Monday, January 27, 2020

Dark Tourism And Ethical Issues Tourism Essay

Dark Tourism And Ethical Issues Tourism Essay Abstract The research project aimed to do a critical analysis of the ethical issues of dark tourism. Six research objectives were set out to help achieve this aim. In the process of gathering relevant information on this topic, an analysis of dark tourism throughout the years will be done, followed by the commitment of different authors. Furthermore, by examine in depth both the consumers and providers point of views to further understand the ethical dilemma of dark tourism, the research project will highlight the main problems that occur within this sector of tourism. Secondary research has been chosen as a main research method. A wide variety of literature was gathered on the concept of culture and tourism by using a snowball sampling of secondary literature. This type of sampling was carried out by using the authors list of references to highlight other articles that might be of relevance. The findings indicated that, it may be possible to state that ethical issues will always continue to exist around dark tourism, as long dark tourism itself exists too. Recommendation has been given on the importance of the consideration of the ethicalities of dark tourism. As conclusion indicated, ethical issues cannot be understated, and both consumers and providers may want to work together, if in the future, we still would like to know about our history through the form of tourism instead through textbooks and education. Introduction Hall (1998) states that tourism is the worlds largest industry, and it is expected to continue to grow, develop and maintain. The tourist industry is a major economic, environmental and socio-cultural force, and it becomes a lifestyle for millions of people on our planet. Its beneficial effect on the development of political, social, cultural relations and international relations on a global scale has become an obvious fact to all countries around the world. (Meethan, 2001) Over the last half century it is seeing that tourists have long been attracted to places or events associated in one way or another with death, disaster and suffering. (Stone, 2009a) All these sites and many more which are similar, are what are called sites for dark tourism according to main theorists John Lennon and Malcolm Foley, also known as Thanatourism (Seaton, 1996 cited in Ryan et al, 2005) and Black Spots (Rojek, 1997). This form of tourism is what Seaton (1999) defines is about travelling to sites associated with death, suffering and other tragic events that have become significant tourist destinations. In fact, the act of touristic travel to places of death, war, genocide, assassination and disasters is becoming the most developing branch of tourism during the past years and cultural activity within contemporary society. At the same time, there is evidence of a greater willingness or desire on the part of tourists to visit dark attractions and the sites of dark events. (Stone, 2009a) For example, thousands of tourists come to Pont de lAlma Road Tunnel in Paris, to lay flowers and light candles in unofficial memorial of Princess Diana of Wales, where she died in car accident. With the growing popularity of this kind of tourism within the dark tourism market (Tunbridge and Ashworth, 1996), the ethical issues surrounding it will need to be enquired. Ethics plays a role in nearly every business related decision. (Hartman, 1998) With the consumers and providers participating in this growth of phenomenon of dark tourism, as they potentially contrasting ethical perspectives towards dark tourism may be different. Whereas a providers means of preserving history is to charge people to maintain its upkeep, the consumers may see it as money making scheme in the expense of the deceased lives of the site. Whereas the providers means of letting people know its history is through interpretation of vulgar images, may seem unethically unpleasant for consumers. The dissertation will focus on the question of ethics in dark tourism, thereby advancing knowledge and understanding of dark tourism itself. Aim The aim of the project is a critical analysis of the ethical issue of dark tourism. Whether the death could be sold and consumed throw dark attractions and national tragedies. Objectives To define Dark Tourism To define the concept of ethics To examine in depth both the consumers and providers point of views to further understand the ethical dilemma of dark tourism. To use Stone (2006)s shades of darkness spectrum as a tool for measuring different levels of dark tourism sites To establish a conceptual ethical framework for the study of selling provocative narratives of national tragedy in heritage situations To suggest recommendations on the ethical issues Rationale Despite the long history of dark tourism and evidence of travel to sites associated with death, the academic attention on this phenomenon has recently appeared. As a result, a number of fundamental questions with respect to dark tourism remain unanswered. (Stone, 2009a) This topic has been chosen due to a lack of research carried out on ethical and moral issues of dark tourism. The project can be useful to gain more knowledge into the topic of dark tourism. The study of dark tourism is important for a number of reasons. It can be used for educational purposes of wider social interest or for means of enjoyment. In relation to this Stone.R (2009, p.7) states: à ¢Ã¢â€š ¬Ã‚ ¦ Dark tourism provides the opportunity for tourists to experience playful houses of horror, discover places of pilgrimage such as the graves or death sites of famous people or visit sites of major disasters or atrocities Nevertheless, all these attractions require a deep understanding within cultural, social, historical and political context, effective interpretation and development. Otherwise the nature of dark tourism, in particular, the debates and conflicts it represent, will point to a number of issues that demand examination and understanding, such as ethics and morality. Whether people visit these sites for remembrance, education or entertainment purposes, there will be one dilemma relating to many dark attractions: if it is ethical and moral to sell, promote or offer death for touristic consumption. For example, millions of tourists stop alongside with those, who mourning the loss of loved ones, to see where the World Trade Center once stood in New York. In order to research the dilemma of the ethics and morality of dark tourism, it is necessary to realise that dark tourism is fascinating, emotive and provocative and it is important to explore many features of dark tourism, which may be perceived unethical by some people. Stone (2009a) states: à ¢Ã¢â€š ¬Ã‚ ¦Consequently, the ethics of dark tourism  are perhaps part of the broader research agenda. Ultimately, from this research a fuller understanding