, due to needed secrecy or personnel turnover. There should also be an effort to bring together knowledge on profiling from the Intelligence Community, from the Federal Bureau of Investigation, from the Immigration and Naturalization Service, and from the FAA, so that all agencies may profitably pool their knowledge.One way of helping assure such interagency communication would be the institution of annual interagency conferences on the topic (see ch. 3). Profiling techniques and related technologies are being added to current security R plans at the FAA Technical Center. The operationa l aspects of using automated profiling systems, such as data entry and human/computer interaction, are similar to those of many other technologies, and could benefit from further research and development. intelligence section under the Assistant Administrator for Civil Aviation Security with no direct link to FAA’s R division.Historically, the FAA pioneered the use of profiles in aviation in the late 1960s and early 1970s during the upsurge of hijackings to Cuba. A team of experts under the leadership of the FAA Office of Aviation Medicine was involved in the development of the initial profiles. Limited use of profiles was made during the early 1970s and again in 1980, when immigrants from the Mariel Boatlift began hijacking aircraft to Cuba. [Profiles were employed on a limited basis to help stem the wave of hijackings to Cuba by some â€Å"Marielitos†. In the 1970s, the FAA also developed a profile for domestic use to identify persons who might be carrying explosives or incendiary devices in checked baggage. This â€Å"checked bag† profile included several objective elements and was intended for use by airline personnel at ticket counters. This profile was never applied rigorously, although some of its elements were automated by at least one U. S. air carrier. Thus, the FAA has had substantial experience with developing and implementing profiles for useA near-term research need is how best to combine profiling systems with the new security technologies now in the pipeline. In fact, arguments have been made that the TNA device can only function effectively when combined with profilebased selection of baggage to inspect, since false alarm rates are high. This is, in fact, being done at the Gatwick tests. Presently, the profiling process results in binary decisions—let the passenger pass into the normal security process (more than 95 percent of passengers) or conduct a manual search of the passenger and his baggage. One possibility w ould e to expand and refine the decision outcome from profiling to provide multiple screening paths for passengers depending on the level of threat and the availability of advanced detection equipment (see ch. 4). A longer term research option is to investigate new technologies to enhance profiling. Rapid access in the field to Federal, international, and, possibly, private databases (i. e. , hotel, credit card) could greatly enhance capabilities. Remote sensing of respiration and heart rates and other biological parameters, combined with large population databases, automated facial-recognition systems, andSsCustom offici& in the Northern ~ Islands, a U. S. -flag territory, incorporate cultural characteristics in looking for anomalies for profding. â€Å"a 88 q Technology Against Terrorism: Structuring Security biometric passports, all offer new possibilities for on-the-spot psychological and physiological assessments. From past experience, cultural factors particular to the countr y where the event is taking place frequently influence decisionmaking by local authorities. Some observers report that U. S. fficials who were involved would, on occasion, have benefited by a more detailed knowledge of the dynamics of local social systems. For example, in some cases, although crisis management officials were supposed to be in charge of handling an incident, local cultural or political factors have resulted in the crisis being directed instead by senior office holders, who are untrained for the purpose and unable to provide the rapid decisionmaking that is often required. Some research into systematizing knowledge of relevant aspects of different social systems would be useful.In this area, as in profiling, the construction of appropriate databases would be of use to U. S. officials who may be called on to participate in resolving a crisis. At present, there appears to be little coordination among agencies in understanding behavioral aspects of incident management. T his lack provides another argument for strengthening interagency coordination in counterterrorism (see ch. 3). Civil Liberties Security systems in general, and profiling methods in particular, trade certain freedoms (e. g. privacy) for safety. profiling methods, based on specific individual characteristics, may be derived from historical experience (e. g. , the large number of Cuban refugees who hijacked aircraft to Cuba in the early 1970s or the examples of hijacking engaged in by members of various Middle Eastern terrorist groups). These characteristics sometimes include physical and cultural features, since these traits are the easiest indicators to verify. Often such subjects belong to readily distinguishable minority groups.Therefore, people who possess the characteristics in question but who have no ill intentions (obviously, the great majority) could be subjected to scrutiny that could be considered to encroach on individual freedoms. This study describes measures to meet com pelling public safety interests. It is, however, beyond the scope of this study to discuss the many legal and societal civil liberties issues involved (e. g. , how much intrusiveness on privacy is countenanced by a compelling interest of the state? ).It is certain that the technical ability to investigate and record personal histories and characteristics and the demand for the use of such ability will greatly expand, thereby increasing the potential for crossing the fine line protecting constitutionally guaranteed individual liberties. Legislative attention will have to address the tradeoff between public safety and welfare and civil liberties. Policy Options The following policy options address human factors and aviation security. 1. Enhance FAA attention to human factors in security: 34 qExplicitly address aviation security in agencywide human-factors planning. The FAA has taken measures to move in this direction. Bolster human-factors expertise under the Assistant Administrator f or Civil Aviation Security and the Aviation Security Research and Development Service at the FAA Technical Center by adding professionals to their respective staffs, especially in light of plans to increase staff levels of both sections significantly during the next few years. One such professional has already been added. Incident Management Human factors also play a role in managing incidents abroad.When U. S. citizens are held hostage in a foreign country, the United States often plays a role in resolving the incident. Some foreign security officials are trained in the United States under assistance programs. But the United States also may participate actively, as it did in responding to a number of airline hijackings in the 1980s. q ~~e follo~ r=omenhtiom included in earlier drafts of this repofi has already been implemented by tie FAA q Add a designee of the Assistant Administrator for Civil Aviation Security to the FAA’s Human Factors Coordinating Committee.Chapter 5-Hum an Factors in Aviation Security q 89 2. Consider conducting R on combining passenger profiling techniques with other security technologies. 3. Give consideration to methods for â€Å"leveling the playing field† when imposing requirements on U. S. carriers but not on competing foreign ones. 4. Give consideration to civil liberties issues 5. stemming from Federal aviation security requirements. Coordinate behavioral research into profiling and incident management being conducted in the Federal Government. Arrange periodic interagency conferences on related topics.