Wednesday, May 6, 2020
Facebook And Social Networking Sites Essay - 1619 Words
New media has been easily made available everywhere and Facebook in particular as one of the world most popular social networking site (SNS) can be made accessible from desktops, laptops, smartphones and tablet because of this, almost everybody can have access to Facebook anywhere they go. For the most reason, due to the introduction of new media, Facebook plays a key role communication and staying in touch with families, friends, acquaintances, businesses, groups meetings and a whole lot of others. Moreover it has also been useful in growing markets and advertising mediums through big companies, brands and highly respectable top class businesses. New media as a broad topic can be defined as a ââ¬Å"form of communication which transmits information through a medium that uses routers and servers via high-speed internet and involves materials been received via desktops, computers, tablets and smartphonesâ⬠. In this paper, I will like to convey how the dramaturgical model of socia l interaction on the use of Facebook reveal how humans communicate their identities using front stage, back stage and impression management to have a perceived view about the world as well as how it reflects Facebook users everyday lives. To begin with, the worldââ¬â¢s largest Social media site (Facebook) has made it possible for your front stage, back stage and impression management to be different due to the individual view of how they want to be perceived, howShow MoreRelatedFacebook : A Social Networking Site857 Words à |à 4 Pagesãâ¬â¬Ã£â¬â¬When one joins a social networking site, they basically sign their rights over to that site (Friends Without Boarders). Many people do not read the terms and conditions when making an account to begin with, so they never know what they are really getting into (Friends Without Boarders). For instance, did you know on Facebook when someone joins, it automatically allows Facebook to access their information? They collect data from th eir members off of third party websites, so they can tailor the websiteRead MoreFacebook Is A Social Networking Site1467 Words à |à 6 PagesFacebook is a social networking site (SNS) where people can communicate with one another, share photos and posts, and poke one another. Numerous studies have been conducted concerning Facebook, and an array of social and psychological theories have been used to study the SNS. When I was looking through my profile from over the years, I began to notice characteristics about me that I tried to present to my audience. Self-esteem issues were present in my profile, and the social comparison theory relatedRead MoreFacebook And Social Networking Sites1532 Words à |à 7 PagesMark Zuckerberg founded Facebook when he was 23 years old while he attended Harvard University. Zuckerberg went to Harvard to study psychology and while he went there he developed a number of social networking sites that allowed students to view other students with the same d egree and others where users could rate peopleââ¬â¢s attractiveness. When Facebook was first launched in February of 2004 it was called ââ¬Å"The Facebookâ⬠. 1,200 Harvard students signed up and had a Facebook profile within the firstRead MoreFacebook : A Social Networking Sites Essay2202 Words à |à 9 PagesThrough its years of operation, Facebook has been able to evolve and remain as one of the most popular social networking sites ever created. Facebookââ¬â¢s purpose is for users to connect, share,â⬠¯and communicate with each other across theâ⬠¯internet. The case explores the beginning of Facebook, in 2003, when Harvard student, Mark Zuckerberg first created an on-campus website called Facemash. The site would allow other students to rank the attractiveness of fellow students and quickly became the topic ofRead MoreFacebook : A Social Networking Sites At The Moment1661 Words à |à 7 PagesIntroduction Facebook is one of the most famous social networking sites at the moment. It was launched in February 2004 and it is owned by Mark Zuckerberg and his Harvard college roommates and fellow students Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes. The website at the start was only for Harvard students but it soon expanded to colleges in the Boston area, then the Ivy League and Stanford University. When the website first started it was called The Facebook but was laterRead MoreFacebook Is The World s Second Largest Social Networking Site1916 Words à |à 8 Pages 1.0 Introduction In February 2004, Facebook was founded by Mark Zuckerberg and his college roommates while they studied at Harvard University. It is the worldââ¬â¢s second largest social networking site and was originally known as ââ¬Å"The Facebookâ⬠which was changed a couple of years later to facebook.com, which it is known as from today (2014). The site remains free to join and makes its profits through advertising revenue. (Phillips, S.2007) Facebook has adapted greatly over the last 10 years, itRead MoreDo Social Networking Sites Such as Facebook and Twitter Cause More Harm Than Good1017 Words à |à 5 PagesDo social networking sites such as Facebook and Twitter cause more harm than good? As time changes almost everyone around the world spends time using internet instead watching television these days. They seek help from