of dark tourism  shall be made, and thus knowledge of the phenomenon advanced. Naturally, anyone researching dark tourism should consider the ethics of their research, in particular how data is both gathered and presented Furthermore a case study will be conducted in order to have a closer look at the situation and the major problems occurring regarding ethical issues of dark tourism. In addition, the researcher is originally interested in dark tourism phenomenon. For the past 2 years the researcher has visited the numerous places of death and disaster such as Chernobyl, and has noticed that it is becoming increasingly popular. The researcher also found out that, for 2 years there are numerous quantity of debates on particular dilemma, which will be analysed in the dissertation. It is hoped that this study will have an impact on understanding dark tourism. In addition, it is also hoped that this project will draw more attention to ethical issues and provide a new point of view for those, who does not accept truth and reality of dark sites or attractions. Literature Review Roberts (2004, p.73) defines a literature review as, à ¢Ã¢â€š ¬Ã‚ ¦locating, analysing, synthesising and interpreting previous researchà ¢Ã¢â€š ¬Ã‚ ¦ This section will be used to establish theoretical framework, identify models and studies and define key terminology in relation to dark tourism and ethics. All research that has been conducted will be presented within this section. An in-depth review of the literature has been done in order to gather relevant information on dark tourism itself and ethical issues throughout the years. The literature matrix illustrates the main areas which are perceived to be the most important in relation to the topic of dark tourism ethical issues. By creating a literature review matrix, it would help the researcher contrast and compare the authors work easily. As a result by carrying out a detailed review of the literature it could possibly identify important questions, key issues and noticeable gaps within the current knowledge on the topic. Dark Tourism: Definitions Only in recent years that it has been together referred to as dark tourism, travel to places associated with death, disaster and destruction has occurred as long as people have been able to travel. In many cases there is no clear definition of this tourism niche. Although, the term dark tourism was firstly created by Foley and Lennon (1996a,b). For Foley and Lennon, the term dark tourism relates primarily to the presentation and consumption (by visitors) of real and commodi ¬Ã‚ ed death and disaster sites (1996a:198); a broad de ¬Ã‚ nition later re ¬Ã‚ ned by their assertion that dark tourism is an intimation of post-modernity (Lennon and Foley 2000:11). At the same time, another terminology has been applied to the phenomenon. Seaton (1996) refers to death-related tourist activity as thanatourism, while other labels include morbid tourism (Blom, 2000), Rojek (1993) offered a Black Spot tourism definition, grief tourism and milking the macabre (Dann, 1994:61). Nevertheless, there is a factor, which is common to all these terms of tourism. It is all about association, in one form or another, between a tourism site, attraction or experience and death, disaster of suffering. As a result, definitions of dark tourism focus on connection between tourism and death. Tarlow (2005:48), for example, gives identification for dark tourism as visitations to places where tragedies or historically noteworthy death has occurred and that continue to impact our lives, a definition that aligns dark tourism somewhat barely to certain sites and hints at particular motives. Miles (2002) states that, however it excludes many dark sited and attractions related to, while not necessarily the site of, death and disaster. Therefore, for the purposes of this research project, the author will define dark tourism, according to Stone (2006, a) simply and generally as the act of travel to sites associated with death, suffering and the seemingly macabre. Ethics Stone (2006,a) states that ethics and the morality of selling provocative and sensitive narrative through heritage to the touring and visiting community is more established and documented problem of dark tourism. Ethics have been conceptualised as a set of rules and principles, concerning rightful conduct based on our most deeply held values, the things we most cherish and the things we most despise.(Lieberman, 2000). The term can also refer to the systematic study of way of thinking about how we ought to behave and finding a rational way of how we ought to live. Ethics and morality suggest a set of duties that require subordination of natural desires in order to obey the moral law (Singer, 1994). The 20th century saw philosophers approaching the problem of the origin of ethics as something unreachable. Among the most publicised conceptual thinkers in the field of ethics have been (Singer, 1994:18): Thrasymachus ( 4th century) and the thesis that ethics are imposed on the weak by the strong; Socrates (4th century) and the thesis that the ruler is not concerned with his own interests, but with that of the subject; Hobbes (17th century) and his statement that ethics give the ruler a right to to command and to be complied; Nietzsche (19th century) who proposed morality is the creation of the herd'(led more fear than hope) Ethics and Moralisation in Tourism There are numerous schools of thoughts and opinions, and literature on the board subject of ethics is prevalent. What is more significant in the situation of the dark tourism is suggesting a conceptual ethical framework for the analysis of providing and selling provocative narratives of nationwide tragedy in heritage settings. This study is concerned with two main and obvious parts of ethics and morality as follows: Business ethics and the extent to which businesses within the heritage industry which communicate a dark narrative to the visiting public consider their practices to be ethical( Stone, 2006,a) Personal morality and the extent to which these often provocative narratives are received and are passable according to the moral principles of visitors from widely varying cultural backgrounds. ( Stone, 2006,a) According to Stone (2006,a) the term business ethics has been described at the extreme as an oxymoron in the corporate world since some argue that morality, as Butcher ( 2003) states, is intrinsically absent in capitalist entrepreneurial ventures. At the moment the issue of business ethics is a conspicuous subject attracting attention from a number of communities of interest, such as consumers, pressure groups and the media (Strange and Kempa, 2003). According to Crane Matten (2007), corporate social responsibility is a dominant strand of the converse of business ethics and has been contrived to refer to the implicit process of communicating a legal and institutional corporate