Monday, May 25, 2020

No Child Left Behind Act - 1282 Words

would like to start my essay with the following excerpt from the No Child Left Behind Act: Because fewer than 35 percent of fourth graders are proficient readers, No Child Left Behind requires schools to use research-based reading programs: A primary focus of this law is the requirement that school districts and individual schools use effective research-based reading remediation programs so all children are reading at grade level by the end of third grade. The law authorizes funds to provide assistance to State educational agencies and local educational agencies in establishing reading programs for students in kindergarten through grade 3 that are based on scientifically based reading research, to ensure that every student can read at grade level or above no later than the end of grade 3. (20 U.S.C. § 6361) (page 73, Wrightslaw: No Child Left Behind). An evidence-based special education professional practice is a strategy or intervention designed for use by special educators and intended to support the education of individuals with exceptional learning needs. Evidence-based instruction is reliable, trustworthy, and valid record that indicates when that program or set of practices is used; children can be expected to make adequate gains in reading achievement (John Schacter, 2006). Research-based instruction and scientifically based instruction is sometimes used to convey the same meaning. Evidence of the effectiveness of a program or practice should be: †¢Show MoreRelatedNo Child Left Behind Act1621 Words   |  7 Pages The support for the No Child Left Behind Act plummeted down shortly after the act passed. Many people supported the act at first simply because they supported the goals of the act, once they saw the results, their opinions changed. One of the biggest arguments towards No Child Left Behind is that it is unfair. People believed the resources of difference schools were unequal, and thought the Title 1 funding that the schools received should go to ensuring all schools had equal resources. Many peopleRead MoreThe No Child Left Behind Act1670 Words   |  7 Pages Literature Review: Every Student Succeeds Act Suzanne Hatton, BSW, LSW University of Kentucky-SW 630 Abstract This literature review seeks to explore the Every Student Succeeds Act (2015), a bipartisan reauthorization and revision to the No Child Left Behind Act (2002). The Every Student Succeeds Act (ESSA) is the first law passed in fourteen years to address Reneeded changes to the No Child Left Behind Act (NCLB). Considered progressive and innovative at the time of itsRead MoreThe No Child Left Behind Act875 Words   |  4 PagesThe No Child Left Behind Act â€Å"NCLB† was a bill passed by the Senate in 2001 and signed into law by President George W. Bush on January 8, 2002. It was a revision of the Elementary and Secondary Act â€Å"ESEA† of 1965 by President Lyndon Johnson. The NCLB was intended to help children in lower-income families achieve the same standard of education as children in higher income families. This was done by the federal government providing extra finances for Title I schools in exchange for a rise in academicRead MoreNo Child Left Behind Act1418 Wor ds   |  6 Pagessystematic oppression. The flowing water of oppression floods poor schools; drowning students with dreams, and giving no mercy. The only ones safe from the water are the privileged, who are oblivious to the fact that it exists. George Bush s No Child Left Behind Act, which passed in 2002, mandated annual standardized testing in math and reading. If schools received insufficient scores, they were punished or shut down. This fueled the construed concept that a school is only doing well if the students haveRead MoreThe No Child Left Behind Act Essay921 Words   |  4 Pagesuccessful at it. (Source 7) Next, the â€Å"No Child left behind Act† it was signed by President George W. Bush and it passed with bipartisan support on Jan. 8, 2002. This Act states that there will be mandated annual testing in the subject reading and math and science. In the grades 3-8 and 10th grade. It shows the Adequate Yearly Progress of each school in the system of the United States. (source 1) The biggest point of this Act is that no child is â€Å"trapped in a failing school† (source 1). That eachRead MoreThe No Child Left Behind Act2120 Words   |  9 PagesWhen President George W. Bush signed the No Child Left Behind Act (NCLB) into law in 2002, the legislation had one goal-- to improve educational equity for all students in the United States by implementing standards for student achievement and school district and teacher performance. Before the No Child Left Behind Act, the program of study for most schools was developed and implemented by individual states and local communities†™ school boards. Proponents of the NCLB believed that lax oversightRead MoreThe No Child Left Behind Act1988 Words   |  8 PagesJanuary 8, 2002, George W. Bush signed the No Child Left Behind Act into law (also known as the NCLB). The No Child Left Behind Act was the latest reauthorization of the Elementary and Secondary Education Act of 1965, a federal education bill addressing the nation’s schools. At his signing ceremony, Bush stated, â€Å"There’s no greater challenge than to make sure that every child—and all of us on this stage mean every child, not just a few children—every single child, regardless of where they live, how they’reRead MoreThe No Child Left Behind Act1592 Words   |  7 PagesThe No Child Left Behind Act was the biggest educational step taken by president Bush and his administration. Its main goal included the increase of achievement in education and completely eliminate the gap between different racial and ethnic grou ps. Its strategies had a major focus on uplifting test scores in schools, hiring â€Å"highly qualified teachers† and deliver choices in education. Unluckily, the excessive demands of the law have not succeeded in achieving the goals that were set, and have causedRead MoreNo Child Left Behind Act1747 Words   |  7 PagesNo Child Left Behind Introduction The No Child Left Behind Act (NALB) was signed into law by the former President of the United States George Walker Bush on the 8th of January 2002. It was a congressional attempt to encourage student achievement through some reforms focused on elementary and secondary education programs in the United States. The NCLB requires that within a decade all students including those with disabilities to perform at a proficient level on their state academic evaluation testsRead MoreThe No Child Left Behind Act1124 Words   |  5 PagesChristian J. Green Dr. Shoulders NCLB and ESSA 28 February 2016 The No Child Left Behind Act (NCLB) was authorized by and signed into law in 2002. NCLB was a reauthorization of the Elementary and Secondary Education Act (ESEA) of 1965. NCLB was meant to hold schools to higher standards, enforce accountability, and close achievement gaps that had existed in education since ESEA was enacted. Nevertheless, the rigorous standards and goals set forth under NCLB were never attained. ESEA Flexibility could