internet, communicate through internet, and play games online and many more. People starting from minor to adult, they all love to be in the very popular social networking sites such as ââ¬Å"Facebookâ⬠and ââ¬Å"Twitterâ⬠. Actually, theseRead MoreSocial Networking Sites Among People1130 Words à |à 5 PagesContinuance intention of Facebook among people related to different aspects of user psychology. People with high self-esteem use Facebook for number of hours to enhance their social life. People who are narcissist by nature are prone to get addicted easily to social networking sites. People who are extravert spend more time on Facebook to enhance their social life. 2.0 Introduction Social networking sites help diversity of people of different culture to communicate with each other. In thisRead MoreEssay on Social Networking in Business1149 Words à |à 5 PagesMike Swanstrom 3/29/2010 Social Networking In Business Introduction Social networking in business is the study of individuals interacting socially for business purposes. This can be done either electronically, or not electronically. Usually when social networking occurs electronically, it is achieved through network-based interfaces. Social networking is primarily focused around one thing: connections. One can utilize every social network that exists (Facebook, Twitter, etc.), but unlessRead MoreThe Use of Social Networking Sites1657 Words à |à 7 PagesAdvantages, Abuses and Dangers. Their Advantages, Abuses and Dangers. The Use of Social Networking Sites The Use of Social Networking Sites Introduction: Human beings by and large are social. They feel an inherent need to connect and expand their connections. There is a deep rooted need among humans to share. In the past, due to geographical distances and economic concerns, connections between people were limited. A social network is made up of individuals that are connected to one another by a particular
Opedipus, a tragic hero Essay example - 1708 Words
Outline Thesis Statement: Oedipus is the embodiment of Aristotleââ¬â¢s characterization of a tragic hero through his ability to preserve his virtue and wisdom, despite his flaws and predicament. Introduction I. Sophoclesââ¬â¢ Oedipus: A Tragic Hero A. Definition of a tragic hero B. Oedipus Character as it relates II. Tragedy A. Language of Tragedy B. Tragedy as it affects the audience III. Plot A. Aristotleââ¬â¢s idea of a tragic plot B. Significance of the plot IV. Virtue and Morality A. Identifying with Oedipusââ¬â¢ character B. Oedipus obtains virtue and wisdom through poor judgment Conclusion Oedipus, a Tragic Hero Sophoclesââ¬â¢ Oedipus is one of the most well-known tragic heroes in the history of drama. His strangeâ⬠¦show more contentâ⬠¦Ã¢â¬Å"Aristotle believes that the language must be sweet in tragedy. The level of language used by different characters should differ to depict the social stands of the charactersâ⬠(Adade-Yeboah, Ahenkora, Amankwa, 2012 pg. 1). Additionally, he focuses on meaningful language reflected throughout the entire play, and stresses that tragedy must be taken seriously. Aristotle presents that there is a complex relationship between tragedy and emotions. For him, it is expressed through pity and fear. Konstan argues: The idea that the object of pity does not deserve his fate is present in the definition Aristotle offers in the Rhetoric; in the Poetics, however, Aristotle exploits the concept of similarity in order to explain the terror that tragedy induces. If the characters on stage are enough like ourselves-the context indicates that the sense is morally similar-then we will experience their fear as our own. (Konstan, 1999, pg. 1) Unquestionably, the audience reacts to the sequence of events in the play; feeling pity for Oedipus about his fate and the predicament he faces. Aristotle praises a brilliant arrangement that makes the play more attractive and creates higher expectations: The putting together of the separate actions is very crucial. The beauty of the plot therefore lies in the arrangements which must have magnitude and not be a matter of chance. Indeed, the subtle manipulation of theShow MoreRelatedIncest, Murder, And Suicide1424 Words à |à 6 PagesIncest, murder, and suicide; many readers regard Oedipus the King as a story of a tragic hero unable to alter his course of fate. Fate is defined as ââ¬Å"a power that is believed to control what happens in the futureâ⬠(Merriam-Webster). It is believed in Greek Mythology ââ¬Å"that many aspects of a personââ¬â¢s life were determined by the three mythical women known as Fates. These were three sister goddesses that appeared in Greek and Roman mythology and were believed to have ââ¬Å"spun outâ⬠a childââ¬â¢s destiny at birth
The Death Penalty 11 Essay Research Paper free essay sample