framework within which a duty of care (to people, the environment and employees among others) is implied. For dark tourism, it has not been fully elaborated upon in this context since there present different problems in communicating the social responsibility of these types of heritage sites, such as: The esotericism in the scope of what is morally acceptable to various communities of interest: is there a hierarchical order of care or responsibility that must be demonstrated? Stone (2006, a) provides example of Auschwitz as the most responsible way to admit visitors in compliance with the moral and ethical codes of the relatives of prisoners and victims, but also with the moral principles of other visitor types such as Polish visitors, young visitors. Conflicts of interest, according to Ryan et al (2005), are common in heritage but more morally charged where the narrative is provocative and contested Is it ethical to adopt another national tragedy and inculcate it with new national discourse? Cole (1999a) provides this in a context of the United States Holocaust memorial Museum which he disputes Americanises European Jewish tragedy, repacking Holocaust for American mass consumption in theatre, tourism and heritage. In general, these discourses of corporate social responsibility are present in language of many operations thus far defined as being in the dark tourism business Stone (2006a) states, that traditionally, tourism ethics are discussed in the context of tourism as a major economic engine that can wreak havoc on the environment and can negatively temper the influence host communities in destinations imagined as culturally sensitive Cheong and Miller (2000) discuss tourism ethics in terms of normalising what is acceptable or not acceptable, and an inspecting gaze influenced by the manipulation of imagery in tourism marketing. Tourism activity offers a rare, observable form of ethical behaviour. Tourists vote with their feet and demonstrate in visiting dark heritage sites that these are morally acceptable spaces to occupy. Ethical discourses linked to the production and consumption of contested heritage sites are shaped and maintained by many voices Stone (2006a). The issue of remembering tragedy and oppression in heritage sites and to whom memory is entrusted, is at the centre of academic debate surrounding truth and appropriate narratives broadcast by dark tourism sites. Summary of the literature review Issues in literature review has been addressed which stress the importance of the different definitions to cultural tourism suggested by different authors. The results of this literature review have enabled the author to complete the first objective of the study by demonstrating an understanding of the ethical issues of dark tourism, what dark tourism itself is and what ethical framework is. Using a wide range of modern academic perspectives has helped to illustrate meaning of dark tourism ethics academic perspective, which can be used in the following chapters in reviewing the main findings of the study undertaken. The matrix figure provides a summary of the main points generated by each academic paper and compares and contrasts the various authors views. The matrix figure illustrates the context of cultural tourism referred to in academic papers and books utilized in the literature review. It demonstrates that the opinions of the different authors are both different and similar. Methodology This section of dissertation is going to study the different research methods used within this project. In order to make this research project successful, it is important that appropriate research methods or techniques have to be chosen. The purpose of a methodology is to demonstrate, explain and justify the research methods used in this dissertation. According to Krippendorff (2004) the purpose of a methodology is to help the researcher effectively plan and examine the logic, composition and protocols of the research methods that have been used in research project. The researcher will present a summary of the sources of information gathered; a description of the procedure used to obtain information and the various research methods will be discussed. Furthermore, by completing the methodology it will demonstrate how a systematic investigation was applied into the topic of dark tourism. Choice of Research Design Secondary Data Sharp et al. (2002, p139) define two categories of data which are: primary data that the researcher collects through observations, interviews, questionnaires and etc.; and secondary data that have been collected by other previous researchers. As the author of this dissertation has already mentioned before, in order to perform this research project in successful way, two categories of data and different research methods should be investigated. This research project will be primarily based on secondary research because the primary research is not needed as all the information is already available through secondary research sources, such as books, journals and newspapers. What is more, in order to achieve the aim that has to be investigated, the best method of research would be secondary research. To enhance the existing but very little evidence of the posed topic, secondary research was gathered. Ghosh and Chopra (2003, p.33) define the term secondary research as: data which are already in existence and collected by others, not by the investigator and are available in published and unpublished forms Secondary research was chosen as the quickest and the easiest way to access and is the most cost effective approach to this research project as well. Veal (2006) confirms this by stating that secondary data often provides researchers with rapid answers to some questions at less cost than it would to undergo primary research. Furthermore, if there is enough secondary research to base the study on then it would be a waste of resources to collect new information for the same purposes (Veal, 2006).What is more, secondary research seemed more relevant than primary research. This was because there was wide variety of literature on the subject of dark tourism and ethical issues, sourced from University College Birmingham library, with many books containing relevant information, which will be discussed later. Primary Data The Oxford English Dictionary (2002) defines primary research which is collected for a specific and immediate research need There are many different ways in which to carry out primary research. In order of this research topic, the author found that many of the theories couldnt be backed up with primary data and with a suitable sample. For the purpose of this research project, primary research could be used to gather relevant data and access a large population of students at University College Birmingham and other universities situated in Birmingham. One of the core methods of carrying out primary research is