Tuesday, May 19, 2020

Cape Lion Facts

Name: Cape Lion; also known as Panthera leo melanochaitus Habitat: Plains of South Africa Historical Epoch: Late Pleistocene-Modern (500,000-100 years ago) Size and Weight: Up to seven feet long and 500 pounds Diet: Meat Distinguishing Characteristics: Extensive mane; black-tipped ears    About the Cape Lion Of all the recently extinct offshoots of the modern lion—the European Lion (Panthera leo europaea), the Barbary Lion (Panthera leo leo), and the American Lion (Panthera leo atrox)—the Cape Lion (Panthera leo melanochaitus) may have the least claim to subspecies status. The last known adult specimen of this big-maned lion was shot in South Africa in 1858, and a juvenile was captured by an explorer a couple of decades later (it didnt survive long out of the wild). The trouble is, the various extant subspecies of lions have a tendency to interbreed and mix up their genes, so it may yet turn out that Cape Lions were an isolated tribe of Transvaal Lions, the remnants of which can still be found in South Africa. The Cape Lion has the dubious honor of being one of the few big cats to have been hunted, rather than harassed, into extinction: most individuals were shot and killed by European settlers, rather than slowly starving due to habitat loss or poaching of their accustomed prey. For a while, in the early 2000s, it seemed that the Cape Lion might be de-extincted: a zoo director from South Africa discovered a population of big-maned lions in Russias Novosibirsk Zoo, and announced plans to perform genome  testing and (if the results were positive for fragments of Cape Lion DNA) attempt to re-breed the Cape Lion back into existence. Unfortunately, the zoo director died in 2010 and the Novosibirsk Zoo closed a couple of years later, leaving these putative Cape Lion descendants in limbo.

Friday, May 15, 2020

The Battle of Tannenberg in World War I

The Battle of Tannenberg was fought August 23-31, 1914, during World War I (1914-1918). One of the few battles of maneuver from a conflict best known for static trench warfare, Tannenberg saw German forces in the east effectively destroy General Alexander Samsonovs Russian Second Army. Employing a mix of signals intelligence, knowledge of the enemy commanders personalities, and effective rail transportation, the Germans were able to concentrate their forces before overwhelming and surrounding Samsonovs men. The battle also marked the debut of General Paul von Hindenburg and his chief of staff, General Erich Ludendorff, as a highly effective duo on the battlefield. Background With the outbreak of World War I, Germany began implementation of the Schlieffen Plan. This called for the bulk of their forces to assemble in the west while only a small holding force remained in the east. The goal of the plan was to quickly defeat France before the Russians could fully mobilize their forces. With France defeated, Germany would be free to focus their attention to the east. As dictated by the plan, only General Maximilian von Prittwitzs Eighth Army was allocated for the defense of East Prussia as it was expected that it would take the Russians several weeks to transport their men to the front (Map). Russian Movements While this was largely true, two-fifths of Russias peacetime army was located around Warsaw in Russian Poland, making it immediately available for action. While the bulk of this strength was to be directed south against Austria-Hungary, who were fighting a largely one-front war, the First and Second Armies were deployed north to invade East Prussia. Crossing the frontier on August 15, General Paul von Rennenkampfs First Army moved west with the goal of taking Konigsberg and driving into Germany. To the south, General Alexander Samsonovs Second Army trailed behind, not reaching the border until August 20. This separation was enhanced by a personal dislike between the two commanders as well as a geographic barrier consisting of a chain of lakes which forced the armies to operate independently. After Russian victories at Stallupà ¶nen and Gumbinnen, a panicked Prittwitz ordered the abandonment of East Prussia and a retreat to the Vistula River (Map). Stunned by this, the Chief of the German General Staff Helmuth von Moltke sacked the Eighth Army commander and dispatched General Paul von Hindenburg to take command. To aid Hindenburg, the gifted General Erich Ludendorff was assigned as chief of staff. Shifting South Just prior to the change in command, Prittwitzs deputy chief of operations, Colonel Max Hoffmann, proposed a bold plan to crush Samsonovs Second Army. Already aware that the deep animosity between the two Russian commanders would preclude any cooperation, his planning was further aided by the fact that the Russians were transmitting their marching orders in the clear. With this information in hand, he proposed shifting the German I Corps south by train to the far left of Samsonovs line, while the XVII Corps and I Reserve Corps were moved to oppose the Russian right. This plan was risky as any turn south by Rennenkampfs First Army would endanger the German left. In addition, it required the southern portion of the Kà ¶nigsberg defenses to be left unmanned. The 1st Cavalry Division was deployed to screen to the east and south of Kà ¶nigsberg. Arriving on August 23, Hindenburg and Ludendorff reviewed and immediately implemented Hoffmanns plan. As movements began, the German XX Corps continued to oppose Second Army. Pushing forward on August 24, Samsonov believed his flanks to be unopposed and ordered a drive northwest towards the Vistula while VI Corps moved north to Seeburg. Germans General Paul von HindenburgGeneral Erich Ludendorff166,000 men Russians General Alexander SamsonovGeneral Paul von Rennenkampf416,000 men Casualties Germany - 13,873 (1,726 killed, 7,461 wounded, 4,686 missing)Russia - 170,000 (78,000 killed/wounded/missing, 92,000 captured) Hindenburg Attacks Concerned that the Russian VI Corps was making a flanking march, Hindenburg ordered General Hermann von Franà §ois I Corps to begin their attack on August 25. This was resisted by Franà §ois as his artillery had not arrived. Eager to begin, Ludendorff and Hoffmann visited him to press the order. Returning from the meeting, they learned through radio intercepts that Rennenkampf planned to continue moving due west while Samsonov pressed XX Corps near Tannenberg. In the wake of this information, Franà §ois was able to delay until the 27th, while XVII Corps was ordered to attack the Russian right as soon as possible (Map). Due to I Corps delays, it was XVII Corps which opened the main battle on August 26. Attacking the Russian right, they drove back elements of the VI Corps near Seeburg and Bischofstein. To the south, the German XX Corps was able to hold around Tannenberg, while the Russian XIII Corps drove unopposed on Allenstein. Despite this success, by the end of the day, the Russians were in jeopardy as XVII Corps had begun to turn their right flank. The next day, the German I Corps began their assault around Usdau. Using his artillery to advantage, Franà §ois broke through the Russian I Corps and began advancing. The Trap Closed In an effort to save his offensive, Samsonov withdrew XIII Corps from Allenstein and re-directed them against the German line at Tannenberg. This led to the majority of his army being concentrated east of Tannenberg. Through the day on the 28th, German forces continued to drive back the Russian flanks and the true danger of the situation began to dawn on Samsonov. Requesting Rennenkampf to divert to the southwest to provide aid, he ordered Second Army to begin falling back to the southwest to regroup (Map). By the time these orders were issued, it was too late as Franà §ois I Corps had advanced past the remnants of the Russian left flank and assumed a blocking position to the southwest between Niedenburg and Willenburg. He was soon joined by XVII Corps which, having defeated the Russian right, advanced southwest. Retreating southeast on August 29th, the Russians encountered these German forces and realized they were surrounded. The Second Army soon formed a pocket around Frogenau and was subjected to relentless artillery bombardment by the Germans. Though Rennenkampf made attempts to reach the beleaguered Second Army, his advance was badly delayed by the German cavalry operating on his front. The Second Army continued to fight for another two days until the bulk of its forces surrendered. Aftermath The defeat at Tannenberg cost the Russians 92,000 captured, as well as another 30,000-50,000 killed and wounded. German casualties totaled around 12,000-20,000. Dubbing the engagement the Battle of Tannenberg, in vindication of the Teutonic Knights 1410 defeat on the same ground by a Polish and Lithuanian army, Hindenburg succeeded in ending the Russian threat to East Prussia and Silesia. Following Tannenberg, Rennenkampf began a fighting retreat which culminated in a German victory at the First Battle of the Masurian Lakes in mid-September. Having escaped the encirclement, but unable to face Tsar Nicholas II after the defeat, Samsonov committed suicide. In a conflict best remembered for trench warfare, Tannenberg was one of the few great battles of maneuver.

