Tuesday, January 28, 2020

What Is Decision Support System?

What Is Decision Support System? DSS can be defined as use of computer application that can help managers, staff members, or people who interact within the organization to make decisions and identify problems by using available data and communication technology. Origin Of DSS In 1960 J. C. R. Licklider wrote a paper on his observation of how the interaction between man and computer can improve the quality and competency in recognising and problem solving. His paper proved to be like a guide to many future researches on DSS. In 1962 with use of hypertext online system helped in storage and retrieval of documents and creation of digital libraries. SAGE (Semi Automatic Ground Environment) built by Forrester is probably the first data driven computerised DSS. In 1964 Scott Morton built up an interactive model driven management decision system which could help managers make important management decisions. In 1970 John D.C. Little noted that the requirement for designing models and system to make a management decision was completeness to data, simplicity, ease of control and robustness, which till date are relevant in improving and evaluating modern DSSs. By 1975 he built up a DSS called Brandaid which could support promotion, advertising, pricing and product r elated decisions. In 1974 the focus was on giving managers with information which was from accounting and transaction processing system with use if MIS(Management Information Systems) but MIS was found to not helping out managers with making key decisions. Hence in 1979 Scott Morton and Gorry argued that MIS just primarily focused on structured decisions and hence the system which also supports unstructured and semi-structured decision should be termed as Decision support systems. In s nutshell developments:- 1960Æ’Â   Building model-driven DSS 1970 Æ’Â   Theory developments Mid 80s Æ’Â  Implementation of financial planning systems, spreadsheet DSS and Group DSS. Early 90s Æ’Â   Evolving of Data warehouses, Executive Information Systems, OLAP and Business Intelligence. Mid 90s Æ’Â  Knowledge-driven DSS and the implementation of Web-based DSS Types Of DSS: Model Driven DSS `Quantitative models provide the most basic level of functionality. Model driven DSSs use small data and parameters provided by the DSSs users usually managers to help them in analysing a problem and generate statistical, financial report and simulation model to help the decision makers. Model driven DSSs question can help organisational processes to answer the WHAT IF question and thus help them forecast the effects of changes in business process. Ferguson and Jones production scheduling application was also a model-driven DSS but Scott-Mortons in 1971, production planning management decision system was the first widely discussed model-driven DSS. Data Driven DSS Data driven DSS are systems which makes use of companys mostly internal data and sometimes external and real time data to help organisations make decisions. Usually the data comes in form of databases or data warehouse which allows queries and data retrieval tools and analysis to make decisions. Richard Klaas and Charles Weiss at American Airlines developed one of the first data-driven DSS. An example of data driven DSS can be use of digital maps or the GIS( Geographic Information System). Communication Driven DSS Communication Driven DSS helps in decision making to internal group of people by sharing of information and enabling communication between them. Most basic example can be the threaded email between a group and complex example can be video conferencing. In communication driven DSS communication technologies is most important component of its working architecture. In recent years internet provided vast possibilities to communication driven DSS. Groupware bulletin video and audio conferencing are few of the technologies used for communication Driven DSS. Document Driven DSS Document driven DSS uses the organisations documents such as policies, procedures, processes, specifications, historical, stored documents and processing technologies to give documental analysis and enhance decision making. This type is system is usually targeted at larger base of users. Internet greatly increases the availability of all required documents and hence helps in development of document driven DSS. Knowledge Driven DSS Knowledge Driven DSS are used usually by managers to help them with management advice or to choose products or services. These DSSs can be just a standalone computers with applications which are expert in particular domain along with its understanding so as to solve the problems of that particular domain. Artificial intelligence is vastly used by such application to help Knowledge driven DSSs. Now a days Knowledge Driven DSS coupled with intelligence systems are used at medical diagnostic centres, fraud detection and scheduling manufacturing operations. Web-based DSS Computerized DSSs capabilities were extended with emergence of internet and world-wide web. With passing time HTML developed and TAGS and tables further helped in enhancing Web-based DSS. With all these developments web-based DSS became main platform for all types of DSS to develop. Corporate have started using intranet for knowledge management and support information exchange between various departments. The server that is having the DSS application is connected to the computer by a network through the TCP/IP protocol. Recently application service providers introduced enterprise knowledge portals that combined information portals, knowledge management, business intelligence and communications-driven DSS in an integrated Web environment. Benefits of DSS Improves efficiency Helps in faster problem solving Helps in interpersonal communication Promotes learning Increases organizational control Provides new evidence in support of a decision Creates a competitive advantage over competition Encourages exploration and discovery on the part of the decision maker Reveals new approaches to thinking about the problem space Helps automate the managerial processes. Cost reduction and enhance profit. Disadvantages of DSS Over dependency for Decision making Assuming it to be correct. Unanticipated effects Deflect personal responsibilities Information overload. Conclusion DSS is still and evolving technology. The types of DSS mentioned are just few of the many DSS which are around and help organization in decision making. Many of the types of DSS are subsets of previously researched and created DSS with added functionality and/or requirements. A very brief span of historical data has been used to portray DSS evolution and growth in early years. All the scientists, researchers and professors then set up a base for future DSS to develop and build upon to enhance and simplify decision making. By understanding how DSS evolved over the period of time and how its still being developed helps us in understanding how and where the future DSSs are heading and what to expect next in this fast emerging technology. Of the types discussed Web based is the most rapidly growing and improving DSS. Recent developments in internet, computers and communication devices are helping Web-based DSS application to divulge into various other fields. DSS and DSS application continues to take advantage of any and all emerging technologies in artificial intelligence, databases, data warehouses, human interaction with computers which can help improve it more and simplify decision making. Sources/References:: http://www.bestpricecomputers.co.uk/glossary/decision-support-systems.htm http://searchcio.techtarget.com/definition/decision-support-system http://en.wikipedia.org/wiki/Decision_support_system http://dssresources.com/history/dsshistory.html Vitamin E: Functions and Metabolism Vitamin E: Functions and Metabolism Vitamin E is one of 4 fat-soluble vitamins. The vitamin is formed by plants, and has eight unlike isoforms separated into two classes of four vitamins each. The compounds include of a 6-chromanol ring and an isoprenoid side chain.The group bond to the R1, R2 and R3 position on the 6-chromanol ring verify whether the vitamin is acknowledged as alpha, beta, gamma, or delta.