Friday, December 27, 2019

Privacy Is Dead - Get Over It - Free Essay Example

Sample details Pages: 13 Words: 3810 Downloads: 7 Date added: 2017/06/26 Category Management Essay Type Argumentative essay Level High school Did you like this example? The essay will consider and evaluate the proposition â€Å"privacy is dead- get over it† by looking at organizational communication theory and practice. Introduction The essay will consider and evaluate the proposition â€Å"privacy is dead- get over it† by looking at organizational communication theory and practice. The essay will look at the role of the employee in the modern corporate environment, and compare and contrast this with the role and status enjoyed by the employee in more historical settings. The essay will look at the statutory framework for Data Protection in the UK, and privacy and will examine how this applies to the workplace, both in theory and in practice. Don’t waste time! Our writers will create an original "Privacy Is Dead Get Over It" essay for you Create order The role of legislation designed to protect the interests of employees will be considered and the writer will comment on the efficacy of the legislation as well as considering the specific rights that it creates for employees and the specific responsibilities that it creates for employers. The wider sociological context for issues connected to surveillance in the workplace and employment rights will be examined also, and the writer will consider how technological advancement and the Information Age has affected the status of the modern employee in terms of their privacy. The ultimate aim of creating this context will be to inform a holistic evaluation of the proposition â€Å"privacy is dead- get over it†. Privacy and surveillance in the workplace In the modern workplace there are various tensions that exist between the privacy of employees and the level of surveillance that employers may employ in order to ensure that the organization functions optimally (Sprenger, P. (1999); Treacy, B. (2009); Wilkes, A. (2011)). Social networking sites are becoming more and more popular, and the internet is being used more and more to facilitate communication within organizations: â€Å"According to the Office for National Statistics 2010 data, 30.1 million adults in the UK (60% of the population) access the internet every day or almost everyday. This is nearly double the 2006 estimate of 16.5 million. Social networking was a popular internet activity in 2010, with 43% of internet users posting messages to social networking sites or chat sites, blogs etc. While social networking activities prove to be most popular amongst 16–24 year olds, 31% of internet users aged 45–54 have used the internet to post messages on social net work sites, while 28% uploaded content. Many of the adults that use social networks do so not only for social networking purposes but also for business networking purposes. Of the individuals listed in LinkedIn this year, there are over 52,000 people, predominantly in the US, Canada, India, Italy, UK and the Netherlands (in that order) with privacy mentioned in their profile. Within LinkedIn there are also a considerable number of privacy related LinkedIn groups which have substantial memberships. Many of the readers of this article will no doubt be in those groups for social as well as business purposes†¦(Bond, R. (2010) pp. 1)†, and this intensifies the debate as to how far employees privacy can be lawfully infringed by employers. As organizational communication takes place more and more via email and other forms of electronic communication the problem of privacy is further heightened as more extensive records of personal communication are created and retained (Johns on, D. and Turner, C. (2003) p. 43-47; Jordan, T. (1999) p. 17-19; Kitt, G. (1996) p. 14-18). What to do with data like this poses a complex problem relating to the privacy of the employee and the right of the employer to infringe privacy in order to ensure the integrity of their organization. The statutory framework In the UK the privacy of an employees data, and an employers lawful access to such information is defined through a number of routes (Lunney, M. and Oliphant, K. (2003); Mc Kendrick, E. (2003)). Firstly, there is an important statutory framework that employers must respect. This is created by the Data Protection Act 1998, and also by the ECHR which requires that an individuals private and family life be respected (Article 8 of the ECHR). These rights are enforceable by an individual in a civil court in the UK, but also by public agencies in the UK like the Office of the Information Commissioner (Sprenger, P. (1999); Treacy, B. (2009); Wilkes, A. (2011)). The Data Protection Act 1998 has created a number of principles of data protection, which must be respected. These are that information (i) must be fairly and lawfully processed; (ii) information may only be obtained for specified lawful purposes, (ii) may not be processed in any manner incompatible with such purposes; (iii) dat a must be adequate, relevant and not excessive for the purposes for which it is collected; (iv) information must be accurate and where necessary kept up to date, (v) information must not be kept longer than necessary, (vi) information must be processed in accordance with the rights of data subjects, (vii) security measures must be taken against unauthorized and unlawful processing of information against accidental destruction, or unauthorized or unlawful destruction, and (viii) information must not be transferred outside the European Economic Area within the consent of the data subject. In cases where these principles are not adhered to by employers, an employee may institute civil actions for breach of privacy, and or complaints to the ICO who may pursue criminal prosecutions against any party who has breached the Data Protection Principles (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). As such the Data Protection Act 1998 creates a range of rights in terms of priv acy and security of personal information and these may be enforced directly by an individual or by a public body such as The Information Commissioner on behalf of an individual. Breach of the Data Protection Act 1998 is a criminal offence which is punishable with fines and or up to six months imprisonment. Recent changes to the powers of the Information Commissioner gives them powers to issue fines of up to  £500,000 for cases of serious breaches of the Data Protection Act 1998 (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). On the other hand there is also a statutory framework that addresses how far an employer may go in terms of monitoring their employees in the course of employment. The Regulation of Investigatory Powers Act 2000 and the Telecommunications (Lawful Business Practice) (Interception of Communication) Regulations 2000. These provide that monitoring of employee data can only be authorized for specific, defined purposes such as where the employer h as a legitimate overriding interest in the pursuit of monitoring activities (Schirato, T. and Yell, S. (2000) p. 42-45; Sime, S. (2007) p. 12; Smith, M. and Kollock, P. (1998) p. 32-35). Thus it may be argued that there is a balance to be struck between the information that employees disclose which may be lawfully evaluated by the employer (deemed for example in communication privacy management theory as â€Å"self-disclosed† information (see: Petronio, S. (2002) p. 3)) and information that is subject to inappropriate uses. Clauses in the employment contract may also define the rights and responsibilities of the employer and the employee in terms of privacy, but it is important to note that employers may not, through the operation of a private contract exclude any of the rights and or responsibilities that are defined in The Data Protection Act 1998, or the ECHR (Blanpain, R. (2007); Elliott, C. and Quinn, F. (1999)). The wider legislative framework may be further defined according to the theory of privacy rule development. Privacy rule development theory argues that cultural, and sociological factors impact the boundaries of privacy rights (Petronio, S. (2002) p. 40) and it is clear that there is a balanced approach to the rights of the employee and the responsibilities of the employer under this framework and this reflects wider liberal sociological and cultural values prevalent in the UK. Management Information Communication Systems and Monitoring Strategies Different strategies may be adopted by organizations in terms of monitoring their employees. Historically, opportunities for monitoring were limited for example in relation to workers on shop floors or in a physical office environment (Freedman, J. (1994); Fletcher, I. (2001)). In modern times employees may be monitored in terms of the keystrokes that are used by them or their computers or at their work stations. Additionally, the use of smart cards and CCTV monitoring of employees may give employers extra information with which to monitor the activities of employees (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). There is also a valuable market for the use of computer products that allow employers to monitor employees, for example Spector Pro which uses the slogan â€Å"when you absolutely need to know everything they are doing online†. The use of products and services such as this is referred to as the embedded approach to workplace surveillance, where the employer â€Å"tracks† the activities of the employee mainly through the use of computer based products. Companies are undertaking proactive strategies like this to assess what is the most appropriate way to monitor employees, while striking a balance between effective monitoring and preserving staff morale, a case in point being Servisair which undertook a holistic risk assessment of the organizational monitoring practices in their company and concluded that methods of monitoring of employees needed to be improved across their organization. It is clear that in the Information Age, managers have much more information at their disposal that allows them to make more informed choices as to the vetting of possible future employees, and also the performance of current employees (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005)). All of these changes raise attendant privacy issues. An organizational communication perspective – is privacy dead? The question of whether privacy is dead is a complex issue. A simple example might be that an employee viewing pornography at their work station in circumstances where they are unaware that the employer may be able to access their computer also and view their electronic â€Å"history†, might be disciplined or dismissed by that employer. The employer who instituted disciplinary action against such an employee may be seen to have acted in a justified manner. However, there are also cases where the dividing line between the rights of privacy and the responsibility of the employer to respect that is less clear. Several cases for example highlighted in the media recently have involved employees â€Å"off sick† who were disciplined or dismissed when it later transpired that they had been using social networking sites during their time off, casting doubt of the veracity of their claims to illness (Moult, J. (2009)). What to do regarding data recovered as a result of a third party data breach represents another difficult issue for employers: â€Å"there was considerable media attention drawn to the fact that a security consultant, Ron Bowles, had used a piece of code to scan Facebook profiles collecting data not hidden by the users privacy settings. The scanned list of profiles was then shared as a downloadable file across the internet, and allegedly caused privacy fears for the 100 million users of Facebook whose personal data were compromised. The reaction by the media and regulators to the exposure of personal data in the new social media platforms of Facebook, Google and the like, tends to be focused on the intrusion on individuals privacy. When personal data are compromised in the realm of social media, the media reaction is to blame the SNS provider for, firstly, not having enough security in place and, secondly, for not having done enough to draw the attention of users to the need for them to manage their own privacy in terms of privacy se ttings and privacy parameters†¦Ã¢â‚¬ ¦(Bond, R. (2010) pp. 3)†. Other