Thursday, October 3, 2019

The Biometric Technology For Effective Payroll System

The Biometric Technology For Effective Payroll System Payroll is one of a series of accounting transactions, dealing with the process of paying employees for services rendered, it is electronic software, where all the employees information is recorded and captured. Companys experiences a lot of payroll fraudulent occurring by utilizing this payroll software which affects the companys capital due to a high increased payroll cost. Background and Motivation Money being a valuable asset to the company, I have chosen to research more on payroll and how can the effective security level be implemented to enhance the security on payroll by the use of biometrics, as I believe in Physical Attributes identification like finger prints, palm prints, and facial. To solve the security risks, biometrics technology (implemented in the ReCon Biometrics Keyless Identification Security System) uses physical attributes to identify an individual. This solution is ideal because biometrics authentication does not require the user to have any physical access objects present or remember any passwords. With ReCon Biometricss advanced facial recognition technology, we can now overcome many problems that other systems have encountered in the past (Rogan, 2002). Rather than using personal identification because, as (Rogan, 2002) stated that in personal identification A Personal Identification Number (PIN) is another widely adopted means of authentication, and is a standard example that uses memorized passwords or pass codes. The advantage to this approach is that no physical means are required for authentication. However, this method still suffers from security risks if an unauthorized individual gains access to an authorized users PIN. Further complications can arise when authorized users forget or misplace a PIN. Turner, a payroll specialist for a large Florida nonprofit organization, was a sick man. Most employees who steal do so out of greed, but Turner had a different motive-he was HIV-positive and needed expensive drugs to control the disease. Turners duties included posting time and attendance information to the computer system preparing payroll disbursement summaries. Adding and deleting employee master records were separate tasks, performed by another staff member. As an additional safeguard, a supervisor approved all payroll disbursements, and the company deposited them directly into employees personal bank accounts. When the coworker who added and deleted master records logged onto the system, Turner peeked over her shoulder and noted her user ID and password. This enabled him to add fake master records-for ghost employees to the system (Wells and Joseph, 2002). Where there is money to be made, dishonest and unscrupulous individuals can find ways to bilk the system (Michaels, 1998). As with any financial instrument, the key to success is prevention, and FIS continues to create new fraud prevention and monitoring tools as new trends develop (Mccann, 2008). A lot of money becomes missing and records being edited because of unauthorized users who hack the payroll system or being able to retrieve the passwords into accessing the payroll system, so the purpose of this research is to investigate the roots of hacking in the payroll so as to find a lasting solution to it and eliminate ghost employees. It is intended that in this research a suitable biometric system will be introduced providing greater reliability and accountability, in order to enhance the security level of The INNOVATIONHUBS VIP payroll and the staff. 1.2 Problem statement Payroll encompasses every employee of a company who receives a regular wage or other compensation. Some employees may be paid a steady salary while others are paid for hours worked or the number of items produced. All of these different payment methods are calculated by a payroll specialist utilizing a payroll system, and the appropriate paychecks are issued. So for an employee to get their paycheck a time sheet is submitted so that the payroll specialist can capture the data on the time sheet example number of hours worked, and then compute the salary for the employee, so companies often use objective measuring tools such as timecards or timesheets completed by supervisors to determine the total amount of payroll due each pay period. Payroll system is an electronically software that calculates employees salary. The problem is that when employees fill in their time sheets or timecards, they easily forge their attendance of being present at work or working overtime knowing they did not, they do what is called buddy punching which is when an employee punches a time card for another person. This is done by employees reason being earning more money, or earning money even though they did not work for it, because we all want to get our hands on money this affects the companys productivity and payroll cost. However payroll specialists easily get away with fraud because, usual solutions to the problem of enhancing security is identity involve using systems that rely on what a legitimate user knows example, passwords or personal identification numbers or what a legitimate user possesses example , ID cards or keys. However, these methods are susceptible to fraud and security threats as they do not identify the person but simply identify the information that is provided by that person (Gupta, 2008). Companies need to have an absolute trust in the identity of their employees, customers, and partners that is, they are really who they say they are. Taylor Farm, a processing plant for bagging produce, was incurring 20 percent of payroll cost due to buddy punching (Gupta, 2008). Kahn et al (2002:57) found that the System provides an automated, centralized back end payroll service with a full-featured web-based payroll system. Both aspects of the system have access to a central database, which includes, for example: profile information on employers and employees; timesheet, salary and hourly wage data; employee benefit data and information regarding third-party providers and miscellaneous payee. According to Krons (2010:109), the YMCA was committed to keeping its payroll in-house and was looking for a flexible and configurable system that would enable it to do so efficiently. With Kronos, they have been able to cut payroll processing time by 50 percent largely due to the automation of payroll data from the time and attendance system into payroll. With more than 1,800 full- and part-time employees at 12 facilities across Ohio, many employees often perform multiple jobs in the same pay period. With Kronos, the YMCA is able to keep track of position management and ensure that payment is applied correctly. After implementing a new time and attendance system for its labor intensive operation, Fantasy Cookie Co. has realized a 90% reduction in payroll errors and return on investment of one year (Hitchcock, 1993:70). Some of the motivations to change payroll frequencies include best practice or industry standards, possible future sale or acquisition, cost savings, union contract requirements, or even employee requests (2010:8). My intention is to find a way by means of biometrics systems to enhance the security level on VIP payroll at The Innovation Hub and monitoring employees presence at work. 1.3.1 Goal The primary goal of this study is to introduce Biometrics System for the security of VIP payroll at The Innovation Hub. 1.3.2. Objectives To investigate the security problems being encountered at the payroll and monitoring employees timesheet or timecards of the Innovation Hub To find out what is the security system applied in the payroll of the Innovation Hub. To explore the use of Biometric technology as a security system in this company to solve the security problems discovered. 1.3.3 Research questions What are the security problems being encountered at the payroll of the Innovation Hub? What is the security system applied in the payroll of this organization? How does Biometric system can be applied to solve the security problems identified? 1.3 Scope There are three types of payroll systems the first being the manual payroll system typically serves small medium and macro enterprise (SMME), and all this is done by hand with a manual payroll system. Secondly being the In-house Payroll a company with up to 60 employees can benefit from a computerized in-house payroll system. Thirdly is the external Service (outsourcing) company with more than 60 employees usually hiring an external payroll service. They are a separate firm that specializes in payroll processing. The basis of the definition supplied by Justice Buckley is that in order for a fraud to exist a lie must be told and something tangible obtained by virtue of the operation of that lie on the mind of the person receiving the information. That premise has been extended through common usage and the media so that now fraud is referred to as the obtaining of property through any dishonest means. Those means do not necessarily include the telling of a lie and can include what is considered corrupt activity by a person in authority (Jarrod 2006). There is no easy fix for Social Security. No silver bullet or miracle accounting will painlessly fix the problem posed by our 70-year-old national retirement system. At a recent meeting in Washington, D.C., the ABA Government Relations Council reaffirmed a strategy first advocated by ABA in 1999. It calls for ABA to act as industry spokesman for reform, work with Congress on a bipartisan basis and support the creation of personal retirement accounts those special accounts that would allow younger workers to place a portion of their payroll taxes in private retirement accounts they manage themselves (Duke 2005:20). Swart (2002:5-15) found that the payroll systems are cumbersome and problematic, they require the use of a middleman payroll service to either send or calculate and send the employees net pay data to the bank, which increases costs to the employer. These cost are ultimately passed on to the employees and public, such systems also take significant amounts of time to acquire, transfer, translate and process all of the data required to determine and distribute net pay to the employee, and employees are therefore forced to wait one or two weeks before even receiving their paychecks another disadvantage of the prior art payroll system is the use of centralized data processing for calculation of net pay, such as used by ADP. The allegations ranged from accepting kickbacks, committing bank larceny against the Orleans Parish Credit Union, and forging and passing bad checks, to theft, income tax violations, insurance and mail fraud, as well as extortion.6 With encouragement from State Superintendent Picard, the New York-based firm of Alvarez Marsal was selected in July 2005, by the Orleans Parish School Board and the Louisiana Department of Education, to address and resolve the districts numerous systemic financial improprieties.7 Employees of Alvarez Marsal immediately found significant payroll discrepancies estimated to cost the district approximately $12 million per year (Pamela Frazier 2008). Systems that lack a secured authorization detector can end up being history to the owners and costly. HIGH-PROFILE payroll problems have plagued a $25 million PeopleSoft ERP implementation in the Palm Beach County School District in Florida after just five months of operation.Since the Oracle Corp. software went live in July, there have been numerous instances of employees being underpaid or not paid at all, said Mike Guay, a Carlsbad, Calif.-based consultant hired in early September to help fix the problems. In many cases, the payroll errors have caused significant hardship to workers, added Sharon Barmory-Munley, president of thse local office of the National Conference of Firemen Oilers, a union representing more than 4,000 school district employees.In September, payroll problems prompted some 300 bus drivers to picket the school board. Other employees have complained to the U.S. Department of Labor, said Barmory-Munley (Barton, 1992). Its horrible, she said. Some people cant pay their bills, mortgage payments are late, and theyve ruined their credit. This is disastrous (Marc, 2006), this report shows how serious and harmful the system can get if not resolved in time. Payroll Express Corp., a company that provided paycheck cashing services for about 100 corporate clients, has gone bankrupt, and owner Robert Felzenberg has been accused of diverting customers funds to its own uses. Payroll Express bank, United Jersey Bank (Hackensack, NJ), is being sued by some Payroll Express customers for not monitoring the business more closely and for allegedly ignoring and glossing over Payroll Express troubles. The bank says the charges are without merit (Barton, 1992). Not all of the IT specialist do the right job or what they are suppose to do, you find IT hackers who can do anything to get their hands on money, money being an object that everyone wants to get their hands on. A large local employer in a small town had its office burglarized. Nothing appeared to be taken but there was some vandalism. The company assumed it was just some kids. A few days later, on a late Friday afternoon, a group of about 20 people with heavy accents came into the local bank and cashed payroll checks drawn on the local employer. On Saturday, the same 20 people went back to each of the bank branches again cashing more checks. It was then discovered that these checks were forged. The blank checks had been stolen during the break-in. Encouraging or requiring businesses to use a Positive Pay System will prevent these losses. When using Positive Pay, the business customer provides the banks computer with check numbers and amounts before providing the checks to recipients (Towle, 2010:17). There is no end to Queenslands payroll debacle with a report finding it will take another six months to make critical fixes to the system and 18 months for it to be fully re-implemented.Queensland nurses and midwives were waiting for a formal response from the states health department after a report recommended sticking with the flawed system (2010-2011:15). No matter what industry an organization serves, there is one common element the customer. That customer can be external or internal. The key focus in having quality be part of everyones job is to make sure customer value is the primary purpose of the organization. Everyone in the organization should know the customers and what they consider important. All functions accounting, payroll, information systems, engineering, sales play a role in how these customers view the work. Tools such as customer survey analysis, best practice studies and publisher customer audits are used to determine what customers really want, as are graphs of customer complaints over a specific time period (Whitarcre, 2001). 1.4 Significant This study is very significant in the sense that there is a serious implication of financial security to the survival of any organization especially the InnovationHub. Electronic security has also become a global issue in the discourse of a virile Information System, while the biometric system is a current security application of IT in the security system. The report of this work will also add to literature on the state of the art applications of IT study while the solution can be applied in all payroll systems. 