through questionnaires. Mainly, there are two forms of questionnaires: open ended and closed ended. Open ended questionnaires are likely to have unlimited answers to a set of alternatives and likely to receive long answers. However, the difficulty is that they are difficult to analyse and as they seem to hand the baton of control over to the other person. Closed ended questions impose a direct risk to the validity of findings and can be answered with either a single word or a short phrase. Another form of primary research, which was considered were interviews. The Oxford English Dictionary (2002) defines interview as formal discussion between two parties in which information is exchanged. It is possible to say, that it is all about asking questions and receiving the answers. Therefore in this research project, due to difficulties in collecting the required data and access a large population for testing along the facilities required to carry out, a primary research would not be useful in gathering relevant data and the researcher will benefit further from analysing secondary data from literature. Obtaining Research The majority of secondary research for this dissertation was gathered from books, academically reviewed journals, on-line factual reports, newspapers and the internet. All this sources can justify the point of view of an author and provide relevant information about the research project. The most easily accessible secondary research method that the author of dissertation found was the usage text books. Text books were primarily used to gain background knowledge and obtain a wider understanding of specific topics. The advantage of using books is because it gives a clear understanding and academic information. As it was already mentioned before, this method was the easiest, because the researcher could get them not just from the University College Birmingham library, but also to the online library supplied by the University and other on-line organisations such as Amazon, EBay and Google. Key words had to be entered to find appropriate books from the on-line organisations and the library catalogue, the following key words were entered, dark tourism, dark tourism ethics, dark tourism and morality. There were some books which contained many different theories from the past to the present day. The researched decided that the most relevant authors for this research project were John Lennon and Malcolm Foley (2000) and Richard Sharpley and Phillip R.Stone (2009,a). Books for the methodology were found by entering the key words; research methods and methodology. The journals are preferred because they are accurate and provide up to date data, they are also more relevant to the topic as the dissertation is concentrated on the topic of consumers and providers point of views of dark tourism. The journals were accessed through academic search engines like Athens for example and journal databases such as ScienceDirect, Emerald Management Xtra. But unfortunately, these databases were not useful as they did not give any information on particular question, except ScienceDirect. Journals relating to the research topic were accessed with comfort as the researcher can type in key words and the database will present pages of journals that are associated with the key words. The key words the researcher typed in to each journal database were Dark tourism, ethical issues of dark tourism, ethics and morality, Dark tourism forum. To get more information, the researcher travelled to universities to view their journals however access to relevant information, w ere not as successful as it was to find them via the internet. On-line factual reports were used to obtain raw facts and figures; some of these reports include Mintel. Similarly to accessing the journals, key words were entered in order to retrieve the data, the key words that were entered were Dark tourism ethics, Dark tourism. Moreover, on-line articles were read in order to gain a wider perspective of the posed subject area. The usage of newspaper and internet will also be included in order to provide a variety of information and because they are easy of access. Newspapers are useful because they are up to date, however the information can be too subjective, and as for this particular topic of dark tourism, the researcher found newspapers not really useful, because of the lack of information on dark tourism. Internet was useful source of information; however the reader need to check if the source is reliable and information is updated. Websites are easy to access and easy to research information on and are also updated regularly. This variety of sources gives a better understanding of the subject. Construction of Design Out of all the research that has been taken, text books and academic journals were the most reliable and valid to use to back up any point. This is due to the fact that dark tourism is comparatively new phenomenon in tourism industry, books and academic journals are often published frequently throughout the year so the information that is provided is up to date. Furthermore, academic journals and text books are intensely reviewed by academic professionals before publication to ensure its validity. The author of dissertation aimed to gather resources that were only published after the year 1999 as this is relatively recent; however certain books have been used from a much earlier date due to their relevance to the research question. However, journals or books dated in the 80s or 90s will not consider as outdated. The selection of secondary data gathered has been published in a variety of places; it was thought that as the topic in question is ethical issue of dark tourism, then perhaps research published in a variety of countries would be useful to get a wide range of views from across the globe. Advantages and Disadvantages of Research Methods Although secondary research was the ideal research method to use for this research project, it does hold some disadvantages. There is always the risk that the author could include their own opinions, so they can strongly sway towards one point and books can be not updated on a regular basis. Also, with academic journals, there are many accurate topics and findings, however a fee is charged for many of them, some of which are only available to a certain group of people making them hard or even impossible to access, this could put a strain on the researchers findings. As for Mintel, some of reports were helpful, but not published yet for audience. Furthermore, Ghosh and Chopra (2003) mention that although it is more cost effective and less time consuming, the secondary research may not be as accurate as the researcher had hoped. Besides this, secondary research still remained ideal for the dissertation as the quality of data obtained can be better than the quality of primary research, as information gained through secondary sources could