The Death Penalty 11 Essay, Research Paper The Punishment of Death In this essay, H.L. Mencken has two statements that stand out in the beginning of this essay. These statements are against the punishment of decease, although his essay is in a manner, for it. The first 1 is, That hanging a adult male ( or frying him or gassing him ) is a awful concern, degrading to those who have to make it and revolting to those who have to witness it. ( Mencken 455 ) . The 2nd 1 is besides against it, That it is useless, for it does non discourage others from the same offense. ( Mencken 455 ) . These statements are evidently against the decease punishment. Towards the terminal of his essay he gives us an illustration of his true statement. He says that the delay for the slayer and the household is the cruelest portion and he despises it. If people deserve the decease punishment, which he says people do, so they should be penalized about on the topographic point. We will write a custom essay sample on The Death Penalty 11 Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page He does non believe the clip in which the offense is committed and the punishment of decease should be pushed off every bit long as it is. I think he is right with this statement but, it seems as though he is against the punishment of decease. But, in world he is non. His essay to me was falsely interpreted. He must be for the decease punishment, he says Any lesser punishment leaves the people experiencing that the felon has got the better of society ( Mencken 457 ) . This means that the victim s household and friends feel as though the slayer has gotten off easy. There should be no acquiring off easy after you commit a slaying. I have so much regard and respect for human life, that I decidedly favor capital penalty. Murder is the most awful offense there is. Anything less than the decease punishment is an abuse to the victim, society and human race. Not penalizing the slayer to the fullest Tells me that we do non value the victim s life adequate to penalize the slayer to the full. This essay in my sentiment was awful, I did non like the manner he set it up, he did non take a solid side. It was written to be as though it is a gag and good story. I did non believe it was amusing, it merely boggled my head, I had a difficult clip seeking to calculate out that he is for the decease punishme nt. I do like the manner he described the delay. I thought that was the best portion because it was descriptive and I could understand where he is coming from.
Michael Corleone free essay sample
The Corleone family is part of the Italian Mafioso residing in New York and Don Corleone is the strongest of all the other Italian groups. They are involved in certain illegal activities, what they call the ââ¬Å"family business,â⬠of which Michael has no part in since he has spent most of his adult life away studying at Dartmouth College and then into the United States army as a Marine who has fought in the Pacific Theater during the Second World War. He is a brave fighter and is awarded the Silver Star before being discharged from the army in 1945 as a Captain so that he is able to recover from his wounds. After the war, Michael comes back to Dartmouth and marries Kay Adams. A few months later, an assassination attempt is made on Don Viro Corleone and this enrages Michael. This is where his transformation as a person and as a man begins. We will write a custom essay sample on Michael Corleone or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Michael comes to his brothers and offers to murder his fathers would-be assassin Virgil ââ¬Å"The Turkâ⬠Solozzo, and the police captain, Captain McCluskey, who ordered the Dons guards off their posts. Michael believes that the police captain did that on purpose, as he was also in on the plot to kill his father. This is another instance where we see a change in Michael Corleone with his aggressive and untraditional methods. The Mafia has a strict rule that calls for the protection of the police members, as they do not allow the members of the Mafia to harm the members of the police. However, Michael is able to convince his elder brother, Sonny, that McCluskey is acting as Solozzos bodyguard, which means that he is protecting their enemy, and gets permission to proceed to murder the two men. After the murders, Michael cannot stay in New York, so he flees to Sicily and lives there in exile for the next two years. He marries a young girl Apollina, but she is killed in a car bomb that was intended for him. His brother, Sonny is also killed in New York, and this is when he returns to take over the family business. This is where he encounters the skepticism of many of the family members, as they doubt his ability to lead the family. However, Michael is headstrong and he marries Kay, promising her that he will make the business completely legitimate within the next five years. Michaels personality is depicted as a very brutal one where he uses clear-cut logic while making his decisions. He is ruthless as far as his enemies are concerned and does not even spare his own brother-in-law, who he finds to have plotted with other Mafia chiefs for Sonnys murder. Once he realizes that the other chiefs had arranged for his murder, he goes berserk and decides to kill as many as five other heads of the families. This establishes his power over the other families and puts the Corleone family back to the top. After these attacks, he gains the respect of his own family as well elicits fear from others, thereby establishing himself as the new Don, Don Corleone. Michael has a great ability to read people and he is very good with analyzing situations and preparing his own role within the outside influences. He is very sharp in his abilities and this is one of his positive aspects that allow him to succeed all the way to the top and take his family there along with him.
