Featured Post

Introduction To Psychology Essay

Sylvia is 28 years of age, housewife bringing up two little kids with her better half, who voyages every now and again for his work. Sylvia ...

Sunday, January 26, 2020

The Business Transformations Organizational Context Information Technology Essay

The Business Transformations Organizational Context Information Technology Essay Business Transformation, in an organizational context, is a process of profound and radical change, focussing an organization on a new direction and taking it to a new level of effectiveness. Transformation implies a basic change of character and little or no resemblance to the past configuration or structure (www.businessdictionary.com, 2010a). IT enabled business transformation is the use of technology in order to fundamentally alter the way business is carried out within an industry and organizations implementing these changes can competitive advantages (Rau, 2006). Information Systems enabling business transformation has evolved greatly over time. The early 70s saw data being centralized and systems linked to a very few business functions and the operations of the bulky main frames. The 80s saw the installation of PCs and LANs and departments set up computer systems, using end-user computing with word processors and spreadsheets making departments less dependent on the IT department. The main focus was central control and corporate learning. The 90s Wide Area Networks became corporate standards with senior management looking for system and data integration. Main focus was central and corporate learning. The millennium brought with it Wide Area Network expansion through the internet to include global enterprises and business partners supply chain and distribution. Senior management look for data sharing while the main focus is on attaining efficiencies and speed in inventory, manufacturing and distribution. (University of Wisconsin Oshkosh, n.d ). The roles and responsibilities of the CIO are ever evolving. Ross and Fenny (1999) highlight the varied roles of the CIO during three eras; mainframe era (1960s 1980s), distributed era (late 1970s onwards) and the web-based era (mostly mid 1990s onwards). The mainframe era CIO was is most cases a Data Processing/Information Systems manager. The key tasks demanded were to deploy new systems to time and budget, and ensuring systems reliability during operations. The distributed era saw the CIO hit turbulent times. CIOs had to learn and master multiple roles in order to survive and prosper. The four main roles of the CIO were Organizational Designer, Technology Advisor, Technology Architect and Informed Buyer. During the web based era, the evolving CIO focuses on business change through new business models, management processes etc. The CIO also argues for greater measure of central coordination and also work with executive colleagues to improve leverage so as to fulfil the need for st rategically aligning operations to IT in a bid to attain higher levels of efficiency and competitive advantage. Lanka Bell is the second largest fixed line telecommunications operator in Sri Lanka with over 1.2 million CDMA and fixed wired lines. It is also the ISP with the largest international backbone in Sri Lanka. Lanka Bell was established in 1997 and was later acquired by Milford Holdings (Pvt) Ltd, a subsidiary of the Distilleries Company of Sri Lanka (DCSL) in 2005. Under new management, Lanka Bell was the first Operator to introduce CDMA into the Sri Lankan market and is presently has the largest CDMA customer base of more than 1.2 million subscribers. In 2008, Lanka Bell invested US $27 million to link Sri Lanka to the Falcon section of the FLAG fibre optic undersea cable, which is owned by Indias Reliance Communications and has more than 87 points of presence (POPs) worldwide. Lanka Bell is the Sri Lankan operator with the largest international backbone capacity. Further, the Lanka Bell team more than quadrupled from about 350 employees in 2005 to about 1500 today. Lanka Bell curren tly has 65 branch offices, and also strategic ties to Abans, Softlogic, Arpico Shopping Malls and multiple banks in easing the obtaining of services and the settlement of bills. In mid 2008, Lanka Bell was the first Sri Lankan operator to commercially launch WiMAX operations. WiMAX is currently being deployed island wide in the provision of data and voice solutions. The WiMAX network enables the coupling of voice and data solutions including Broadband, Leased Lines and VPNs. It also provides for a centralized monitoring and fault locating. WiMAX is one of the most recent technologies to hit the telecom industry in the provision of high speed data, voice and streaming media. Lanka Bell is just 13 years old and as Sri Lanka is a developing country, it cannot be assumed that Sri Lanka has the infrastructure and know-how currently available in more developed nations. In place of a CIO, Lanka Bell has an individual with the designation of General Manager IT. Presently