1.5 Key words Payroll, System, Access, Security, Biometric Literature review Companies need to able to have absolute trust in the identity of the employees, that they are really who they say they are. Fraud can occur in the payroll department in many ways. These can include (Journal of Trade, 2010): phantom employees being paid; fraudulent additions to approved time records; increases in hourly rates; payments of commissions, bonuses, or incentives that are added to an employees normal paycheck; deduction reversals that add to an employees net pay; illegal advanced earned income credit payments; and Child support garnishments that are mailed to a custodial parent but never deducted from a paycheck. Identification is a one-to-many matching process that ascertains the existence of an individual in a database. This process merely determines that the person exists. If access control is predicated only on the existence of an individual, then the individual is given access to the system when the required identifier is found to exist in the access database. There is no confirmation or proof that the person who is given access is indeed the person who initiated the access procedure (Chandra Calderon, 2003). Everyone is a potential fraud, and only careful hiring and strong internal control are effective in preventing fraudulent to the organization (Seidman, 1985). Payroll accounting shows another area where authentication issues assume importance. The importance for effective authentication exists in at least three processes: time-keeping and attendance records, pick-up of paychecks, and linking employees to specific tasks in the organization. Three broad categories of factors that organizations use for automated authentication-possession, knowledge, and biometrics. Authentication can be predicated on a single factor (e.g., a password, a PIN, or a picture ID) or on multiple factors (e.g., password and picture ID, or PIN and picture ID). Vertical movements within the pyramid are associated with increases in the strength and focused nature of the authentication process. The likelihood that the verified identity is not that of the true owner also decreases with vertical movements in the pyramid (Chandra Calderon, 2003). The user must present a physical possession (such as a token or a key) to be authenticated. Though visible and usually portable, possessions can be lost, stolen, shared, duplicated, forgotten, or destroyed. Possession-based authentication factors provide assurance that a user presents a valid token or card. Within the context of an automated authentication process, these factors do not provide direct assurance that a user who is allowed access into an information system is indeed the person he or she claims to be. In the second category, the user provides information about his/her knowledge (such as, password, or passphrase). Passwords and other knowledge authentication factors are highly portable, invisible (unless written down), can be changed often, and can be designed to be relatively secure. However, they can be forgotten, reused, stolen, guessed, or shared. Passwords offer assurance that the person at the keyboard knows the password. They do not offer assurance that the person at the keyboard is indeed the person he/she purports to be (Chandra Calderon, 2003). Fraud in payrolls always involves over statement of the total of the payroll, and usually involves either (1986): Padding the payroll by including names of new employees before they started to work, or names of employees who have left, or names of men who are simply non-existent, or who exist but do not work for the company. Overstating payroll footings, carry forwards etc Failure to account for unclaimed wages, overpayments. Etc. One private sector problem is what is called buddy punching which is when an employee punches a time card for another person. Taylor Farm, a processing plant for bagging produce, was incurring 20 percent of payroll cost due to buddy punching. (Gupta, 2008). People are our business and managing such a large workforce that operates on diverse client sites is a challenge. We recognized that a standard time and attendance system that could provide as many access methods for clocking on as possible biometric, internet, proximity, telephone yet could be managed both centrally and remotely, was an essential requirement for our business (Pollitt, 2008). The real cushion against fraud, however, is in the type of individual employed. This means concern not so much with an applicants technical background, as with human background. Things like his mode of living , his social habits, his family troubles, his financial stresses and strains all of these are vital in the fraud potential (Seidman, 1985). The construction foreman of a large chemical company is responsible for a maintenance crew of about fifty employees who include tradesmen and labourers. He is also responsible for the deployment of a large amount of tools and equipment for the repair and maintenance of the plant. The employees are permitted to work overtime. The foreman started his own handyman/small construction company specializing in week end work. To carry out this work he utilized the tools and equipment of his employer and the time for the labour of the employees engaged in this nefarious activity was paid for by the employer by way of overtime for working on the weekend. The foreman authorized their overtime cards, certifying they had worked the overtime for the company. Employees were paid for their work, but the foreman, who charged his private clients, did not have to pay any costs of the construction whatsoever. The foremans behaviour was such that he obtained a financial advantage because hedid not have to pay for the labour of his workers or the tools and equipment he used onhis jobs. He was convicted of deceiving his employer into paying for the labour cost (Bowditch, 2006). The paymaster of a large technical company on the north shore was a trusted and valued employee until a co worker saw him driving a brand new Porsche on the week end. An investigation revealed that he had been systematically paying himself overtime at the rate of five times his regular salary. No subterfuge, he was just authorizing the payment to himself of more hours overtime than there are hours in the week. The fact that he could have got away with this brazen fraud for over twelve months showed a lack of any sort of control by management in the running of the company, and certainly no thought to fraud control (Bowditch, 2006). The state sales manager for a leading liquor distributor was offering the clients on his run a special discount for cash. He was fulfilling the orders and obtaining the cash and writing an invoice and receipt from a loop he had installed in the company computer which had a program to generating the invoices, receipts and stock upgrades. He got away with hundreds of thousands of dollars until a physical reconciliation was done between the stock and sales figures and the crime discovered (Bowditch, 2006). American businesses lose nearly $12 billion a year to check fraud, and small businesses are frequent victims of fraud artists, who consider them easy prey (Blackwood, 1998). Dont trust any person with money, always check on them and then check more. 3. Theoretical frame work Using Autopoietic theory as a framework for biometrics Autopoiesis is a pseudo Greek word coined from ÃŽÂ ±Ãƒ Ã¢â‚¬ ¦Ãƒ Ã¢â‚¬Å¾Ãƒ ³ (auto) for self and à Ã¢â€š ¬Ãƒ ³Ãƒâ€žÃ‚ ±ÃƒÅ½Ã‚ ·Ãƒ Ã†â€™ÃƒÅ½Ã‚ ¹Ãƒ Ã¢â‚¬Å¡ (poiesis) for creation, production or forming that was first introduced by the Chilean biologists Humberto Maturana and Francisco Varela in 1973 to denote the type of phenomenon they had identified as a characteristic that distinguishes living systems from other types of systems. They claimed that living systems are autonomous entities that reproduce all their properties through their internal processes. Later on this term was introduced into social theory as well as formal organization theory by Niklas Luhmann who claimed that social systems are systems of communication that emerge whenever an autopoietic communication cycle comes into being that is able to filter itself out of a complex environment (Schatten, 2008). Luhman argues that there are three types of social systems: societal, interactional as well as organizational. Any social system has its respective information subsystem described through their communicative processes. Systems that are not autopoietic (systems that produce something other than themselves) are considered to be allopoietic (technical) systems (Schatten, 2008). This is how the theory of Autopoietic will be applied to my research, the theory which represents a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic) system yields a behavioral or psychological characteristic of the living system (Schatten, 2008). It is revealed that a system that can be considered as autopoietic can potentially be measured, authenticated and or identified using biometric method, and thus biometrics is appropriate to any autopoietic system it can be people, social systems, organizations as well as information systems. So biometric is a method of series, steps or activities conducted to practice biometric samples of some biometric feature usually to find the biometric features holder or a special feature of the biometric sample. A biometric template or extracted structure is a quantity or set of quantities acquired by a conscious application of a biometric feature extraction or preprocessing method on a biometric sample. These templates are usually stored in a biometric database and used for reference during the recognition, training or enrolment processes of a biometric system (Schatten, 2008). The diagram below illustrates how the biometric technology will be intergrated with the payroll system, and this is how the autopoietic theory will be applied to my study. Diagram of payroll system integrated with iris biometric device Back up a data center The time sheet detail is captured in the payroll system. Time sheet (time in and out) about the employee is recorded. Employee scans his or her Iris in the iris scan device. The payroll specialist forwards the employees paycheck, using timesheet information from the captured payroll. Paycheck is transferred by the finance department to the employees accounts. 4. Methodology This is an exploratory research because it is the goal of formulating problems more precisely, clarifying concepts, gathering explanations, gaining insight, eliminating impractical ideas, and forming hypotheses. The method of data collection that I will use is qualitative method as it is used when a question needs to be described and investigation in some depth, or examining the meaning of an experience (Shields and Twycross). How I will compile my research I will seek to interview those who are knowledgeable and who might be able to provide insight concerning the payroll system and monitoring of time sheets to verify employees presence at work. I will interview 20% of the staff members and all the staff at the finance department and the payroll specialist, I will use audio tapes for recording my interviews and a method of transcripts of conversation. Some of the questions Ill ask the staff members: Do you use any type of access to enter into your office or the building of the company? What monitors your presence at work? Do you submit weekly or monthly time sheet? Who witness the time sheet? Some of the questions Ill ask the payroll department: What attributes or information do you need to capture for a new employee? How do you handle information of ex employee? When do you do roll over of the payroll? How are different leaves captured? Some of the questions Ill ask the finance department: When do the employees receive their pay check? How do you monitor costs of payroll, after how long? Im going to carry out my research at The Innovation Hub focusing on their VIP payroll system, time sheets and the clocking in and clocking out of work method used. This is a brief introduction of my solution framework Biometrics refers to the process of automatically recognizing a living person using his or her distinguishing, measurable traits. Biometric systems identify the person rather that what the person has (like ID cards) or what they remember (like passwords). The term biometric refers to the statistical analysis of biological phenomena and measurements and has been widely used to describe technologies used for personal identity management (Gupta, 2008). Biometrics technology uses unique, measureable, human characteristics to automatically recognize and verify an individuals identity. Biometrics can measure both physiological and behavioural characteristics. Physiological biometrics is based on precise and accurate measurements of unique features of the human body, and includes: Finger scan which matches the minutiae, pattern, ultrasonic or moirà © fringe imprint, most common of all devices (Chandra Calderon, 2003). Facial scan is designed primarily to find close matches of particular facial features such as eyes, nose, mouth, cheekbones, chin, and forehead against a database of static facial images (Clodfelter, 2010). Iris scan technology relies on the distinctly colored ring that surrounds the pupil of the eye. Irises have approximately 266 distinctive characteristics, including a trabecular meshwork, striations, rings, furrows, a corona, and freckles. Typically, about 173 of these distinctive characteristics are used in creating the template. Irises form during the eighth month of pregnancy and are thought to remain stable throughout an individuals life, barring injury (Rosenzweig, 2004). Retina scan a digital image of the retina of the eye is created to match the pattern against a live sample, scanning done by low-intensity light via an optical coupler (Chandra Calderon, 2003). Hand geometry relies on measurements of the width, height, and length of the fingers, distances between joints, and the shape of knuckles (Rosenzweig, 2004). Behavioral biometrics (based on measurements and data derived from an action) include: Voice recognition measures the wavelengths and frequencies of the voice (Chandra Calderon, 2003). Signature recognition traditional device, a behavioural device, it checks the way a person signs his or her name, and writes letters (Chandra Calderon, 2003). Keystroke recognition a behaviourable biometric device, it measures the force applied and the pattern used to push keys on a keyboard (Chandra Calderon, 2003). I will be utilizing the iris biometric system because: Iris recognition technology is relatively easy to use and can process large numbers of people quickly. The iris is the most unique identifier on the human body. It is the most reliable form of biometrics. Iris patterns are unique and stable, even over a long period of time. Furthermore, iris scanning and recognition systems are very user-friendly. Less intrusive than retina scan, higher matching performance, works well with glasses, across ethnic groups. Biometrics