Thursday, April 23, 2020
INTERNAL-COMBUSTION ENGINE Essays - Piston Engines,
INTERNAL-COMBUSTION ENGINE INTRODUCTION Internal Combustion Engine, a heat engine in which the fuel is burned ( that is, united with oxygen ) within the confining space of the engine itself. This burning process releases large amounts of energy, which are transformed into work through the mechanism of the engine. This type of engine different from the steam engine, which process with an external combustion engine that fuel burned apart from the engine. The principal types of internal combustion engine are : reciprocating engine such as Otto-engine, and Diesel engines ; and rotary engines, such as the Wankel engine and the Gas-turbine engine. In general, the internal combustion engine has become the means of propulsion in the transportation field, with the exception of large ships requiring over 4,000 shaft horsepower ( hp). In stationary applications, size of unit and local factor often determine the choice between the use of steam and diesel engine. Diesel power plants have a distinct economic advantage over steam engine when size of the plant is under about 1,000 hp. However there are many diesel engine plants much large than this. Internal combustion engines are particularly appropriate for seasonal industries, because of the small standby losses with these engines during the shutdown period. History The first experimental internal combustion engine was made by a Dutch astronomer, Christian Huygens, who, in 1680, applied a principle advanced by Jean de Hautefeuille in 1678 for drawing water. This principle was based on the fact that the explosion of a small amount of gunpowder in a closed chamber provided with escape valves would create a vacuum when the gases of combustion cooled. Huygens, using a cylinder containing a piston, was able to move it in this manner by the external atmospheric pressure. The first commercially practical internal combustion engine was built by a French engineer, ( Jean Joseph ) Etienne Lenoir, about 1859-1860. It used illuminating gas as fuel. Two years later, Alphonse Beau de Rochas enunciated the principles of the four-stroke cycle, but Nickolaus August Otto built the first successful engine ( 1876 ) operating on this principle. Reciprocating Engine Components of Engines The essential parts of Otto-cycle and diesel engines are the same. The combustion chamber consists of a cylinder, usually fixed, which is closed at one end and in which a close-fitting piston slides. The in-and-out motion of the piston varies the volume of the chamber between the inner face of the piston and the closed end of the cylinder. The outer face of the piston is attached to a crankshaft by a connecting rod. The crankshaft transforms the reciprocating motion of the piston into rotary motion. In multi-cylindered engines the crankshaft has one offset portion, called a crankpin, for each connecting rod, so that the power from each cylinder is applied to the crankshaft at the appropriate point in its rotation. Crankshafts have heavy flywheels and counterweights, which by their inertia minimize irregularity in the motion of the shaft. An engine may have from 1 to as many as 28 cylinders. Fig. 1, Component of Piston Engines. The fuel supply system of an internal-combustion engine consists of a tank, a fuel pump, and a device for vaporizing or atomizing the liquid fuel. In Otto-cycle engines this device is a carburetor. The vaporized fuel in most multi-cylindered engines is conveyed to the cylinders through a branched pipe called the intake manifold and, in many engines, a similar exhaust manifold is provided to carry off the gases produced by combustion. The fuel is admitted to each cylinder and the waste gases exhausted through mechanically operated poppet valves or sleeve valves. The valves are normally held closed by the pressure of springs and are opened at the proper time during the operating cycle by cams on a rotating camshaft that is geared to the crankshaft . By the 1980s more sophisticated fuel-injection systems, also used in diesel engines, had largely replaced this traditional method of supplying the proper mix of air and fuel; computer-controlled monitoring systems improved fu! el economy and reduced pollution. Ignition In all engines some means of igniting the fuel in the cylinder must be provided. For example, the ignition system of Otto-cycle engines , the mixture of air and gasoline vapor delivered to the cylinder from the carburetor
Thursday, April 16, 2020
Sample Criminal Law Essay Examples
Sample Criminal Law Essay ExamplesIn the course of preparing a sample criminal law essay for your future education, it is good to know that there are so many different types of essays that a prospective student can choose from. Your particular purpose in writing one is not as important as the type of essay you should be writing. A well-written essay will accomplish what you need it to accomplish.The first type of essay you should consider is an oral history essay. This is where you use the written word to tell your story and how you became involved in this activity. It may be your best bet to consult with someone experienced in this type of writing before attempting it. As stated above, you do not have to write an essay just for this purpose.The second type of essay you can use to prepare for your criminal law research and writing is a 'case study' essay. This is when you use the stories of other people who have faced the same