cases have been highlighted where comments published by employees in reference to their employers on social networking sites have led to dismissals, and or disciplinary action where these have amounted to unauthorized disclosures of information, or unwelcome criticisms of the employer (Moult, J. (2009) and see also: Freedman, J. (1994); Fletcher, I. (2001)). In terms of the employee, it is also the case that records of email communication can be viewed by employers on a Master server computer, and so whereas an employee may be under the impression that their personal work email may be used for personal communication, they may not be aware that an employer could also have access to these records of communication (Sprenger, P. (1999); Treacy, B. (2009); Wilkes, A. (2011)). Kuschewsky, M. (2009) highlighted a case recently where an employer was prosecuted by the ICO for compiling a database of personal data on employees to include information about their personal lives, employment history, personal relationships, political affiliations and trade union membership. The database was seized by the ICO during the course of criminal proceedings relating to the Data Protection Act 1998, and it emerged that the database had been used by up to 40 construction companies for employment vetting without the knowledge of the employees. The consultant managing the database was prosecuted by the ICO for failing to inform the employees that their personal information was being used in this way, and the ICO considered taking legal action against the construction companies for using the information inappropriately (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). Surveying all of this information about how the status of the employee has been affected by technological developments, it is easy to see why some scholars might argue that privacy is dead. The fact is that privacy is somet hing that is a lot more difficult to preserve in a modern working environment. Social networking sites and activities on these provide a prime example of why. Whereas one hundred years ago an employees private communications between their friends about their work would be largely inaccessible to an employer (Johnson, D. and Turner, C. (2003) p. 43-47; Jordan, T. (1999) p. 17-19; Kitt, G. (1996) p. 14-18), this has changed considerably as real-time electronic communications create considerable amounts of data for employers to use to evaluate the employee and their performance at work (Freedman, J. (1994); Fletcher, I. (2001)). Commercial profiteering has also grown up around the vetting of employees, as the case of the ICO prosecution of a security vetting consultant discussed above highlights. Organizations for example have emerged that compile databases of individuals that may be searched to give employees extra information about the employee, and so it is becoming more and more di fficult for an employee to â€Å"hide† a gap in their work-history, a dispute with a previous employer, a dismissal or even a poor credit history due to the risk that an employer may be made aware of it as a result of their vetting process (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). In terms of the proposition it is however submitted that it must be rejected. Privacy in the workplace is not dead. If anything, the exact opposite is true in that employees have a range of rights that are specifically designed to protect their privacy in the workplace, the most notable being the prospect that the ICO would choose to pursue criminal prosecutions against an employer (Sprenger, P. (1999); Treacy, B. (2009); Wilkes, A. (2011)). In this respect it may be argued that the status of the employee subject to monitoring in their work is subject to growing protection by an ever-increasing range of rights that are being enacted by policy-makers. In this regard the influ ence of the EU is of particular significance, since the impetus for the enactment of the Data Protection Act 1998 in the UK lay in a 1995 EU Directive on data protection (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). An example that highlights this is the Data Protection Act 1998 and the growing powers that the ICO can apply to employers who abuse the personal information of employees. As Kuschewsky (2009, pp. 2) notes for example employees cannot be forced to submit to surveillance in the workplace in the absence of informed consent, and genuine choice as to their consent. Further employers are required to demonstrate that there is a specific need for the surveillance practice to be pursued. Thus, in a sense any surveillance practice employed by an employer is subject to another type of â€Å"surveillance†, and in cases where inappropriate practices are identified employers can incur significant financial penalties which can lead to significant civil liabili ty to employees (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). It may be argued that rather than privacy being dead, it is the case that more and more information is entering the public domain and this information may be used by employers to limit the rights of an employee. The distinction to be drawn is significant though. If privacy may be seen as something that employees enjoy less and less, this is not a function of privacy regulation, but rather a function of information and the amount of information that is available regarding employees in the workplace (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). The distinction between the relationship of privacy to privacy laws and regulation and the relationship of privacy to information and its availability is important, because it is the central tenet under which the proposition â€Å"privacy is dead† may be rejected. It must be remembered that just because information may be available, it is not the case that employers can simply do what they wish with it. As more and more information becomes available to employers, policy-makers are responding by imposing regulation as to what is an appropriate use of information, and setting out statutory powers that may be used to act against employers who have abused the trust of employees who have made their information available to them (Johnson, D. and Turner, C. (2003) p. 43-47; Jordan, T. (1999) p. 17-19; Kitt, G. (1996) p. 14-18). Conclusion This essay has argued that the Information age has changed the status of the employee significantly. The increased use of email and other forms of electronic communications in the workplace has meant that a modern employer typically holds a great deal more information about the employee than would have been the case one hundred or even fifty years ago. Additionally, the divide between a persons personal life and a persons status as an employee is lessening with the use of social networking sites (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). There has also been a commercialisation of employee monitoring and this can lead to the adoption of information systems and products to appraise the performance of employees in terms of â€Å"tracking† their activities online, and creating statistical profiles of their internet use. The case of Servisair was discussed to highlight this, and many other corporate organizations are attempting to reduce the risks that they a re exposed to in employing employees by gathering information about their personal lives, financial interests and also their activities while they are at work (Johnson, D. and Turner, C. (2003) p. 43-47; Jordan, T. (1999) p. 17-19; Kitt, G. (1996) p. 14-18). The result is that employers have much more opportunity to review the performance of employees. It is not the case however that these changes have taken place in a vacuum. In the UK at least a strict statutory regime has grown up around issues of privacy, the most important being the Data Protection Act 1998 and the ECHR. These have created privacy rights in both the private and the public sphere (Johnson, D. and Turner, C. (2003) p. 43-47; Jordan, T. (1999) p. 17-19; Kitt, G. (1996) p. 14-18), as employers face the prospect of fines and criminal prosecutions in cases where it is found that they have abused or inappropriately used information regarding an employee (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005) p. 57). It has been argued therefore that as more and more information has become available to employers, employers have been fixed with more and more responsibility to use this information appropriately. The development of the legislative framework in the UK highlights this, with the development of the Data Protection Act 1998 as well as the public law agencies such as the ICO who are empowered to enforce it. A case in point was the case highlighted by Kuschewsky, M. (2009) where a security consultant hired by 40 construction companies to provide vetting services regarding construction workers was prosecuting under the Data Protection Act 1998 for breaches of the data protection principles (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005)). It is clear therefore that whereas employers can reduce risk by carrying out dubious vetting practices, there are also many risks that corporations are exposed to in cases where they abuse personal information, or when they infringe the rights o f employees to enjoy a reasonable level of privacy. The default position that is encouraged is one where an appropriate balance is struck between the rights of the employee to privacy and the responsibility of the employer to respect privacy. On the whole the writer has rejected the proposition that privacy is dead, because there is clear evidence that privacy is something that employers need to respect if they are to avoid criminal prosecution and the risk of litigation by disgruntled employees (Kuschewsky, M. (2009); Hansson, S. and Palm, E. (2005)). It has instead been argued that, rather than privacy being dead, privacy is just harder for employees to maintain in the Information Age. This, it has been suggested is a function of the availability of information, and not a function of the status of privacy. If anything privacy has become something that employers need to be more and more aware of, albeit in circumstances where much more information is available to them as to the performance of an employee. References Bond, R. (2010) Data Ownership in Social Networks A Very Personal Thing. Privacy and Data Protection. 11 1 8 (Nov) Blanpain, R. (2007) The Global Workplace: International and Comparative Employment Law. CUP. UK. Elliott, C. and Quinn, F. (1999) Contract Law. Longman, UK. Freedman, J. (1994) Small Businesses and the Corporate Form: Burden or Privilege? The Modern Law Review (Vol. 57) (4) pp. 555-584 Fletcher, I. (2001) A Small Business Perspective on Regulation in the UK. Economic Affairs. Vol. 21 (2) pp.17 Hansson, S. and Palm, E. (2005) The Ethics of Workplace Privacy. Lang. Brussels. Jensen, K. (2002) A Handbook of Media and Communication Research: Qualitative and Quantitative Methodologies. Routledge. UK. Johnson, D. and Turner, C. (2003) International Business- Themes and Issues in the Modern Global Economy. Routledge. UK. Jordan, T. (1999) Cyberpower: The Culture and Politics of Cyberspace and the Internet. Routledge. UK. Kitt, G. (1996) Advanced Organizational Struc tures. Elan. UK. Kuschewsky, M. (2009) Surveillance at the Workplace – How to Avoid the Pitfalls. Privacy and Data Protection. 9 6 (8) (June) Lunney, M. and Oliphant, K. (2003) Tort Law. OUP. UK. Mc Kendrick, E. (2003) Contract Law. Clarendon. UK. Moult, J. (2009) Woman Sacked on Facebook for Complaining About Her Boss after Forgetting She Had Added Him As A Friend. Available at: https://www.dailymail.co.uk/news/article-1206491/Woman-sacked-Facebook-boss-insult-forgetting-added-friend.html Petronio, S. (2002) Boundaries of Privacy: Dialectics of Disclosure. SUNY. USA. Schirato, T. and Yell, S. (2000) Communication and Culture: An Introduction. Sage. UK. Sime, S. (2007) A Practical Approach to Civil Procedure. OUP. UK. Smith, M. and Kollock, P. (1998) Communities in Cyberspace. Routledge. UK. Sprenger, P. (1999) Sun on Privacy – Get Over It. Available at: https://www.wired.com/politics/law/news/1999/01/17538 Treacy, B. (2009) ICO Tells Employers – Dont Be Scared to Screen Staff. Privacy and Data Protection. 10 2 1 2 (December) Wilkes, A. (2011) What Does Privacy in the Workplace Really Mean in Europe? – Part 11. Privacy and Data Protection. 11 4 14 (March)