Lanka Bell is upgrading IT/IS infrastructure and data and voice networks to support future expansion and create efficiency. The IT/IS division has presently taken over the IT/IS operations of 16 companies coming under the parent DCSL group and manages all technology related issues. This provides for improved efficiency and significant cost savings on man power and other resources. Further, Lanka Bell is testing the use of HP Blade Servers in collaboration with DMS Electronics (Private) Limited. The Blade systems are state of the art new server systems which support for advanced data processing, storage and redundancy option through SAN (Storage Area Network). These Blade systems consume less po wer, less space and support virtualization, which will enable multiple servers to be installed and managed on one system, which is the technology of tomorrow. The positive outcomes of this could be newer, faster and reliable systems supporting centralized storage and management and thus lowering the overall hardware costs, power costs, maintenance cost and labour costs etc. Tests are also being carried out on mobile CDMA. This technology has already established infrastructure and the company may have a considerable income if the system could be implemented. The organization also conducts tests on the WiMAX network with multiple vendors, testing inter vendor compatibility and the overcoming of identified issues etc. These experiments are being conducted to enable reduction of costs of operation and to also provide a wider range of products and services to customers at more competitive rates. The role played by IS/IT in the telecom industry worldwide is immense. Cansfield (2008) states à ¢Ã¢â€š ¬Ã‚ ¦value in telecoms is created by the IT systems that create the services that run on the network and are purchased by customers. Cansfield (2008) further states à ¢Ã¢â€š ¬Ã‚ ¦the performance of the IT systems should be placed under as much scrutiny as the balance sheet. As mentioned in the above paragraphs, it can be seen that IS/IT enabled business transformation is a continuous process and as change occurs, so does the role of the CIO have to evolve. It can be understood from the overview of Lanka Bell that as the company enforces changes to business strategy, it needs the IS/IT strategy to evolve too. For these changes to occur smoothly, the CIO should be able to evolve to match the situational requirements. Literature mostly covers the two areas of IS/IT enabled business transformation and the evolving role of CIOs as separate areas of study; neither providing sufficient comparisons nor emphasizing the relationship existent. Based on initial studies, congruency between the evolving role of the CIO and IS/IT enabled business transformation can be noted. This research is conducted so as to identify how the evolution of IS/IT enabled business transformation influences the change in the roles of CIOs and also to formulate guidelines and recommendations to Lanka Bell. These guidelines and recommendations are intended to assist the top level management match the changes in business environment with the level of IS/IT enabled business transformations and provide a clearer view for the CIO to conduct operations. 6.0 Literature Review: IT enabled business transformation has many definitions by different academia. Rau (2006) defines IT enabled business transformation as the use of technology in order to fundamentally alter the way business is carried out within an industry and organizations implementing these changes can competitive advantages. Oestreich (2009) says of IT enabled business transformation that it is the integration of all activities and functions along business processes into a single process agile value chain. Similarly, Markus and Benjamin (1997) also view the transformation as a business process that crosses several functional lines. In studying the above definitions, it can be summarized that Rau (2006) views IT enabled transformation as the use of technology in attaining competitive advantages, while Oestreich (2009) views it as the integration of processes. Markus and Benjamin (1997) view is integration across functions. Based on the above, a definition can be formed where IT enabled transformat ion is the use of technology to attain competitive advantages by integrating processes across functional lines. Ever since the commercialization of computers in the late 1950s, IT has been an enabler to business transformation. Ross and Fenny (1999) differentiate the levels of IS utilization during three eras. The mainframe era commenced with the automation of clerical tasks and overtime developed transaction processing capabilities. It was during this stage that Electronic Data Processing was initiated in the accounting function. In good time, firms began automating other functions until mainframe computing affected the organizational activities or most large organization. The distributed era commenced with the development of business applications for mini computers