situation that you are facing. They may share their stori es with you, or you can gather their experiences from different sources.Another type of essay that you can use in preparing for your criminal law research and writing is an interview essay. This is similar to an oral history essay except that you are asking the person you are interviewing for their perspective on the situation at hand. Many times you can get an inside view of the problem you are facing by asking the person you are interviewing for their advice and insight.The third type of essay you should prepare for your criminal law research and writing is a policy or case study essay. This involves using case studies, constitutional principles, and legal principles to discuss an issue, as opposed to a 'statement of fact.' There are some examples of this type of essay that you can write that will be useful in college applications. It is also one way you can get the attention of admissions officers. The fourth type of essay you should consider is an 'explanatory essay.' This is an essay that takes a portion of a legal document and uses the words you have written to explain why you believe what you are saying. It is something that can come in handy in your future career.The fifth type of essay you should consider preparing for your criminal law research and writing is a persuasive essay. It is a great way to tell the reader that they should change their mind. Usually in an essay like this you can also include citations to research.You should write your own essay if you want to prepare for your criminal law research and writing. The examples listed above are just a few of the different types of essays, you can write. Be sure to read samples of others' essays and select those you think are most appropriate for your needs. With a little time and effort, you will be well on your way to writing a winning essay.
Tuesday, March 17, 2020
Caspian Construction PLC Security Management
Caspian Construction PLC Security Management Twenty-Four Hour Security Management Site security is one of the fundamental aspects, which must be given first priority in the event that a construction expects to undertake any assigned project work in a timely, as well as less costly manner. In every construction site, the term security has a wide range of meanings. It may refer to the safety of the workers who are on the site in terms of enjoying an accident free environment.Advertising We will write a custom essay sample on Caspian Construction PLC Security Management specifically for you for only $16.05 $11/page Learn More Security can also refer to the undertaking of loss control through the prevention of equipment theft. In most of the Venezuelan construction sites, contractors incur big losses as a result of equipment theft. Even though insurance firms offset some of the financial costs, the contractor settles most of the uninsured costs. The runway construction will entail a wide range of equipment along with a diverse workforce and thus it will be of great essence to put in place vibrant security measures (Fay, 2011). Contractors with insufficient security management remain to be theft targets. The security personnel should address all issues leading to both tool, as well as, equipment theft. In most of the scenarios, the profitability of a construction company highly relies on the ability to prevent theft losses effectively. An effective construction-site security requires good planning along with programming. Runway construction involves the use of construction material along with equipment of high value and thus it is vital to prevent them from being stolen. Secure equipment automatically leads to secure business. Equipment theft is associated with various potential sources. However, the two principal sources are the workers on the site along with the general public who visit the site as the construction work continues. Caspian Construction PLC has to implement various me asures to succeed in maintaining a twenty-four hour security operation within the Venezuelan site. In the first place, it will be of great essence to establish methods of getting early warning signs while undertaking construction site monitoring. It is highly unlikely that thieves or vandals will forewarn anyone about their intention to carry out theft on a certain place. Nevertheless, it is important to note that there are various techniques that could be used by a security manager in order to acquire information concerning a planned theft (Sennewald, 2011). This could be through early warning messages. For instance, using Google alerts, one can get aware of the string of thefts taking place within the neighborhood and thus tighten vigilance within the site.Advertising Looking for essay on project management? Let's see if we can help you! Get your first paper with 15% OFF Learn More The other measure, which will be put into consideration, is ensuring that th e security lighting within the construction site is at acceptable standards. Lighting brings down construction site theft because it discourages prowlers. In addition, adequate lighting assists those assigned the duty of monitoring the site in identifying the suspicious activities. It has been established that intruders will tend to target the poorly lit areas. Therefore, before the construction materials along with equipment are brought to the site, security lights should be positioned in various points within the site. It is always recommended to make use