(www.exrx.nt, 2011) A large body of the study now focuses on the alpha tocopherol form of vitamin E, which is the most biologically active (Tiidus, P. M., and M. E. Houston, 1995, Traber, M.G., 1999). Recently gamma tocopherol has been a subject of importance by countless researchers. Vitamins are a vital source of life. Vitamins are any organic that is essential for many living things to obtain a normal healthy living. (Dorling Kindersley, 1998) Dietary Function Vitamin E is an essential part of cellular membranes whose main role is to protect the cell alongside to oxidation, Within cells and organelles vitamin E is the first line of defence against lipid per oxidation. The vitamin also acts as a very important function in providing elasticity to red blood cells as they travel through the arterial system. Artificial vitamin E nominates dl-alpha-tocopherol, is less expensive from the naturally occurring form, d-alpha tocopherol. The expected/natural form of the vitamin is synthesised only by vegetation and is found mostly in plant oils. Vitamin E is also present in large numbers in the chloroplast and as a result the leaf of most plants.The fat-soluble property of vitamin E allows it to be stored within the fatty tissues of humans and animals. Therefore a diet that includes meat supplies additional vitamin E. However, the amount of vitamin E obtained in a high protein meat complete diet is less than the quantity supplied by a plant source. Metabolism Absorption and Bioavaliability Absorption of vitamin E is highly reliant on the same process that develop during fatty acid digestion and metabolism. A lack of any component of these transporters will reduce carrier structure and in turn vitamin E absorption. vitriol acids are a measured essential for vitamin E absorption and micelle formation. Once formed, the micelle is then able to cross the undiluted water layer and discharge its contents into the enterocyte. A contemplation of the flow pressure of vitamin E through the enterocyte has been elusive to researchers (Traber, M.G., 1999). The ingested Vitamin E is quickly vacant from the bloodstream, into tissues as blood concentrations of vitamin E in humans and animals have minute relation to the quantity within the body. Vitamin E is fat soluble; food intake could potentially persuade its bioavailability, it is claimed that the alpha-tocopherol has the highest bioavailability. The lower bioavailability of Vitamin E is form a typical vitamin E supplement, and the changeability which is experimented when consumed, this suggest that vitamin e is poorly absorbed through the body with low-fat meals. Vitamin E can be improved by food reinforcement makes Vitamin E more bio-available .Bioavailability of vitamin E, is influenced by the increase of risk in coronary heart disease. Vitamin E is an antioxidant that is vital for our bodies, to preserve optimum health and in people diets. Vitamin E is extensive and in all kinds of foods. Most vitamin E comes from vegetable oil and products made from them like margarine and salad dressings. It is important for youth,in order to maintain their health. It aids in protecting red blood cells, defends the body against oxidative damage and helps avoid damage of both vitamins A C. Having vitamin E as part of a well balanced diet can reduce the risk of heart disease and cancer, also slows down the effect of Alzheimers disease when consumed in high dosage Once in the blood 15 to 45% of the total vitamin E intake can be absorbed by the cells. Transport Upon reaching the bicollateral exterior of the enterocyte vitamin E is packed into chylomicrons and then elated throughout the body via the movement. Within five minutes of arrangement chylomicrons are broken down by lipoprotein lipase and the contents are isolated towards a range of paths. The vitamin E in the chylomicron equilibrates both with (HDLS) and (LDLS) ( Groff, J.L., Gropper S.S., and Hunt S.M 1995). HDLS all circulate lipoproteins which eventually receive vitamin E, as HDL fervently relocates the compound to the lipoproteins at a rate equivalent to 10% of the plasma vitamin E per hour (Traber, M.G., 1999). The vitamin E remaining in the chylomicron becomes a chylomicron remnant and travels back to the liver for re-uptake in a process that has garnered much research, but so far is poorly understood. Once in the liver the vitamin E is packaged into Very Low Density Lipoproteins (VLDL) and excreted back into the circulation. Being the most biologically active of the eight vi tamers, (Groff, J.L., Gropper S.S., and Hunt S.M 1995, Kanter, M.M. 1998, National Academy of Sciences. 2000, Traber, M.G., 1999, www.exrx.nt), alpha tocopherol is sequestered by the liver and constitutes over 80% of the total vitamin E packaged into the VLDL and secreted by the liver (Traber, M.G., 1999, www.exrx.nt). The predominant transfer of the alpha vitamer is performed by alpha tocopherol transfer protein (ATTP). As the VLDL are broken down by lipoprotein lipase, Low Density Lipoproteins (LDL) are formed and from these lipoproteins the vitamin E is transferred to HDL and eventually incorporated into either circulating lipoproteins or peripheral tissue. Any of the previously mentioned lipoproteins have the ability to transfer vitamin E to the tissue as needed (Groff, J.L., Gropper S.S., and Hunt S.M 1995, Traber, M.G., 1999, www.exrx.nt). A final mechanism for vitamin E is uptake by the peripheral tissue from the chylomicron via lipoprotein lipase activity. Unlike re-uptake o f vitamin E by the chylomicron remnant, uptake of the vitamer by peripheral tissue is better understood. After vitamin E has been transferred to the LDL from the chylomicron two receptors (LDL dependent receptor and LDL independent receptor) within the tissue play a key role in the uptake of vitamin E into the cell (Traber, M.G., 1999, www.exrx.nt). Storage Vitamin E is a lipid soluble vitamin and therefore over 90% of total body vitamin E is found in the adipose tissue (National Academy of Sciences, 2000, Traber, M.G., 1999, www.exrx.nt). Over 90% of these pools are found as a part of an adipocyte fat droplet whereas the remaining amount is found mainly in adipocyte cellular membrane. The storage ratios of vitamin E are also very difficult to alter. It takes over two years to alter the ratio of alpha to gamma isoforms. Previous studies have shown that the ratio is altered as the alpha vitamin replaces the gamma vitamin, which is reduced by 70% (Tiidus, P. M., and M. E. Houston, 1995, www.exrx.nt). Concentrations of vitamin E cover a wide range in body tissues. In the plasma the concentration of vitamin E is approximately 27 umol/l. Within skeletal muscle protein the vitamin E concentration varies considerably depending upon the type of muscle (National Academy of Sciences, 2000). Although a large majority of vitamin E is found in adipo se tissue (230 nmol/g wet weight) (National Academy of Sciences, 2000) there isnt an organ that function to store and discharge vitamin E. The actual means regarding vitamin E release from the tissue is unknown at this time. While it seems likely that vitamin E is released during lipolysis associated with exercise this may not be true. Research has shown that even during times of weight reduction vitamin E is not released from the adipose cells (Traber, M.G., 1999). Therefore, the factors that regulate bioavliability of vitamin E from adipose tissue are not known. Requirements As it is unknown how much vitamin E should be consumed by adults, it is aid that according to the (RDA) that men whould have a Vitamin E intake of 15 mgs and 10 mgs for females.