Wednesday, May 6, 2020

Canterbury Tales - Comparing Chaucers The Clerks Tale...

In The Clerks Tale and The Wife of Baths Tale from Geoffrey Chaucers The Canterbury Tales, characters are demanding, powerful and manipulating in order to gain obedience from others. From all of The Canterbury Tales, The Clerks Tale and The Wife of Baths Tale are the two most similar tales. These tales relate to each other in the terms of obedience and the treatment of women. The Wife of Bath Tale consists of one woman who has complete control over her husbands. It evolves the idea that a woman is more powerful and controlling in a relationship. She intimidates her husbands to do things and treat her in a certain ways so that they would buy her material things and†¦show more content†¦In addition, the Wife of Bath also shows some of the same signs of tyranny toward others. She takes reference from the Bible to defend her opinions on a husband obediently loving his wife. To justify her beliefs, the Wife of Bath says that thus the apostle Paul has told it me, and bade our husbands they should love us well. There ¹s an command on which I like to dwell (262). Both Walter and the Wife of Bath are demanding to bring them happiness and satisfaction in therms of getting obedience. In addition to demanding love, both characters demand favors, a representation of their obedience. Walter gives Griselda jewels and rings for her to wear demanding the favor of her obedience to him, the marquis bade prepare brooches and rings, all for Griselda, lit with jewels, gold and lapis. (328). The Wife of Bath also demands the favor of her personal satisfaction from others. She demands material treasures and sexual desires from her husbands. But as I had them eating from my hand and as they yielded me their gold and land, why then take trouble to provide them unless to profit my leisure (264). She is a very persuasive and controlling woman who seeks personal favors to symbolize obedience. She and Walter both share the quality of demanding favors to bring them happiness and satisfaction in the terms of obedience. Lastly, the two charactersShow MoreRelated Essay on Human Nature and The Canterbury Tales1572 Words   |  7 Pagesand The Canterbury Tales  Ã‚     Ã‚  Ã‚   When Geoffrey Chaucer undertook the writing of The Canterbury Tales, he had a long road ahead of him. He intended to tell two stories from each of thirty pilgrims on the way to Canterbury, and then two more from each pilgrim on the way back from Canterbury. Of these, he completed only twenty-four. However, in these tales, Chaucer depicts both the pilgrims and their stories with striking realism. In The Nuns Priests Tale, The Canons Yeomans Tale, The FriarsRead More Contradictions in Chaucers The Canterbury Tales Essay3897 Words   |  16 PagesContradictions in Chaucers The Canterbury Tales There is no question that contradictory values make up a major component of The Canterbury Tales. Fate vs. Fortuna, knowledge vs. experience and love vs. hate all embody Chaucers famous work. These contrasting themes are an integral part of the complexity and sophistication of the book, as they provide for an ironic dichotomy to the creative plot development and undermine the superficial assumptions that might be made. The combination of completelyRead MoreThe Power Of Women In Geoffrey Chaucers The Wife Of Bath2180 Words   |  9 Pagestruly want. According to the tale told by the Wife of Bath, â€Å"Women desire to have sovereignty/ As well over their husbands as their loves, / And to be in mastery them above† (Chaucer 1044-1046). This statement means that to be masters over their husbands is the ultimate desire of all women. Therefore, the power women have in this time is the power over their husbands, and this power is what they truly desire. However, this is not a common occurrence, and the Wife of Bath believes that in her experience