Thursday, December 19, 2019

Reflection On My Genius Hour Project - 1212 Words

Greetings and welcome to my Genius hour project! This is a project I have chosen because I am a very intuitive person, and with an abstract object such as the brain to study, I feel inspired to learn more and investigate the brain’s actions, jobs, abilities, and the overall science behind it. The human brain shapes the way we perceive and think about our everyday lives based on the experiences we gather and live through. My genius hour project is about where the best learning happens. For my genius hour infographic I decided it would be appropriate to learn about what also happens to the human brain when problems are formed inside. This lead me to the complex field of neurology. This field inspired me quite materially. So without further†¦show more content†¦There often appears to be a gap between the individual’s potential and actual achievement. This is why learning disabilities are referred to as â€Å"hidden disabilities.† neurologists learn how to effectively identify and treat many types of mental disorders, nerve problems, and viruses that threaten the brain’s security. Prong 2: Many neurologists go through an extensive education that helps them to identify and treat the diseases and disorders of the central nervous system. There are many different careers in neurology including, neurologist neuroscientist,neuroanatomist neurobiologist, neurochemist,neurological Surgeon, neuropathologist, neuropharmacologist, neurophysiologist, Electroneurodiagnostic Technician, neuropsychologist, neuroradiologist, Psychobiologist/Biological Psychologist, Psychiatrist, neuroscience nurse, and a Psychophysicist. † Most neurologists earn degrees in, â€Å"Biology: With a biology degree, you will focus heavily on the anatomy, physiology and makeup of organisms and their systems, Physics: Physicists study the laws of matter, Chemistry: This branch of scientific thought is concerned with atoms, molecules and the other basic building blocks that comprise the substances. neurologists are also required to go through pre-med.To become a neurologist, you must first e arn a bachelor’s degree in a field that will prepare you for medical school,† as stated byShow MoreRelatedWarning : The Following Review1052 Words   |  5 PagesI legitimately thought it was a joke, like seriously. It looked so ridiculous that when I saw Jordan Peele’s name on it, I thought â€Å"ok good one, you got me†. To my surprise, it wasn’t a joke and suddenly I went â€Å"That’s a funny trailer†¦it s serious Oh dear God†¦Ã¢â‚¬  If you can imagine my shock of this being a real film, you can imagine my shock that the film came out to rave reviews and no critics have written a negative review about it on Rotten Tomatoes thus far†¦not a single one. Given the racialRead MoreReflection Essay : Rent s Due Art Boy 915 Words   |  4 PagesReflection journal Essay Sculpture, the thing I never knew I was good at. Two semesters ago I met a very strong woman, and she opened up a part of me that I had mostly given up on. The part of me I had given up on over a decade ago was my artistic side. I simply felt that it was a waste of time to spend hours perfecting something that would most likely never make me money. Also, I would look at the multitude of staving artists online, and consider how much better they were than myself, and howRead More The Role of Religion in Elementary Secondary Education Essay1540 Words   |  7 Pagesmoment of science†. I laugh at the bumper sticker as I pull into my high school’s parking lot. The controversy of public school prayer has not struck my particular school, but it is still prominent in my mind. For decades, many schools have allowed for a moment of silent prayer in the beginning of the day – a time for reflection or meditation – and some have even led deliberately Christian-oriented prayer services over the PA systems. My sch ool would open each class with a recitation of â€Å"Let us rememberRead More Three Eras, Three Novels2270 Words   |  10 Pagesno ultimate goal of progress; and as limits continue to be broken, the boundaries of human interference in nature are expanding indefinitely. Everywhere, there is a sense of the unconquerable forces unwittingly evoked to serve the project of progress, bringing the project itself into question. This idea has produced three novels that suggest the improvidence of mans quest for authority from natural law; they are: Frankenstein, by Mary Wollstonecraft Shelley, H.G. Wells The Time Machine, and BraveRead MoreShort Story1290 Words   |  6 Pageslittle bridge.† She then clasped his hand close to her chest and he could feel her heart palpitations. â€Å"The apple orchard... the trees look so beautiful and healthy.† â€Å"Just wait until the fall—they still give the most delicious apples. Dad’s pet project was getting the orchard back in shape and we’re partners in that now. We hired an orchardist last year.† When the majestic mansion came into view, he could tell that she was thunderstruck. â€Å"I swear the house is glowing,† she cried, and indeed it didRead MoreEssay about Jim Morrison; From Boy To Legend1455 Words   |  6 Pagesnbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp;Jim Morrison is often thought of as a drunk musician. He is also portrayed to many as an addict and another doped up rock star. These negative opinions project a large shadow on the many positive aspects of this great poet. Jims music was influenced heavily by many famous authors. You must cast aside your ignorance and look behind the loud electric haze of the sixties music. You must wipe your eyesRead MoreAnalysis Of The End Of The Night By F. Scott Fitzgerald Essay1679 Words   |  7 PagesIn the end, Tom’s long-awaited shower did little to relieve the tension in his body, and stepping out of the cubicle, he wiped a hand over the steamy bathroom mirror and carefully studied his reflection. Dozens of tiny water droplets clung to his hair, the shimmering beads eventually losing their precarious hold in rhythmic drips, sending a trail of moisture down his chiseled cheeks and onto his smooth chest. Stress had etched deep lines around his eyes, the weary, pained expression becoming moreRead MoreSocial Media And Its Effect On Society Essay1817 Words   |  8 Pagessometimes he senses it. But without deeper reflection one knows from daily life that one exists for other people- first of all for those upon who’s smiles and well-being our own happiness is wholly depen dent, and then for the many, unknown to us, to whose destinies we are bound by the ties of sympathy† (Einstein, p. 536-537). I am writing this journal in a time of personal struggle and a time of turmoil, but turning to this quote has lead to countless hours of thinking and simultaneously feeling aRead MoreResearch paper on the beatles2935 Words   |  12 PagesThe Story of My Search Everyone, Americans and Europeans alike, have heard-of, if not grown off of, a generation and culture started by an ensemble of four shaggy-haired Liverpool musicians that the world went mad over; no one can deny that no greater event impacted todays pop culture than Beatlemania. But not everyone has heard the story behind the Beatles, who were they? How did they become the band and how did they make it big? Whats the story of their struggle? Before researching, I alreadyRead MoreAnalysis Of James Joyce s The Dead Essay1857 Words   |  8 PagesJames Joyce has been regarded as a literary genius for the better half of a century, and perhaps his most popular and most widely debated piece is the last story of Dubliners, â€Å"The Dead.† The ending paragraph of the story is deemed one of the most beautiful endings in all of modern literature, and the story’s ultimate meaning can be hypothesized and criticized in discussion after discussion, making it a popular work among the ascribed literary canon in academia. The whole of Dubliners is meant to

Wednesday, December 11, 2019

Uncovering Business Benefit From Regulatory - MyAssignmenthelp.com

Question: Discuss about the Uncovering Business Benefit From Regulatory. Answer: Compliance requirements: This section of the summary report presents various requirements for compliance systems including the external and the internal requirements. This section also includes the compliance requirements of the industry. internal compliance requirements: The internal compliances are followed for providing assurances for following to the policies, standards and codes in the internal environment of the company (Othman and Doherty 2014). In addition, the internal compliance is also responsible for providing a framework for assisting in the achievement of compliance standards. Figure 1: Internal compliance framework (Source: Othman and Doherty 2014, pp 24) The library of internal compliance requirements includes the policies and codes of the company. The code of conduct followed by Befesa is concerned with a legal and ethical framework to be followed by the employees, directors and executives. The library of key controls lies in conjunction with risk and control assessment. The company is subjected to regulations and laws corresponding to law and corruption. The company business process has to be analyzed for identification of the risk procedures. Attestation corresponds to the execution controls which are needed for complying with the policies. This involves detection of the non-compliance issues, investigation of them and execution for meeting the standards. External compliance requirements: The external compliances are set for meeting the various requirements externally (Ifinedo 2014). It is also in place for providing a framework for complying with the externally required materials. Figure 2: External compliance (Source: Ifinedo 2014, pp 75) The external compliance requirements are the same as the internal requirement list excluding the risk control aspects. The external compliance requirement includes the presence of external officers for monitoring the level of compliance in the company. The external officers will be responsible for the development of compliance questions for the company. This will then be passed to various business reports and the attestation questions will be developed. Industry compliance requirements: The industry level requirements of the compliance policy need to achieve success and a strong business ethics. In addition, it also includes the protection of staffs and the reputations of the company (Braithwaite 2016). The customers of the company are also to be secured by the compliance policy so that the business process is not hampered. Compliance effects: This section discusses about the various effects where the compliance will have its impacts. Areas affected: The main areas impacted by the compliance policies are the legal and financial aspects of the company and the environment of the company. This helps in efficient use of resources and also helps in meeting the requirements of the customers. Risks: The major risks of the company are the environment laws and regulations. As the company is involved in environment management, there are specific amount of risks that are always considered by the company. According to this, all the legal policies are to be complied by the company and their subsidiaries. Penalties: The compliance policy is to be maintained and all the business units are to be complied with the policy. Failure to comply will result in various penalties. Risk minimisation: The risks of the company will be minimized by the compliance policies. This will result in long term success and efficiency of the company. Compliance systems: Available systems: The major systems to be discussed are the risk management systems. This involves setting up of a risks mitigation plan that will be helpful for the staffs to follow the set standards. Parameters: Cost: The cost effectiveness of the risks systems has been complied with the business process. Effectiveness and efficiency: The effectiveness and the efficiency of the compliance system are supposed to increase the success of the company. Feasibility and organizational culture: The risk management of the company has been made for analyzing the anti-money laundering systems of the company. Recommended systems: The company needs to consider the adoption of identity checks in their system. In addition, the analysis of the customer information is also to be emphasized so that the business can be effectively measured. References: Braithwaite, J., 2016. Law and Corporate Behaviour: Integrating Theories of Regulation, Enforcement, Compliance and Ethics by Christopher Hodges. Bhr, D.L. and Seitz, C., 2015. From compliance programme to compliance management systems: International convergence and standardization.Business Compliance,4(2), pp.28-42. Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition.Information Management,51(1), pp.69-79. Othman, A. and Doherty, N.F., 2014, April. Uncovering Business Benefits From Regulatory Compliance Systems. InUKAIS(p. 24).