(S.Frances,2006) Only natural alpha-tocopherol can typically provide supplements of Vitamin E, and only existing one stereo-isometric form. The need for vitamin E increases as people diet consist of more polyunsaturated fats and oils as the oils in Vitamin E needs a source of antioxidants to help absorption/and protection. Vitamin E is largely contained in raw oils. In 1968 the RDA for vitamin E was established at 300 IU (300 mg) for a 65 kg adult male ( National Academy of Sciences. 2001).The detailed RDA is listed in table 1 and table 2. This daily level is difficult to reach unless a diet high in polyunsaturated fatty acids was consumed ( Tiidus, P. M., and M. E. Houston1995)From 1 mg of vitamin E approximately .3 ( Traber, M.G., 1999) to .5 is in the alpha vitamin form and therefore readily absorbed. The o ther vitamers are not stored as efficiently and usually excreted ( Tiidus, P. M., and M. E. Houston1995, Traber, M.G., 1999). Therefore a new RDA was set based on the alpha-tocopherol form of the vitamin. In 1989 the RDA for Vitamin E was set at 10 mg alpha tocopherol for men and 8 mg of alpha-tocopherol for women (Traber, M.G., 1999, www.exrx.nt). In the year 2000 all RDA values were in the process of being replaced by Dietary Reference Intakes (DRI). The DRI has been established at 15 IU of alpha-tocopherol. The revised DRI levels are the same for both men and women ( Packer, L.1997, www.exrx.nt). Recommended Dietary Allowance (RDA) In 1968, the recommended dietary allowance for vitamin E was established at 300 IU (300 mg) for a 65 kg adult male ( National Academy of Sciences. 2001. The other vitamins are not stored as efficiently and usually excreted (Tiidus, P. M., and M. E. Houston1995, Traber, M.G., 1999). In accordance to information resourced from Traber, M.G. in 1999 , there was a new recommended dietary allowance which was set based on the alpha-tocopherol form of the vitamin. In 1989 the RDA for Vitamin E was set at 10 mg alpha tocopherol for men and 8 mg of alpha-tocopherol for women. Deficiency Anaemia, muscle necrosis, and foetal death have been observed in over fifteen different vitamin-E-deficient animal species.(www.exrx.nt) .Humans who have fat mal-absorption suffer from the same symptoms shown in rats, but to a lesser degree. These manifestations are exhibited early in childhood. Some of the symptoms include decreased sensory perception, muscle weakness, scoliosis, and muscle structural abnormalities. These symptoms can usually be reversed using vitamin E supplementation ( Tiidus, P. M., and M. E. Houston1995, www.exrx.nt)) Vitamin E deficient diets fed to adult humans have resulted in the formation of very few deficiency symptoms. (Bunnell R.H., E. De Ritter, S.H. Rubin 1975, www.exrx.nt) has shown that prisoners performing strenuous physical labour while fed a vitamin-E deficient diet for 13 months exhibited no deficiency symptoms. A diet full of vitamin E may lower the risk of cancer and the likely hood of death, in part through oxidation and inflammation. Lacking vitamin E concentrations in the blood; people die more often and than people with a high blood concentration (s.Frances, 2006).Through research and development of vitamin E has an effect on helping slowing down the loss of function that occurs in Alzheimers disease when taken in excessive dosages. Toxicity Vitamin E toxicity has not often been acknowledged in humans. Doses up to 1600 I.U. have been usually administered in study with no clear unpleasant side effects. Toxicity may be complex since there is a wide variant in daily blood vitamin E levels. Increasing vitamin E levels in muscle tissue is especially difficult to attain and therefore toxic levels are difficult to achieve. Meydani et al. ( Karlsson J.,1997, www.exrx.nt) given 800 I.U. of vitamin E to subjects for a period of 48 days and only saw a 37% increase in plasma alpha tocopherol levels (www.exrx.nt). The tocopherol binding protein is most commonly said to manage the quantity of vitamin E that can be physiologically stored. High levels of vitamin E are likely excreted by the body. Conclusion In conclusion vitamin E may help reduce oxidative stress and lipid per oxidation of cellular membranes. The current Dietary Recommended Intake for vitamin E meets the needs of most individuals can be achieved through a healthy diet, and eating plan. In April 2000 The National Academy of Sciences according to Packer, L. In 1997 established an intake maximum of 1100 I.U for synthetic and 1500 I.U. for natural vitamin E. These maximum levels are approximately one hundred times the Dietary Recommended Intake. Vitamin E supplementation by both active and non active individuals is widely employed. The choice to supplement or not supplement a diet with vitamin E is an option. REFERENCE LIST Bunnell R.H., E. De Ritter, S.H. Rubin. Effect of feeidng polyunsaturated fatty acids with a low vitamin E diet on blood levels of tocopherol in men peroforming hard physical labour. Am. J. Clin. Nutr. 28:706-711, 1975. Clarkson P. M. Antioxidants and physical performance. Crit. Rev. Food Sci. Nutr 35: 131-141, 1995. Class notes on vitamins and minerals. Dr. Mariam Farhad, 2011 Groff, J.L., Gropper S.S., and Hunt S.M. The Fat Soluble Vitamins. In: Advanced Nutrition and Human Metabolism. Minneapolis: West Publishing Company, 1995, p. 284-324. Hartman, A., A.M. Neiss, M. Grunert-Fuchs, B. Poch, and G. Speit. Vitamin E prevents exercise-induced DNA damage. Mutat. Res. 346: 195-202, 1995. http://consumerlab.com/RDAS viewed 15.05.2011 http://ods.od.nih.gov/factsheets/VitaminE.asp viewed 13.05.2011 http://www.exrx.nt/nutrition/antixidants/vitaminE.html viewed 15.05.2011 Karlsson J. Exercise, muscle metabolism and the antioxidant defense. World Rev. Nutr. Diet. 82:81-100, 1997. Packer L. Protective role of vitamin E in biological systems. Am. J. Clin. Nutr. 53:1050S-1055S, 1991. Rokitski, L., E. Logemann, A.N. Sagredos, M. Murphy, W. Wetzel-Roth, and J. Keul. Lipid peroxidation and antioxidative vitamins under extreme stress. Acta. Physiol. Scand. 151: 149-158, 1994 Traber, M.G., 1999. Vitamin E. In: Modern Nutrition in Health and Disease. Ninth Edition. Edited by Maurice Shils, James Olson, Moshe Shike, and A. Catharine Ross. Baltimore: Williams Wilkins, 1999 p. 347-362. Watt, T., T.T. Romet, I. McFalane, D. McGuey, C. Allen, and R. C. Goode. Vitamin E and oxygen consumption. Lancet. 2: 354-358, 1974. T., T.T. Romet, I. McFalane, D. McGuey, C. Allen, and R. C. Goode. Vitamin E and oxygen consumption. Lancet. 2: 354-358, 1974.