Sharks Are Worth More Alive Than Dead - 1597 Words

Although out of fear or ignorance, some believe that sharks serve zero purpose, sharks are worth more alive than dead because sharks stabilize the underwater ecosystem, and increase economic growth. 1. It is a common belief in certain cultures that shark fins have health benefits, when in reality that’s not true. With increasing levels of pollution entering into the oceans it’s known that sharks absorb the pollution which create an unsafe level of mercury for humans to consume. Scientists at the University of Miami recently conducted a study to test the concentrations of two toxins- mercury and ÃŽ ²-N-methylamino-L-alanine (BMAA) – in 10 different sharks species located in the Atlantic and Pacific Oceans (â€Å"Study Finds High Level of Neurotoxins,† 2016). Deborah Mash, the senior author of the study and a Professor of Neurology stated, â€Å"Recent studies have linked BMAA to neurodegenerative diseases such as Alzheimer’s disease and amyotrophic lateral sclerosis (ALS),† Contrary to cultures that believe shark fins contain health benefits, it’s been proven that there’s a direct link between consumption of shark meat to ne urodegenerative diseases. The evidence provided above proves to the earlier statement that there are no health benefits, and that in fact, it may cause a increase damage to human health. Conservationists across the globe have presented the notion that sharks are worth more alive than dead, because of the economic growth that shark ecotourism brings in. â€Å"The studyShow MoreRelatedMM Pizza Essay examples1730 Words   |  7 PagesFoods determined that its cost of capital was 13%, significantly more than the cost of capital of its competitors, which put Hershey at a significant competitive disadvantage. It might have even put Hershey out of business if steps were not taken to address this issue. 3. Can a company choose its CS? If so, how? Yes, within reasonable limits. If it wants more equity, the company can issue stock and pay off debt. If it wants more debt, it can borrow and with the proceeds buy back stock. The Read MoreThe American Dream 2000 Word Essay. Nathan Houghton Pd2003 Words   |  9 PagesDream means equal opportunity for all Americans and it is indeed still alive. The American dream consists of the ability to come from a foreign country and be able to become a successful business man or woman. In other countries you can go to the country, but you will most likely not become as prominent. That’s why other people from other countries come to the US to start or restart their lives. if the American dream was dead nobody would want to come to the United States. America is the most freeRead MoreMy Life - Original Writing974 Words   |  4 Pagesidolise it. They remind me of a secluded ocean, where the waves crash and the dolphins leap through the air in joy, where the slight breeze lifts sand onto my face. It is an ocean where I feel free, where I feel like I m at home, where I feel even the sharks wouldn’t hurt a soul. Her eyes show me a different world, they show me another dimension to life. However, right now as I deeply stare into them it feels like I m in the ocean and the waves are dunking me under the water’s surfa ce; I feel scaredRead MoreSharks2370 Words   |  10 PagesRunning head: Sharks Sharks T Tolerico Marine Biology Doctor Cameron Guenther Sharks What do you think of when you hear the word â€Å"Shark†? Do you think of the lion of the ocean or perhaps God’s perfect predator/scavenger? Perhaps you think of the movie â€Å"JAWS†? Most people will think of the movie â€Å"JAWS† and think killer, attacker, and predator. However, are sharks really preying on humans? I view sharks as God’s perfect predator and scavenger. Sharks, like lions, weed out the sick andRead MoreOld Man and the Sea Study Guide Answers2651 Words   |  11 Pageschildhood and because the lions are like him, a hunter. DAY TWO: PAGES 25-54 1. Why can the reader consider Santiago a superior fisherman? Give examples. o â€Å"He was rowing steadily and it was no effort for him†¦Ã¢â‚¬  (30) o â€Å"He kept [the lines] straighter than anyone did†¦there would be bait waiting exactly where he wished it to be†¦Ã¢â‚¬ (32) o â€Å"he was still fishing correctly through faster then he would have fished if he was not trying to use the [man-of-war bird].†(33) o He knows that the flying fish and birdsRead More Psychosocially Therapeutic Aspects of The Old Man and the Sea by Hemingway6795 Words   |  28 Pagesthis symbolic sentence: The old man was dreaming about lions. It is a psychological analysis of Hemingway famous story that we have used it as a psychotherapeutic aid for hopeless and depressed people and also psychological victims of war in a more comprehensive therapeutic plan. The first sentence of the book announces itself as Hemingways: He was an old man who fished alone in a skiff in the Gulf stream and he had gone eighty-four days now without taking a fish . The words are plain,Read MorePsychosocial Aspects of the Old Man and the Sea6923 Words   |  28 Pageswith this symbolic sentence: The old man was dreaming about lions. It is a psychological analysis of Hemingway famous story that we have used it as a psychotherapeutic aid for hopeless and depressed people and also psychological victims of war in a more comprehensive therapeutic plan. The first sentence of the book announces itself as Hemingways: He was an old man who fished alone in a skiff in the Gulf stream and he had gone eighty-four days now without taking a fish . The words are plain, andRead MorePOETRY 2 11389 Words   |  46 Pagesimpurities. (iii) ‘Dreary desert sand of dead habit’ is a metaphor. Through this metaphor the poet wants to say that his countrymen should work for perfection in everything and should not be led astray from their goal in the dry desert of dead habits, i.e., in a place where outdated customs and traditions are followed. (iv) According to the poet, the hurdles in achieving perfection include the outdated customs and traditions based on irrational thinking rather than sound reasoning and scientific thoughtRead MoreUnbroken A Story Of Redemption And Forgiveness By Laura Hillenbrand3364 Words   |  14 Pagesaudience get transfixed towards the completely engaging and almost unbelievable story line of the novel, the true story is more than just any war story and survival. Rather, it is of pain, suffering, hatred, forgiveness and love. Promising in its literary content and its overall reading experience, the novel is considered as one of the best literary publications of 2014. More than just a story of redemption and war, pain and suffering, hatred and vengeance, is a story of humility and forgiveness. ItRead MoreApple Inc vs Microsoft4573 Words   |  19 Pagesinnovative company. Microsoft has been the market leader in the computing market for decades, mostly because any opponent never disrupted its upward momentum. Conversely, Apple targets and dominates the high end of the computing market, with more than 90% market share in computers priced over $1,000. In addition, despite a sole devotion to high-priced products in a lousy consumer environment, Apple is actually gaining market share and increasing margins via the power of its seemingly magical

