Premium Essay

Breaching

In:

Submitted By mecmom815
Words 1967
Pages 8
Porsche Massey
April 19, 2012
SOC-340
Spring 2012
Breaching Assignment

The Things That Happen When You Break in Line
The breaching experiment I chose was breaking in line. At first, I didn’t think that I was going to get much of any reaction because sometimes breaking is something I have seen occur a couple of times. However, I received a great response when I completed the task. I chose to spice up the experiment by going to three totally different places, and acting three different ways. The first way in which I was going to act was to break in line and act as if I did nothing wrong because something that the customer was doing or had violated me and I no longer wanted to wait in line behind them. The second reaction was to argue back with anyone who said something to me about breaking. The third reaction was to be apologetic but at the same time not get out of line because I felt entitled. The first place I decided to go was to a smaller retail place called Walgreens to get some reactions. I went in on March 9, 2012 at 3:00pm. The exact location was Walgreens on Highway 31 in Vestavia Al. There were approximately twenty people in the store not including the workers. As I was approaching the front of the store I noticed an array of races; Blacks, Whites, Asians, and Hispanics. Also, the ages ranged from fifteen to late sixties. The second place I went to was Wal-Mart on Lakeshore Drive in Homewood Al on April 3, 2012 at 11:00am. It was over fifty people in the check-out area. There was also a mixture of races like Whites, Hispanics, Asians, Blacks, and Africans. The ages varied from nine to seventy years old. The third location was a Subway on Lorna Road Hoover Al at 5:30 pm April 13, 2012. The store was pretty busy because it was dinner time. There were roughly eleven people in line, I was number seven. The store had Blacks, and Hispanics

Similar Documents

Premium Essay

Breaching Experiment

...Breaching Experiment Name Class Affiliation Instructor Date In social psychology and sociology field, a breaching experiment is one that evaluates the reaction of people to violation of accepted norms. The experiments consist of the exhibition of conscious engender, and social structure analysis that make the social reaction possible. In today’s world, it seems everybody owns a mobile phone, and when people are in public areas, particularly a library, it is a social norm to either put it off or put it in a silent mode. But for my breaching experiment I wanted to break this social norm by going to the library and put my phone on, on full volume and see how people around me would react. Some of the reactions were surprising, but others were not. The people’s reaction made me think how much one can trust a person to help you in time of need, and the reason some people act in the a manner that they do. I did my breaching experiment on a Saturday afternoon, I went into a study library in the university, put my headphones in the phone, (in order to convince people I was listening to music), and begun to read. After some time, my friend came so that to assist me in accomplishing the experiment. He was to assist me by calling my number. When he got in I knew everything was ready for my experiment. After he settled he started calling my phones without anybody else’s knowledge. My friend told me he did that by making it look like he was texting, and from his observation none...

Words: 929 - Pages: 4

Premium Essay

Breaching Experiment

...Breaching Experiment Name Class Affiliation Instructor Date In social psychology and sociology field, a breaching experiment is one that evaluates the reaction of people to violation of accepted norms. The experiments consist of the exhibition of conscious engender, and social structure analysis that make the social reaction possible. In today’s world, it seems everybody owns a mobile phone, and when people are in public areas, particularly a library, it is a social norm to either put it off or put it in a silent mode. But for my breaching experiment I wanted to break this social norm by going to the library and put my phone on, on full volume and see how people around me would react. Some of the reactions were surprising, but others were not. The people’s reaction made me think how much one can trust a person to help you in time of need, and the reason some people act in the a manner that they do. I did my breaching experiment on a Saturday afternoon, I went into a study library in the university, put my headphones in the phone, (in order to convince people I was listening to music), and begun to read. After some time, my friend came so that to assist me in accomplishing the experiment. He was to assist me by calling my number. When he got in I knew everything was ready for my experiment. After he settled he started calling my phones without anybody else’s knowledge. My friend told me he did that by making it look like he was texting, and from his observation none...

Words: 929 - Pages: 4

Free Essay

Breaching Expiriment

...Breaching Experiment: The Human Response to the Invasion of Personal Space. Most people do not like having their personal space invaded and everyone reacts to this in their own personal matter, depending on that person's preference and the approach of invasion as well. As a usual, we keep distance between other people about arm’s length; we call it personal space. In most cases, this personal space is set for the comfort ability of one another. However, in my experiment, I decided to breach this norm, and took some situations into action. I invaded personal spaces of friend and strangers and observed the reactions of these people. The feedback I received from the invasion of my friend's personal space differed from the response of invading a stranger's. While we were at the café with my best female friend, I stayed very close to her all the time. As we sat down at the table, I sat near her, where was enough space only for one person, instead of sitting on the opposite side. She hadn’t say anything about my invasion, but I noticed that she was wandering if something wrong with me. Though, when I intruded stranger’s personal space, their reaction toward it was different. While I was in subway, I spotted a man who was sitting on the empty bench and reading a newspaper. When I sat down right beside him, as close as I could, the man stopped reading and looked at me, as if he was expecting me to say something, but I just smiled to him. The man ease up a little and continued his...