Tuesday, December 3, 2019

The Canterbury Tales Clerk and Monk Essay Example

The Canterbury Tales: Clerk and Monk Paper The Contrasting Characters: The Monk and The Clerk of Oxford The Monk and the Clerk are two characters lying in opposite extremities. What one person lacks, the other has gained in abundance. This essay will explore the major differences between the Clerk and Monk in the Canterbury Tales; its focus mainly pointed to physical descriptions, differences in personality and the underlying themes in their tales of sacrifice and betrayal. Chaucer the pilgrim is quite keen on both of these opposite characters in respect to their attitudes. The Monk is a merry man who has a portly body and not an inch of hair on his head and is explained as attractive. His love for fine jewellery is presented with the gold he wears on his body, including the gold pin with a love-knot in it, which will be examined later. His love for food can be noticed by the weight he carries. His easy-going nature is quite darkened with the tragic tales he tells on his journey to Canterbury. The Monk owns several horses in perfect condition and the finest riding equipment, showing more signs of his wealth apart from his refined clothing. We will write a custom essay sample on The Canterbury Tales: Clerk and Monk specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Canterbury Tales: Clerk and Monk specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Canterbury Tales: Clerk and Monk specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The Clerk is quite opposite from these physical details; he is quite thin from being underfed and not having enough money to feed himself properly. He is shabbily dressed. His horse is as thin as the Clerk himself. The Clerk is poor, as a student spending more time reading for learning purposes rather than gaining money. The Monk displays some curious habits as a religious figure. His hobby is to hunt, which is against the morals of his profession. His rich clothing and appetite for good food are contrary to the rule of poverty that monks are known to be in. He has no patience for the rules that confine monks to study or labour, he is therefore rebellious and disobedient. The gold pin that he dons with a love knot implies that he has broken his vow of chastity towards his religion. He shows the qualities of what exactly a monk should not be. He pursues his own desires and is quite content with it yet he flaunts his authority in the presence of other even though he doesn’t work very much. On the contrary, the Clerk is an ideal form of his profession. He spends the money he earns on books instead of clothes and food. He is quite quiet in the beginning of the pilgrimage until the Host kindly asks him to speak. The clerk who is a student at Oxford and pursuing his Master’s degree in logic has a knowledgeable speech and regarded highly by the Host. The Monk’s tale focuses on the theme of tragedy and revenge and is based on Boccaccio’s de Casibus Virorum et Feminarum Illistrium. In the Italian Renaissance, it is regarded as one of the greatest works of early humanism and was emphasized in the Greek and Latin classics focusing on the importance of man as his own individual regardless of their fame which can be contrasted with the medieval views. Chaucer has taken the basis of this view and brings it back to the setting of the Middle Ages, writing about the downfalls of famous people. The accounts of the famous people in the Monk’s Tale are examples of strong and powerful men who have been betrayed and destroyed. As examples, Lucifer was an angel who fell through sin. Adam lived in paradise until one moment caused him to lose everything. The ruler of Israel called Sampson was incredibly strong; his wife convinced her husband to divulge into the source of his strength and betrayed him by telling his enemies and taking another husband for herself. His hair was then cut as it was the source of his power and he was thrown into a cave. Later on, after being teased for his lack of power, Sampson’s strength returned killing an entire temple and even managing to kill himself. Every man in the Monk’s tale suffered from betrayal. The Monk’s moral tale of not to divulge secrets to your wife was shown in Sampson’s segment. Conversely, the Clerk’s tale had learned his tale from the scholar and poet named Petrarch at Padua. The outlining themes of this tale involve inner purity and it is a story of philosophical morality. Griselda has given her husband total control and Griselda regards them as one person, she acts and thinks as Walter does, giving him complete sovereignty. The themes of revenge and betrayal in the Monk’s Tale contrast with Griselda’s sacrifice nd her purity. The Clerk had mentioned to the other pilgrims that Griselda was not a model for women to imitate but an example to be patient when God tries us. Griselda’s voluntary acceptance to suffer contrasts with the famous people in the Monk’s tale who died out of spite, revenge, hatred or who killed themselves to avoid suffering. In conclusion , The Monk and the Clerk lie on opposite extremes. The Monk physically is a stocky man, showing his wealth through jewellery and the finest horses and equipment. The Clerk is thin and trying to make ends meet. Personality-wise, he Monk displays curious behaviours that go against a Monk’s usual beliefs. He has broken his vow of chastity, of poverty; he has taken up hunting as a hobby and eats the finest foods. He doesn’t believe in the meaning of work, however, the Monk will gladly gloat over his supremacy. The Clerk however, is a quiet character, who speaks only when spoken to and thinks of books and reading. He spends all his money on books so he could consequently feed his mind with logic and it is proven with his knowledgeable speech. These two characters have also told contrasting tales. The merry Monk has told successive tales of tragedies and death. The quiet, poverty-stricken Clerk was told by the Host to disclose a happy tale even though the Clerk goes in a slightly off direction and speaks of a religious tale of the acceptance of suffering. Chaucer can successfully portray characters exactly as they should be or how opposite they are. The audience can imagine a Clerk as a studious type, spending time on reading books and telling a philosophical tale. On the contrary, a hunting Monk is quite humorous as this character even seems.