Sunday, January 19, 2020

The Dignity of Cloning :: essays research papers

The Dignity of Cloning   Ã‚  Ã‚  Ã‚  Ã‚  Cloning is just one of the new ways that modern medicine is pushing the boundaries into uncharted moral waters. Cloning can be divided into two main groups by its purpose; therapeutic, which looks into the generation of body parts for transplants, and reproductive, which is cloning for the sake of replicating an entire organism. The main method of cloning mammals is called somatic cell nuclear transfer, where the DNA from a cell of an existing organism is put into a donor egg whose nucleus has been taken out. The major question that surrounds this process and the idea of replicating an organism is whether or not it detracts from human dignity.   Ã‚  Ã‚  Ã‚  Ã‚  According to the Catholic Church, cloning is immoral on many bases. Firstly, even the experimentation of cloning is seen as immoral, since, in the process of creating a viable clone, hundreds of embryos simply do not work. In the case of Dolly, the first successfully cloned sheep, she was the only survivor of 277 attempts. Statistics like this show how scientists are playing â€Å"fast and loose† with living embryos, which is unacceptable for Catholic teaching. The Catholic Church is also against the fact that, in therapeutic cloning, only a part of the new organism is â€Å"harvested†, and the remaining parts are destroyed. This raises Catholic objections on the grounds of playing God by creating and destroying life. This goes back to one of the temptations presented to Adam and Eve, â€Å"You will be like gods† (Genesis 3:5).   Ã‚  Ã‚  Ã‚  Ã‚  On the account of reproductive cloning, the Catholic Church has a whole new set of reasons relating to how it is immoral. With the advancements in cloning it is said by some that it will be possible to engineer a genetically superior human being. The problems with this are evident in the fact that an engineered child would have been created in our image, instead of the image of God. It is therefore arrogant of us to say that we can direct the evolution of humanity better than God.   Ã‚  Ã‚  Ã‚  Ã‚  Proponents of cloning raise many points in how, specifically therapeutic cloning, can advance knowledge and even lead to cures for some diseases. For example, theoretically, a liver cell could be used to grow a new, healthy liver for a transplant. The same could be said for kidneys, or organs that are not currently transplantable. Genetic diseases, such as cystic fibrosis can be better handled with answers to the genetic puzzle that cloning could provide. The Dignity of Cloning :: essays research papers The Dignity of Cloning   Ã‚  Ã‚  Ã‚  Ã‚  Cloning is just one of the new ways that modern medicine is pushing the boundaries into uncharted moral waters. Cloning can be divided into two main groups by its purpose; therapeutic, which looks into the generation of body parts for transplants, and reproductive, which is cloning for the sake of replicating an entire organism. The main method of cloning mammals is called somatic cell nuclear transfer, where the DNA from a cell of an existing organism is put into a donor egg whose nucleus has been taken out. The major question that surrounds this process and the idea of replicating an organism is whether or not it detracts from human dignity.   Ã‚  Ã‚  Ã‚  Ã‚  According to the Catholic Church, cloning is immoral on many bases. Firstly, even the experimentation of cloning is seen as immoral, since, in the process of creating a viable clone, hundreds of embryos simply do not work. In the case of Dolly, the first successfully cloned sheep, she was the only survivor of 277 attempts. Statistics like this show how scientists are playing â€Å"fast and loose† with living embryos, which is unacceptable for Catholic teaching. The Catholic Church is also against the fact that, in therapeutic cloning, only a part of the new organism is â€Å"harvested†, and the remaining parts are destroyed. This raises Catholic objections on the grounds of playing God by creating and destroying life. This goes back to one of the temptations presented to Adam and Eve, â€Å"You will be like gods† (Genesis 3:5).   Ã‚  Ã‚  Ã‚  Ã‚  On the account of reproductive cloning, the Catholic Church has a whole new set of reasons relating to how it is immoral. With the advancements in cloning it is said by some that it will be possible to engineer a genetically superior human being. The problems with this are evident in the fact that an engineered child would have been created in our image, instead of the image of God. It is therefore arrogant of us to say that we can direct the evolution of humanity better than God.   Ã‚  Ã‚  Ã‚  Ã‚  Proponents of cloning raise many points in how, specifically therapeutic cloning, can advance knowledge and even lead to cures for some diseases. For example, theoretically, a liver cell could be used to grow a new, healthy liver for a transplant. The same could be said for kidneys, or organs that are not currently transplantable. Genetic diseases, such as cystic fibrosis can be better handled with answers to the genetic puzzle that cloning could provide.

Saturday, January 11, 2020

Network Design Project It/230 Final Paper

Network Design Project Art Meyer IT/230 Pernell Curtis 11/27/2011 Executive Summary The Tri-Corp company is need of a complete networking solution. Tri-Corp has two offices, one in Phoenix, and the other in Tucson. The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications; both offices require data transfer on a daily basis. Each user requires access to the internet and the shared data stored on the nine clients workstations.DSL, cable, and T3 network solutions are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit. The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. Tri-Corps needs a reliable network, with a VPN service to accommodate the needs of traveling executives, upper management, and a growing workforce.Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. In order to function more efficiently, many companies across the globe require remote access to their server systems. A remote access solution will provide Tri-Corp with a proven method to retrieve data from remote locations and them with the opportunity for their executives to complete necessary tasks on the go.However, remote access may provide intruders a method to access Tri-Corps secure data. These vulnerabilities may expose the risk of exploitation and have caused irreparable damage to other companies i n the past. Successfully implementing Tri-Corps remote access solution requires careful planning to protect their data and avoid unwanted attacks by unauthorized users. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data to many employees in both locations. Cabling Specifications The shield twisted pair (STP) or unshielded twisted pair (UTP) cable are what connects computers to the switch on the Star Topology network10Base-T is one of the Ethernet standards for cabling in a network environment. 10BaseT uses a twisted pair cable with a maximum length of 100 meters.Standard 10BaseT operates at 10 Mbps. It is commonl y used in a star topology. Gigabit Ethernet (CAT6) over twisted pair copper wires is the preferred cabling specification for high speed data transmissions. Transmission rates in this cabling specification may reach speeds of up to 1000 Mbps. CAT5 T/100 base cables will provide adequate data transfer for most other applications. Local Area Network (LAN) Topologies In the star topology, instead of having a direct connection to each other, the systems are connected to a central device, such as a network switch or a router.One definite advantage the star topology provides is network stability. For example, in the star topology, when one system goes down, it does not bring the rest of the network down with it as it does in the bus or ring topologies. The star topology is the most prevalent topology in use today. The physical topology of the star network contains six different classifications; namely point-to-point network, ring network, mesh network, bus network, tree network and star ne twork. Of these six, the star network is one of the most commonly utilized network topologies.According to definition, the term ‘star topology‘, refers to a network wherein all the nodes are connected individually to one common hub (Naik, 2011). Simply stated, the stat topology is a network topology wherein transmission stations connect to the central node in a configuration where the design of the network stations resembles the shape of a star. Essentially, the star topology design may be likened to the spokes on a wheel, all connected to the central hub. In this network configuration, the exchange of date is only possible through an indirect connection to the central node; this connects all other nodes to the network.As with various other types of network topologies, the star topology has its own set of particular advantages and disadvantages. These factors require careful consideration in regards to the