and personal computers and typically targeting needs of knowledge workers. This initially resulted in islands of computing within organizations. IT was increasingly perceived as a tool for cross-functional integration and collaboration. It was at this stage that certain companies took IT as a competitive weapon and strove to innov ate along the supply and distribution chains. Further changes evident were globalization and business process re-engineering. Towards the end of the era, ERP systems emerged and they seamlessly integrated all required transaction processing within a distributed network. Organizations invested huge sums in ERP development. The web-based era brought with it the development of the internet, extranet an intranet based applications for business. Organizations began to realize they could offer low cost value-added services via the web. Intranet applications linking the organization provide for data sharing and business process standardization. Knowledge management is a key development of the web-based era. Extranet applications have also developed to link an organization with multiple partners in supply, distribution, manufacturing etc. Rouse (2005) states in the late 1950s and early 1960s, a whole new segment of interactive computing emerged. In the late 1960s, Digital Equipment Corporat ion (DEC) minicomputers dominated the interactive computing market while in the mid 1980s, Apple came out with the Macintosh, which became the industry standard in the sense of its features and benefits. He further states that most of todays attention has been dominated by the internet. The process of transformation in itself is of complex nature and many academics have suggested models. Venkatraman (1994) provides a framework based on two dimensions: the potential IT benefit range and degree of organizational transformation, and states the benefits from deployment of IT are marginal if superimposed on existing organizational conditions. In cases where investments in IT functionality are complimented by organizational changes in characteristics, benefits accrue. A diagram of the model is given below: Source: Venkatraman (1994) Ventakraman (1994) further describes the distinctive characteristics of each stage: Localized Exploitation covers the leveraging of IT functionality to redesign focused, high-value areas of business operation. Internal Integration covers the leveraging of IT capability to create a seamless organization process reflecting both technical interconnectivity and organizational interdependence. Business Process Redesign addresses redesigning the key processes to derive organizational capabilities for competing in the future as opposed to simply rectifying current weaknesses; use IT capability as an enabler for future organizational capability. Business Network Redesign is articulating the strategic logic to leverage related participants in the business network to provide products and services in the marketplace; exploiting IT functionality for learning from the extended network as well as for coordination and control. Business Scope Redefinition is the redefining of the corporate scope that is enabled and facilitated by IT functionality. Venkatraman (1994) conclusively states that, successful companies will be differentiated by their ability to visualize the logic of the new business world and leverage IT to create an appropriate organizational arrangement internal and external to support business logic. The transformation trajectory is a moving target, shaped by fundamental changes in the competitive business world. Managements challenge is to continually adapt the organization and technological capabilities to be in dynamic alignment with the chosen business vision. Rouse (2006) in his book provides a broad systems-oriented view of transformation and a theoretical view on the forces that prompt transformation and the nature of how it is pursued. He also addresses the issue of transformational leadership and organizational and cultural change. Towards the end, he provides a collection of transformational case studies. Perumal and Pandey (2008) define the process of transformation as, a drastic change in the way of running a business. This change may span across processes, people, technology, policies, vision or any other business component, and has a direction for meeting a specific business goal. They provide a table containing the stages of the transformation process and further state that any business transformation impacts in one or more of the following ways; workforce culture becomes manageable, processes become efficient, automation of manual activities, business rules are altered, strategy gains direction. The following is an illustration of the various transformational process stages: In analysing the above paragraphs, it can be noted that Ventakraman (1994) defines the stages or levels of transformation based on two variables; the range of potential benefits and the degree of organizational transformation. An organization