Wednesday, November 27, 2019

The Role of Supply Chain Risk Management in Ensuring Smooth Functioning

Introduction A number of issues such as changes in product design, branding and employee are likely to cause risks that threaten supply chain. Risk management in this field is a fundamental activity at the executive level in most organizations.Advertising We will write a custom essay sample on The Role of Supply Chain Risk Management in Ensuring Smooth Functioning specifically for you for only $16.05 $11/page Learn More Several studies have developed various models and theories that attempt to provide an explanation of the need for supply chain management in reducing risks. The purpose of this paper is to review and analyze some research articles from various authors with an aim of exploring theories and models developed over the last few decades. Model and theory analysis: Review of research Lin and Zhou (2011) carried out a study to address the impact that product design changes have on supply chain, with a special focus on the risks involved. Using a case study, the researchers developed some concepts that attempt to explain how supply chain runs under risks when the product design changes significantly. The theory attempts to show that such changes predispose an organization to a number of risks in supply, policy and delivery. Moreover, this theory suggests that change in product design leads to an array of risks at the internal level, which in this case involves research and design, production, planning, organization and information. This theory seems to indicate that any change in the product design that may have a significant impact on the customer and retailer’s perception of a product is likely to expose the supply chain system to these risks, which means that both customer-requested and company-initiated change in product design exposes the supply chain system to these risks. Using an in-depth longitudinal case study, Khan, Christopher and Burnes (2012 examined the impact of product design on the supply chain risk. The case study was based on a major cloth retailer in the United Kingdom. The researchers aimed to address the questions associated with the increasingly important issues of the impact of product design on the risks involved in supply chain management. The case study leads to a concept that was used to explain the impact of product design in the supply chain and the associated risks. The researchers theorize that risk management in supply chain is heavily dependent on the product design, where recognition of a design is a creative function of managing risks. In addition, the theory attempts to show that recognizing product design is a fundamental platform, on which risks are managed with ease and effectiveness.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This concept attempts to show that recognition of product design must be one of the major activities as well as requirements for risk management at the executive level. In addition, this theory seems to have closer association with the theory developed by Lin and Zhou (2011), as both of them emphasize on the need to consider product design as one aspect or factor that may lead to risks as well as effective management of risks in the supply chain. Christopher and Peck have attempted to present a good analysis on how supply chain management can effectively control risks by building a resilient supply chain system. Although the research is an analysis of findings rather than an empirical study, it provides the reader with some important theories that attempt to explain how product design impacts the supply chain in modern organizations. An important model developed in this article is the argument that building a resilient supply chain depends on a number of features that can be engineered into the supply chain to improve resilience. Among these factors is the need to focus on product design, which should be incorpor ated into the general designing for the supply chains in organizations. In addition, the concept argues that product design plays a major role in the process of understanding the supply chain and its structure. According to the article, products are the major aspect of a supply process, which means that their nature and impact on the whole process are fundamental. Therefore, failure to focus on product design when engineering supply chains is likely to involve risks that threaten the integrity and effectiveness of a supply chain management in a globalized business environment. This theory is important in providing some background information on the need to focus on product design when managing and engineering supply chains. In fact, it shows the important role that product design plays in mitigating risks in supply chains. The article by Chopra and Sodhi (2005) is based on real-life examples of how risk management in supply chain poses threats to the business process in a modern bus iness environment. The authors used two cases in which an electricity supply plant operated by Royal Philips Electronics in Albuquerque, New Mexico, was hit by a lightning in 2000. The massive surge the impact of the lightning caused at the grid started a fire that completely destroyed the plant’s microchips. Nokia Corporation was one of the major customers of the Royal Philips at the time. The impact of the lightning caused a massive reduction in the number of microchips at the Royal Philips stock, which made corporations like Nokia and others find it difficult to deal with the company.Advertising We will write a custom essay sample on The Role of Supply Chain Risk Management in Ensuring Smooth Functioning specifically for you for only $16.05 $11/page Learn More However, it is worth noting that Nokia Corporation had more than one supplier in its supply chain strategy, which made it possible to switch from ordering chips from the Royal Philips on a temporary base. This proved effective in risk mitigation. On the other hand, the authors compared this situation with the impact of the problem at Telefon AB Ericsson Corporation, another major customer of the Royal Philips Corporation. This company had a single provider of chips in its supply chain. The company suffered from the problem, which led to a complete shut down of operations until the Royal Philips resumed production. From the two examples, the authors attempt to develop a theory, in which they explain the need for an effective design in the supply chain system. In this theory, the authors argue that corporations that use multiple designs for a product that is either sold or outsourced are likely to mitigate the risks involved when one product line or design is affected by any problem that may arise. In other words, this theory hypothesizes that multiple supply chain designs are more effective in risk management and mitigation than single-design supply chains. Supply c hain management in the process of supplying and delivering high risk products such as oil and gas proves to be one of the most crucial aspects of managers in these corporations. In fact, high risk but, at the same time, high profitable oil and gas production and supply provide a good example of how risk management in the supply chain can be enhanced with product design. Vosooghi, Fazli and Mavi (2012) used this example to develop additional concept of product design and its impact on supply chain management in the oil supply industry. The researchers use the fuzzy analytical hierarch process (FAHP) to weigh and analyze the risks related to crude oil supply chain. The study, carried in Iran, developed some theory that can be used to explain how risks can effectively be managed and mitigated in crude oil supply process. This model argues that regulation and environmental risks as well as cooperation polices can be viewed from a design perspective. Although the theory does not deal wit h product design, the conclusions made in the article indicate that the way, in which the product is designed, usually influences the effectiveness of risk management in the supply chain.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The aerospace industry is another high-risk field that requires attention when studying risk management and product design. Sinha, Whitman and Malzahn (2004) developed a study, in which they aimed at explaining how risk management can be effected in aerospace industry. The researchers argue that most of the supply chain systems involve a single supplier, which is likely to increase risks involved. Therefore, risk management proves to be an important area of management in companies that adopt this system. The researchers’ aim was to develop a model that can mitigate risks in supply chains adopted by aerospace companies. The results of the study have provided some models that can be used to mitigate risks in these companies. According to the study, IDEF0 concept is a model that mitigates risks in the aerospace supply chains. The model has five stages: risk identification, risk assessment, planning, and failure analysis and continuous improvement. Although this model focuses on a number of issues, it is worth noting that the design of the products in the supply chain system is a fundamental aspect of the model. Tang (2007) published an article that explains the risks involved in supply chains and how they can be managed with effectiveness even during crisis. The researcher develops a model that attempts to show how supply chain managers can enhance the supply chain to navigate through major disruptions whenever they occur. According to this model, inherent fluctuations are the first aspect that increases the risks, which implies that they should be the first issues to address in management. Secondly, the model indicates that corporations must design and reengineer their supply chain systems to enhance resilience and the ability to withstand the impacts of major disruptions. In addition, the model indicates that enhancing residence is strongly linked to the process of retaining apprehensive customers. Goh, Lim and Meng (2007) developed a study, in which the y attempted to develop a model for enhancing risks management in globalized supply chain networks. The study, carried out in Singapore, provided a scholastic model that indicates the need for risk management in supply chain to reduce the threats involved in globalized organizations.The model, known as multi-stage global supply chain network, incorporates a number of supply chain aspects in a globalized business system. For instance, it considers a new focus on related risks such as supply, demand, disruption and exchange as the most important areas of focus in managing risks. In addition, the model provides a new solution methodology that makes use of Moreau-Yosida regulation, design and logarithm that enhances the process of risk management and mitigation in diagnosing risk associated problems in globalized and multi-staged networks. Although this model is difficult to implement, it is highly effective in managing and mitigating risks in supply chains. Sheffi (2001) takes a differe nt approach to developing a model for risk management and mitigation in supply chains. In this article, Sheffi (2001) takes an example of risks posed by terrorism as a major threat to modern supply chain systems. The author analyzes the companies that were affected by the 9/11 terrorist attacks in the US. Using several examples, the researcher develops a model for explaining the importance of supply chain management in risk mitigation. This model focuses on two issues. First, it argues that corporations must adopt strategies to set certain operational redundancies in order to enhance their preparedness for risks. Secondly, it focuses on reduction of reliability on lead time and certain demand scenarios. The model suggests that private public partnership is the best way, trough which companies can organize themselves into networks that will enhance risk management and mitigation. In 2007, American corporations IBM, KPMG and ACE sponsored a study with an aim of revealing the best prac tice for managing risks in supply chains. The researching institute, the Economic Intelligence Unit, developed a comprehensive study and a report that show their hypothesized model for managing supply chain risks in the modern concept. In its simplest form, the model suggests that risk management is a discipline that has moved from loss avoidance to assume a new position as the key contributor to market advantage. According to the model, this is achieved through improved corporate reputation and better stand among the companies with the role of oversight such as rating industries. In addition, the model hypothesizes that risk management in supply chains has become an area that needs both technology and workmanship, because ideas must be generated, devised and implemented. In addition, it indicates that technology is an additional source of risk for supply chains, especially at a time when supply of products has gone virtual thanks to the internet technology. However, the author†™s model does not imply that technology should be avoided. Rather, it suggests that technology and workmanship should be integrated to provide the best method for mitigating and managing risks in supply chains. Conclusion From this analysis, a number of aspects should be noted. For instance, the models developed over the years to enhance risk management in supply chains tend to focus on the product, product delivery and internal aspects of the management. They incorporate the ideas of understanding the risks, developing prior knowledge of the risks, ensuring everyone is involved, company-company or company-public sector relations and the use of technology. Although the models are different, most of them attempt to show that supply chain is one of the areas of corporate management that runs under high risks due to the link between the company and other parties in its supply chain system. Therefore, changes in product design, branding and employees are likely to cause risks that thr eaten supply chain. Risk management in this field is a fundamental activity at the executive level in most organizations. These models/theories have attempted to provide an explanation of the need for supply chain management in reducing risks. References Chopra, S Sodhi, M, 2005, â€Å"Managing Risk To Avoid Supply-Chain Breakdown†, MIT Sloan Management Review, vol. 3, no. 1, pp. 53-64. Christopher, M Peck, H, 2004, â€Å"Building the resilient supply chain†, International Journal of Logistics Management, vol. 15, no. 2, pp. 1-13, Economist Intelligence Unit, 2007, Best practice in risk management: A function comes of age, Economist Intelligence Unit, New York Goh, M, Limb, J Meng, 2007, â€Å"A stochastic model for risk management in global supply chain networks†, European Journal of Operational Research, vol. 182, no. 1, pp. 164–173 Khan, O, Christopher, M Burnes, B, 2012, â€Å"The impact of product design on supply chain risk: a case study†, International Journal of Physical Distribution Logistics Management, vol. 38 no. 5, pp. 412-432 Lin, Y Zhou, L, 2011, â€Å"The impacts of product design changes on supply chain risk: a case study†, International Journal of Physical Distribution Logistics Management, vol. 41, no. 2, pp. 162-186 Sheffi, Y, 2001, â€Å"Supply Chain Management under the Threat of International Terrorism†, International Journal of Logistics Management, vol. 12, no. 2, pp. 1 – 11 Sinha, PR, Whitman, LE Malzahn, D, 2004, â€Å"Methodology to mitigate supplier risk in an aerospace supply chain†, Supply chain management: An international journal, vol.9, no. 2, pp. 154-168. Tang, C, 2007, â€Å"Robust strategies for mitigating supply chain disruptions†, International Journal of Logistics Research and Applications: A Leading Journal of Supply Chain Management, vol. 9, no.1, pp. 34-56. Vosooghi, M, Fazli, S Mavi, R, 2012, â€Å"Crude Oil Supply Chain Risk Management wit h Fuzzy Analytic Hierarchy Process†, American Journal of Scientific Research, vol. 12, no. 46, pp. 34-42 This essay on The Role of Supply Chain Risk Management in Ensuring Smooth Functioning was written and submitted by user Brodie J. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Saturday, November 23, 2019

Free Essays on Machivellis Discourses

Machiavelli’s Discourses Throughout his discourses, Machiavelli gives a political and philosophical interpretation of the first ten books of Livy’s History. Using such examples as ancient Athens, Sparta, and Rome he attempts to determine what made certain city-states survive into immense republics, while others came under the authority of those very same expansionistic regimes. Some of the basic reasoning he puts forth deals with the very ideas of liberty and greatness along with the relationship that both these ideas form. By clarifying this relationship, Machiavelli offers an insight to a possible conclusion to why the Roman Republic became such a successful empire. According to Machiavelli, Rome was the ultimate free state in the ancient world. No other empire before it matched its strength militarily, economically, and politically. Although Athens was a great state as well, its government quickly became corrupted therefore becoming vulnerable for conquest by other republics or principalities. One reason that Machiavelli gives for this is that while Athens enjoyed a period of liberty through a democratic government, it was quickly transformed into a tyranny once the composer of its laws, Solon, lost power. Liberty was temporary due to the fact that although the laws were democratic in nature, â€Å"Solon had not blended either princely power or that of the aristocracy† into the mixture (Machiavelli, 110). Rome, on the other hand, had institutions in place that in turn laid the ground work for liberty and greatness once the monarchy was abandoned and a republic was established. Liberty in the Roman Republic came in sporadic episode s while in its first stages. However, since Principality and Aristocracy were still present in the system that was in use, the Republic was able to maintain itself over time by constant shifting between the three estates leading to greatness for the Roman Empire. Another aspect for the... Free Essays on Machivelli's Discourses Free Essays on Machivelli's Discourses Machiavelli’s Discourses Throughout his discourses, Machiavelli gives a political and philosophical interpretation of the first ten books of Livy’s History. Using such examples as ancient Athens, Sparta, and Rome he attempts to determine what made certain city-states survive into immense republics, while others came under the authority of those very same expansionistic regimes. Some of the basic reasoning he puts forth deals with the very ideas of liberty and greatness along with the relationship that both these ideas form. By clarifying this relationship, Machiavelli offers an insight to a possible conclusion to why the Roman Republic became such a successful empire. According to Machiavelli, Rome was the ultimate free state in the ancient world. No other empire before it matched its strength militarily, economically, and politically. Although Athens was a great state as well, its government quickly became corrupted therefore becoming vulnerable for conquest by other republics or principalities. One reason that Machiavelli gives for this is that while Athens enjoyed a period of liberty through a democratic government, it was quickly transformed into a tyranny once the composer of its laws, Solon, lost power. Liberty was temporary due to the fact that although the laws were democratic in nature, â€Å"Solon had not blended either princely power or that of the aristocracy† into the mixture (Machiavelli, 110). Rome, on the other hand, had institutions in place that in turn laid the ground work for liberty and greatness once the monarchy was abandoned and a republic was established. Liberty in the Roman Republic came in sporadic episode s while in its first stages. However, since Principality and Aristocracy were still present in the system that was in use, the Republic was able to maintain itself over time by constant shifting between the three estates leading to greatness for the Roman Empire. Another aspect for the...