Wednesday, October 2, 2019

Internet Censorship Essay - Internet AccessShould be Restricted to Prot

Access to the Internet Should be Restricted to Protect Children      Ã‚  Ã‚   We are now entering an age of computers where people have almost unlimited access to information. There are entire books and encyclopedias that can be purchased for use on personal computers. Information such as stock prices to computer-aided design programs to entire business operations is being used and accessed through the power of the computer. This information is obtained through the thousands of computer programs out on the market, but most importantly, it is obtained by access to what is called the "Internet." The Internet is the term for the ten thousand plus interconnected computer networks throughout the world that enable us to gather and dispense any type of information almost instantly. For the 1.5 million computers and the 10 million plus users, the Internet gathers information easily and quickly by means of messages, newsgroups, discussion groups, and conferences (rmuir, '94). Anyone who owns a computer and has the necessary software and hardware can have a ccess to this infinite amount of information.    This, of course, can include children. Right now children at the age of seven are speeeding down the "information superhighway," accessing an almost unlimited amount of information. In fact, there are schools on the Internet with their own World Wide Web homepages already. Unfortunately, some of this information isn't geared for children and can even be strictly for adults. Just as inappropriate material in books and magazines is regulated, there too should be some form of Internet regulation and ethics because children of secondary schools have access to any and all information including that information which is objectionable and ev... ...p://www.eff.org:80/CAF/cafuiuc.html rmuir@chs.cusd.claremont.edu FYI, RFC#1578 -Schools and Internet, February 22,1994, http://chs.cusd.claremont.edu:80/www/people/rmuir/rfc1578.html Abrahams, Janice. Janice's k12 Cyberspace OUTPOST. October 1,1994. http://k12.cnidr.org/janice_k12/schools.html, http://k12.cnidr.org/janice_k12/menu.html The Family Resource Center in Santa Clara, California, Parents Helping Parents. October 25, 1994, http://www.portal.com:80/~cbntmkr/php.html Gore, Albert. Speech at Royce Hall, UCLA Los Angeles, CA. January 11, 1994. http://sunsite.unc.edu:80/icky/speech2.html Morrison, Michael. Computer Writing and Research Center. University of Texas at Austin. Personal Interview. December 3,1994. Hoker, Delia. Computer Writing and Research Center. University of Texas at Austin. Personal Interview. December 3,1994.   