can map itself into one of the five stages, given it matches the required criteria. Perumal and Pandey (2008) state transformation spans across processes, people, technology, policies, vision or any other business component, and has a direction for meeting a specific business goal and provide seven stages for transformation. Each stage has sub-steps and if conducted in the correct manner, each element of business gets favourably transformed during the process. The Booz Allen Hamilton (2010) transformation life cycle defines five stages for transformation. It also defines the key enablers to successful transformation which are people, process, technology and physical infrastructure. The model also illustrates the process areas of capability devel opment, ownership building and program stewardship, each are related collectively performed sub processes to achieve a set of predefined goals. In analysing the above paragraphs, Feldhues (2006) presents the Gottschalk set of CIO Leadership Roles. These nine roles described can be applied to a CIO and also to the role expected of a CIO. Furthermore, Edwards et al. (2009) presents five types of present day CIOs and describes them against six criteria he has defined. Also, Kaufeld et al. (2000) provide Charis extended IT Leadership Growth model in emphasizing the role of IS/IT management. This model divides the IS/IT leadership into a four stage process where, when the leadership evolves, the characteristics of the previous stages are included in the new stage, thus improving and increasing competencies and abilities. Lanka Bell was incorporated in 1997 and since inception has been a key player in the telecom and Internet Service Provider (ISP) industry in Sri Lanka. Lanka Bell commenced with around 300 members of staff and very limited technology and systems. Most of the processes at inception had a lot of manual processing involved as they were only partially automated. As operations progressed, the influence of IS/IT upon operations increased. IS/IT was always a part of the business as the telecommunication industry is very dependent on IS/IT systems (Cansfield, 2008). The hierarchy of IT leadership at Lanka Bell also evolved over time with new designations being created and others removed. Currently, the role of the CIO at Lanka Bell is played by the General Manager IT. In 2005, as Lanka Bell saw a new management takeover, the strategic importance of IS/IT and the need for good leadership was recognized. Research can be classified as primary and secondary research. Primary research refers to the researcher collecting his/her own data rather than depending solely on published literature while secondary research refers to the researcher seeking out literature from a number of sources including journals, books conference proceedings etc with a view to show he/she is well read in the area (Biggam, 2008). Further to the above, research methods in general can be classified as action research, experimental research, case study approach, computing research are some examples. The Lecture notes (2010) mention Kock (1997) describes action research as research where the researchers aim is to directly improve the organization studied while also generating scientific knowledge, while Oates (2006) describes experimental research as a strategy investigating cause and effect relationships and seeking to prove or disprove the relationship between a factor and an observed outcome. It also mentions of Yins (2003) description of the case study approach as an empirical study investigating in real life context, even when boundaries are not clearly evident. Computing research is mentioned as being composed of eight major approaches (Galliers, 1992). Dr. Bandu Ranasinghe

Saturday, January 18, 2020

Macbeth Paper Noble Deterioration Essay

In Shakespeare’s play Macbeth, the protagonist undergoes a profound and gradual evolution throughout the play, for the worse. Macbeth decays from a noble soldier, and a truly great man, into a corrupt king whose senseless actions result in his mental deterioration. Macbeth’s mind set is mostly stable in the early stages of the play, until he regresses him into an uneasy character, and finally devolves into such a corrupt state that his life is ended and falls to pieces even before he even meets his death. Macbeth expresses high signs of a heroic character in the early stages of the play. Captain says: For brave Macbeth (well he deserves that name),/ Disdaining Fortune, with his brandished steel,/ Which smoked with bloody execution,/ Like valor’s minion, carved out his passage/ Till he faced the slave;/ Which ne’er shook hands, nor bade farewell to him,/ Till he unseamed him from the nave to th’ chops,/ And fixed his head upon our battlements.