Words: 1097 - Pages: 5

Free Essay

Breaching Experiment

...Shirley Tatum Professor Monica Sosa SOIC 1301 11 April, 2016 Breaching Experiment Many people feel that it is uncomfortable standing closely to someone during a conversation, in an elevator or while walking. I have chosen this social norm violation because it really happens to many people. As I walk around people or when I’m in an elevator my first thought is to be mindful of their personal space because all humans have boundaries. Many people feel if their personal space is disrupted they are being attacked. Trying to keep a comfortable amount of distance between ourselves and strangers is very hard because there are many reason for one not knowing others’ cultural customs, religion belief, professional regulations, and even gender preferences. But the norm of personal space is what make us unique as Americans. Other cultures may not have the same expectation when it comes to personal space. In some cultures, greeting complete strangers with a hug and a kiss on each cheek is not only normal, but also expected. Other cultures find it completely normal to stand very close to someone you don’t know while talking to them. If either of these things happened to us in America we would be shocked and probably very uncomfortable. In America, personal space is a social norm that will definitely receive negative sanctions if violated. We also refer to our personal space as our “bubble”. Because when someone is facing us, they must be a certain distance away or we begin to...

Words: 1575 - Pages: 7

Premium Essay

Breaching Rhetorical Triangle

...Writing is a form of communication with an intent of efficient delivery of a desired message to the audience to achieve a particular purpose. Any barriers in the key elements of the wringing rhetorical triangle will lead to communication breakdown. The first thing I will do as a writer to avoid this disruption and maintain the logical flow of information is understanding the purpose of writing. Knowing what type of information that one need to pass across will help in searching the details that a piece of paper will contain and planning on how best to forward the information to the audience. The purpose is the critical issue in any form of communication. In my writing, I will stick to the purpose that I intend the audience to receive. Secondly,...

Words: 312 - Pages: 2

Premium Essay

Bus 670 Week 1 Assignment

...agreement. Breach of contract is categorized as material or immaterial to determine the appropriate legal solution or remedy for the breach (Retures 2012). Compensatory damages put the non-breaching party in the position that they had been if the breach had not happened. Punitive damages are payments that the breaching parties have to pay. Above and beyond the point that would fully compensate the non –breaching party. Punitive damages are meant to punish a wrongful party for a wrongful act and is rarely is used for business contract settling. Specific performance is used when damages are inadequate as a legal remedy. The non – breaching party may seek an alternative remedy which is specific performance. Specific performance is known for describing as the breaching party court ordered performance of duty under the contract. Specific performance might be used as a remedy for breach of contract if the matter is rare or unique. Damages would not suffice to place the non-breaching party in as good a position as they would have been if the breach had not happened. Cancellation and Restitution the non-breaching party can cancel the contract and sue for restitution. If the non-breaching party have given a benefit to the breaching party restitution as a contract remedy means the non-breaching party is put back in the position it was before the breach. While cancellation...

Words: 496 - Pages: 2

Premium Essay

Term Paper

...TO: Ronald T. Dumpp, Chief Executive FM: The Law Firm SUBJ: Legal Advice Dear Mr. Dumpp, After your recent requisition of legally advice concerning the commercial flooring for you Pig Out restaurants. My staff and I have carefully reviewed your case and picked out all the legal issue that concerns you and your restaurants. It is our mission to provide you with the best legal services possible. We are also determined to find the best possible solution that will make you and the PigOut family happy. Below we have listed the legal issues that concern us and our recommendations on each matter. First off I want to point out to you the essential elements that will bind you in a contract. The law will only recognize contracts where there is intention to create legal relations. Parties to an agreement concerning commerce or business intend to be legally bound. The court will look at the conduct of the parties to determine whether there was intent or not. Secondly an offer is a proposal and upon acceptance a legally binding contract is formed. The third element of a contract is consideration. A legally enforceable contract must be supported by consideration. Consideration is usually money, however, a promise to do something can amount to consideration. The fourth binding contractual element is capacity. A contract may not be valid if one or both parties lack the legal capacity to contract. Intoxicated people have the incapacity to enter enforceable contracts...

Words: 1213 - Pages: 5

Premium Essay

It Failure Paper

...Running Head: THE BREACHING OF TARGET 1 The Breaching of Target: What Happened and How It Could Have Been Prevented THE BREACHING OF TARGET 2 The Breaching of Target: What Happened and How It Could Have Been Prevented In December of 2014, hackers infiltrated Target’s credit card system. These hackers obtained over 40 million customer’s credit card information along with 70 million customer’s personal information. What should have been Target’s most profitable season, actually turned into its worst. They lost many loyal customers while obtaining numerous lawsuits. Before this catastrophe, Target was known for being an extremely technologically advanced and secure corporation. This is why many customers are left wondering what happened and how it could have been prevented. The hackers that breached Target’s system supposedly used a piece of software called BlackPOS (Monocello, 2014). This piece of malware obtained its information from the black magnetic stripe on the back of each credit card as it was swiped. Stores use a POS system to swipe credit cards. This is how they obtain required information. However, the information does not come encrypted, so it is easy information for an advanced hacker to receive. A simple way to encrypt this information is by using an EMV chip and EMV chip reader. According to Rash (2013), “The EMV chip that's embedded...