Warehousing

Question: Describe a typical range of storage and retrieval facilities and stock holding scenarios you would find in the following supply chain network. You are free to use diagrams and flow charts to illustrate and underpin your analysis. Answer: Warehousing in many guises appears at different points across supply chain networks. The main aim of the assignment is to describe a typical range of storage and retrieval facilities and stock holding scenarios in the supply chain networks. The assignment includes supply chain diagrams and flow charts. It describes the entire process of supply chain analysis from the point of production to the point of consumption. Supply chain networks are a process that describes the production of goods from the supply of raw materials to manufacturing to warehousing to consumption. Maintain a good supply chain network is essential for timely delivery of goods and services to the customers. Warehousing is one of the important parts of supply chain networks. Warehouses are the store houses where the finished goods are stored before being supplied it to the end users that are customers. It is not always necessary to that the supply chain networks and the suppliers belong to the same place or region w here the good is produced. The suppliers may be close to the place of production or far from the region. Vicinity of suppliers close to the place of manufacturing helps in reducing the cost of production as it saves the transportation cost. The assignment describes the types of warehousing and the importance of warehousing at supply chain networks. Introduction Warehouse is a place that is used to store the inventories and buffer stocks temporarily before being supplied to the clients and customers or distributors. Warehouses are used not only during the time of supplying the finished goods but are also used to store the raw materials and other products needed during the time of manufacture. The processes of warehouse management remain the same during the entire process of warehouse management and supply. Warehousing management is a process where the goods are stored, processed and dispatched it to the distributors. The main aim of the production houses is to reduce the transportation costs. Inventory management is meeting the demand of the customers by supplying the given amount of goods (Jun et al., 2015). Supply chain management is the flow of goods, services and information from the suppliers to manufacturers to retailers to consumers. It is the duty of the organization and the manager to maintain the warehouses according to the norms o f the state and the organization. Warehouses are a commercial building that is used for storage of goods. Warehouses are used for storage of goods used by the manufacturers, importers, exporters and wholesalers. There are various roles and functions that the warehouses play. It is one of the dominant parts of the urban landscape that came into existence during the time of industrial revolution. Warehousing appears in different forms in an entire supply chain network and production process of a commodity (Christopher, 2016). Supply chain network is a basic evolution of supply chain that shows inter connectivity and inter dependence of organizations for providing the goods and services to the end users that involves the customers. There are various roles that warehousing play at different point of production and distribution. Topic one: Warehousing at different points of supply chain Warehousing plays a pivotal role in supply chain management. Its main function is to pack and ship the products stored at the store houses to the respective places where it is further processed into a finished product for consumption. First the role of warehousing is at the place where the raw materials are bought into the place of manufacturing. At that point of time the raw materials are stored and then transported to production houses. If the production houses are close to the place of storage then it is transported through cars, but if it is far then the transportation takes place through railways or ships. The main aim of any business houses is to minimize the cost of production (Faber et al., 2013). This is only possible when the warehouses or the place of storage is close to the production houses or the distribution centers. The second role of warehouses is at the point of storage of finished products before the distribution sta ge. This is the most important stage where the suppliers store the finished product before supplying it to the distributors. The goods once demanded by the distributors are then supplied by the producers at the distribution centers. From the distribution houses the goods are then supplied to retailers and then the end users that are consumers. The goods that are not demanded are called inventories or stocks (Rushton et al., 2014). The next responsibility of the production houses is to manage the stock of inventories for the next season. Warehousing becomes more valuable when it is flexible and adds to the reduced cost of production. Warehousing also helps the production houses identifying the risks and the areas of waste during the distribution process. Warehousing also helps in management of inventory. It is not only used for the distribution of products but also services and information in the form of data. To avoid the risk of delays warehouse management system helps in tracking delivery and order fulfillment through data analysis. A firm can meet its long term objective and achieve competitive advantage through maintain its supply chain networks efficiently and effectively (Hussain, 2015). Value at warehouses is provided through fulfilling the demand of consumers by storing the product to face any situation during the time of uncertainties. The customers also get a chance to consume variety of products. It also helps in assembling and manufacturing the data and products (Stadtler, 2015). Role of warehousing Warehousing plays an important role in management of supply chain and distribution of goods and services from the producers to consumers. Warehouses act as central location for receiving, storing and distributing products. As the goods are transported to warehouses the function is to locate, distribute, store, identify and dispatch the product to the place concerned that is temporary in nature. Before the shipment of the product to the final destination the data and products is retrieved, grouped and packaged for dispatching it to new destination. The other objective is to reduce the delivery time and the stock of inventories by reducing the cost of transportation and distribution. The utility and customer service for the product increases as warehouses helps in supplying the right product to right customers at right time and place (Davarzani Norrman, 2015). Warehouses has to play various roles as that of cross docking, product mixing, order assembly and order consolidation that add s to the overall value to the logistics management. Warehouses provide economies of scale by effectively managing the resources through efficient operation, storage, capacity and central location. Consolidation helps in minimizing the cost by cutting down the delivery costs and operations. Since warehouses involves shipment of bulk orders it helps in reducing cost as the production houses need not supply small shipments. Warehouses acts as buffer houses that helps in maintaining demand and supply at all seasons for the long term storage. This helps in increasing the economic benefit and profitability as the product can be supplied even at the time of low production and lean season when the products are not available. Accumulation of goods is profitable as it can help solve the problem during uncertainties (Morton et al., 2015). Warehouses also help in improving services and its benefits as it ensures that the orders are transferred full on time. There are various methods that the pr oduction houses can use that helps in determining and maintaining inventory items at warehouses. Safety stocking is one of the tools that can be used for management of stocks and inventories. It manages both the inbound and outbound sales and distribution (Wisner et al., 2014). The three main roles are taken into considerable interests that are shared space environment, secondary packaging and cross docking. Cross docking is a system where the products are directly being shipped from the producers to consumers with no handling of stocks of inventory in order to reduce the cost of providing (Xuefeng Hongyu, 2013). This method is being used specially to reduce cost and improve the service. It is used to meet the requirements of end users while making deliveries. Secondary packaging is a method that includes assembling of parts. Warehousing is especially useful in case of seasonal and promotional fluctuations to manage the challenges. The 3 PLs that describes the role of warehousing are conveyed with a force of skilled labors that helps in maintaining the peak performance (Richards, 2014). Supply chain networks Supply chain network is management of supply chain management and logistics. The network shows the connectivity between the raw material suppliers, producers, manufacturers, distributors, retailers and the end users that is consumers. The goods are transferred from manufacturers and suppliers to consumers through the process of distribution. Warehouses in this entire process of supply and distribution have an important role to play. It appears at many guises during the entire process of supply chain networks. First it acts as the storage for raw materials, then it acts as storage house for the finished products then it acts as storage for stocks of inventories. The main aim of the warehouses is to package, assemble, identify and deliver the right product to right person at right place on right time through transportation and logistics management. It is not only used to transfer products but also services and data (De Backer Miroudot, 2014). Point of consumption at motor vehicle manu facturing plant:Consumption occurs at last stage of the entire process of supply chain networks. The finished product reaches the consumers after passing through many stages of supply chain process. The first stage is raw material manufacturer where the supplier supplies the unfinished product to the car manufacturer. It is then the duty of the car manufacturer to assemble all the parts that the supplier has supplied and then supply the finished product to the national distributors. The national distributor then supplies the finished product to the dealers and then to the end users that is the consumers. It is essential for the production houses to find the suppliers of raw materials that are close