Tribalism :: Personal Narrative Papers

Tribalism I. My sister recently put a map of the world in her bedroom, where she dreams always of being chased. Warfare is the greatest affair of state, the basis of life and death, the Tao of survival and extinction. It must be thoroughly pondered and analyzed. If you want to succeed in battle, act as if deranged. 1 I overheard two women arguing. One of them was me, in a later life. The other was God. My sister pushes her dream away and we'll call her a mystic; her lived reality defers to the visions, and details of where we'll live, how we'll earn a living, or who is at the door sink into the background. If creatures are helpless in a world of flags and fairies, we can break tyrants with our fists. Why wake up from that vision? If I could remember, I would never return to sunburn, rental cars, boy scout leaders, garbage, greasy hair, no water in the desert, cold nights of sweat and gleaning. Trust me. Spring the trap - a package with an umbilical cord, ties straining. Mourning doves and the sound of birds and rapids. The wind pushes the river backwards, completing the cycle. Before night fell into your lap you stared blankly at the traffic light on the corner wondering, why consult the Book of Changes? Every sign you need is right here: fire trucks a staple on brook street, power lines buzzing overhead like soldiers of fortune. The planets align in your seventh house, poking feebly at an electromagnetic field. So if I ever say anything I'm lying to you. Feel better or worse, see if I care. March toward madness, in the evening we swore up and down to stay alive. Foundry the boundary down to the last gravedigger. Morning or evening times are unimportant; don't live to compete, but fight when you must for a better world. We are all singers and mad and we make less and less money every year. Perhaps you care about all this loss, heaped onto your plate like steaming eggs on an English. Further along and we come to a crossing, where I found you waiting for me and left. Pretend you have come to a crossing. Not a fork in the yellow wood but a good city intersection, with traffic and manholes and strangers not particularly watching.

Tuesday, October 1, 2019

Cultural Influences on Social Cognition and Behavior Essay

There was once a time when I met a Filipino family in the park. The most famous hospitality of Filipinos was showed to me. They have invited me to join them for snacks — something that a typical American would not do even to fellow American. However, these people became friendly to me even though they know that I am not among their own race. I was able to identify with them because I have experienced the real essence of having a family, something I am not seeing in most American families. With that encounter, they have thought me to also be concern with other people. More than that, they have showed me that we can unite amid cultural differences and that we can trust people even at the first meeting; and through that we can have connections. I found this influences to easy come to my senses and being because I have been observing families in my own community and I have not found anyone or family as hospitable as them. That is because I was able to identify with them. I was vulnerable because it was my first time to experience such hospitability from other people who possess different culture other than what I have been practicing. Americans have become very individualistic and have failed to show such culture to other people even in our own kind. I was able to process my thoughts and feelings in terms of dealing with other cultures because I have experienced another culture first hand, more than what I can read from books and periodicals. What I have experienced and learned through the encounter is definitely a positive influence. Because their culture has encouraged me to learn more about other cultures and practices of other people and they have helped me understand the differences of cultures. Reference Huitt, W. (2006). Social cognition. Educational Psychology Interactive. Valdosta, GA: Valdosta State University. Retrieved May 13, 2008 from http://chiron. valdosta. edu/whuitt/col/soccog/soccog. html.