† and expresses Macbeth’s high levels of nobility(I.ii.18-25). The mental state of Macbeth at this point is still very stable and displays the strength of the principal character. Macbeth’s mental stability is not only represented by his loyalty, but also by his steadiness and ability to analyze situations. He communicates his mind state to the reader by saying, â€Å"The Prince of Cumberland! That is a step/ On which I must fall down or else o’erleap,/ For in my way it lies. Stars, hide your fires;/ Let no light see my black and deep desires./ The eye wink at the hand, yet let that be/ Which of the eye fears, when it is done, to see†(I.iv.55-60). The decisiveness and precise mindset Macbeth has is more evidence to support the fact that Macbeth changed from a stable character in the beginning of the play. Granted, he thought about how to deal with Dunkin, he still thought to himself clearly and think realistically as to his possible solutions at hand. Towards the middle of the play, Macbeth shows strong signs of mental deterioration. Macbeth displays his true signs of his deterioration through his soliloquys and is clearly shown when he says, â€Å"Is this a dagger/ that summons thee to heaven or hell†(II.i.44-77). The soliloquy exposes the decline of Macbeth’s mental state as he hallucinates the dagger telling him to kill Duncan. After Macbeth does kill Dunkin, he says, â€Å"Methought I heard a voice cry ‘Sleep no more!/ Macbeth does murder sleep’- the innocent sleep,/ Sleep that knits up the raveled sleep of care,/ The death of each days life, sore labor’s bath,/ Balm of hurt minds, great nature’s second course,/ Chief nourisher in life’s feast†(II.ii.47-52). This shows his extreme feelings of guilt, directly resulting from the murder he committed. The guilt plays an immense role in Macbeth’s decay because he cannot take his murders back at any point and causes his loss of sensibility. He speaks on the impact it leaves on him by saying, â€Å"How is ‘t with me when every noise appalls me?/ What hands are here! Ha, they pluck out mine eyes./ Will all great Neptune’s ocean wash this blood/ Clean from my hand? No, this my hand will rather/ The multitudinous cease incarnadine,/ Making the green one red†(II.ii.76-81). Macbeth feels that nothing in this world can rid him of his guilt and/or anxiety. The reader can see that Macbeth has even deeper signs of guilt when Lady Macbeth says to her guests at Banquo’s Banquet, â€Å"Sit, worthy friends. My lord is often thus/ And hath been from his youth. Pray you, keep seat./ The fit is momentary; upon a thought/ He will again be well. If much you note him/ You shall offend him and extend his passion./ Feed and regard him not./ Are you a man?†(III.iv.64-70). Macbeth’s guilt has worsened his mental state so immensely, that he sees a ghost of Banquo and Lady Macbeth has to cover up for his awkward behavior in front of their guests. Due to the overwhelming amount of guilt Macbeth is feeling, his mental state takes the blunt force and drastically declines, resulting in hallucinations and abnormal behavior. By the end of the play, Macbeth is locked into and irreversible decay and ends up as an unrecognizable person in contrast to his origins. Macbeth’s final stage of decay involved his lack of emotion and loss of honorability. Malcolm exclaims, â€Å"I grant him bloody,/ Luxurious, avaricious, false, deceitful,/ Sudden, malicious, smacking of every sin/ That has a name†(IV.iii.70-73). This blatantly reveals the kingdoms feeling towards Macbeth’s corrupted character and the man he has come to be. The mental deterioration is not only evident in his decisions, but also in his emotions. Macbeth has a serious lack of emotion by his final corrupted state and shows almost no emotion when he finds out his wife is dead, as seen by the quote, â€Å"She should have died hereafter./ There would have been time for such a word†(V.v.20-21). He lacks the passion he felt for his wife in the earlier stages of the play. The decay of Macbeth causes him to lose his followers and kinsmen as well. Malcolm makes his opinion clear by saying, â€Å"But Macbeth is./ A good and virtuous nature may recoil/ In an imperial charge. But I shall crave your pardon,† and makes it very clear that he feels Macbeth has been a good man until he changed for the worse(IV.iii.22-25). Macbeth’s final deterioration state, that proved he changed from a valiant soldier to a corrupt king throughout his mental decay, is obvious to the reader by his massive character change in an opposition to his origi nal role. It is easily seen that Macbeth goes through an extreme mental deterioration throughout the course of the play. Macbeth decays from a noble soldier, and a truly great man, into a corrupt king whose senseless actions expose his mental deterioration. In the beginning of his nobility, Macbeth is an honest and stable man, who then regresses into an uneasy and backstabbing deviant, which ultimately leaves him in such a corrupt state that his life is destroyed and set onto a track of demise for him to only be left a slain, foul, tyrant. Works Cited Shakespeare, William. The Tragedy of Hamlet, Prince of Denmark, by William Shakespeare. Edited by Barbara A. Mowat and Paul Werstine. New York, Washington Square Press: n.p., 1992. Print.