to the place of manufacture to avoid transportation cost and delay. This will lead to efficient provision of goods at low cost (Richards Grinsted, 2016). After the consumption the role of the warehouses is to manage the stock of inventories that is the left over stocks that is not demand ed by the consumers. The stock of inventories that is left over is then utilized for the next season when the production does not take place. Raw material suppliers may vary in number. It is not necessary that all the parts used in assembling and manufacturing the cars are supplied just by one single supplier. For example the paints used to decorate the car may be supplied by supplier one and the tyres may be supplied by supplier two. Hence the raw material supplier can vary in number. They may also be located at different regions. It is not necessary that the manufacturing industry uses all the supply of one region only (Ross, 2015). For example, suppose the manufacturing takes place in Singapore then the tyres may be supplied from Malaysia while paints from local region or area itself. It would be beneficial for the industry to find the suppliers of raw material close to the vicinity in order to avoid transportation cost and delay in service (Toth Vigo, 2014). The raw material s uppliers also have theory own supply chain network that is given as follows:If the supplier at tier one is situated at a distance of 1.5 miles away from the car manufacturer then the cost of production will be lowest and the goods will reach the production site on time. This will ensure efficient production and supply of commodities. The finished goods that will be supplied to consumers will be available at low prices due to which the demand of the product will high. The stock of inventories will be less that in turn will reduce the cost of warehousing. Hence the profitability of firm will increase (Ross, 2013). Now, there can be cases where the manufactures of the products act as raw material suppliers. The definition of raw material is often categorized as unfinished goods. The car manufacturer can act as raw material supplier. This will happen in the case where the assembling of cars takes place at different regions. Suppose the fixing of tyres and assembling of motors is done at one production house while the final touch up that is painting and quality check is done at another place then in this case the car manufacturer will act as raw material supplier as it supplies unfinished product (Dyckhoff et al., 2013). If the same manufacturer acting as tier two suppliers to vehicle manufacturer is based 180 miles away from the manufacturing house, then the main difference of finished products will be in terms of storage and supply. Warehouses will act as storage houses to store the unfinished product before being supplied to car manufacturers. This adds on to the cost of production. The main difference is that the goods that are stored will not be directly supplied to distributors but will be supplied to car manufacturers. The storage house is close to the manufacturing house hence the transportation cost is less (Thom et al., 2014). The third case is of supplier that is located six thousand and five hundred miles away from the tier one supplier. There are vario us transport strategies that the supplier will use to deliver the goods at different points of supply chain networks. To avoid the transportation cost the manufacturer will find the raw material supplier close to its vicinity. This will reduce the transportation cost by reducing the cost of fuel and others. In order to effectively manage the supply chain network it is essential for the manufacturer to understand the actual demands of the customers. A proper strategy should be formed in order to manage the supply chain effectively (Dekker et al., 2013). Topic two: Firms hold types and quantities of stocks throughout the supply network. This includes the stock in transit. It is essential for the firms to keep in mind the requirements of consumers to mitigate the number of unnecessary stocks that accumulates due to lack of demand. A balance must be achieved between the demand and supply of goods. There are various ways to manage the accumulation of stocks and avoid unnecessary inventor ies. Stock in classical position acts as a medium to fulfill the demand of consumers at time of unforeseen event. Stocks are buffers between the demand and supply (Sankar, 2014). Balancing stocks Stocks can be balanced using various ways such as demand forecasting, storage and ease of stock accuracy. The main reason for accumulation of stocks is mismatch between the demand and supply of products. When the demand is less then that is supply then the goods are left unsold that adds to the accumulation of stocks and inventories. Forecasting demand helps the firms know how much of their produced goods are going to be sold out in the market. Hence it is essential for the firms to hire a team of experts that looks into the process of demand forecasting. This helps in matching the demand and supply that in turn reduces the risk of accumulation of stocks and inventories (DeCroix, 2013). The main reasons for keeping the stocks and inventories are time lag between the supply and demand, seasonal demand and season where the demand for the products is low, economies of scale, uncertainties such as natural disaster and appreciation in value. Proper storing of commodities at warehouses als o helps in managing the stocks. It so happens that some of the stocks are not seen by the suppliers and is kept at warehouses for years. This happens in the case where the warehouse is big and no proper stock list is maintained. So in order to avoid this it is essential for the firms and warehouses to maintain the record of stock and keep a timely record of the goods are bought in and out of the warehouse. Stocks accuracy is another tool that can be used to maintain and manage stocks (Kelly Attia, 2015). Roles of technologies and data sharing Technologies and datas of the past plays an essential role in the analysis of the stocks and current scenarios. The datas of the past scenarios such as aggregate demand, gross domestic product and income of the people of a particular helps in forecasting demand for the future as demand mainly depends on price, income and other economic factors. Technologies also play an important role as it helps in maintaining ten lists of stocks and item that are kept in warehouses and is ready to be sold in the next season. Technologies are used to store the data that is used for future use (Jarke et al., 2013). Conclusion Warehouse management is an essential part of supply chain network that occurs in many appearances in an entire supply chain process. Proper management of supply chain management is essential for effective business. Warehouses should be managed in such a way that it helps in minimizing the cost of production and is flexible in nature. Balancing stocks and inventories is also essential. There are various ways and techniques that can be used by firms to balance and manage the stocks. Forecasting data by use of proper data helps in reducing the accumulation o stocks and inventories. References Christopher, M. (2016). Logistics supply chain management. Pearson Higher Ed.Davarzani, H., Norrman, A. (2015). Toward a relevant agenda for warehousing research: literature review and practitioners input. Logistics Research, 8(1), 1-18.De Backer, K., Miroudot, S. (2014). Mapping global value chains.DeCroix, G. A. (2013). Inventory management for an assembly system subject to supply disruptions. Management Science, 59(9), 2079-2092.Dekker, R., Fleischmann, M., Inderfurth, K., van Wassenhove, L. N. (Eds.). (2013). Reverse logistics: quantitative models for closed-loop supply chains. Springer Science Business Media.Dyckhoff, H., Lackes, R., Reese, J. (Eds.). (2013). Supply chain management and reverse logistics. Springer Science Business Media.Faber, N., De Koster, M. B. M., Smidts, A. (2013). Organizing warehouse management. International Journal of Operations Production Management,33(9), 1230-1256.Hussain, A. (2015). Role of Warehousing in Supply Chain Management of Internat ional Business.Jarke, M., Lenzerini, M., Vassiliou, Y., Vassiliadis, P. (2013).Fundamentals of data warehouses. Springer Science Business Media.Jun, W., Li, O., Gelin, D., Jing, S. (2015, May). Research on efficiency evaluation methods for warehousing operation and management. In The 27th Chinese Control and Decision Conference (2015 CCDC) (pp. 4529-4534). IEEE.Kelly, A. G., Attia, J. (2015). Balancing access and quality in comprehensive stroke care. Neurology, 84(12), 1188-1189.Morton, J., Cambiaghi, R., Radcliffe, N. (2015). Inventory management requires an end-to-end approach: our consulting team defines the key concepts of inventory management and elaborate on the decisions and cross-functional collaboration required to be more effective. Logistics management (Highlands Ranch, Colo.: 2002).Motor vehicle manufacturing technology. (2016). Atp.nist.gov. Retrieved 18 July 2016, from https://www.atp.nist.gov/press/mvmt9702.htmRichards, G. (2014). Warehouse Management: A complete guide to improving efficiency and minimizing costs in the modern warehouse. Kogan Page Publishers.Richards, G., Grinsted, S. (2016). The Logistics and Supply Chain Toolkit: Over 100 Tools and Guides for Supply Chain, Transport, Warehousing and Inventory Management. Kogan Page Publishers.Ross, D. F. (2013). Competing through supply chain management: creating market-winning strategies through supply chain partnerships. Springer Science Business Media.Ross, D. F. (2015). Distribution Planning and control: managing in the era of supply chain management. Springer.Rushton, A., Croucher, P., Baker, P. (2014). The handbook of logistics and distribution management: Understanding the supply chain. Kogan Page Publishers.Sankar, K., Kannan, S., Muthukumaravel, A. (2014). E Logistics for Warehouse Management. Middle-East Journal of Scientific Research, 20(6), 766-769.Stadtler, H. (2015). Supply chain management: An overview. In Supply chain management and advanced planning (pp. 3-28). Sprin ger Berlin Heidelberg.Thom, A. M. T., Scavarda, L. F., Pires, S. R., Ceryno, P., Klingebiel, K. (2014). A multi-tier study on supply chain flexibility in the automotive industry. International Journal of Production Economics, 158, 91-105.Toth, P., Vigo, D. (Eds.). (2014). Vehicle routing: problems, methods, and applications (Vol. 18). Siam.Wisner, J. D., Tan, K. C., Leong, G. K. (2014). Principles of supply chain management: a balanced approach. Cengage Learning.Xuefeng, S., Li, Z., Hongyu, L. (2013). Study and Design of Sports Logistics Warehousing Management Information System. Logistics Technology, 11, 083.