feasibility of the network setup. When evaluating this topology, careful comparison to other network solutions and consideration of all available options helped to discover which solution would provide Tri-Corp with the best answer to meet their needs. It is very easy to install and manage star network topology because its functionality is the simplest among the topologies.Because all computers rely on the central hub, troubleshooting a star topology network is much easier, therefore, any problem, which leaves the network inoperable, leaves a direct path to the central hub. This feature simplifies troubleshooting by offering a particular spot for error connection and at the same time, the reliance is very high on that single point. In star topology, the data packets do not have to make their way through various nodes; this ensures that the data transfer is fast.Consequently, the fact that the data packets only make it through three different points also guarantees that the data is safe. Because the nodes do not connect to each other, problems in one node do not affect the routine of other nodes in the network. Since all the computers on the network have independent control of their networks and are only dependant on the central hub computer, failures in transmitting data and other possible problems in this area are less likely to occur. In addition, if the hub is safe then every computer in the network is safe.This type of network provides more privacy than any other network. Additions, such as new machines or replacing older units are much easier in the star network topology, since the network will not experience any disruption to facilitate changes. The primary problem with star network topology is the fact that it is highly dependent on the central hub functioning properly. Additionally, network size is dependent on the number of connections available on the hub. This network type requires more cable when compared to other topologies, such as linear bus topology.Therefore, the cost and expense of a star topology runs hig her and the expenses incurred are relatively high. Since the performance of the total network depends on the performance of the hub, a slow server will cause the entire network to slow down. As mentioned earlier, the star network topology requires more cable to connect the network together than the usual Bus topology. For this particular network setup, the recommendation is to use is the RJ45 or the Ethernet cables. To be specific, this network setup requires a gigabit 48-port switch and CAT6 base T/1000 Ethernet cabling to both the IT and the graphic design department.The other departments will use CAT5 base T/100 cabling. In a Star Network the entire network is dependent on the hub so if the entire network is not working then there could be a problem with the hub. Since all the computers on the network have independent control of their networks and only dependant on the central hub computer, the failures in transmission and other possible problems in this area are less likely. In addition, if the hub is safe then every computer in the network is safe. This type of network also offers more privacy than any other network.A Star Network Topology is best suited for smaller networks like Tri-Corps and works best when there is limited number of nodes. The primary objective is to ensure that Tri-Corps hub or the central node is always functioning and that all extra security features are added to the hub because it s the heart of the network and the stability of the network relies directly on the stability of the central hub. Wide Area Network (WAN) Design Tri-Corps two offices, one in Phoenix and the other in Tucson require a WAN network to effectively communicate and share data and resources.The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications and require mini mal amounts of data transfers between the offices. Each user requires access to the internet and the shared data stored on the nine clients workstations. Both DSL and cable internet service are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit.The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. The current system in the Tucson office uses a non-commercial five-port router; each computer connects to the router through a Cat5 Ethernet connection. The first step is to discover the bandwidth needs and average user loads. Data from Cisco (Boda, 2009) suggests the average broadband connection generates approximately 11. gigabytes of Internet traffic per month. We will use this figure to calculate the bandwidth needs of this company. Calculating with 10 users and a five-day, forty-hour workweek as our model for the Tucson office, we can calculate average daily consumption to be approximately 5. 7 gigabytes per day of bandwidth consumption. The current cable internet allows for 28 gigabytes during an eight-hour period (multiply 8mbps x 3600, the number of seconds in an eight, hour period, and divide by 1024) should provide a stable connection throughout the day as all ten users are rarely on the network at once.The setup of the Phoenix offices is more complex; they require a T3 connection to accommodate the IT and the Graphic Design departments. The third floor houses the IT department, the first floor houses the reception staff, along with lower level management, the second floor houses the graphic design department, and the fourth floor houses the operations staff while the fifth floor houses upper management. The current system in the Phoenix offices uses a network hub and repeaters. Both the IT and graphic de sign department complain they do not have sufficient bandwidth to meet their needs.Upper management complains that the system on their floor is too slow. The Tucson offices complain they experience difficulty sending and receiving data and email from the Phoenix offices, and connections time out frequently. The current system in the Tucson offices lacks design and will not allow for additional users or adding network printers. Additionally, aside from the firewall provided by the router, no real network security is in place and the workstations cannot communicate with each other in either location. The Phoenix offices need increased speed and greater bandwidth. Both offices require better communications etween the workstations to increase efficiency. The recommendation for the Tucson offices is to install a server system using Windows server 2003, and a VPN; this office will utilize the star topology, thus allowing for growth and easier diagnostics. In addition, failure of one works tation will not affect the entire network and the speed will be optimal. The server software provides several benefits. Multiple applications are available to run in the Server 2003 environment, including financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs.Domain operations are included in the software, something that will become an important resource by adding security and the ability to the local and group policies of the network. Additionally, if Server 2003 is not utilized as a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). An extensive amount of shielded twisted pair Cat5 cables will be necessary to connect each workstation and the network capable printers. The VPN system will allow the users to connect remotely to their workstations and the company intranet. The Tucson office will utilize the central closet as a server room.The server will handle all application s and house the data storage. The server will have a connection to a primary switch; this switch will also handle the data transfer between the local PCs of each office. The switch accomplishes two tasks; since connections from one port to another are made on an as needed basis (Axia College, 2005), this will eliminate traffic collisions and create faster point to point connections. The switch will be connected to ports on the private network switch allowing for access to the application and data servers, along with the DNS and Active Directory server.Since the data transfer needs are minimal, the switch does not need Cat6 cabling; Cat5 STP will work, gigabit switches will not be necessary. Security from outside traffic will be enforced by closing the ports to outside traffic. Users will access the internet via an Internet Security and Acceleration (ISA) server, which will be connected to the public network. The recommendation for the Phoenix office will also include a new server an d the Windows server 2003 platform. Both offices will use the same VPN, however, in the Phoenix offices, only upper management will have access to the VPN from outside the building.The existing network hub will be replaced by T/1000 switches connected to gigabit LAN network interface cards on each of the workstations in the graphic design department as well as those in the IT and upper management. Gigabit LAN adaptors are required on the servers to accommodate the high bandwidth needs of these departments. The reception area, lower management, and Operations will connect to standard switches using a