Friday, January 10, 2020

Measuring Crime Essay

There are two different instruments used in reporting crime. There are also major crimes reporting program used in the United States. These major crime reporting programs do have a purpose and does give statistical information on crime in the United States. There are a difference between crime rates, arrest rates, clearance rates, and recidivism rates. The information reported about crime rates can be misleading and give inaccurate information about the crime rate in the United States. Crime and recidivism statistics can both give some important about crime in the United States. Instruments used to measure crime There are different ways that crime is reported in the United States. The media reports crime and influence society perception of crime (Schmalleger, 2011). This sometimes causes public opinion on crime unrealistic (Schmalleger, 2011). Statistic data provides a better view on the amount of crime occurring than what is reported by the news media. The statistic reports are not as accurate as society would want, but it still gives a better understanding of the amount of crimes, types of crimes and also the frequency of those crimes than the news media. People who are the victims of a crime are the ones who report the crime and allow the crimes to be placed in a crime database (Schmalleger, 2011). Major crime reporting programs The Uniform Crime Reporting (UCR) and the National Crime Victimization Survey (NCVS) are the two major reporting of crime programs used in reporting crime in the United States (Schmalleger, 2011). Crime is computed by adding the major crimes reported to the police. The police report these crimes to the F.B.I who publishes the findings in the UCR. The UCR provides an annual report of incidents and rate of the reported crime that occurs throughout the United States (Schmalleger, 2011). The UCR program created a crime index to create a comparison over time. The index contains seven major offenses. These offenses are robbery, murder, forcible rape, aggravated assault, burglary, larceny, and motor vehicle theft gives the result of crime based on the population (Schmalleger, 2011). The UCR also reports victimless crimes to the F.B.I. The NCVS is designed to report an estimate occurrence of all crimes in the United States (Schmalleger, 2011). The NCVS shows the amount of different victimized crimes not reported to the law enforcement. NCVS provides information about crimes collected from individuals and households, who have suffered from crimes whether the crimes have been reported or not to authorities (Schmalleger, 2011). Both UCR and NCVS serve the same purpose. This purpose is to report and keep track of the crime reported in the United States each year to law enforcement agencies (Schmalleger, 2011). It is a way of keeping crime statistics so law enforcement agencies can develop ways to manage crime in different areas. These reports also provide the areas where crime rates are higher than other and what type of crimes are high in a certain area. Crime rates, arrest rates, clearance rates, and recidivism rates Crime rates and arrest rates are difficult for a law enforcement agency to produce to the high volume of calls received. Some examples of calls that do not require an arrest include lost pets, individuals needing medical assistance, and noise complaints. Each agency must make an organized effort to make contact with the individuals making the calls with high and low priority due to the unseen or unreported information at the caller’s location. The law enforcement community has also created an organization devoted to crime reports known as the Police Executive Research Forum (PERF) data is based on law enforcement agencies (Schmalleger, F. 2011, p. 3). Clearance rates are defined as cases that have been solved. Many times if an arrest was made then the case has been cleared. Some case are never cleared one example, if an offender commits a murder and he or she is found dead or flees the country before an arrest is made the data does not go into the cleared category. Recidivism rates are directly related to the quality of life after an offender is released from prison. Many offenders repeat crime related offenses due to the addiction of drugs. At times serious pathological offenders create a threat to the community therefore recidivism rates are often used in determining the punishment required for the offender. Myth v. Reality Crime rates can be deceiving according to information form (Criminal Justice Video, 2013). Crime rates are based on different factors including the type of crime, the type of offender, also the place a crime is committed. In late 1990’s property crimes had decreased, today property crimes are suspected to rise due to a slow economy. Another factor leading to the deception of crime rates is based on the type of offender; including the increase of juvenile crime. Also affecting the crime rate according to Criminal Justice Video, (2013) are change in