Monday, September 30, 2019

Victoria`s Secret Economic Environment

IntroductionThe apparel industry faces various supply chain challenges, many due to the fact that the major part of apparel manufacturing activity for the United States market has moved outside the country to low-labor-cost countries in the Far-East. Thus, due to long physical distances, apparel companies in the US are continuously challenged to quickly respond to changing trends, to reduce long lead-times, to execute collaborative product development with suppliers using effective communication and to ensure total supply chain visibility. Moreover, fickle consumer preferences and shortening of the product life cycles make the apparel industry very challenging from a supply chain perspective.The Victoria's Secret business provides a case study representative of most supply chain challenges faced by the apparel industry as a whole. Victoria's Secret is a multi-channel retailer selling its products through physical stores located throughout the United States, as well as through a colle ction of printed catalogs and an online shop. Its major product offerings lie in the category of intimate apparel, sleepwear, beauty, apparel, shoes and swimwear. For the purpose of this research, we focus on the intimate apparel segment of Victoria's Secret. Intimate apparel represents the largest portion of Victoria's Secret business and is sold through all the retail channels described above.Company HistoryAccording to company lore, after a disagreement with his father in 1963 over the operation of the family store (Leslie's), Leslie Wexner, then 26, opened  the first Limited store in Columbus, Ohio, with $5,000 borrowed from his aunt. Leslie Wexner's desire was to focus on moderately priced fashionable attire for teenagers and young women (Hoover's Online). The Limited went public in 1969 with five stores. Rapid development of large malls spurred Limited's growth to 100 stores by 1976.Two years later, The Limited acquired Mast Industries, an international apparel purchasing an d importing company. In 1982, Limited purchased Lane Bryant (a plus size brand) and Victoria's Secret (lingerie). In March 2002 the so called The Limited changed its name to Limited Brands. Limited Brands is currently focusing on its star players, Victoria's Secret and Bath and Body Works.Company StrategyThe company strategy has evolved over time. Prior to 1995, the company's strategy was primarily driven by a knock-off design, shop-and-copy system. During this period, the company's merchants searched for forthcoming fashion designs, all over the world, especially in Europe, and produced merchandise inspired by these designs. Their strategy involved speed sourcing of the products and selling them out even before the original brand could actually be launched. By the early nineties, there remained little competitive advantage in this approach, as the rest of the world had figured out similar ways to do business (Limited Brands Presentation, 2005), between 1995 and 1998, the company st rategically planned an overhaul, focusing on developing a distinct brand identity.The Limited became the largest employer of apparel designers in the world (as mentioned by a top executive). The company re-positioned itself to operate like an upscale consumer package company. With aspirations to be a large powerful brand that controlled its own retail distribution channels and seeking a consistent repeatable business, the company soon incorporated vertically integrated capabilities into its supply chain. In its quest to narrow its portfolio and create a distinct brand image, the company closed all of its poorly performing businesses, including the sale of its bank, and spun off or sold Abercrombie and Fitch, Lane Bryant and six out of seven Henri Bendel stores (Limited Brands Presentation, 2005).Financial PerformanceVictoria's Secret Business UnitWithin Victoria's Secret, all three channels – Victoria's Secret Stores, Victoria's Secret Beauty and Victoria's Secret Direct â₠¬â€œ are experiencing revenue growth as well as profitability. As of august 2013, Victoria`s Secret stores sales increased 3% on top of a 9% increase last year. Increase was primarily driven by strength in bras and panties. Victoria's Secret Direct, the catalog and online business, also experienced growth. Direct enjoyed a 3% increase in sales in 2013. The growth came from improved clothing assortment at more competitive prices and growth of its intimate apparel category, especially of panties and sleepwear.Direct now represents approximately a third of Victoria's Secret sales. A 2001 â€Å"share of drawer† analysis indicated that one-third of the typical customer's lingerie drawer comes from the Victoria's Secret brand. Most of the drawer, however, consists of daily wear lingerie products, of which Victoria's Secret is a relatively lower percentage. Thus, the trend for the new product introductions will likely be toward more pretty, yet every day, styles like the Body by Vic toria sub-brand, a line of everyday intimate apparel.Victoria's Secret StoresVictoria's Secret (VS) is the most profitable as well as the biggest revenue generating brand for Limited Brands. Its net sales for the year 2013 were $ 271 million correspond of 16.7% of the total % of sales. Victoria's Secret comprises 3 sub-businesses: Victoria's Secret Stores (VSS), Victoria's Secret Beauty (VSB) and Victoria's Secret Direct (VSD) network of stores. VSD sells VS lingerie, sleepwear as well as 3rd party brands in the categories of apparel, shoes and accessories through its online store and catalogs. This case study focuses on Victoria's Secret's lingerie business.ProductsVictoria's Secret sub-brands or collections can be said to focus on a central theme. For example, the most recently introduced Victoria's Secret sub-brand called ‘Pink† is a new collection of intimate apparel aimed at a 19 year old  woman (Limited Brands Interview, 2005), and the â€Å"Victoria† is t he new glamorous fragrance launched that build on its fragrance business. Each of these collections is offered in a variety of different styles based on the extent of coverage given by the bra, the configuration of the bra strap or even its entire silhouette.Overall, the products carried by Victoria's Secret Stores can be divided into 3 broad categories: Launch Fashion Products, Non-Launch Fashion Products and Basic Products. About 60% of units in store are basic, 25% non-launch fashion and the remaining 15% are launch products. Basics consist of products which sell all year round and have styles and colors which can be sold in all seasons and for the most part, never go out of style. Beige Dream Angel's bras, white and black bras from the Body by Victoria collection are examples of basic products.Fashion products are loosely defined as items with styles, colors or silhouettes which typically sell for one season (1 season = 6 months) and then shift to regular replenishment. Launch p roducts are fashion items which are heavily promoted and may even announce the introduction of a completely new category. These products involve special planning and are typically launched two times per year, in spring and fall. An example of a highly successful recently launched product is the new The Close-Up ®. The company also engages in about fifteen annual reconfigurations of its stores also termed as â€Å"floorsets†. A floorset may or may not involve a launch.Customer SegmentsVictoria's Secret Stores is trying to be the dominant, young, sexy and sophisticated lingerie and beauty brand in the world. Victoria's Secret serves a wide range of customers with varied psychographics and demographics. On a household income scale, the VS customer loosely lies between 30-75 percentile ranges. With presence in almost all major malls in the United States, VSS aspires to become a destination brand, which means that a customer would be tempted to visit the malls just to see the VS store. With the Pink ® sub-brand, the space Victoria's Secret is trying to fill as â€Å"young and casual†, a category which had been previously overlooked  by Victoria's Secret.Pink was developed in response to the fast growing Abercrombie & Fitch brand, which was once a part of The Limited. Out of the three key words describing the overall target customer above, â€Å"young† is the most important. The goal is clearly to target a young demographic. Finally, the company sees VS as an â€Å"aspirational† brand, and as such, older women may be encouraged to buy Pink  ®' products as well, as a 40 year old is likely to aspire to look like 30 rather than to look.Demand Forecasting and PlanningOn the demand planning and forecasting front, the Catalog and Web businesses are governed by separate strategies. This is primarily because the drivers of demand for the two channels are different. For the catalog, the demand forecast is mapped against the curve of the pr oduct life cycle from the point the catalog is mailed to when 98% of the product is sold. Moreover, circulation of printed books is the primary driver of sales. Within a catalog, dynamics related to location of the display of product, and to the model selected for the display, are sales drivers. Once Direct has visibility as to the actual product layout of the catalog, it re-forecasts the demand several weeks before it is mailed, and subsequently adjusts its purchase orders.For the web, on the other hand, the forecast is based on individual item performance on an hourly, daily or weekly basis. One of the key metrics that Direct uses to monitor its sales is given by the Net-Growth Ratio. This ratio measures for every $1 of demand generated, how much was generated for sales after accounting for returns, cancellations and failure to fulfill back-orders. Victoria's Secret Direct, especially the catalog business, has additional levers in the way that offer a wider breadth of fashion asso rtments. This is because the marginal costs of carrying fashion versus basics product in Direct is governed by different dynamics in comparison to stores, as the stores have huge fixed costs due to real-estate.Moreover, it is possible for Direct to leverage assets between the catalog and web operations such as common photography. About 400 million catalogs are mailed in a year; approximately one fresh book a week having anywhere between 60 to180 pages and including between 250 and 600 items. About 95-98% of the Direct products are sold in US. Semi-annual sales are  tied together with Victoria's Secret Stores and a sale period is comprised of 8 weeks, requiring approximately 8 mailings during this time (Limited Brands Interview, 2005). Last, but not the least, if a product doesn't perform well in one media, it is not introduced in the other.Sourcing and ProductionVictoria's Secret Direct utilizes the Mast network, as do the Victoria's Secret Stores. Direct is able to maintain accur ate data about customer preferences and buying patterns due to the online nature of its business. It is therefore able to quickly translate this information to its vendors, making it much more responsive to changing customer needs than the Victoria's Secret Stores. This allows Mast to adopt a sourcing strategy based on the vendors' ability to deliver smaller and more frequent orders. Smaller orders mitigate risk of over-stocking and frequency allows the company to react closer to the demand and to get the right product out to market in time.Distribution and FulfillmentOn the distribution front, Direct uses its own distribution center in Columbus, Ohio, separate from the Victoria's Secret Stores' distribution center. Both web and catalog share this DC. The process of picking in distribution centers is different from stores, as these products are picked as single items based on orders, whereas in the Victoria's Secret Stores' operations the products are picked and shipped in cases. Th e average time it takes to get to customers is about two days. The online business is well integrated to inventory systems at the DC level, but is not integrated with Victoria's Secret Stores. With only about 15-20% of overlap in SKUs between the stores and Direct, this is not an immediate need (Limited Brands Interview, 2005).Direct keeps a close watch on its inventory and maintains fairly accurate item levels as well as order level data. For example, the current percentage of service level that Direct operates shows an 88% in stock and 12% back-order at the item level. This level