have been obtained using better and more advanced resources. Moreover, because of the lack of time and financial situation, secondary research was primarily used as being cost effective and less time consuming, it is also easy to access as it does not require any additional resources. Primary research was considered due to the fact that it is useful to gather relevant data and access a large population of students tailored to the researchers needs. However, it was rejected due to the lack of experience, funds and resources which could give a limit to the quality of the data gathered and as a result, being unsuccessful (Kumar, 2005). The researcher does not have any experience in carrying out primary research so in order to make the research project successful, it would be inappropriate for primary research to be undergone for this dissertation, and it would make more sense for the researcher to analyse findings from previous and more experienced researchers and academic professionals. Plan for Data Analysis As there is a variety of secondary information gathered, it is necessary for the researcher to analyse them carefully. This variety of sources gives a better understanding of the subject. Once it has all been collected, it will be thoroughly analysed to determine its validity and reliability, and those that are not pertinent will be rejected from being used for the dissertation. It is important that validity is measured carefully as Kirk and Miller (1986, p.71) mentions that perfect validity entails perfect reliability. In order to evaluate the collected research, the researcher will read over it and make their own judgments based on a number of factors surrounding it for example, the sources in which the information was collected from and the method in which the sources were collected. When applying the frame work, the researcher will use it to assess different aspects of the dark tourism ethics to conclude by providing final results to the aim. Summary This methodology has evaluated and justified the choice of research design for this dissertation. As secondary research is being used, the researcher has analysed this type of research by describing the advantages and disadvantages of it. After the collected research has been evaluated, the findings will be analysed and discussed in the following section. Analysis and Evaluation This section is essential as the researcher will be analysing and evaluating the findings of the research project. The main aspects of the results which were found in the data discussed in the literature review will be approached carefully in order to weigh up the arguments effectively. Dark tourism and ethical issues Among the more established dilemmas of dark tourism is ethics and morality. Dark tourism has often raised ethical debates and discussions about the ways in which leisure time and pleasure are mixed with tragedy (Kempa and Strange, 2003), as many people think some sites of dark tourism are too sensitive to present it for the world to see. In addition, management of dark tourism attraction is a sensitive issue which is difficult to undertake, and Tunbridge and Ashworth (1996) observed the misuse and abuse of sacred values for market benefit and entertainment purposes are more likely to occur at atrocity site than at other heritage sites. Moreover, as Stone (2009,a) states, the rights of those whose death is commoditised or commercialised through dark tourism represent an important ethical and moral dimension, which deserves depth consideration. However, although this may be the case, it actually varies depending on the sh

Sunday, January 19, 2020

Temporary Assistance to Needy Families (TANF) and Teen Parents Essay ex

Temporary Assistance to Needy Families (TANF) and Tenn Parents The American Public never loved social welfare programs, but it did not necessarily want them dismantled. In fact, by the early 1990s, nearly 50 percent of all households drew on government benefits from Food stamps to social security to mortgage interest tax deductions. To convince the public that it stood to gain from smaller government and weaker social programs, the reformers had to undermine the longstanding belief that government should play a large role in society. Abramovitz (1996) suggest that Civil rights gains were called reverse discrimination and the victories of the women’s and gay rights movement were seen as a threat to â€Å"family values.† Having set the stage, the welfare reformers began the attack on the welfare state by targeting AFDC, the most vulnerable and least popular welfare program. Drawing on social science theories that blamed poverty on the values and behavior of the poor, the reformers put forward the belief that social problems stemmed from a â€Å"culture of poverty† that promoted â€Å"defective† values and â€Å"deviant† behavior. In 1996, Congress passed and the President signed the Personal Responsibility and Work Opportunity Reconciliation Act (P.L. 104-93). It combined AFDC (Aid to Families w/Dependent Children) JOBS, and Emergency Assistance into block grants of single capped entitlement to states and placed federal childcare funding into a separate block grant for Temporary Assistance to Needy Families (TANF). The new federal law known as TANF was implemented in most states within the year. Reflecting the â€Å"work first† approach, TANF placed a lifetime limit of five years on welfare eligibility. The new approach to welfare... ...Philadelphia, PA- Manlove, J. (1998) The influence of high school drop out and school disengagement on the risk of school age pregnancy, Journal of Research on Adolescence, 8, 182-185 Mathews M. & Shelly, S. (1999) Turned away misinformed, and denied; Teen parents experience in the welfare office. Youth law News, July, August 1999 Roseman, E. & Yoshikawa, H. (1999) Effects of welfare reform on children of adolescent mother, moderation by maternal depression, father involvement and grandmother involvement Women and Health 32, June 1999. Vallerand R., Fortier M. & Guay F. (2000) School motivation for teens. Journal of Education Today, December 2000 Werthmeier, R. (1998). Childbearing by teens; Links to welfare reform. The Urban Institute, Fall Report, 1998 Zonker, L., (1997) Teenage pregnancy; Situation and strategies. The Florida Nurse, June, 1997

Saturday, January 11, 2020

E.J. Computers Case Essay