policies and mandatory laws that take effect. Crime rates relate to arrest rates in the fact that both are based on the unit of the population; per 100,000 of the population, Schmalleger, F. (2011). The crime index is a tool used to determine the amount of crime in an area; the index is effective however, it does not provide accurate numbers of crime committed. Updated Uniform Crime Reporting, (UCR) programs can help support the number of crimes committed also helps determine the types of crime. One solution for correlation between crime rates, arrest rates, and clearance rates can be to keep data updated. Updated data is the reporting of all arrests, and criminal behaviors also dropped charges. If data is continually up dated a system can be used to compare information on specific crimes helping to determine different aspects of crimes and arrests. Crime and recidivism statistics Crime rates did increased since the early 1970’s in many major states as the baby boomers became young adults. Most crime are being committed by today’s young males because of the higher population, the best way to eliminate crime is the eliminate poverty, because poverty breeds crime. Crime is very high in African –Americans due to they are unemployed or being a single parent and doing what he/she has to do to survive or provide for their families. The crimes that are committed by the young adults may have been seen as a child while they were growing up or maybe that is what they were taught to do. It is estimated that sociopaths who are prone to commit crimes, because they are incapable of feeling remorse or empathize with other’s pain, comprise about 3-4% of the male population, and between 33% and 80% of chronic criminals offenders. Some females may shoplift to support their drug habit, and this means that everyone is a victim especially their family members. Conclusion Although there may be changes of crime statistics but not changes in the crime rate, crime can be measured in numerous ways because of all of the numerous ways crime can be measured. The National Crime Victimization Survey and Uniform Crime Reports are both reliable systems but still leave the â€Å"dark figure of crime† because of the crimes that go unreported. Reference Criminal Justice Video, (2013). Myth v. Reality. Pearson Custom Publishing Retrieved from: http://media.pearsoncmg.com/pcp/pcp_94869_mutchnick_cj_uop/chapter1/ch1_mvr/index.html Schmalleger, F. (2011). Criminal justice today: An introductory text for the 21st century (11th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

Thursday, January 2, 2020

Punishment And Sentencing Punishment - 1281 Words

Punishment and Sentencing By: Dion Hice Columbia Southern University Professor: Dr. Thomas Kelly Punishment and Sentencing The definition of the word â€Å"sentencing†, is described as a particular process through a sentencing authority, which imposes a lawful punishment, or other type of sanction on a person that has been convicted of violating the criminal law. The definition of the word â€Å"Punishment†, is described as an act of punishing an individual, or a way to punish an individual. Schmalleger, F., Hall, D. (2014). Sentencing Rationales In order to put blame on an individual, or assign a form of punishment. You must first realize the fundamental human qualities. Criminal Law is very rooted and grounded, and there are many psychological principles that play a part in it as well. According to H.L.A. Hart, he has identified five very similar features of criminal punishment, which are different from other sanctions, such as: †¢ Pain must be involved, or any other type of consequence that would be considered uncomfortable, or even unpleasant. †¢ The offense must be against the legal set of rules. †¢ It must be imposed against the offender for the particular offense committed. †¢ Has to be administered by other individuals other than the offender. It has to be imposed and administered by someone of authority from a legal system against the particular crime committed. Five Forms of Sentencing Rational A well favorable term of justice is called â€Å"Just Desserts†.Show MoreRelatedPunishment and Sentencing Paper1278 Words   |  6 PagesPunishment and Sentencing Paper CJA/224 Garrett LeGrange September 17, 2010 There are many different philosophies that are in use in the court systems when determining what sort of punishment will be imposed on someone who is found guilty of committing a crime. These philosophies are in use in both the adult courts and juvenile courts. The juvenile court system is similar to the adult courts, but there are many differences between the two. Both court systems try and keep crime from happeningRead MoreSentencing Of Death And Punishment909 Words   |  4 Pagesinfrequently decrease a death judgement to life without parole. If the jury returns a life verdict, the judge has no power to enforce death. C. The Appeals Process Each felony conviction and resulting punishment can follow an elaborate and every long process of