of white light because it is considerably bright. White light is also helpful in making a clear color differentiation, thereby facilitating the identification and reading of license plates. Even though the white lights are expense to maintain lit; they are worth the price. In accordance to the basic thumb rule, the white light can assist the security personnel to identify a certain face, which is approximately thirty feet away. I t is also essential to make it certain that the power sources within the site are protected. Thieves always attempt to interfere with the power source prior to carrying out their agenda. It is therefore advisable to have a well-secured private power source for the purposes of the security lighting. Daytime security should no be taken for granted. In most of the construction sites, the security managers tend to overlook daytime security issues. In this regard, it is essential to formulate security questions, which will be applied within the field. Moreover, it might be essential to request all the site workers to remain dressed in a set standard uniform while undertaking their daily duties (Fay, 2011). This might seem insignificant but it makes the identification of unauthorized ââ¬Å"visitorsâ⬠easier. In respect to the security questions, the on-site staff should be trained on formulating strong lined questions, which might assist them in identifying unauthorized persons with in the site. For instance, instead of asking an individual whether he or she works within the site, the crew should inquire from the individual whomever he or she works for within the site. This is due to the fact that a construction of this magnitude will entail a number of sub-contractors and some invaders may hide their identity behind the sub-contractorsââ¬â¢ names.Advertising We will write a custom essay sample on Caspian Construction PLC Security Management specifically for you for only $16.05 $11/page Learn More The other step will be the development of a pre-job checklist. A checklist will turn out as vital in making better the site security. Within the list, various personnel will be assigned certain security duties. The assignment should be allocated to those who have the required expertise, as well as, experience. Since some of them will have served in the same capacity in the previous projects, they will be requested to dedicate themselves mo re within this project by promising them various incentives. The checklist will also consist of items such as inventory management system, mandatory sign-in register along other documents, which may assist in reducing theft. Consideration will also be made to award gifts to individuals thought to have made the most helpful security tip within a certain time, for instance, per month. The gathering of essential contacts such as police contacts, fir departmentââ¬â¢s contacts, as well as, neighborsââ¬â¢ contacts will not be overlooked (Sennewald, 2011). Through the use of internet, substantial information about the local contacts of all the individuals mentioned previously will be obtained. The local police will assist in making specifications about the distinct security precautions, which should be made. The aforementioned security measures may not achieve much success in the absence of a strong security fence. Within every site security program, more focus should be directed tow ards the establishment of the perimeter fence as it acts as the siteââ¬â¢s defense line. Security fences are fundamental for the protection of tools along with materials. They also assist in bring under control the issue of trespassers. It is only at the presence of a security fence that one can launch a lawsuit on trespassing against any culprits. Therefore, the security fences should satisfy certain characteristics. The security fences should be high such that they cannot be climbed. Moreover, high fences play the role of psychological deterrent. Trespassers along with ââ¬Å"impulseâ⬠vandals get discouraged upon coming across high fences. It is also important to ensure that the number of gates within the security fence is brought to the minimum. In the event that the access gates are numerous, the more vulnerable is the security detail. The gates should also be narrow enough to allow the entry of emergency vehicles.Advertising Looking for essay on project management? Let's see if we can help you! Get your first paper with 15% OFF Learn More It will also be necessary to conduct an analysis of the security needs of that specific site. The analysis will entail of reviewing the crime rate within the area. This is due to the fact most of the site theft is always organized from within (Fay, 2011). In addition, while conducting the security analysis, safety zones will be identified within which the stores along with car park will be located. There are other rules along with regulations, which will be passed to all the workers prior to the commencement of the project. The staff will also be informed about the reporting procedures to be followed in case they discover cases related to equipment theft. It is unethical to wait for a certain theft incident to take place to establish the reporting procedures. In the course of the working hours, all the equipment should remain locked, as well as, immobilized. Anti-theft devices will be attached on various equipments such as steering-wheel locks, locked fuel caps along with some more others. Where possible, all the equipment within the site should remain