Monday, February 24, 2020

Why young people join gangs Essay Example | Topics and Well Written Essays - 2250 words

Why young people join gangs - Essay Example A gang is a relatively durable, predominantly street-based group of young people who see themselves (and are seen by others) as a discernible group who engage in a range of criminal activity and violence, who identify with or lay claim over territory, have some form of identifying structural feature and are in conflict with other similar gangs (Centre for Social Justice, 2009, p. 21). Youth make a conscious choice to join a gang during adolescence, and multiple personal and environmental factors influence this choice A youth gang can also be defined as a self-formed association of peers having these characteristics: a gang name with recognizable symbols, identifiable leadership, a geographic territory, a regular meeting pattern, and collective actions to carry out illegal activities (Howell, 1997, p. 1). The majority of gang members are male and almost half of them are under the age of 18 years (Ministry of Public Safety and Solicitor General, 2011, p. 2). This research will try to look at the factors and pre-conditions that make gang life an attractive and desirable option to the young people. The themes that will be espoused in the essay will be education and employment, gender, family, poverty ethnicity and peer pressure. The main conclusions to be drawn from the research are that the provision of basic amenities and opportunities will go a long way in preventing young people from engaging in gangs and gang related activities. The social development of a child is rooted in the opportunities, skills and the recognition that builds up through early interactions with family members, friends and teachers (Stefan Hounslea, 2011, p. 9). Education to the progression of a young person is significant. Thornberry discovered that 71.5% of ‘stable gang members’ had dropped out of secondary education compared to 33.6% of non-gang members (Thornberry, 2003, p. 169). He also found that the youth who transitioned smoothly from secondary to

Friday, February 7, 2020

Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 1

Security Policy Analysis - Essay Example These company’s make earnings from these projects (Luetge & Jauernig, n.d.). As a result, they need to mitigate risks facing the projects as one of the factors that will influence the project. In regard to that, there is a need to identify, examine and regulate the threats that may affect the completion of any project. The company also faces other threats not related to the projects in any manner. These form the institution risks. Most of them will attempt to obstruct the system from achieving its objectives. It involves the organization settling on priorities concerning the efforts made in the institution and the use of resources for optimum achievement. It should span all the mission areas of the company. Assume you are a technical advisor for the Chief Information Officer (CIO) of your organization. The CIO sends you an email communicating that she wants to be briefed on "OMB M-11-11" because the administrator has just added it to the list of priorities for the organization. She has limited knowledge of the policy and needs to know how it will effect the organization, and what we have already accomplished towards meeting the requirements within the system. First, I would report on what OMB-11-11 is (Xceedium.com, 2015). In relation to that, it is a policy that advocates for the implementation of identity verification among persons to facilitate authorization to have access to information systems, networks and facilities in an organization. Next, I will report on the implementation of OMB-11-11. The application will entail a detailed procedure and use of software applications that will make the process simpler such as a Xsuite. The access control mechanism will offer privileges such as keeping track of passwords, access methods that rely on keys both for network and information systems. Through such application software, it is possible to separate authorization and authentication to beef up security especially in highly sensitive areas of