challenges to that conviction and punishment, but comparatively some inmate really exhaust the possibilities. It is usually the death row prisoner (and his or her lawyers) who can be predictable to wring every last drop out of this procedure.Read MoreSentencing And Punishment Of The Legal Law868 Words   |  4 Pages Members of the legal profession are claiming that changes to the availability of legal aid brought about by the introduction of the Legal Aid, Sentencing and Punishment of Offenders Act 2012 could cause harm to the rule of law. The Act it is claimed creates an environment in which those who, without the financial resources to access justice will be denied access to justice. In principle the rule of law is intended to ensure that the law is just, accessible to all and that it is enforceable. Read MoreCapital Punishment Is The Process Of Sentencing One1526 Words   |  7 PagesCapital punishment is the process of sentencing one to death for committing an extreme crime. The death penalty is known to have been used as far back as the Eighteenth Century B.C within the code of Hammurabi also known for the phrase â€Å"an eye for an eye, and a tooth for a tooth†. Capital punishment has evolved and stayed the same in many places around the world, which has been seen as morally wrong in many regions that has created a worldwide argument. While I personally believe that no one in thisRead MoreMandatory Minimum Sentencing Is Cruel And Unusual Punishment1418 Words   |  6 PagesIntroduction The mandatory sentence of two years’ imprisonment is unconstitutional because it is â€Å"cruel and unusual punishment† which infringes upon the accused’s right not to be subjected to such treatment. Firstly, it is determined that the mandatory minimum sentence in this case is grossly disproportionate to the accused’s circumstances and would be reasonably foreseeable that the provision would have the same overreaching effect on other offenders. Secondly, the provision in question in the ControlledRead MoreCapital Punishment Is The Most Severe Form Of All Sentencing2525 Words   |  11 Pages Capital Punishment Directed Research: CCJ 2910 Instructor: Dr. Neal Jaresia Marks 19-NOV-14 Capital punishment is the most severe form of all sentencing. It was first introduced in 1700 B.C. When written under the Code of Hammurabi by the sixth Babylonian king. The laws covered nearly all subjects but is well known for its law stating, â€Å"If a man put out the eye of another man, his eye shall be put out.†(Birth of a, 2012) The death penalty was prescribed for about twenty-fiveRead MoreThe Legal Aid And Sentencing And Punishment Of Offenders Act 2012843 Words   |  4 Pagesjustice through the courts. The discussion will involve establishing the importance of access to legal aid for justice to effectively be accessed by vulnerable citizens. Secondly, there will be a discussion on the impact that the Legal Aid, Sentencing and Punishment of Offenders Act 2012 (hereafter, LASPO Act) has had on access to justice and access to courts for vulnerable citizens. Legal aid is a necessary mechanism to ensure that vulnerable citizens can obtain the necessary legal assi stance for justiceRead MoreThe Sentencing Structure And Texas Capital Punishment Assessment Team Report1328 Words   |  6 PagesThe sentencing structure in Texas is in need of reform within several different areas of the state’s death penalty system. The American Bar Association with their Texas Capital Punishment Assessment Team reports recommendations in regards to the areas that need to be assesse: [(Law Enforcement Identification Procedures, Law Enforcement Interrogation Procedures, Preservation of Biological Evidence, Access to testing Biological Evidence, Crime Laboratories and Medical Examiner Offices, Forensic ScienceRead MoreDo Queensland s Sentencing Laws Focus Too Heavily On Punishment948 Words   |  4 PagesDo Queensland’s sentencing laws focus too heavily on punishment, rather than rehabilitation, of drug offenders? Queensland’s current drug sentencing laws primarily focus on punishment more than rehabilitation. Courts in Queensland have penalties that can be enforced on an offender such as Community Service Order, Fines Restitution, Probation, Intensive Correction Order, Imprisonment and Parole for the use of illegal drugs. The penalties vary according to the type and amount of drug use involvedRead MoreDiscuss Factors That Affect Sentencing Decisions, Including the Purposes of Punishment and the Role of Victims.783 Words   |  4 Pagessentence must coincide with the statutory guidelines e.g that set out in the Crimes (Sentencing Procedure) Act 1999 (NSW), and the judicial guidelines that set precedent for all judges and magistrates in the state. Within this legislation are the purposes for which a sentence may be imposed, types of penalties, minimum/maximum sentences and mandatory sentences. The purposes of sentencing are set out in the Crimes (Sentencing Procedures) Act 1999 (NSW) and fundamentally include deterrence, retribution