Tuesday, May 5, 2020

E-Technologies have Changed Modern Social Life and Remedies

Question: How E-Technologies have Changed Modern Social Life and Remedies. Answer: The advent of electronic technology, also known as e-technology, has significantly changed how human beings interact with each other and how they stay connected. However, with the proliferation of these technologies, one would imagine these tools would help people to have a better understanding of other cultures, communicate effectively with other people, maintain and enhance familial relationships, and help most people to be more socially adept. However, that has not been the case. These communication devices have caused many people to get distracted, be increasingly stressed, and be overly isolated. Impact on Social Life The use of e-technology has several positive and negative consequences. Some people have been able to find long-lost friends through e-technology platforms, especially social networking sites, and this has enabled them to reconnect and live happy lives again. In communities where people are highly mobile, and friends and family members work or live in different geographical areas, they find it quite convenient to use e-technology so as to keep in touch. Since it requires only a few seconds to pass across a message and subsequently receive feedback, it removes the barrier of distance (Rocha 2013; Atkinson and Castro 2004). In addition, these tools make everyone equal. As a result, it is easy to communicate with people from a wide variety of backgrounds using these devices. When people are interacting over the Internet, for example, it is difficult for them to know whether they are more senior than the other party. With a professionally developed website, a junior person can appear well informed on the Internet as other experts as there is no way they can be judged based on their age, skin color, race, and more other similar factors (Hertlein and Blumer 2014). However, there are also problems that are associated with this technology. Most people on social media consider perception to be the reality. Many people agree that many users on their social media networks are not their real friends. However, social networking sites have added a new meaning to friend. They consider two people to be friends or not friends, which make people to consider perception to be reality (Turkle 2012; Roberts 2010). Studies indicate that these sites create a platform for promiscuous trust relationships that eventually contribute to cheating on significant others, which have lead to many cases of divorce. The number of people who have been fired from their jobs and given warnings for using these tools or posting something that undermines their professional standings is also on the increase. These problems arise because users consider each other as friends online (Turkle 2012; Woolgar 2002). While the loss of jobs and divorce are serious issues, other problems that the potential to stem from social media such as narcissism are more common than them. Most websites encourage narcissism, a condition in which someone exhibits extreme interest in another persons appearance and oneself. This behavior leads to lust, cybersex addiction, and other obscene reactions. Some experts consider that most people also use social networking sites to display their popularity to their audience instead of using them as a vehicle to develop real, meaningful relationships (Woolgar 2002). Creating meaningful relations is about people sharing their lives with their friends and acquaintances. It is possible to use technology to do that through photos, music, text, and videos. A recent survey has indicated that those who have to know each other for years more easily connect through e-technology than those who have never met (Thomson 2006). However, online communities and virtual worlds cannot offer an opportunity to many people to overcome a sense of isolation. Individuals who successfully find others online with similar hobbies and interests may feel good but does not necessarily have a positive effect on their social skills and social development. The greatest problem comes when people find themselves subtly substituting electronic relationships for physical relationships. Too much electronic relationships also engender a sense of social isolation (Lickerman 2010). There is also the risk of Identity hijacking, which allows people to pick the personal information of an individual and use it to create another profile. Since many people trust what their friends post on social media, malicious users can use this strategy to execute their plans on others with almost no detection (Adam and Smith 2008; McCloud 2013). E-technology is a risk factor for Internet gaming addiction. Internet gaming is an instance where people can encounter serious social setbacks. Most young people who are addicted to these games find it easy talk about romantic relationships of some virtual world games, but when they are granted an opportunity for deep, respectful, and meaningful conversations, they are inept. While linking their poor social skills to these games might appear a little far-fetched, research has pointed out several negative social impacts of some videos on young people. One recent study indicates that playing violent video games is a leading risk factor for later physical aggression for both boys and girls (McQuade et al. 2012). The same research, however, also implies that linking gaming to poor social skills can miss the big picture. There are instances where people can take part in real activities such as football, and when the social problems that arise from these activities are the same or worse than those of gaming, gaming can help in relationship building (McQuade et al. 2012). Electronic television also has both positive and negative impact on social development. Studies indicate that families that take a limited amount of time watching wholesome programs have healthier relationships than those that do not. Other researchers, however, think that television is contributing significantly to the rotting of social values, which in turn makes it difficult to build useful relationships. Since many people spend more time watching television than with others on their communities and television is a passive medium, it provides almost no opportunity for meaningful interaction while watching. This element of passiveness can have a negative impact on the social skills of people. Television denies viewers the opportunity to learn how to relate to and deal with others (Willard 2007). Exposure to Internet games can cause some serious negative effects on peoples social lives. Exposure to shows that present sexual content can increase teen pregnancies. In addition, some people who see violent behavior accepted in a virtual community are often prone to mimic. If everyone were to mimic the immoral behaviors that are presented in many shows, the society would lack morals and many peoples lives would be destroyed Willard 2007). Phishing, an act of stealing sensitive information through a medium that presents itself a legitimate authority, is another common problem. For a phishing scheme to succeed, there must be an appearance of legitimacy and also trustworthiness of the delivery medium. Modern schemes depend on detailed personal information for targeted attacks. When one is so readily willing to disclose has phone numbers, interest, education history, and addresses, they find the work easy. Although there are no reported damages caused by phishing using these sites, it poses a real danger. Since over 15,000 people sign up on Facebook daily, the attacks and their severity are set to increase (Carlson 2008). E-technology is also a threat to physical security. When people frequently update on Twitter about where they will be at a particular time, it helps malicious people to figure out where one is. It creates opportunities for