Thursday, November 21, 2019

Consumer Behavior Essay Example | Topics and Well Written Essays - 2500 words - 1

Consumer Behavior - Essay Example There are many changes taking place in the society structures and the family values are going down gradually (Giddens 1979, Giddens 1991; Miles 2000). At times advertisements can play an important role in bringing the family values together. There are some ads which treasure the family moments to the maximum and make you realize how important it is to give time to your loved ones. This is mostly shown through the chocolate or sweet ads. Celebrities have their own impact while they advertise for any ad (Atkin 1983) and mostly major companies want to take big celebrities to make an ad for them as this tends to generate more consumer response. Kodak camera films and cameras have their ads being portrayed as value expressive. They show that all the special moments in everyone’s life cannot be missed and it should be captured at the right time in the cameras. The digital cameras of Kodak also give the same message as the normal cameras that moments are special and cherishing for everyone and they should be given special treatment always. Value expressive influence of advertising may tend to create high emotional levels and also sensitive feeling for the consumers. They may become emotionally attached with the products as they would feel a strong sense of attachment while they use the product. Nokia advertisement can be considered as an informational group influencing ad as it portrays in their ad that having Nokia develops a lifestyle, it develops it for oneself and for others too, the consumers passion and fashion can be immensely taken to success because of having Nokia. The ad shows that with the use of Nokia, one has a strong confident personality and they can achieve whatever they want. If one aims to have very high goals they can do it while having the Nokia cell phones, as Nokia has portrayed its image as strong, reliable, unbreakable, good quality , resistant to damages. Other

Wednesday, November 20, 2019

Processed Food as a Cause of Obesity and Chronic Illnesses Assignment

Processed Food as a Cause of Obesity and Chronic Illnesses - Assignment Example This essay "Processed Food as a Cause of Obesity and Chronic Illnesses" outlines the health's risks connected with the consumption of the processed food and the ways how to prevent it. Most processed foods contain a high level of modified diet products such as soybean and canola. Processed foods such as potato chips and cookies are characterised by high amounts of calories. This is because most processing procedures remove the amount water in these foods to reduce transportation costs and increase the shelf-life. Consumption of such foods leads to increased intake of the calories with a corresponding decrease in nutritional gain. Sugar sweetened soft drinks are a prominent source of calorie intake in children leading to obesity in the young generation. Ultra-processed foods lack the healthy fats, minerals, vitamins, insoluble fibre and phyto-chemicals that guard the human body against cancer and heart diseases. Fresh fruits and vegetables have a lower concentration of sugar and requi re less insulin release for their digestion compared to processed foods. High consumption of processed products may alter or completely destroy the taste buds making a person develop a tendency of getting used to strong tastes. This makes them increase the consumption of foods rich sugar and salt content. According to Ludwig (2011:1352-53), an effective plan than can reverse obesity and related trends in the prevalence of chronic diseases is, â€Å"adoption of a collective strategy that includes individual, industrial, governmental, community participation...†.

Sunday, November 17, 2019

Road Safety Essay Example for Free

Road Safety Essay Road incidents are a major problem in every society. Many lives are taken due to careless driving or misuse of public roads. Road incidents, also known as traffic collision, traffic accidents, motor vehicle collision, road traffic collision, wreck (USA) and car crash (Australia), can be defined as an unexpected and undesirable event , that occurs when a vehicle collides with another vehicle, pedestrian and other stationary obstruction. Road incidents are not only a rising concern in Fiji but also in every country in the whole world. Increase in the number of road incidents is a matter of concern in Fiji and also other countries in the world. Usually road incidents have very high impact on the people, that is, on the life, mind and family. People who are the victim of accidents normally regret for the rest of their lives because of the suffering they endure due to their carelessness in not following the simple road safety rules. Approximately hundred to two hundred people die each year due to road incidents. An escalation in the number of road incidents is not only a problem in Fiji but in every country in the whole world. Developed and leading countries like Australia and the United States of America also face the problem of road incidents and its impact on the people. In the recent years, the number has increased rapidly and many people are affected due to road incidents in one way or another. Many people lost their lives, family members or loved ones, suffer physical damage and damage to their properties due to not following the simple and easy road safety rules. Due to carelessness of people and failing to follow the road safety rules, this is turning out to be a great concern for Fiji Government and its time that action is taken. Many people are dying everyday. The Government and concerned authorities such as the Land Transport Authority (LTA) and police, are showing their concern by organizing operations to monitor the drivers activities and holding awareness programs to educate people.