of data integrity allows Direct to be much more responsive than Victoria's Secret Stores and  as a result allows them to make dynamic changes to order quantities, pre-packs and size-curves based on latest selling patterns. In contrast to placing large orders with Mast, as do Victoria's Secret Stores, Direct can thus place smaller and more frequent orders. Moreover, Direct doesn't require excess inventor y for the purpose of its floor and window displays as do Victoria's Secret Stores.Goals and ChallengesAs a part of the INSIGHT project, Victoria's Secret Direct is working closely with its production team to create a library of fabrics and raw materials to make a choice matrix such that lead times can be reduced dramatically. They are also a part of the same initiative to reduce concept to market lead times from 72 to 40 weeks.The challenge for the company is in the area of returns. Currently, returns amount to approximately 25% of demand and are primarily driven by the Swim and Apparel categories; however, a considerable part of returns are put back in stock. These are products which are in reasonable condition to be resold. The return rate for lingerie is negligible. One of the challenges that Victoria's Secret faces overall is in the category of fringe sizes. Fringe sizes are the ones which are on the tail-end of the demand curve and whose demand patterns are harder to predict. C ustomers looking to buy these sizes typically feel the need to try them on before purchase.If these products are carried by Direct, there is potential for reduced customer service levels. On the other hand, if Victoria's Secret Stores decides to carry these sizes to provide better customer service, they will be faced with challenges of less predictable demand patterns for these sizes, leading to over or under stocking of product. Therefore, the company has to work a delicate tradeoff between providing better customer service levels and the subsequent financial impact of this service. A survey about multi-channel retailing tactics used by retailers, conducted by Forrester research, showed that 87% of retailers allowed purchases made online to be returned to stores.Limited Brands fully integrated Victoria's Secret with its Direct business. This involves large logistical challenges for the brand but have a  positive impact of customer satisfaction levels as the customers are able to return goods purchased online to Victoria's Secret Stores, and are even able to order products in stores which they purchased online and have them delivered to their house with no additional cost.Victoria's Secret's Supply Chain FrameworkVictoria's Secret's business strategy has evolved from a shop-and-copy system to a branded concept, that of selling innovative, technologically advanced products at reasonably high profit margins. The Victoria's Secret brand is positioned to be the dominant, young, sexy and sophisticated lingerie and beauty concept, targeting young customers who appreciate the value of possessing innovative lingerie. At the same time, the company is somewhat risk averse.It does not rely solely on its fashionable bra launches for all of its sales. It distributes risk by having a mixed assortment of fashion and basic goods. However, having this mixed assortment adds complexity, in that the brand has to operate two supply chains; one for each of these types of products . Below I underlined the operating model, operational objectives and important tailored business activities that drive sustained competitive advantage within the Victoria's Secret supply chain and align with the overarching business strategy.Complementary Operating ModelThe operating model at Victoria's Secret Stores is to achieve desired brand recognition through innovative product development, glamorous bra launches and high shelf availability of its products. Most of the Victoria's Secret Stores' new product introductions are offered in both fashion (items with less predictable demand) as well as basic (stable demand) styles. This mix of fashion and basic items helps Victoria's Secret to distribute risk, to ensure profitability and to offer compelling value to customers. The company identifies that there is not a single all-in-one supply chain solution for both of these categories of products and therefore it maintains two different types of supply chains for each.The supply chai n for Victoria's Secret's fashion items is driven by â€Å"Speed-to-Market† to ensure responsiveness. This is reflected in the company-wide initiative to shorten its â€Å"Concept-to-Market† calendar. This supply chain is further governed by a sourcing strategy that requires a set of suppliers with an excellent record of product innovation, value-adding capabilities and no minimum volume requirements. Due to the prioritization of speed over low labor cost, these items are made in the most capable factories in the world, wherever they may be, and are consistently air shipped to the company's distribution center in Columbus, Ohio.On the other hand, the supply chain for Victoria's Secrets basic items is driven by factors like asset utilization and supply chain efficiency. As a result, basic goods are manufactured in vertically integrated factories which provide close control over capacity utilization and productivity. These factories run at full capacity and provide econo mies of scale (Limited Brands Interview, 2005). Mast holdings have an equity stake in two of Limited Brands' largest factories in India and Sri Lanka. This is a strategic decision in order to maintain tighter control and better supply chain visibility.Operational ObjectivesThe help of Limited Logistics Services (LLS), Victoria's Secret has drafted a Service Level Agreement that defines various performance metrics for services to Victoria's Secret Stores. This agreement also defines the role of the Victoria's Secret Stores in successfully meeting these objectives. The performance metrics are divided into three broad categories as defined below.Customer ResponseThese metrics are customer-focused and customer-facing. They include a set of distribution metrics as well metrics related to store performance such as responsiveness, floor-set, business priorities, new stores, Value Added Services (VAS), meeting cadence, reporting, and air shipments.EfficiencyThese are internal metrics. They are productivity and cost-related and include a set of metrics at the manufacturing as well as distribution center level such as Auditing/Cycle Counts, Through- Put, Network Productivity, DC Metrics, DC Throughput, and Store Throughput.Asset Utilization These metrics are also internal-facing and largely focus on maintaining economies of scale. They include: Capacity Utilization and Inventory Turns.Objectives Balancing FrameworkThe focus placed on each of the metrics mentioned, varies by whether the product is basic or fashion. For example, in the category of basic products, asset utilization metrics like capacity utilization and efficiency objectives like supply chain costs and productivity carry more weight than responsiveness. The factories making these products run at full capacity with two shifts per day to efficiently deliver these products to market at minimum possible cost of production. These products generate moderate margins for the company in comparison to the fashion pro ducts.On the other hand, in high-margin product categories of fashion goods, particularly in highly promoted launch-related fashion goods, which are most often a result of innovative product development and have relatively short-product-lifecycle of just one season, responsiveness metrics are seen to carry more weight overall. The focus in this model is to increase in-season product availability to reduce lost sales and maximize margins.Tailored Business ActivitiesAt the operational level, there are a set of three tailored business activities that provide significant competitive advantage to the Victoria's Secret supply chain and place Victoria's Secret in a unique position in comparison to its competitors. These activities are aligned to the overarching strategy, which is to deliver an assortment of innovative  fashion products and less risky basic products. The first tailored activity emanates from the company-wide open innovation model. The decentralized design culture within V ictoria's Secret adds unique capabilities to its supply chain design.Product Innovation can come from the supplier, from in-house development or through design inspirations from external concepts. This creates the possibility of inter-company operating ties with outside suppliers. For example, if Limited Design Studios in New York initiates a design concept, it can go to a preferred supplier to be further developed and even changed. This relationship during the design process adds flexibility, which is hard to replicate.The second tailored activity has to do with the sourcing model that Limited has adopted as a whole. The presence of Mast Industries as a wholly-owned subsidiary of Limited Brands is of tremendous value to the company. Mast carefully selects its vendors based on capabilities to manufacture and deliver fashion versus basic products. Mast works with a set of vertically integrated factories as well as raw material suppliers to create a product that is hard to replicate.V ertical integration helps the company to control the production process from fiber to garment. On one hand, this leads to greater manufacturing efficiency required for producing basic products, which generate relatively lesser profit margins than fashion items. On the other hand, vertical integration also helps to speed the product development process essential for new and fashionable products.Finally, the role of Limited Logistics Services' (LLS) â€Å"shared service model† in the smooth operation of its supply chain is indispensable. As mentioned earlier, the Service Level Agreement with each of its brands, including Victoria's Secret, not only defines the detailed performance metrics but also defines the role of each brand in order to carry out the objectives on time. LLS consistently benchmarks itself against outside logistics providers and has been able to provide higher service levels to its brands at competitive costs. The dynamic ability of LLS to constantly evaluate and re-evaluate its performance against external agencies, helps Victoria's  Secret to stay ahead of the competition. In its logistics design, LLS incorporates the fact that whether a product being delivered is fashion or basic.For example, in most cases, fashion lingerie is air-shipped from Asia to Columbus, OH and basic products are ocean-shipped. This is because the fashion products, which have relatively higher margins, are less expensive to transportation costs per unit. Fashion and launch products may also have to go through a customized value-added service process in order to cater to the requirements of the individual stores to which they are shipped. These value-added services are performed at the DC level and the company claims to perform them more cost effectively and efficiently than an outside third party logistics provider. MarketMonopolistic competition is a form of imperfect competition where many competing producers sell products that are differentiated from one a nother (that is, the products are substitutes, but, with differences such as branding, are not exactly alike). In monopolistic competition firms can behave like monopolies in the short-run, including using market power to generate profit. In the long-run, other firms enter the market and the benefits of differentiation decrease with competition; Textbook examples of industries with market structures similar to monopolistic competition include restaurants, cereal, clothing, shoes, and service industries in large cities, which the company Victoria`s Secret fit perfectly.The â€Å"founding father† of the theory of monopolistic competition was Edward Hastings Chamberlin in his pioneering book on the subject Theory of Monopolistic Competition. Joan Robinson also receives credit as an early pioneer on the concept. Monopolistically competitive markets have the following characteristics: There are many producers and many consumers in a given market, and no business has total control over the market price. Consumers perceive that there are non-price differences among the competitors' products. There are few barriers to entry and exit.Producers have a degree of control over price.