T/100 base, thus eliminating the problem of network congestion in the departments where more bandwidth is required, and limiting the bandwidth where it is not necessary.Cat6 cabling will be utilized on the second, third, and fifth floors to accommodate the bandwidth needs of the high end users. CAT5 cabling will be used throughout the rest of the system and should easily meet the needs o f the end users in the other departments. The primary cost of upgrading both systems will be in the cabling; both offices will require an extensive amount of CAT5 and CAT6 networking cables.The server systems and switches will incur the second highest cost; both upgrades are necessary to provide the company with greater ease of use and transitional growth opportunities Updating the current systems and switching to Windows server 2003 will provide both offices with greater stability, efficiency, and increased security. Updating the Phoenix offices from hubs to switches will increase the flow of network traffic and allow for greater communications between both offices and all workstations.The Tucson offices will benefit from less frequent connection time outs and rapid data transfer to and from the Phoenix offices. Additionally, both offices will be more prepared for rapid growth. The Tucson offices will show increased productivity by networking all of the printers. The Phoenix office s will benefit from as the IT department and graphic design will have the necessary bandwidth to meet their needs, while upper management will spend less time waiting on reports and data necessary to make day to day decisions that will affect the company’s long-term growth strategies.Upgrading the current systems is not only a wise decision, it is the only logical decision for a company that is primed to move ahead and take control of the market in its area and expand into more profitable markets in other cities as well. Network Protocols VPN users gain remote access to their LAN through the internet. VPN’s are network links formed by connecting to an ISP and the company LAN. These connections use technologies such as sophisticated packet encryption to secure the data link. This is especially important, as the information is travels across a public network.The advantage of using a public network versus dedicated connections is the cost; many companies take advantage of VPN technology to provide remote access without compromising security. Dial-up networking is the simplest way to connect to the Internet. Computers connect over the phone line using a modem. Users must pay for a subscription to an ISP like AOL. Dial-up connections are much slower than broadband and the speed maxes out at 33. 6 Kbps. Some applications will work with satisfactory results; more and more applications require greater connection speeds even when performing simple tasks such as transferring files.Both applications require user name and password login information; that however, is where the similarities end. VPN users benefit from a secure, encrypted connection that is firewalled from intruders and typically monitored by a network administrator to ensure the privacy of the connection is not compromised. Dial up users connect to a public network and may be susceptible to outside attacks. Network Remote Access Company executives at Tri-Corp have requested a remote access sol ution as part of their systems upgrade.The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. The company requests that all upper management be granted unlimited access to all files and network resources and permissions. Additionally, they wish to grant access to all mid-level managers, the operations manager, and the entire graphic design department. Support staff and non-salaried associates desire access to the company site for employee benefits and access to daily reports.Tri-Corps enterprise system runs two servers, one in the main branch located in Phoenix; the other in the support branch located in Tucson. Both branches utilize Microsoft Server 2003 software, and a star topology. Outlook is among the programs that are most widely used by the executive branch, Publisher and Adobe Illustrator top the list among the graphic design department. O perations use a simple data storage program that breaks down cost and projects business forecasts. Tri-Corp believes their company will function more efficiently by granting its employees remote access to their server systems.Whereas it is true remote access does provide many companies with a proven method to retrieve data from remote locations and offers their users a chance to complete necessary tasks on the go, Tri-Corp will be at risk; remote access also offers intruders a way in to Tri-Corps secure data. If these vulnerabilities expose the company to exploitation, the damage may prove to be irreparable. Companies who plan to use a remote access solution need careful planning to protect their data and avoid unwanted attacks by unauthorized users.Therefore, the question lays, â€Å"Should Tri-Corp use Dial-Up or VPN to complete their remote access solution? The first step is user control; it is imperative to control which users can access the network from outside the company. Ne twork access should be granted only for users who need it; the likelihood is that not everyone is likely to need network access from outside the company. Whether Tri-Corp decides to use Dial-Up or VPN they must set up remote access accounts for remote users that are separate from their normal accounts, and make these accounts more restrictive than their normal LAN accounts (Axia, 2006).The company executives may believe this security measure to be impractical; however, this strategy is vital, particularly for users who normally have broad security clearance (Axia, 2006). The advantage of using Dial-Up is the Dial-back feature. Dial-back is a feature whereby you securely enter the phone number of the system from which users are calling (Axia, 2006). Users requesting remote access from a fixed location such as a private residence are ideally suited for a Dial-Up remote access connection with the dial-back feature.Once these users connect, they dial the system, request access, and then the remote access system terminates the connection and dials the preprogrammed phone number to make the real connection (Axia, 2006). The home based computer then answers the call and proceeds to a normal connection. This service offers greater security for home based users because any other user who may attempt to gain access will not be allowed access with this feature enabled. One more key advantage of a dial-up remote access server (RAS); RAS solutions require employees to onnect to the corporate network via a direct telephone call to modem banks installed at the network edge (â€Å"Remote Access Vpn Solutions†,  2000). Three key differences separate dial-up and VPN architectures; the first being that direct dial-up does not utilize the internet to avoid incurring long distance phone charges. Next, the corporation setting up the dial-up connection is responsible for providing modem banks (modem banks are similar to network hubs or switches). Finally, encryption technol ogies are not required because the network traffic passes through non-shared links.Undoubtedly, granting remote access may increase productivity and effectiveness by giving employees direct access to information from anywhere in the world. One primary example is email access; this factor alone makes a big difference for employees that are constantly on the go and rely on email to communicate from remote locations. The business benefits of using a VPN delivers several advantages versus RAS solutions. VPNs offer two distinct cost advantages; first, Internet connections, which are typically local calls, are much less expensive than toll free or long distance dial-up connections.This consideration typically is what convinces most organizations to apply a VPN rather than an RAS solution. Secondly, the equipment cost of purchasing and maintaining a VPN is much more cost effective than standard RAS equipment. Installation and use of VPN’s may yield a cost savings of up to 70 percent over a standard RAS system. Comparatively, most companies discover that remote access VPNs pay for themselves in cost savings in a relatively short period. By way o f contrast, RAS systems only incur greater cost throughout the course of time, especially if upgrades or adding more users is necessary.The amount of access available is dependent on the scaling system and how the VPN distributes the client’s software. Scaling a remote access may also necessitate increased bandwidth of the company’s Internet connection. As soon as the VPN gateway is operational, the company may change the scaling system to support anywhere from a few hundred to tens of thousands of users. The option of scaling for RAS solutions is not as trouble-free and requires the use of additional hardware and adding phone lines.The widespread use of broadband Internet service now offers VPN clients an inexpensive solution