securely locked once not in operation. It will also be essential to install an alarm system within the site. Moreover, all the major equipments along with site vehicles should be protected by an alarm system (Sennewald, 2011). Alarm systems will always send warning signals to the security personnel in the event that thieves strike. In order to ensure that everything within the site is well monitored; surveillance cameras will also be installed within various areas along with main stores within the site. Basically, it is only with commitment that it is possible to prevent theft effectively. In the event that not all the employees are enlightened about the essence of prioritizing theft prevention, all the formulated theft policies will be bound to fail. All workers along with their supervisors will be held accountable in playing their assigned role within the theft-prevention program. Proper communication channels will be established to ensure that all the workers, as well as sub contractors have all the required information related to security matters. Benefits and shortfalls of making use of local security personnel It is always vital to make use of the local residents or security companies in the provision of security services. Given that the project is being carried out within an area whereby the company management is not conversant with the security situation, securing the services of a local security agency is well advised. The local security firm will have an upper hand in offering efficient security services because it understands better the security needs of the area. Moreover, in relation to the social constructivism theory, cultural understanding is essential in the establishment of practical security system. Even though security issues are currently approached with a global perspective, the local security aspects cannot be overlooked. Moreover, the local security firms will have already established good relationships with the local police such that they can offer them any kind of assistance they may require. Making use of local security firms will also establish good public relations of the Caspian Construction PLC with local companies. It is essential that multi-national companies dish out some contracts in form of sub-contracts to the local firms within which they are carrying out a given project. The locals will be even more ready to cooperate with the company because they are offering them employment. Moreover, in relation to the chaos theory, it is only the local security firm, which can comprehend well the prevailing security conditions. Even though much information can be obtained online regarding the security situation within Venezuela along with the crime rate within the earmarked site area, the information may not be adequate to formulate effective security policies. In addition, the locals are well equipped with the local security laws and thus w hen they need to initiate lawsuits against other parties; they will take up the assignment with a lot of ease. The chaos theory is mostly based on the visual ââ¬Ëbutter fly effectââ¬â¢ whereby underestimated aspects can bring about unforeseeable effects. While the idea of contracting local security agency may seem small, it can help much in mitigating various security issues. It is the local firm, which is well informed with the various forces, which can trigger security instability within the construction site. Putting into consideration the contract involves runway construction within an airport; matters concerning security will be highly prioritized. Airports are sensitive areas and a slack in the security detail can put at stake the lives of numerous individuals (Fay, 2011). The contracted local security firm will be more dedicated in protecting its fellow citizens against any form of attack, which can be targeted to the airport as a result of the on-going construction wor k. Moreover, the local security firm will also be well placed in communicating with the local stakeholders in regard to offering other types of support to the project. Given that they understand Venezuela better than the Caspian Construction PLC management, they will offer suitable advice on the local firms, which should be assigned various sub-contracting jobs. Sub-contracts should be offered to reputable firms. In the event that the sub-contracts are assigned to unworthy companies, the security within the construction site may be at stake. Malicious sub contractors can even organize theft within the construction site. Information provided by various companies within their websites may not be the most appropriate for establishing their actual capacities (Sennewald, 2011). Some firms in the endeavour of expanding their client base post misleading information within their websites. It will also be less expensive to make use of local security firms. These firms will be well informed a bout the various costs which they have to pay for various security equipments such as surveillance cameras. The local companies may attempt to fleece Caspian Construction PLC in the event that they attempt to purchase such equipment by themselves. Caspian being an international company, majority of the local firms may be more concerned with taking advantage of the firm. However, making use of local security firms will be quite helpful in resolving such contracting obstacles. Moreover, the contract to undertake the runway construction was most likely awarded by the Venezuelan government. The government