Sunday, September 29, 2019

Law of the Harvest LDS Talk

My dear Brothers and Sisters, It is so good to be with you today. The warmth and love that each of you have is so good to feel and to be part of the fellowship of the saints. Brother XYZ has asked that I talk to the Law of the Harvest. â€Å"Gallations 6:7 â€Å"Whatsoever a man Soweth , that shall he reap† I wish to first share with you a story. Many years ago when I was working in Sacramento I had to make a trip for work to San Los Opisbo. The funeral was to be in the early afternoon so I could make the trip in one day. I got all my items together. I had maps and directions from map-quest.I knew my direction and I was going to make it there. I got there in no problem but noticed that I took me a little longer then I had planned. Once there service was over I got in the van that I was driving and looked over the map and saw that I just needed to drive on the road I was on and then turn near the town of Avenal and that would get me on I-5. I started out and began driving. Aft er a while I noticed that I hadn't taken the right turn that I had planned on doing. I pulled over and saw that if I stayed on this road I could go into the town of Coalinga and then get I-5 again.But it was going to be more driving on this quite road. I said to myself well I will just have to go faster to make up the time. It felt like forever but I know it was not but I came up over a rise and saw the familiar outline of a highway patrol car. I pulled to the right of the road right as I passed him. His lights came on and over to me and came around behind me. He came over to my window where I had my drivers license and insurance waiting for him. He askeme where I was heading. After a long explanation he saw all my maps and told me that I was going to fast and that I needed to slow down.He let me off but said that if he ever caught me again He would â€Å"throw the book at me† – What did I learn from this lesson of my life. I had made a plan I had the directions and th e path laid our for me. I had a road map but I failed to get on the right road. Then in haste of youth I decided that I would try to race to make up time. Which cost me time. This is like life, Laws are eternal truth that we follow and the direct action of those laws. We can choose to follow the commandments but we CAN NOT CHOOSE the result of that choice. we have the map and course laid out for us to follow. Our leaders guide the way for us to follow.We need to listen to there council and wisdom. We can NOT expect to live a life of sin and of misdeeds and still return back to our Father. But I KNOW that the converse is true. That if we live a life of goodness and of obedience then we shall be welcomed home to our father. Then for life there is redemption. The amazing gift that God has give us through his son Jesus Christ. The way to overcome the consequences of our actions. Like the officer in my story They can grant us forgiveness and met out mercy because justice was served those many years ago in Gessmetine groves and on Calvary's hill.D&C 130 20-21 â€Å"There is a law, irrevocably decreed in heaven before the foundations of this world, upon which all blessings are predicated—and when we obtain any blessing from God, it is by obedience to that law upon which it is predicated. † Take time today to reflect upon your life and the things that you have. I know that you will find that it is a direct reflection of the life that you have lived. Before I continue I need to read another scripture as a clarification Alma Chapter 38 ( Alma speaking to his sone Shiblon.He being a rightous man who was great missionary unto the people of Zoramites And now, my son, I trust that I shall have great joy in you, because of your steadiness and your faithfulness unto God; for as you have commenced in your youth to look to the Lord your God, even so I hope that you will continue in keeping his commandments; for blessed is he that endureth to the end. I say unto yo u, my son, that I have had great joy in thee already, because of thy faithfulness and thy diligence, and thy patience and thy long-suffering among the people of the Zoramites.For I know that thou wast in bonds; yea, and I also know that thou wast stoned for the word’s sake; and thou didst bear all these things with patience because the Lord was with thee; and now thou knowest that the Lord did deliver thee. And now my son, Shiblon, I would that ye should remember, that as much as ye shall put your trust in God even so much ye shall be delivered out of your trials, and your troubles, and your afflictions, and ye shall be lifted up at the last day. I share that scripture so that none may think that the trails that they have are a ‘punishment' for sin.Trails act as the refiners fire spoken of in 1 Peter 1:7. Elder Sill said this â€Å"One of the distinguishing characteristics of our world is that it is a place of law and order, and the basic law of creation is God’ s fundamental law of compensation. It says that all work must be paid for, that we can no more do a good thing without sometime, in some way receiving a reward, than we can do an evil thing without suffering a penalty. In everything that we do, including the very thoughts that we think, we are subject to this interesting, undeviating eternal law.It is just as universal in its operation as are the laws of gravity, electricity, light or heat. It is never set aside, it is never suspended or restricted, and it governs in every department of human activity. Nothing is ever denied to well-directed effort and nothing is ever achieved without it. It is a thrilling challenge, that we may have any blessing that we are willing to live for. And the primary law of the universe is this immutable,†¦Ã¢â‚¬ ¦.. irrevocable law of the harvest that says, ‘Whatsoever a man soweth, that shall he also reap. ’ ( Gala. 6:7 ) ( The Law of the Harvest, p. 1. ) Think of it my fellow saints D& C 82: 10 I, the Lord, am bound when ye do what I say; but when ye do not what I say, ye have no promise. You need to make the choice today the kind of person you want to become and then do what is required to become that son or daughter of God. In my calling I work with the young men. I invite them to chart the course they want to take. If you lay out the course and you make your plans the small choices along the way are easier to make. The blessings are real I have seen them in my life and they can happen in your life.Sometimes other people are in your path that make living the gospel hard. I think of a story from my mission days. My mission president would from time to time send me a missionary that needed some guidance. Elder XYZ was one such Elder. He had a sleeping problem. He would sleep until 10, 11 maybe even noon and then get up to work. When I received the assignment. I was told that I needed to help him not by being the school master but by a quite example of love and com passion. Each morning I would rise at the appointed hour and begin my day. I would follow all the mission rules that I could.I tried with all my might to find people for us to teach and the work with. We began to teach these people when Elder Allen would rise we would begin our day. Brothers and Sisters the Lord blessed us with some amazing people to teach and baptize. Elder XYZ knew it I knew it and President XYZ knew that is was obedience to the rules of the mission and to what we needed to do that produced that fruit. The Lord was bound to help these people as a result of simple Elder ABC following the mission rules. Many times we just need to follow the commandments and as a result og our actions people lives are blessed.This most often happens with church leaders or those who are charged with helping people along the path of life. Because of ones faithful discharge then another is blessed Brother CFD was a faithful home teacher he would go out and visit the people that he had o n his route. Most if not all of them never came to church. He had a name on his list of Brother ERD. For four long years he would go to this man's home and talk with him and invite him to come back. He would get the same answer each time. â€Å"Nope not this week† A change started to come over him as he saw this faithful brother.Then one week he came to church. The ward welcomed him back and he became interested in the work that needed to get done. His wife had to be baptized and his grand kids needed names placed on the roles of the church. He came back to the fold of God because one man decided to share his time with another and follow the charge that he had as a priesthood leader. As we serve others two things happen. 1- Lives of the people change and are made easier or they get stuff that are given to them 2- the people giving the service are rewarded for the work they are done.This reward or compensation is both physical and also spiritual. Alpha was the President of his Teachers quorum , I was the advisor, One Sunday about two years ago we heard that brother YTR had a bad accident and would not be able to mow his lawn. In Priesthood we talked about the needs of Brother YTR and the Bishop told Alpha to get the lawn mowed. Alpha a young 15 year old , holder of the Priesthood of God, planned on going to this house. They got rides for the boys that needed them. They got lawn mowers and edgers. Then They called me.Alpha told me that They were going to there on Wednesday and thought I should know. I was surprised that it was planned. I told him that I could be there and would bring a watermelon if they wanted. He said sure and I was there at the home. Alpha and his fellow members of the Aaronic Priesthood provided service and were blessed. I was taught by these â€Å"boys† and they taught each other. These stories are not unique, you all have these same stories of obedience to a law of God and cherish in the blessings that you received . Each tim e that story is shared the blessings are relived and your excitement is filled.I want to warn us all to not think that these blessings are ours and ours alone. Many faithful people of all religions are given blessings and can feel of the Law of the Harvest. The lord is the same yesterday today and forever and when we do a righteous thing we will be blessed. For those of us who have strayed and who need help getting back on the path there is hope. Christ paid the price for our sin and know how to welcome us back. Luke 8 4- 15 Christ taught the parable of the sower And when much people were gathered together, and were come to him out of every city, he spake by a parable:A sower went out to sow his seed: and as he sowed, some fell by the way side; and it was trodden down, and the fowls of the air devoured it. And some fell upon a rock; and as soon as it was sprung up, it withered away, because it lacked moisture. And some fell among thorns; and the thorns sprang up with it, and choked it. And other fell on good ground, and sprang up, and bare fruit an hundredfold. And when he had said these things, he cried, He that hath ears to hear, let him hear. And his disciples asked him, saying, What might this parable be?And he said, Unto you it is given to know the mysteries of the kingdom of God: but to others in parables; that seeing they might not see, and hearing they might not understand. Now the parable is this: The seed is the word of God. Those by the way side are they that hear; then cometh the devil, and taketh away the word out of their hearts, lest they should believe and be saved. They on the rock are they, which, when they hear, receive the word with joy; and these have no root, which for a while believe, and in time of temptation fall away.And that which fell among thorns are they, which, when they have heard, go forth, and are choked with cares and riches and pleasures of this life, and bring no fruit to perfection. But that on the good ground are they, wh ich in an honest and good heart, having heard the word, keep it, and bring forth fruit with patience. Verse 13 tells of the hope that we have for these who fall away for a time. Let us do what we can to bring them back. The atonement of Christ is for all. I know that as a man soweth so shall he reap.