Introduction The company I am going to be doing my project on is a small firm named E.J Computers. The company have been around for about a year and a half now and have 3 staff. It’s run from a small shop, which they have just recently moved to and they are slowly expanding. Therefore I am going to introduce an Access database to help make the job of keeping the accounts work easier. Statement of problem The problem at the moment is that the company is currently using a paper-based way of doing their accounts. This way is still quite common, but it makes more work for the end-user, as he usually has to go rummaging through bits of paper and filing cabinets etc. Also a problem with doing it this way is that bits of paper etc could go missing and the data would be lost. Its slower, takes up more room and looks unprofessional. I am going to be creating a database for a computer store that sells various things, from computer parts and accessories to fully working systems. The database will consist of many tables, including ones for customer details, products, delivery etc. I will be making the database a relational database so that the tables will interact and it will make it much more easier for the end user to be able to do or get to what they want. A computer database will be a lot safer to keep the records on. If they desire the end user could use some form of data protection so that he viewing of the records are not accessible for anybody (by either pass wording it etc). This way is a lot faster, less hassle, takes up less space and I think it looks more professional. So I am going to be creating a database, which will meet all of these needs. My initial idea is to create a database consisting of 4 tables, one for the customer details, one for the components, one for the ready built computer systems, and one for the orders. Results from questionnaire I wrote a questionnaire, and took it to my end user so that he could fill it in. I got it back, and now I can use the information that he provided to enable me to design my database to suit his needs. Basically he has the appropriate equipment that is required for him to be able to use the database and he also has the knowledge. From the feedback that I got, he basically has left me to my own device on the formatting side, which is good because I can use my imagination a bit and hopefully make a good design. The end user has also said that he would also like a password on the database for data protection. This ensures that the confidential data of his customers remains confidential. He also said that he would like his database to consist of 4 tables, one for customer details, two for product details, and one for order details etc. Information about end user’s computer Fortunately, the end user already has a suitable computer system to enable him to use the database. The current system is an AMD Athlon 1500+ 512mb DDR pc2700 RAM, 40GB HDD, 40x CD re-writer, 3 1/2 † Floppy disk, 17†³ CRT Monitor. He also has sufficient software, which is a bonus. Is current operating system is Windows XP professional and he also has office 2000. Description of the previous system Input of the previous system At the moment the whole system is paper based. If a customer purchases an item, their details are written down on a little white card, this includes their name, address, telephone number etc and then it is stored into a filing case. Eddie then has to write out a receipt by hand and issue it to the customer. If a customer requires delivery, there is an extra fee for postage and packaging and their information gets put into a separate file where at the end of the day it will be processed. Process of the previous system After the information is collected it is left. Hey don’t use it for anything else like advertising or sending special offers. It is just stored in a cupboard and every time a customer phones up or comes into the store and purchases a product it is taken back out and another card is filled in. Output of the previous system Again, the information is not used for output at all, the do not send special offers or print receipts. The receipts are all manually drawn up and written out. All products are paid for up front; no credit is given so there are no fines and no need to use the data for output. Method used for the previous system Data Flow Diagram of the previous system Problems with previous System Main problems with the previous system Problem Solution Time consuming Database will be easy and quick to access and use. Storage All data will be stored on the computer and will be easily accessible and found. Untidy work area Database will be on a computer, which will be neatly stored on the desk. Untidy work All work will be word-processed, therefore the data will all be neat and easy to read. Unsafe Data The database will be pass worded so that no unauthorised access will be possible Requirements of the new system Objectives of the new system Using access 2000 I will be creating a database for the company, this will make the system a lot better for my end user. To enable me to get an idea if what my end user actually wants he has filled in a questionnaire for me. This should help me understand fully what the end-user wants. My database will consist of four tables, each table representing different parts of the company. The first table will be a table for the customer’s details, it will store the details of every customer that comes into the shop and purchases an item. It will store their name, address, telephone number and each one will have their own unique customer ID number. This information can then be used for any marketing schemes that my end-user comes up with and the data will be handy at all times. My second table will contain information about the components that are available for the customers to purchase. It will consist of a list of the products that the shop has on sale and the type of that product. It will have the price, the amount that the business has in stock and a short description. The third table will consist of a list of pre-built fully working systems that are on sale; it will have a field for system ID, the price, number in stock, and a specification of each computer system. I will then have a fourth table consisting of information of the orders that have been placed, it will have the customers ID, the ID of the product that they have ordered, how much it will cost, and whether or not it need to be delivered. How the objectives will be fulfilled Description of the new system Input of the new system As I said above I will be putting the customer and product information details into the database using a mouse and a keyboard. I will be using a mouse to select to appropriate options and applications. I will also be using a VDU so I can actually see the information that I will be putting into the system. Process of the new system The process of the system is going to be pretty simple, I spoke with my end-use and we decided that I will make queries and sorts for the tables so that the information is easier to find and get hold of. We decided that it would be a good idea if I also include a mail merged letter so that things do not have to be written time after time. Output of the new system My end user has out the point across, that the output of the system is not really as vital as the input. The main purpose of creating this database is so that the details are stored safely on the computer. However a printer will