to connect corporate networks by utilizing the World Wide Web to connect from ou tside the company walls without losing speed and compromising security. This is a very attractive option for mobile users in particular. Dial-up solutions do not always provide the same security and ease of use as this option. In some cases dial-up solutions may very well remain the best solution; many company’s still employ this solution as part of their remote access services for their fixed locations.With proper maintenance, this solution will still serve the needs of a smaller client base. However, if the client base grows rapidly and significantly, they may soon overload the RAS system and discover they need to move on to a different solution. The recommendation for Tri-Corp is to utilize a VPN solution. However, the executive branch will utilize the dial-up service from their fixed locations, such as their place of residence. This will offer greater security by using the dial-back feature to ensure the user is not an unauthorized intruder.This will also remain cost effe ctive as the executive staff numbers only eight individuals. Graphic design, operations, and the rest of the support staff will gain access through the VPN software in Microsoft’s Server 2003 package. However, each department will only have access to the resources that are consistent with their job requirements. Operations will have access to the database and Outlook; the graphic design department will have access to their saved projects files and Outlook. The support staff will only have access to the company human resources sites and limited access to non-confidential company information.The key elements of a successful remote access implementation will include security, performance, high availability, and client management. A meeting with the Tri-Corp company will outline and clearly define their specific requirements in each key area to discover the solution that will serve the company’s needs. Utilizing both dial-up and VPN solutions will offer this company the be st of both worlds; security and performance as well as greater productivity and performance without the need for incurring greater cost. Network Business ApplicationsThe recommended applications for Tri-Corp will include Microsoft’s Office Professional suite and the Microsoft Server 2003 software for the local servers. Outlook will replace the exchange server provided by Microsoft. This will provide Tri-Corp with more flexibility and aid in the ease of adding new email user accounts. POP3 and SMPT will require proper configuration to enable this service. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data t o many employees in both locations. Network Security We will first address the issue of Enterprise Security and best practices. Microsoft has developed a four-part checklist, which focuses on the following key points: Assessing the environment, protecting the network, protecting servers and clients, and finally, monitoring the environment (Microsoft 2011).Using this guide will help increase Tri-Corps security and reduce the risk of outside attacks. Assessing the environment requires learning all of the components within the infrastructure. Tri-Corp needs to identify all assets and security issues while continually monitoring the quality of the security program (Microsoft 2011). Their first step will be to partner upper management with the IT staff so they may both focus on establishing an ongoing process to classify and examine all security risks. Failure to establish this vital communication will absolutely place the company at risk with the largest security problems.Next, protecti ng the network; Tri-Corps server system will utilize both Secure Socket Layer (SSL) encryption, and a Public Key Infrastructure (PKI) to aid in maintaining network security. Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web sites, intranets, extranets, and other server-based applications (IT Observer, 2009). Using SSL along with special server digital certificates will provide the security handshake and the data encryption to prevent eavesdropping and secure the integrity of data transmissions (IT Observer, 2009).Although SSL and PKI will help provide network security, additional security measures are necessary to protect the servers and clients. Tri-Corps server will utilize a software firewall such as Zone-Alarm, and must maintain up to date anti-virus and Trojan protection software such as Kasperksy, Norton, or McAfee. Next, the IT department must ensure every security patch for all operating systems and applications are applied as soon as they become available. The final focus point in network security, monitoring the environment, entails the weakest link in all network security, people.Monitoring the environment is more than watching and reacting; Tri-Corp must establish a proactive strategy to audit the network and discover poor practices and configurations. Password rules are a primary example; passwords must contain both upper and lowercase characters and one symbol. Only secure messaging through company provided and monitored email accounts will be allowed, no instant messaging or chat rooms; all emails must pass a virus scan before the recipient will be granted access to view the message.With a detailed information policy in place, proper training, consistent, proactive monitoring, Tri-Corp will protect its data and avoid the mess and disruption of security leaks. Once this policy is in place, Tri-Corp will need to move on to its disaster recovery plan. Tri-Corps needs to have a disaster recovery plan i n place, to return to normal after disaster has struck. Defining disaster means an abrupt disruption of all or part of its business operations, which may directly result in revenue loss (Cisco, 2008).To reduce disaster losses, it is imperative to have a first-rate disaster recovery plan for every business subsystem and operation within Tri-Corps walls. Backup and Disaster Recovery Every time a business encounters a disaster, the company always points to one or more causes and effects. The causes may be anticipated, or a result of human, or mechanical origin, and can range from events as miniscule as a minor hardware or software components malfunctioning to commonly recognized events such as earthquakes, fire, and flood (Cisco, 2009).These disasters may cause small interruptions or may lead to total business shutdown for days or months. Occasionally, these disasters have proven to be fatal to unprepared businesses. Forming a disaster recovery plan begins by recognizing the root cause and effect, followed by a detailed analysis of probability and severity, and ranking them in terms of their business priority. The outcome is an official evaluation of threat and a disaster recovery plan that takes into account all available recovery means.In simpler terms, Tri-Corps IT staff needs to determine what types of disasters are most likely to occur and rank them in order of probability. Afterwards, Tri-Corp must create an action plan that encompasses detailed steps to return business to a state of normalcy in the event of the given disaster. Finally, Tri-Corp must form a Disaster Recovery Committee to assume responsibility for rehearsing, carrying out, and improving the disaster recovery plan on a continual basis. Tri-Corps disaster recovery plan must include a data backup plan in the event the company’s database is compromised. The recommendation is to use IBM’s Tivoli software.IBM’s backup and recovery service provides companies with a backup and d isaster recovery solution that includes cloud backup, remote office, unified recovery, and virtual server protection. Their Tivoli Storage Manager received the 2011 CRN Channel Champions Award because of the quality, reliability, support, and scalability of their solution. Many other companies offer backup and disaster recovery solutions, however, based on my research IBM offers the most complete and reliable solution. IBM’s backup and recovery service provides companies with a proven solution for managing their storage needs with a central backup solution.This service uses smart data movement and smart data store technology; together, these technologies complete backups and restores quickly and efficiently while still providing the client with the flexibility to change and adapt. Additionally, the IBM Tivoli suite of storage products supports more than a dozen OS platforms, along with several network connectors, and more than 500 storage devices. (Art W Meyer,  2011,  pa ra. 2,4) Using these two key components will ensure Tri-Corp will complete the necessary preparation to survive disaster and avoid external attacks.Additionally, this plan will ensure that the resources required to keep the business going are available to key personnel. The questions regarding what to do, how to do it, and the ever- present need for communication to critical data is a key component in maintaining Tri-Corps success. However, no amount of planning provides the desired effect without a thorough understanding of the organization and its inner workings. Tri-Corp must incorporate its processes, people, and systems with precise, exacting detail to aid in a seamless transition.Following the preceding recommendations will help assure Tri-Corp does not fail because of ignorance. This recommendation will protect Tri-Corps valuable data assets and help the company to keep moving forward.References . Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Agility Recovery Solutions. (2009). Retrieved from http://blog. agilityrecovery. com/disaster-recovery?   k=disaster%20recovery%20solutions&_kt=b63adcc1-e0cf-4e52-b042-bbffd8dddc96 Art W Meyer. (2011). Backup and Disaster Recovery. Retrieved from Art W Meyer, IT/230 website Backup and Recovery. (ND). Retrieved from http://www-01. ibm. com/software/tivoli/solutions/backup/ Backup & Recovery. (2011). Retrieved from http://www. sonicwall. com/us/products/Backup_Recovery. html Boda, K. (2009). Forums > Cisco: Average Connection Consumes 11. 4 GB Per Month. Retrieved from http://www. dslreports. com/shownews/Cisco-Average-Connection-Consumes-114-GB-Per-Month-105086 Cisco. (2008). Disaster Recovery: Best Practices. Retrieved