Saturday, September 28, 2019

A Study Of The Theme Of Panopticism And Jeremy Benthams, Michael Foucaults Ideas In Panopticon By Jenni Fagan And 1984 By George Orwell

A Study Of The Theme Of Panopticism And Jeremy Bentham's, Michael Foucault's Ideas In Panopticon By Jenni Fagan And 1984 By George Orwell A panopticon can be used in order to effectively keep surveillance of society. This, in all of its senses, is manipulative and coercive. As society started growing, it kept getting more difficult to control the people, and therefore, other resources or mechanisms had to be used for the monitoring of these people. In the late eighteenth century, Jeremy Bentham had an architectural design for prisons, asylums, schools, hospitals, and factories, and received help from an architect in order to put his ideas on paper . Michael Foucault, a French philosopher, did extensive research on panopticons and his ideas were taken into consideration by future authors. Bentham’s plan for the prison design gained popularity because Foucault saw it as a strategic model to internalize discipline and authority. The Panopticon, written by British young adult author Jenni Fagan, is directly linked to these ideas. 1984 by George Orwell, however, was published in 1949, so it cannot be said that Foucau lt influenced it, since the panopticist ideas were published in Discipline and Punish: The Birth of a Prison (1975). On the other hand, Bentham could have slightly influenced Orwell’s writings. These panopticist ideas come into play in today’s world as well, and it has become a controversial topic because of modern technology that society feels has become more and more invasive. The Panopticon and 1984 both have the recurring theme of panopticism, which affect the main characters in different manners. This paper aims to show the correlation between Bentham, Foucault, and how the same ideas and theories influenced works that were written decades apart. The ideas of a panopticon originally had good intentions; Jeremy Bentham created it in order to retire violent methods of punishment. He wanted to punish in another form, this being more psychological. Foucault stated that the panopticon â€Å"reverses the principle of the dungeon†. The dungeon had â€Å"three functions: to enclose, to deprive of light, and to hide; it (the panopticon) preserves only the first and eliminated the other two† . Knowledge comes from power, and the panopticon can allow the authorities to see everything that is going on around them, leading them to know more things. The panopticon also creates a constant state of control, and makes those that are observed internalize the fact that they are always watched. â€Å"Constant observation acted as a control mechanism; a consciousness of constant surveillance is internalized†. The Panopticon, as the title states, revolves around the idea that people are always being watched. Anais feels as if she is involved in an experiment, and she knows that people are always watching her, and wants to escape it. It’s a novel that goes in depth into the main character’s psyche, and the reader gets an insight into her life and fears. She’s strong, but copes with drugs and her own imagination. Ironically, these are the things that should not be done when one knows that they are under vigilance. For Anais to escape the experiment and cope with her uncertainty of where she comes from, she seeks comfort by playing the â€Å"birthday game†. By creating a life for herself, she is able to rely on those facts and pretend that she has a semi-normal life. On the other hand, it is a sign of resistance from the panopticon, because people can see her actions, but not her thoughts. Since the novel is written from her perspective, the readers do get to see h er thoughts, so the readers act as the panopticon in this case. Anais is very skeptical of all that goes around her, and has been forced to grow up quickly. In the Panopticon that she lives in, the watch tower gives no privacy, which is an act against human rights. Being in a constant state of surveillance drives Anais mad, which in the end pushes her to escape her life. She was able to run away because the watch tower shattered, â€Å"the whole surveillance window shatters, and I see them; turning on their fucking tails; the experiment, for a fraction of a fucking second: exposed† . At this point, Anais is liberated and can start her life in Paris, just like she had decided with her birthday game. The last sentence of the novel is, â€Å"I begin today† . Because the windows hiding the faces of those surveilling her have shattered, they are now at her level because they are real people. She has the power to run away and fight the system, and therefore, becomes her own person. Orwell’s novel is dystopian and reflects the society as powerless and robotic. Big Brother in this case is the panopticon. There is no face to Big Brother, but society fears him. By using these scare tactics they have been able to brainwash society into being permanently scared. They have to be in constant control of what they say or do because the consequences are brutal. It is impossible to trust anybody, because when Winston did, he was turned into the police. Orwell also introduces â€Å"Newspeak† into the novel, which would now be considered simple English. It is the official language of Oceania. Because the words are so simple and there is no complexity to them, it gives people no reason to rethink words or give other definitions to them. It limits their language so they cannot rebel against the system, which is the main reason behind changing the language. Apart from limiting language, it also limits personality and personal identity, which is also a method of br ainwashing. Newspeak does not allow for any type of personal development, and Winston breaks this by keeping a diary. He is able to express his feelings in it, but realizes he has written â€Å"DOWN WITH BIG BROTHER† multiple times on the page and sees that he has committed thoughtcrime. If the level of intelligence of this society were higher, one might have realized that it would be impossible to track all the thoughts of all the members of society, but because of the various methods of brainwashing that have been carried out, no one was able to think it through. â€Å"Thoughtcrime was not a thing that could be concealed forever. You might dodge successfully for a while, even for years, but sooner or later they were bound to get you† . Fear is the most common tactic used by oppressive societies to stay in power. If society fears the system, one will rebel against it and the oppressive state continues. Winston is also guilty of doublethink, although he realizes he is. He works for the system, but secretly is rebelling against it. At the Ministry of Truth, slogans that read â€Å"WAR IS PEACE†, â€Å"FREEDOM IS SLAVERY†, and â€Å"IGNORANCE IS STRENGTH† all brainwash society. These words are antonyms of each other, and the people do not realize that. By working at the Ministry of Truth, he is supporting these statements, but by writing in his diary and being secretive he is rebelling against it. The difference between 1984 and The Panopticon is that the latter has partial freedom. Although Winston Smith is not a prisoner and works for the party, he has less freedom than Anais does. He has no freedom of any type, he cannot do, say, or think as he pleases, because the society is a microscope that is being observed by Big Brother. Anais, though she has been arrested and is a victim of countless foster homes and misfortune, is in a controlled environment but has the freedom to think, which is extremely powerful. As Foucault stated, knowledge is power. She can liberate herself of the constant pressure from the social workers and of the panopticist society she is in. There is no type of Thought Police or thoughtcrime like it exists in 1984. On the other hand, Anais is psychologically incarcerated at times, which is why she resorts to drugs. Although she has the freedom to think and create her past life, it stops her from really knowing who she is and where she comes from. However, her mind is so powerful that she can brainwash herself into creating a past life for herself. Winston, nevertheless, is very aware of what goes on in his life and that can give him a sense of security. Even though he is not following the rules, he knows his consequences. Because both novels share similar themes, the panopticist ideas appear throughout and the characters share common traits. Anais and Winston are very similar in the sense that they are both victims of their society. They are both incarcerated metaphorically. Their minds are free, but only one of them can be safe expressing their true thoughts and feelings. There is an internal struggle occurring with each, and although the characters are very different in terms of lifestyles and persona, their inner struggles clash. Being in a state of liminality like both characters are, they struggle with their daily lives and may or may not go against their basic beliefs, like Winston did when he turned in the love of his life, Julia. Anais differs in this manner, but as the novel progresses, there are signs of maturity on her part, and she becomes more conscious of her desires. The novels also share a major common aspect; the fact that both of the societal powers do not have a face to them. In 198 4, Big Brother does not have a face, so there is enough reason to believe that he does not exist, and that there is a group of people controlling society. Likewise, in The Panopticon, Anais does not see the faces of the people in the watch tower until the windows are shattered and she is able to see for a fraction of a second. Power does not come from one sole person; there is generally a group of people in control or a political figure who is puppeteered by others. A panopticist society currently exists among us, and although it may not be in the traditional sense, people definitely feel the effects of it. People are raised to believe that they are under constant watch of those that cannot be seen, for example Santa Claus for the young, or even more in depth, a God. A panopticon is essentially what God is, all watching and all knowing. In the end, people fear the consequences that God can give them, which is why many are so dedicated to their religion. This can make people feel anxious all the time and it is not fair to make people believe that they are not free because there is a radar on them at all times. It is psychologically damaging, because there is no true freedom. Currently, there have been happenings of government interference with the general public, not only terrorists or potential suspects. Wire-tapping goes against the American Constitution, and although the Patriot Act is named and worded in a way that makes it seem as if it is s omething that is a duty to ones country, it strips society of basic human rights. Under no circumstance is it okay to spy on one’s own, because it betrays trust between the government and members of society. One very current situation is the power behind Cuba’s dictator: Fidel Castro. There is no factual evidence that he is alive, but because â€Å"his people† say he is, Cubans believe it because they have been brainwashed to extreme extents by the communist party. Panopticons exist in all various forms, but the only way that society can fall into the trap is by succumbing to the power behind the words, because words are the most powerful thing when gaining power. Ignorance is not strength, and one should have the freedom to think freely and act within reason. Being under a constant state of vigilance like the characters of The Panopticon and 1984 were wears out ones mind and persona. Anais was able to break out of the cycle, but Winston on the other hand, fell back into the system and was brainwashed once again.