probably be needed for the purpose of printing out records, and letters etc. This is not a permanent thing and maybe things will change later but for now this would be the only output. Performance criteria and limitations of the proposed system Qualitative My database solution will enable the end user to be able to sort the customers surnames into alphabetical so that it makes it easier for the end user to be able to find a customers records. My end user will also be able to sort the prices of everything that he sells into price order (for example cheapest to most expensive). This will make it easier for the end user, so that if he gets a customer asking about certain products that are on sale he can easily do a quick sort and be able to tell the customer. Quantitative With the solution I have made my end-user will be able to find the following: * Begin using the database within 30 seconds of opening it. * Find a customer using name or ID within 15 seconds. * Find a certain product with information within 20 seconds. * Find out if there re any deliveries that need to be made within 20 seconds. System flow chart Software and Hardware considerations Hardware The hardware that I will be using to create my database is as follows: Computer system: 1.0Gghz Celeron Processor 256mb SD RAM 20gb HDD Internal AGP SiS 8.0mb GFX card 15†³ Cathode Ray Tube (CRT) monitor – Sufficient size display so I can easily see what I am doing. Keyboard – Standard RM keyboard enabling me to get the job done. Mouse – 3 button Key Mouse to make selecting options easier. Laser Printer – Printout copies of the work I am doing to take to my end-user to make sure it suits his needs accordingly. Some of my project will have to be completed at home in my own time on my own computer; my own computer consists of: AMD Athlon XP 1700+ 768mb DDR PC2700 RAM 40gb HDD NVIDIA Geforce4Ti 4800 SE Creative Sound Blaster 5.1 Microsoft Intellimouse Explorer 3.0 Optical (USB) Logitech Internet Navigator(tm) Keyboard Special Edition – Black Software The software that I will be using to create my database is as follows: Microsoft Windows 98 SE Operating System Microsoft Windows NT Network Microsoft Office 2000: Word Access – Mainly using access because it enables me to perform complex searches, have a splash screen and create an advanced database system. Excel FrontPage Outlook The software that I have on my computer at home, which will allow me to be able to design the database, is: Microsoft windows XP professional corporate edition Microsoft Office XP: Word Access Excel FrontPage Outlook Data security of the new system Use of passwords I am going to be using a password for my database, as my end user has requested it. My end – user will need a password, to ensure customer confidentiality. The password will be a word requested by the end user and only he and his staff will have access to the password and therefore the database. I have suggested that my end user should change his password on a regular basis, to ensure that if the password is found out it will get changed again. This makes the whole system more secure. Also, to make sure that the system does not get infected by viruses I have also suggested that the end – user invest in some form of anti – virus software. The software I have suggested is Norton Anti – Virus 2003 but it is down to the end – users discretion whether or not he goes ahead with it. Differences and similarities between the current system and the proposed ICT solution Similarities There are not many similarities between the two systems, as the general idea was to change the system to make it a lot better. However there is one similarity between the two systems, the same information is entered into the database as is entered onto cards. This is only a small similarity, as the whole process is completely different now. Specification – Design Possible solutions There were a few other possible solutions to my end-users problem; I came up with a number of alternatives but the database solution just seemed to stand out as being the best. The other solutions that I came up with which were taken into consideration by my end-user were as follows: * Swap the cards for sheets of paper, which could be stored in folder or filing cabinet. We decided that this would not be such a could idea, because its not really much of an improvement and my end-user needs a big improvement. * A spreadsheet using Microsoft Excel. We also decided against because is not a very efficient programme for the type of thing my end-user wants. You cannot perform clear searches or have different tables etc. * A table using Microsoft word. Again, we decided not to use word plainly because this programme is too simple and basic. It does not really include many advanced features like searches and the information cannot be stored neatly, which makes the information difficult to access. Reasons and justifications for final choice of software and hardware We eventually decided to go with the database using Microsoft Access, because overall we thought it was the best piece of software to use. A few of the reasons why we chose Microsoft Access are: * You can perform searches and queries * Data is easily accessed * Modern * You can create tables which are linked together * Create mail merged letters * Password In my hardware section I have already specified what I will be using for hardware. This specification of hardware is suitable for me to create the database because it offers enough speed and memory (both virtual and physical) to enable to be able to work efficiently. This is because the bigger the processor the bigger amount of RAM, all makes the computer a lot faster. Outputs required by the end user The outputs that are required by my end-user are: * Invoices – So that the customer has a proof of purchases. * Splash Screen – This is to improve the presentation of the database and to put information about the creator on. * Reports – To enable the end user to print out hard copies of queries etc * Mail-merged letters – So that the end user can automatically contact customers. Inputs and stored data needed to create the outputs Output What is required? Invoices Customer information, product information and details of purchase (date etc) Splash Screen My 1337 skillz Reports Results from queries from all 4 of my tables will be shown to make the reports, which will then be printed off so that the user has a hard copy Mail merged Letters Customer’s details, which can be automatically accessed. Processes that are required to produce the required outputs Knowledge and ability to use advanced package features Relationships The database that I will be creating will be a â€Å"many-to-many†. I will be in the form of first form normalisation. I will have four different tables, each having its own primary key that will be referentially integrated to a linking table, to make sure all the tables stay up to date.