kidnapping, assault, and burglary (Willard 2007). Overcoming the Threats and Risks While studies have not successfully established a common ground about all the harmful and beneficial effects of e-technologies, these technologies remain to be the main tools that families will continue to use to make life choices and opportunities. In the modern world, people have no option other than to use electronic technologies to interact with public institutions as paper applications and many other communications are no longer accepted. Technology is becoming the only efficient means through which people can apply for jobs, share neighborhood news, do schoolwork, gather together, and share the news about family celebrations and problems. Because of this, supplies of e-technologies are looking for ways to overcome the risks and threats associated with these tools so as to ensure people make the best use of these technologies without the fear of encountering any negative consequences (Ioannides 2006). Suppliers of electronic technologies are seeking to overcome these threats and risks. These sites provide a high level of access control. Facebook, for example, encourages users to configure its privacy settings to have control on who can access some or all of their personal information. In addition, these sites require people to use their real names. The information they contain is either mostly real or easily identified as fake. Most people have almost no reason to falsify information on Facebook for the purpose of keeping up with their friends in a trustworthy manner. Myspace and LinkedIn users also strive to use their real names. According to research, only eight percent of Facebook users have fake names, and 89 percent use real names. The rest uses partial names (Ioannides 2006; Cross 2013). One can also use browsing scope settings to limit the ability of people to view information across spans in any group. A user can decide that his detailed personal information can be viewed up to a specific number of degrees away. LinkedIn requires authorization for any user that is not a direct connection, which is a good control in this category. While this one may not prevent some users from hijacking a profile and gaining access to it, it effectively helps to prevent widespread automated information harvesting (Cross 2013; Lewis 2014). Combined with the low level of education and shoddy privacy settings, these sites provide the perfect ground for collecting information and breading attacks. Supplies of e-technologies recommend that at the application level, one can avoid identity hijacking, phishing, and information theft by enforcing Microsoft Internet Explorer or Mozillas phishing control. Services like PhishTank and BlueCoat also provide network and application blacklisting that one can use as an added protection (Lewis 2014). The first remedy for identify hijacking is verification of emails. Users should check for valid addresses. In addition, they check for valid addresses in profiles they interact with. Another solution is having strong passwords and avoiding the sharing of passwords across many sites. VeriSigns Personal Identity (PPI) and OpenID can solve this issue. The work of OpenID is to provide a central location for high-grade security login credentials. PPI, on the other hand, performs two-factor authentication. These social media sites also encourage users to take precaution when dealing with people virtually, even they that claim to be friendly or that we know them. When verifying any sensitive information, people should take special care (Mathews 2013). Physical attack is a problem that can be solved by toning down details posted on sites like Twitter and Facebook about an individuals whereabouts. Ones status updates should not contain specific details and need to be posted only after that fact (Rockelmann 2013). Conclusion According to this analysis, e-technology has the potential to either improve or harm peoples social lives. Malicious users can leverage these tools as an attack vector. Ranging from information theft and identity hijacking to plastic relationships and Internet addiction, e-technology poses a real yet quite exclusive form of social security threat. On social media networks, one can access a massive amount of personal information, and the lack of effective and easy to use security devices makes these sprawling applications an ideal sandbox for malicious people. There are several countermeasures. However, the best one is user education. E-technology users need to know the consequences of posting detailed personal information and treating strangers as friends. Whether users get a friend request or potential phishing messages, they ought to appreciate that the proper ways of safeguarding themselves and their friends and relatives from attack. Another major method is suppliers of these technologies enhancing security measures. They understand the risks involved, and it is appropriate to follow their advice and also use the security features on the applications appropriately so as to be able to get the most benefit from technology. Technology has changed over the years, and at each stage, it has made life much easier and accessible. However, suppliers of e-technology need to continue advancing these popular and ever changing applications to safeguard the interests of everyone. Bibliography Adams, Tyrone, and Stephen A. Smith. Electronic tribes: the virtual worlds of geeks, gamers, shamans, and scammers. Austin: University of Texas Press, 2008. Atkinson, Robert D., and Daniel Castro. "Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution." SSRN Electronic Journal, March 09, 2004. doi:10.2139/ssrn.1278185. Carlson, Linda. Internet safety and your family: how to protect kids and adults from electronic bullying, cyber crime, identity theft, addictions. Place of publication not identified: Parenting Press, 2008. Cross, Michael. Social media security leveraging social networking while mitigating risk. Amsterdam, Netherlands: Syngress, 2013. Hertlein, Katherine M., and Markie L. C. Blumer. The couple and family technology framework: intimate relationships in a digital age. New York: Routledge, 2014. Ioannides, Marinos. The e-volution of information communication technology in cultural heritage. where hi-tech touches the past: risks and challenges for the 21st century: 30. October - 4. November 2006, Nicosia, Cyprus. Budapest: Archaeolingua, 2006. Lewis, E. E. How safe is safe enough?: technological risks, real and perceived. New York, NY: Carrel Books, 2014. Lickerman, Alex. "The Effect Of Technology On Relationships." Psychology Today. June 08, 2010. Accessed April 06, 2017. https://www.psychologytoday.com/blog/happiness-in-world/201006/the-effect-technology-relationships. Matthews, Carole Boggs. Facebook for seniors: quicksteps. New York: McGraw-Hill, 2013. McCloud, Ace. Gaming addiction, online addiction, internet addiction: how to overcome video game, internet, and online addiction. United States: Ace McCloud, 2013. McQuade, Samuel C., Sarah Gentry, James P. Colt, and Marcus K. Rogers. Internet addiction and online gaming. New York: Chelsea House, 2012. Roberts, Kevin J. Cyber junkie: escape the gaming and internet trap. Center City, MN: Hazelden, 2010. Rocha, A?lvaro. Advances in Information Systems and Technologies. Heidelberg: Springer, 2013. Rockelmann, Richard W. Facebook policy and user knowledge: self-inflicted totalitarianism. 2013. Thomson, Bob. Growing people: learning and developing from day to day experience. Oxford: Chandos, 2006. Turkle, Sherry. Alone together: why we expect more from technology and less from each other. New York: Basic Books, 2012. Willard, Nancy E. Cyber-safe kids, cyber-savvy teens: helping young people learn to use the Internet safely and responsibly. San Francisco: Jossey-Bass, 2007. Woolgar, Steve. Virtual society?: technology, cyberbole, reality. Oxford: Oxford University Press, 2002.