Friday, November 15, 2019

Evolution Of Speaker Manufacturing English Language Essay

Evolution Of Speaker Manufacturing English Language Essay A speaker is an electrical device that converts electrical signals to mechanical motion in order to create sound waves. A transducer, which is another name for a speaker, is a device that converts one form of energy to another. The speaker moves in accordance with the variations of an electrical signal and causes sound waves to propagate through a medium such as air or water. The first electrical speaker, patented by Alexander Graham Bell in 1876, was for the earpiece of the telephone. This design was later improved upon by Ernst Siemens and Nicola Tesla in 1877 and 1881 respectively. Siemens and Tesla used a metal horn driven by a membrane attached to a stylus to create the design of what would be the basis for the modern speaker. Thomas Edison was working on a design at this time using compressed air as the amplifying mechanism. He quickly found this was not the most effective way to create the mechanical waves that produce sound. He quickly withdrew his application for a patent an d settled on the metal horn design. The metal horn speaker is a speaker which can be found on antique record players. Metal Horn Speaker Moving Coil Speaker The modern design of the moving coil driver was established by Oliver Lodge in 1898. Lodge was a British physicist and writer that was involved in many key patents involving wireless telegraphy. In 1915, Magnavox emerged as the first public company to produce a loudspeaker. This design was the first practiced use of the moving coil drivers in a loudspeaker. Magnavox was started in that same year by Edwin Pridham and Peter L. Jensen. The companys focus was on developing consumer electronics. They would later go on to be the first to develop a phonograph loudspeaker. Today Magnavox is owned by one of the world leaders in electronics, Phillips. In 1924, Chester W. Rice and Edward W. Kellogg received the first patent on the moving-coil principle, direct radiator, and loudspeaker. Their patent was different from the previous attempts because of the adjustment of mechanical parameters in their design. The fundamental resonance of the moving system takes place at a lower frequency than that at which the cones radiation impedance becomes uniform. In 1926, Rice and Kellogg sold the loudspeaker, Radiola which was superior to anything else previously invented because it decreased sound distortion and improved audio quality for the buyer. These speakers used electromagnets instead of large powerful magnets in their design. The electro magnets were used because larger, more powerful magnets were not available at a cheap enough price at the time. In the 1930s, manufactures began placing two or three band passes worth of drivers in their speakers, which allowed for increased quality, sound pressure levels, and frequency response. Many of the components involved in the production of modern speakers have been improved upon from their initial designs. The biggest improvements have occurred mainly in the makeup of the materials in the speaker and in the enclosure design. The diaphragm materials and permanent magnet materials are some of the other speaker components which have improved throughout the years. With the advent of computer aided design and increased accuracy in measuring techniques, the development of the speaker and quality of sound have grown exponentially in recent years. The modern loudspeaker has a similar makeup to that of earlier designs, but some of the basic ideas behind the design have changed to give us the speaker we have today. The Modern Speaker Modern speakers use a permanent magnet and an electromagnet to induce the reciprocating motion of the diaphragm. The alternating current going through the electromagnet constantly reverses the magnetic polarity of the coil thus reversing the forces between the voice coil and the permanent magnet. This causes a rapid back and forth motion of the coil resembling that of a piston. When the coil moves it causes the diaphragm to vibrate the air in front of the speaker, creating sound waves. The frequency and amplitude of the electrical audio signal dictates the rate and distance that the voice coil moves thus determining the frequency and amplitude of the sound waves produced by the diaphragm. Drivers are only able to create sound in a given range of frequencies, thus many different types of drivers must be manufactured to account for the wide range of possible frequencies. The main components of the modern speaker are the diaphragm, permanent magnet, suspension, voice coil, and basket with three other important features being coaxial drivers, speaker enclosures, and audio amplifiers. In the following sections we will break down each component and investigate the improvements of each component including those in the material selection and the manufacturing process. Diaphragm One of the main components of a speaker is the diaphragm, sometimes called a speaker cone. The diaphragm can also be referred to as the diaphragm and its surrounding assembly including the suspension and the basket. However for our purposes the suspension and the basket will be individually discussed in later sections. Movement of the diaphragm causes sound waves to propagate from the speaker thus producing the noise we hear. The ideal properties of a diaphragm are minimal acoustical breakup of the diaphragm, minimal standing wave patterns in the diaphragm, and linearity of the surrounds force-deflection curve. The diaphragm stiffness and damping qualities plus the surrounds linearity and damping play a crucial role in reproducing the voice coil signal waveform. Eighty five percent of the diaphragms sold worldwide are made of cellulose fibers because they can be easily modified by chemical or mechanical means to giving it a practical manufacturing advantage not found in other common diaphragm materials, although reproducibility can be a problem. The lack of reproducibility can affect imaging, depending on the precision and quality of production. Cellulose is also advantageous over other diaphragm materials because of its low cost to produce. Although Cellulose works well as a diaphragm, new synthetic materials are emerging that are more lightweight, allowing for better audio quality, reduced distortion, and increased vibration and shock durability. These materials include polypropylene, polycarbonate, Mylar, silk, fiberglass, carbon-fiber, titanium, aluminum, aluminum-magnesium alloy, and beryllium. Polypropylene is the most common plastic material used in a diaphragm. The polypropylene is normally mixed with a filler, such as Kevlar, to reduce the manufacturing costs or it can be to alter the mechanical properties of the diaphragm. Polypropylene diaphragms have been increasingly more popular with the advancements in modern adhesive technology. Although with all plastic materials present, the material tends to have a viscoelastic creep, which is the materials tendency to slowly deform and stretch when under repetitive stresses. However, polypropylene diaphragms are still a popular choice for high performance speakers due to their consistent performance. Research is presently underway in attempts to create new plastic based materials such as TPX, HD-A, HD-I, Neoflex, and Bextrene for diaphragms. These materials generally have the same characteristics as polypropylene so the manufacturing costs cannot be justified for full production. Another option for low-frequency applications are woven fiber diaphragms. The woven fibers such as carbon fiber, fiberglass, and Kevlar are bonded together with a resin. When the high tensile strength of the woven fibers mixes with the adhesive and bonding characteristics of the resin it results in an incredibly stiff material. This stiffness results in a great low-frequency diaphragm, however the stiffness causes rough high-frequency responses. There have been numerous attempts to improve the high-frequency problems of woven fiber diaphragms such as using two thin layers of Kevlar fabric bonded together with a resin and silica microball combination and another attempt employed a sandwich structure of materials with a honeycomb Nomex core. But again, as with the advanced plastic materials, the cost of manufacturing versus the performance of the material cannot yet be justified. The final modern practical material for diaphragms is metal. Metals worst downfall is its terrible damping attributes which causes extreme high-frequency distortion. The most common metal of choice are aluminum and magnesium alloys. Due to the lack of technological advances in damping agents to add to these alloys, metal diaphragms are very rarely used in high-frequency applications. However, these alloys have been commonly used in lower end frequencies with great success. Permanent Magnet Modern driver magnets have become predominately permanent magnets. Historically this function was filled by the use of electrically powered field coils. When high-strength permanent magnets became available, they eliminated the need for the additional power supply that drove the coils. When this happened, Alnico magnets became popular. Alnico magnets are created from alloying aluminum, nickel, and cobalt. Until about 1980 Alnico magnets were primarily used but because of their tendency to become demagnetized, permanent magnets have since been made of ceramic and ferrite materials. Ferrite magnets are constructed by mixing iron oxide with strontium and then milling the compound into a very fine powder. The powder is then mixed with a ceramic binder and closed in a metal die. The die is then placed in a furnace and sintered to bond the mixture together. Sintering is the process in which the particles of the powder are welded together by applying pressure and heating it to a temperature below its melting point. Although the magnetic strength to weight ratio of ferrite magnets is lower than Alnico, it is considerably less expensive, allowing designers to use larger yet more economical magnets to reach a desired performance. In manufacturing, the most significant technical innovation of the speaker is due to the use of neodymium magnets. Currently neodymium magnets are the strongest permanent magnets known to man. For this reason neodymium magnets significantly help in producing smaller, lighter devices and improve speaker performance due to their great capacity for generating strong magnetic fields in the air-gap. A neodymium magnet is an alloy of neodymium, iron, and boron to form the molecule Nd2Fe14B. The molecular structure of this molecule is a tetragonal crystalline structure. Important properties in a magnet are the strength of the magnetic field, the materials resistance to becoming demagnetized, the density of magnetic energy, and the temperature at which the material loses its magnetism. Neodymium magnets have much higher values for all of these properties than other magnetic materials except that it loses its magnetism at low temperatures. For this reason it is sometimes alloyed with terbium and dysprosium in order to maintain its magnetic properties at higher temperatures. Suspension Another critical element in speakers is the suspension. The purpose of a suspension system is to provide lateral stability and make the speaker components return to a neutral point after moving. A typical suspension system includes two major components, the spider and the surround. The spider connects the voice coil to the frame of the speaker and provides the majority of the restoring force. The surround connects the top of the diaphragm to the frame of the speaker and helps center the diaphragm and voice coil with respect to the frame. Both components work together to make sure the diaphragm and coil assembly move strictly linearly and in line with the center of the permanent magnet. The spider is usually made of a corrugated fabric disk, impregnated with a stiffening resin. The name comes from the shape of early suspensions, which were two concentric rings of Bakelite material, joined by six or eight curved legs. The surround may be resin treated cloth, resin treated non-wovens, polymeric foams, or thermoplastic elastomers that are molded onto the cone body. An ideal surround has sufficient damping to fully absorb vibration transmissions from the cone to surround interface, and the durability to hold out against long term fatigue caused by prolonged vibration. Advancements in suspension manufacturing have come from innovations in synthetic suspension materials. The use of synthetic materials like kevlar or konex instead of cotton, has made todays speakers much more stable than those made as recent as ten years ago. A more durable suspension means that a speakers sound quality can remain unaltered for a longer period of time. This is especially a concern for speakers that generally operate at low frequencies since lower frequency sounds are created by larger diaphragm travel and larger diaphragm travel must be supported by more suspension travel. Voice Coil The wire in a voice coil is usually made of copper, though rarely aluminum and silver may be used. Voice coil wire cross sections can be circular, rectangular, or hexagonal, giving varying amounts of wire volume coverage in the magnetic gap space. The coil is oriented co-axially inside the gap; it moves back and forth within a small circular volume (a hole, slot, or groove) in the magnetic structure. The gap establishes a concentrated magnetic field between the two poles of a permanent magnet, the outside of the gap being one pole, and the center post (called the pole piece) being the other. The pole piece and backplate are often a single piece, called the poleplate or yoke. This magnetic field induces a reaction with the permanent magnet causing the diaphragm to move thus producing the sounds we hear. Voice coils can either be overhung, longer than the magnetic gap, or underhung, shorter than the magnetic gap, depending on its application. Most voice coils are overhung thus preventi ng the coil from being overdriven, a problem that causes the coil to produce significant distortion and removes the heat-sinking benefits of steel causing the speaker to heat rapidly. The most important characteristic of a voice coil is that it be able to withstand large amounts of mechanical stresses and also be able to dissipate heat to its surroundings without causing damage to the speakers other components. In early loudspeakers the voice coil was wound onto paper bobbins to remove heat from the system. At the time this was enough to cool the system at average power levels but as larger amplifiers became available allowing for higher power levels new technologies had to emerge. To cope with the increasing power inputs the use of alloy 1145 aluminum foil was widely used as a substitute for the paper bobbins. Aluminum was popular to industry due to its low cost to manufacture, its structural strength, and it was easy to bond to the voice coil. However, problems with the foil emerged over extended use at increased power levels. The first problem was the foil tended to transfer heat from the voice coil into the adhesives used inside the speaker causing them to thermally degrade or even burn. The second problem was the motion of the aluminum foil inside the magnetic gap created currents that actually increased the temperature of the voice coil, thus causing long-term reliability issues. In 1955 a new material was developed called Kapton, a polyimide plastic film, to replace the aluminum foil. Kapton solved all the problems that were associated with the aluminum foil however Kapton or even its improved cousin Kaneka Apical, were not perfect. Both high-tech materials were costly to manufacture and had a tendency to soften when heated. Although Kapton and Kaneka Apical had their downfalls they became the most widely used coating for voice coils until 