will therefore be highly impressed to have local companies involved in the project because that will be a form of supporting local Venezuela business. Besides, it will be a good gesture by the company, as it will show commitment in investing in the countryââ¬â¢s local economy. Awarding the security provision contract to a local company will also assist Caspian Construction PLC in re ducing the administration workload. This is due to the fact that the company management will not be involved in the recruitment, as well as, supervision of security personnel. It will be the duty of the contracted local firm to carry out all the duties concerning the provision of security within the site. In addition, outsourcing security services increases the reliability of the security team (Fay, 2011). Given that the contracted firm is strictly involved with the provision of security services, its personnel will obviously be well trained and in possession of the desired experience. Moreover, in case the need to replace the security personnel emerges, the local firm will be in a position to undertake that duty immediately without major constraints. On the contrary, in the event that Caspian Construction PLC decides to manage its security workforce, it may face staffing problems given that they are operating in a foreign land. In case emergency cases emerge which require extra sec urity staff, the local firm will be capable of meeting that requirement. The security needs within the site will not remain constant through out the construction period, as time progresses, there may be the need to trim down the security personnel. The local security firm will accomplish that without making the personnel redundant because they will be posted to other stations. Besides, Caspian Construction PLC may not be in a position to retain the security personnel after the completion of the project. Nevertheless, in the course of contracting the local firm, it is advisable to evaluate the companyââ¬â¢s reputation along with efficiency. Even though there are numerous advantages associated with the contracting of local firms for the provision of security services, there are also several disadvantages linked to such a step. The procedures of the security firm may not be suitable for the Caspian Construction PLC. The local firm may indulge in certain work ethics which may not be acceptable within the Caspian Construction PLC. The local firm may take security issues with much unnecessary concern. The local security firm may also end up being sued for using unnecessary force in scenarios which did not require such forces. In the event that the firm is charged within the local courts for causing unnecessary harm on suspected vandals, disagreements may emerge on the firm which is supposed to take responsibility. In other cases, the costs of sub-contacting a local security firm may be considerably high than employing such personnel directly. The sub-contracted firms will cite various management issues to justify their exorbitant costs. The other disadvantage is that the contracted security firm may have poorly trained security personnel. This will lead to making the construction firm even more vulnerable to incidents of theft. As mentioned earlier, most of the on-site thefts are masterminded by the workforce present in the site (Sennewald, 2011). The contracted security firm personnel may not integrate well with the Caspian Construction PLC employees. Due to the poor relations between the security personnel with the other workforce on the site, it will be easier to plan equipment or even material theft. The loyalty of the local firmââ¬â¢s employees may also be questionable. Given that any equipment loss will not affect them directly, they may even abet in organizing equipment theft with willing parties. Moreover, unfaithful security personnel can also take part in offering security information which is supposed to remain confidential to outsiders. Seeking the services of another firm to deal with security issue may impact negatively on the relationship of the construction firm employees with their management. The employees may get the false impression that the company management does not trust them. In the effort to prove that such a measure was not worthwhile, these employees may organize equipment, as well as, material theft so that t he sub-contracted firm may turn out as ineffective. In the event that equipment loss takes place, the sub-contracted security firm may object taking up responsibility. This may lead to unnecessary costs as the Caspian Construction PLC may be forced to launch lawsuits against the firm. Besides, the insurance companies can also deny compensating for the lost equipment on the excuse that the company had passed the responsibility of taking care of its assets to another firm. To overcome all these shortcomings, prior to warding the contract to a certain firm, it will be necessary to evaluate the companyââ¬â¢s policies. Construction equipments are highly expensive and thus the hired security should have a good history in the security field. Besides, the company should be in a good financial position such that it can meet the costs of establishing vibrant security systems, which in most cases prove to be costly. Reference List Fay, J., 2011. Contemporary security management. Burlington, MA: Butterworth-Heinemann. Sennewald, C. A., 2011. Effective security management. Burlington, MA: Butterworth-Heinemann.
Subscribe to:
Comments (Atom)