Friday, January 3, 2020

The Gang Issue of America Essay - 2255 Words

Gangs are very dangerous to everyone in society. â€Å"Gangs are groups of people (mostly young males) who band together for protection and a sense of belonging. The U.S. Department of Justice officially defines a youth gang as a group of young people involved in criminal activity† (Gangs 1). About one million gang members are in more than 20,000 criminally active gangs in the United States. Also, that group of about one million people is accountable for up to eighty percent of our nation’s crimes. Since 2005, gangs have nationally added about 200,000 members to the already high total (Targeting Gangs 1). This is why more action from the community needs to be taken to help with the growing gang-related crimes here in America. Additionally,†¦show more content†¦Another item that a lot of gang members have is at least one tattoo that shows his or her dedication to his or her gang. Most gangs initiate their new member by giving them a tattoo that all other gang m embers will recognize for that particular gang. The effects that gangs have on communities are massive, especially since gangs contribute to about eighty percent of our nations crimes. Gangs tear apart communities and disrupt schools. This is due to violence, carrying weapons, drug use or distributing drugs, and even their clothing. Communities are affected because gangs influence their members and other people into using or distributing all different types of drugs. Not only drugs, but the easy access to deadly firearms makes gangs much more intimidating and dangerous to our society. Not only the inner city has gangs, they can also be found in the suburbs and rural areas as well. Different reasons account for why young people join gangs in the beginning. Some reasons would include a very unstable home or family life, the need for protection, or poverty. If the person is in poverty he or she thinks that he or she needs to join a gang to be able to make fast money by doing crimes, su ch as drug dealing and theft. Young people could join a gang due to a family tradition, joining out of peer pressure, or wanting to be more attractive to members of the opposite sex. Another few reasons whyShow MoreRelatedSociety’s Needs for Criminal Justice Practitioners Essay1046 Words   |  5 Pageschaos. Some of the main social issues our society faces are drug abuse, gang violence, child abuse, and terrorism. The criminal justice practitioners face these types of issues daily. These professionals must act on the morals and laws stated by society rather than their own opinions, sometimes facing hard decisions. The criminal justice field is always active and busy, dealing with countless amount of criminal activity throughout the country. Drug abuse affects America severely. It is one of theRead MoreGangs: Past and Present886 Words   |  4 Pagesâ€Å"Gangs are groups of three or more people who band together for protection, socialization, or financial gain. By joining, members take on a common identity of the gang.† (Staff, 2014) Gangs have existed in America since the American Revolution. The presence of gangs has increased in the U.S.; they affect almost 3,550 jurisdictions as of 2007. (Staff, Gangs, ProQuest LLC., 2014) In recent years, they have even corrupted the most secure organizations, such as the armed forces and professional sportsRead MoreDisarmament, Demobilization, And Reintegration Of Rebel Groups1729 Words   |  7 PagesReintegration of Rebel Groups in Latin America Less than eight percent of the global population resides in Latin America and the Caribbean, yet approximately thirty three percent of the world’s homicides occur in this region (Watts). More than 60,000 people have been killed by Drug Trafficking Organizations alone over the past 10 years, and more than 26,000 have gone missing (Morris). Jordan recognizes that a significant portion of the homicides in Latin America stem from the actions of rebel groupsRead MoreAmerica s Trade Area Of The Americas1494 Words   |  6 PagesHistory Latin America is composed of seventeen countries which was colonized by Spain’s and Portugal. They are large in diverse population with four hundred and ninety million people in total. The percentage of the Indian and African that lives in Latin America is basically seventy-five percent just in the cities. The industrial and development grew since the 1960’s; also the free Trade Area of the Americas (FTAA) proposes to integrate economies of Latin America, North America and the Caribbean (exceptRead MoreEssay On Gangs890 Words   |  4 PagesNovember 8,2017 Gangs, are they good for our community? Gangs, they’re all around us,everywhere,and anywhere. How do us americans feel about gangs, and their affects on our environment ? I’m against gangs because of their affect on our youth. It affects the youth causing distractions, peer pressure, and blocking opportunities for them. Gangs are one of the top three causes of crime in America today. And gives America’s crime system a lot of difficulty with solving the problem. Gangs are and haveRead MoreThe Nature American Street Gangs Essay1366 Words   |  6 Pagesnature American street gangs. The research shows historical evolution of gangs’ prevalence in US and major reasons for their enormous growth in various regions. Gangs erupted from economically under privileged communities while others inherited their gang background from their families and continued in America. The gang culture evolved and attracted hundreds of people mainly youth. Hagedorn stressed upon the equal division of economic development and job throughout major gang area.  Furthermore, heRead MoreWhy Do People Join Gangs?762 Words   |  4 Pages Gang violence is a reality that many American citizens must deal with from day to day. Webster defines gangs as an â€Å"organized group of criminals†. Why do people join gangs? probably to satisfy the need of being accepted. Being accepted gives an individual a sense of identity or belonging. Many join gangs for a source of income and to provide stability. Peer pressure is another reason why individuals join gangs, especially teens and young adults. They can easily be influenced byRead MoreEpidemic of Violence in the USA Essay1441 Words   |  6 Pages Violence, one of the biggest problem in the world right now, especially in America, where the gun control law are barely enforced, every citizen is at constant risk, considering the amount of people in this country that own guns. Crime and violence are rapidly becoming the prime epidemic in the U.S today, but what can we do to ensure our future generation’s safety? Gun violence is a big problem everywhere, in poor rural neighborhoods to prosperous urban cities like Malibu, it canRead MoreSummary Of Policing Gangs In America1318 Words   |  6 PagesPolicing Gangs in America Ryne Kisslan October 7, 2017 Gangs Professor Nuno In Policing Gangs in America, Charles Katz and Vincent Webb describes every issue in American Gangs today. The ultimate goal of this book is how the gang officers work and the different kind of atmosphere they work in. Their job isn’t like other law enforcement jobs. It’s one of the more dangerous occupation in the Criminal Justice system. These gang officers focus on how they react to public gang issues. TheRead MoreYouth Participation In Gangs Essay1141 Words   |  5 Pagesparticipation in gangs actually decreased from 1996 to 2004, but the violence within these gangs has not. Homicides committed by youth gang members still remain as a monumental problem across the United States of America. The Office of Juvenile Justice and Delinquency Prevention reported in its 2004 survey of youth gangs that there were an estimated 760,000 gang members that year. Many of the kids affiliated with gangs come from lower income, single parent homes; therefore, the youths of America often turn