Friday, January 3, 2020

The Issue Of Bullying At School - 951 Words

In this week assignment I am going to describe an issue that I passionate about it. Bully is an issue that destroys a family specialist the kid involve in the situation. Those children can experience negative physical, school, and mental health issues. Kids who are bullied are more likely to experience. Depression and anxiety, increased feelings of sadness and loneliness, changes in sleep and eating patterns, and loss of interest in activities they used to enjoy. These issues may persist into adulthood. Three actions that I would take to address the issue with bullying at school and the challenges I might encounter taking the action to address each and achieve my goals. The issue of bullying at school is one of the issues I passionate person because I have the experience three years ago with my own son. I think that s something that help to recognize that something was not right with my son s was seeing him getting isolating himself in his room after school and himself too sensitive and he use to cry for everything and anything into my son feel comfortable to share with me what he was experiencing at school being bullied and being physically abused by one his classmates. The first thing I did as a parents remind me son that he was not alone and he has a hundred percent of support his family, then I went to school and requested a meeting with the teacher and principal and the parent of other children because to me was going to be the last time I will have a typeShow MoreRelatedEssay on Bullying: a Social Issue That the School System Ignores2921 Words   |  12 PagesRunning Head: BULLYING Bullying: A Social Issue That the School System Ignores â€Å"Never be bullied into silence. Never allow yourself to be made a victim. Accept no ones definition of your life, but define yourself†. – Harvey S. Firestone The Issue Strong, influential and cruel are just some of the words that come to mind when you hear the word bully. In American culture, bullying among children and teenagers has often been dismissed as a normal part of growing up. Little attentionRead MoreThe Social Issues Affecting Our Children1304 Words   |  6 PagesTopic One of the top social issues affecting our children in schools is bullying. In recent reports, one out of every four students reports being bullied during school (National Center for Education Statistics, 2015). Bullying is very important to me because I have been bullied through my schooling career. I remember how it was not only the bullies that made my time in elementary hard but also the bystanders that did nothing to stop them or stand up for me. This issue has definitely gotten more attentionRead MoreBullying And Its Effect On Society1633 Words   |  7 Pagesthe familiar conviction of bullying. Bullying has been entrenched in American society as a relevant issue for quite some time. The word â€Å"bully† derives back from as far as the 1530’s. In 1838, the novel, Oliver Twist, exhibited the first use of bullying within literary work. Years later, in 1862, the first account of bullying was reported. Over one hundred years following this, the first proposition of an anti-bullying law was constructed. As time has persisted, the issue has began to proliterate,Read MoreBullying : A Social Issue1284 Words   |  6 PagesBULLYING: A SOCIAL ISSUE 2 Abstract Bullying is an issue that has been overlooked for many years because of students being frightened to tell that they are being bullied. Many teachers, administrators, and school counselors underestimate the amount of bullying that takes place within schools. The behavior of bullying has impacted so many students’ lives to the point of causing a student to want to cause harm to his or her self or others. Many students that bully threaten theirRead MoreBullying: Have Schools Really Found A Solution? Essay795 Words   |  4 PagesBullying remains a progressively notorious topic due to the unbiased choice of victims and death-related incidents. In particular, schools have become a predominantly natural location for bullies to prey on victims, but schools have finally started to respond to this epidemic issue. Schools have initiated anti-bullying programs to, if not stop bullying as a whole, at least, reduce bullying to a minimum; however, even with anti-bullying programs in eff ect, the bullying dilemma still continues, whichRead MoreThe Effects Of Bullying On Children s Learning And Development Essay1587 Words   |  7 PagesIntroduction Bullying in Australian primary schools has become an epidemic, having a negative effect on children’s learning and development (Lodge, 2014). Therefore, it is crucial that schools and teachers are aware, understand and educated on how bullying can impact children’s learning and development; to be able to effectively implement policies, respond, educate and eliminate bullying in the school environment. The purpose of this report is to highlight how bullying is a growing issue that affectsRead MoreThe Issue Of Bullying And Bullying1401 Words   |  6 PagesGOVT 2305 4 Nov. 2014 The Issue of Bullying Did you know each year there are over 3.2 million students that are bullied? (11 Facts About Bullying ) Bullying has been a fundamental human demobilizing act for centuries; that has been woven into the crevices of non-physical cruelty and abuse. A simple meaning of bullying is the need for control. (contributors) It has always involved power, pain, persistence and premeditation. Emily Bazelon wrote an article, defining bullying as physical or verbal abuseRead MoreThe Long-Term Effects of Bullying Essay1409 Words   |  6 PagesIntroduction There are several ongoing of issues that are effecting adolescents in today’s society ranging from low self-esteem, teen pregnancy, and obesity. Also, amongst these issues are the growing concerns and effects of bullying. Its epidemic is also starting to become closely related to the growing numbers of suicide rates amongst adolescents within the United States and across the globe. However, there are several adults that may take bullying lightly thinking that it is just a part of kidsRead MoreA Treatment of Solutions to Bullying in Schools Essay1177 Words   |  5 PagesBullying has always been present within the United States. Although the issue has been around for a long time, it continues to grow and become more of problem. It is said that about 160,000 children within the United States are refusing to go to school because of bullying. Another statistic is that within American schools alone, there are an estimated 2.1 billion bullies and 2.7 billion victims (Dan Olewus, MB NBD). The numbers presented here are outrageous and although there are organizations toRead MoreCyberbullying: The New Form Of Bullying. When Sending Our1661 Words   |  7 PagesCyberbullying: The New Form of Bullying When sending our children to school we expect them to be able to learn without distractions, but bullying makes that impossible. Bullying has been recognized as a problem for school children globally. In fact, school bullying has proven to be a risk factor for suicide, which has been identified as one of the top causes of death among teens (Erick Messias, 2014). Now that bullying and its importance has been acknowledged as a critical concern, several prevention