1992 when a material called Hisco P450 was developed. Hisco P450 is a thermoset composite created by using a thin film of fiber glass cloth and impregnating it with a polyimide resin. This combination allowed for necessary mechanical strength and endurance of the polyimide and necessary temperature resistance and stiffness of fiberglass. Hisco P450 was able to withstand the grueling temperature requirements of professional speakers while also maintaining enough rigidity to withstand the mechanical stresses associated with long-term, high-frequency motions. In recent years the copper wire that is almost always used as the voice coil has been replaced sparingly with aluminum wire in extra sensitive, high-frequency applications. The aluminum wire is lighter than the copper wire and has about two thirds of the electrical conductivity allowing the wire to move at higher frequencies inside the magnetic gap. Variations of the aluminum wire include copper-clad aluminum and anodized aluminum. Copper-clad aluminum allows for easier winding along with an even more reduced mass. The anodized aluminum is effectively insulated against shorting which removed the concerns of dielectric breakdown. Aluminum wires are great lightweight, low-inductance choices for voice coils however, they do have their downfalls. The thermal characteristics of aluminum causes power limitations with the coil. If too much power is passed through the aluminum coil it can cause the adhesive bonds between the wire and the bobbin, or the bobbin to the spider and coil to weaken or even burn. To cope with the ever increasing power demands on the voice coil in addition to wrapping the coil in some high-tech material to increase its thermal properties, the voice coil has also been submerged in a ferrofluid, an oil that is used to conduct heat away from the voice coil and also creates a small magnetic field thus increasing the power handling capacity of the voice coil. Basket The basket or frame (as seen below) is the fixture used to hold the diaphragm, voice coil, and magnet in the proper place. The rigidity of this part is extremely important to prevent rubbing of the voice coil and prevent random movements that could cause problems with the permanent magnet. The three most common types of modern baskets are cast metal baskets, rigid baskets made out of stamped steel or aluminum, and cast plastic baskets. Each type of basket offers different advantages and disadvantages; these will be discussed in the flowing paragraphs. The stronger the basket the more power the speaker can handle before failure occurs. A well made basket should have a high power rating, be lightweight, and be able to conduct heat away from the voice coil to prevent physical changes or even possible demagnetization of the permanent magnets. Cast metal (above right) baskets are the most rigid of the three in all directions, but they are the most expensive to make. Cast metal baskets are made by melting down the desired metal to liquid form. The scorching hot liquid metal is then poured into a mold and once the liquid metal dries inside the mold, the mold is removed revealing a cast metal basket. Cast metal baskets although more expensive than the other two options, usually are more rigid thus preventing motion. They also have better damping characteristics, and they are also more easily manufactured allowing for more intricate shapes. Cast metal baskets are usually the preferred basket choice for higher quality speakers. A less expensive and yet less rigid basket can be made out of stamped steel. The stamped steel or aluminum sheets arrive to the manufacturer preformed. The sheets are then drilled using a hydraulic press to cut holes in the sheet to allow air flow to and from the diaphragm. The sheet is then pressed using another hydraulic press using a die to form the desired shape. Stamped metal baskets tend to be weaker than their cast metal counterparts. This weakness could cause the basket to flex if the speaker is being used at high volumes. The final option, which is even less expensive, is a cast plastic basket. Cast plastic baskets are made by using the liquid plastic and pouring it into the desired shaped mold. When the liquid plastic dries the mold is removed revealing a cast plastic basket. Just like cast metal baskets, cast plastic baskets are easily manufactured allowing for intricate shapes. The lightweight characteristics of the plastic would also make the speaker lighter allowing for smaller power consumption. However, as with most engineering decisions, the performance of the part proportionally decreases as the cost to produce the part decreases. The decreased cost of production of the plastic basket means that it is a weaker basket. This weaker, plastic basket will allow for the most flexing as compared to cast metal and stamped steel baskets. The power rating of the speaker would also be less than that of the metal baskets, both cast and stamped, due to the weaker strength characteristics of plastic in com parison with metal. Coaxial Drivers Coaxial drivers are the components of a speaker that radiates sound from the same point or axis. This is done by placing a high-frequency driver in the center of a low-frequency driver so that they produce sound waves from a single point in a loudspeaker system rather than separate locations. This allows for a more beneficial design over having the low and high frequency drivers separate. There are many different types of drivers and each driver produces sound within a limited frequency range. Subwoofers, woofers, mid-range drivers, and tweeters are all driver types capable of emitting different ranges of sound. A coaxial driver takes one of these higher frequency drivers and places it within a lower frequency driver. For example, a tweeter, the high frequency unit, could be placed in the center of a woofer, the low frequency unit, so that both drivers emit sound from the same point. This example can be seen in the images below. This design, which improves sound quality, was first de signed by Altec Lansing in the 1940s. Although it has many advantages, it is still an uncommon practice in the manufacturing of speakers due to technical and budgetary considerations. Enclosures The enclosure of a loudspeaker serves three functions and is made with a specific design that helps improve the quality of the sound produced by the speaker. The first function the enclosure performs is separation of the sound waves. It accomplishes this by preventing sound waves generated at the back of the speaker from interacting destructively with sound waves generated at the front of the speaker. The enclosure is intended to reduce distortion created because the waves that emanate from the front of the speaker are out of phase with the waves emanating from the rear of the speaker. If the front and rear waves were to overlap with one another it would result in wave interference. The second function the enclosure serves is to stop any echo and reverberation that would be created from the two differing sound source locations on the speaker. Because waves are created at the front and rear of the speaker, the two different sets of waves travel through the air differently as a result of their relative locations, and arrive at the person listening at different times. The third function the enclosure serves is to deal with the vibrations produced by the driver and to deal with the heat produced by the electronic components. Enclosures did not always have the fully enclosed container design that they now commonly have. Although present day practices say that enclosures need to have a back, before the 1950s they lacked one due to the cooling functions of an open container. Sealed enclosures, the most common type of enclosure, is completely sealed so no air can escape. With this type of enclosure the forward wave travels outward into the surroundings, while the backward wave is limited to only fill the enclosure. With a virtually airtight enclosure, the internal air pressure is constantly changing; when the driver retracts, the pressure increases and when the driver moves out, the pressure decreases. Both movements create pressure differences between the air inside the enclosure and the air outside the enclosure. Because of this, the driver motion always has to fight the pressure differences caused. These enclosures are less efficient than other designs because the amplifier has to boost the electrical signal to overcome the force of air pressure. The force due to air pressure does, however, provide an additional form of driver suspension since it acts like a spring to keep the diaphragm in the neutral position. This makes for tighter, more precise soun d production. Enclosure designs range from very simple, rectangular particle-board boxes (above left) to very complex cabinets made of composite materials (above right). The simplest enclosures are made to prevent destructive interference caused by overlapping of the front and rear sound waves from the speaker. The most complex enclosures contain acoustic insulation and internal baffles, which prevent interference. Solid materials such as heavy wood, are typically used when building enclosures in order to absorb the vibration caused by the speaker driver. This vibration dampening is extremely important. A speakers sound output would be drowned out by the drivers vibrations if there were not an enclosure incorporated into the design. Since the beginning of the production of enclosures, the most advantageous properties required for minimal energy loss through the enclosure walls have remained unchanged. Different strategies employed to reduce energy losses are to use thicker enclosure walls, denser hardwood plys and sturdier bracing. The downside to these methods is that they all add significant weight to the enclosure. However, with the production of newer materials that possess an increased stiffness-to-mass ratio this is changing. These new materials can improve performance and reduce weight, while also reducing the cabinets resonance. The end result is that a greater amount of the speakers en ergy is delivered in the intended direction rather than into mechanical vibrations which are wasted and produce a decrease in sound quality. A recent alternative to heavy wood construction of enclosures is the use of composite materials. It was for the aerospace industry that composite materials such as carbon-fiber were originally developed. Carbon-fiber was a success because of the high demand for a material with increased strength and rigidity. Speaker applications, such as enclosures use carbon-fiber materials to create a product with a vastly decreased weight and increased strength and rigidity. Enclosures built with carbon-fiber can weigh less than half as much as enclosures built from heavy wood. These enclosures which limit the speaker resonance can provide as much as 3 dB more output than the same speaker would have otherwise had in a heavy wood enclosure. Furthermore, carbon-fiber enclosures are extremely durable adding quality to the final product and they require almost no maintenance. Even though carbon-fiber enclosures cost around twice as much to produce as traditional enclosures, the lighter weight and ext ra output offer two very advantageous tradeoffs. Amplifier An amplifier is any device that increases or decreases the amplitude of a signal. An audio amplifier increases low-power audio signals to a suitable level for loudspeakers. When dealing with a speaker there are a many audio amplifiers involved. These amplifiers are responsible for pre-amplification, equalization, tone control, and mixing effects followed by a higher power amplifier which creates the final amplification for suitable levels of sound output. Amplifiers are found in wireless receivers and transmitters, CD players, acoustic pickups, and hi-fi audio equipment. Amplifiers are used for high-quality sound production, and depending upon the quality of the amplifier, they may cause distortion, which the speaker enclosures are meant to deal with. Distortion in amplifiers is caused by difference in phases of the output waveform and the input waveform. The smaller the difference in between the output and input waveforms the greater the quality of final sound. Audio amplifiers cons ist of resistors, capacitors, power sources, wires, semiconductors, and stereo jacks all combined on an electronic work board to produce the type of amplifier needed. Types of Speakers Woofers are loudspeaker drivers designed to produce sounds of low frequency from around 40 hertz up to around 1000 hertz. The most common design for a woofer is the electro-dynamic driver, using a stiff paper cone driven by a voice coil. Woofers are important to allow for a range of frequency that will hit a low level. Effective woofer designs efficiently convert low frequency signals to mechanical vibrations. The vibration of the air out from the cone creates concentric sound waves that travel through the air. If this process can be done effectively, many of the other problems speakers run into will be greatly reduced such as linear excursion. For most speakers the enclosure and the woofer must be designed to work hand in hand. Usually the enclosure is designed around the woofer, but in some rarer cases the enclosure design can actually dictate the woofer design. The enclosure is made to reflect the sounds at the right distance, so that they will not be wave cancelling reflections. Below you can see an example of a common woofer. A subwoofer is a woofer with a diameter between 8 and 21s. Subwoofers are made up of one or more woofers. They can be arranged in many different configurations to produce the best quality of sound. Subwoofers usually play frequencies between 20 hertz and 200 hertz, well within the range of human auditory levels. The first subwoofer was created in the 1960s and added to the home stereo to create bass for sound reinforcement. Up until this point the only form of audio player which contained bass was a phonograph player which was created by Magnavox. This allowed for a more accurate array of music. Subwoofers are used in all sound systems today such as in cinemas, cars, stereos, and for general sound reinforcement. A mid-range speaker is a loudspeaker driver that produces sound between 300 hertz and 5000 hertz. These are less commonly known as squawkers. Midrange drivers can be found as cone speakers, dome speakers, or compression horn drivers. Mid-range speakers usually resemble small woofers. The most common material the cone is made out of for a mid-range is paper although they can be found to be coated or impregnated with polymers or resins to improve vibration dampening. Much of the rest of the mid-range speaker is made from plastic polymers. Mid-range speakers which employ the dome set up usually only use 90 degrees of the sphere as the radiating surface. These can be made from cloth, metal or plastic film. The voice coil in this design is set at the outer edge of the dome. Mid-range drivers are most commonly used for professional concerts and are compression drivers coupled with horn drivers. Rarely mid-range speakers can be found as electrostatic drivers. Mid-range speakers handle the most prominent part of the human-audible sound spectrum. This is the region where most sound emitted by musical instruments lie. This is also where the human voice falls in the audible spectrum. Most television sets and small radios only contain a single mid-range driver. Tweeters are a loudspeaker designed to produce frequencies from 2,000 to 20,000 hertz. Some tweeters on the market today can produce sounds of up to 45000 hertz. The human ear can generally only hear up to about 20000 hertz. The name tweeter comes from the extremely high pitch it can create. Modern tweeters are different from older tweeters because older tweeters were smaller versions of woofers. As tweeter technology has advanced, differen