Words: 898 - Pages: 4

Premium Essay

Monteray Damages

...Damages: In most situations, when a breach of contract occurs, the non-breaching party has a duty to take whatever action is reasonable to minimize the damages caused by the breach.  For example, in most instances, people who are fired by their employer, regardless of the reason, have a duty to find a new job. Likewise, a thwarted house buyer has a duty to take reasonable steps to locate another house.  Liquidated Damages: Many contracts contain provisions specifying a sum certain of money to be paid by the breaching party in the event that he fails to perform as required by the contract. Generally speaking, the liquidated damages are based on a reasonable estimate of the value of the promised performance.  Penalties: By contrast, a penalty provision specifies a sum certain of money, bearing no reasonable relationship to the value of performance, to be paid by the breaching party in the event of default or breach. Penalty provisions are rarely enforceable. EQUITABLE REMEDIES  In addition to the various types of money damages, there are several equitable (i.e., non-damage) remedies available.  Rescission: Canceling a contract and returning the parties to their pre-contract position.  Restitution: Returning goods, property, or money previously transferred in order to restore the non-breaching party to his pre-contract position.  Specific Performance: Requiring the breaching party to perform exactly as called for in the contract.  This remedy...

Words: 310 - Pages: 2

Premium Essay

The Essential Elements of a Contract and the Applicable Remedies in the Event of a Breach.

...Business I. The essential elements of a contract and the applicable remedies in the event of a breach. Four Essential Elements of a Contract An agreement must contain four essential elements to be regarded as a contract. If any one of them is missing, the agreement will not be legally binding. a. Offer There must be a definite, clearly stated offer to do something. For example: A quotation by sub-contractor to the main contractor and an offer to lease. An offer does not include ball park estimates, requests for proposals, expressions of interest, or letters of intent. An offer will lapse: * when the time for acceptance expires * if the offer is withdrawn before it is accepted * After a reasonable time in the circumstances (generally the greater the value of the contract, the longer the life of the offer). Invitation to treatAn invitation to treat is a mere declaration of willingness to enter into negotiations; it is not an offer, and cannot be accepted so as to form a binding contract. An agreement is not created if there is an acceptance of the invitation to treat.An invitation to treat is part of the preliminaries of negotiation, whereas an offer is legally binding once accepted, subject to compliance with the terms of the offer. For example: Invitations to treat are advertisements, price lists, circulars and catalogues. | b. Acceptance Only what is offered can be accepted. This means that the offer must be accepted exactly as offered without...

Words: 2981 - Pages: 12

Premium Essay

Torts

...A. Torts 1. Compensatory and Punitive Damages Tort law involves civil liability between private parties. A plaintiff who wins a tort suit usually recovers the actual damages or compensatory damages that she suffered because of the tort. Depending on the facts of the case, these damages may be for direct and immediate harms, such as physical injuries, medical expenses, and lost pay and benefits, or for harms as intangible as loss of privacy, injury to reputation, and emotional distress. In cases where the defendant’s behavior is particularly bad, injured victims may also be able to recover punitive damages. Punitive damages are not intended to compensate tort victims for their losses. Instead, they are designed to punish flagrant wrongdoers and to deter them and others from engaging in similar conduct in the future. Theoretically, therefore, punitive damages are reserved for the worst kinds of wrongdoing. Punitive damages have always been controversial, but they have grown more so in recent years due to the size of some punitive damage awards and the perception that juries are awarding them in situations where they are not justified. 2. Negligence Defenses The common law traditionally recognized two defenses to negligence: contributory negligence and assumption of risk. In many states, however, one or both of these traditional defenses has been superseded by new defenses called comparative negligence and comparative fault. Contributory negligence is the plaintiff’s...

Words: 3405 - Pages: 14

Premium Essay

Contracts-Rules Outline

...Contracts Rules Outline |Intent to Contract: | |Applicability of the UCC: Uniform Commercial Code applies to contracts for the sale of goods | |Unilateral Contract: A contract in which a Promise is exchanged for an action | |Bilateral Contract: A contract in which a promise is exchanged of a promise. | |Formation of Contract | | |Mutual Assent: Mutual assent occurs when one party makes an offer, and prior to the expiration or termination of the offer, the other | | |party accepts the offer | | | |Offer- A communication to a recipient, that a reasonable person, under similar circumstances would believe created the power of | | | |acceptance. | | | |Acceptance - An offer is accepted when the person to whom it was communicated (“offeree”) assents to the terms of the offer, as | | | |proscribed by the terms of the...

Words: 2857 - Pages: 12

Premium Essay

Ethical Frameworks

...absolute even though it is a patient’s right. Certain situations exist where medical staff is obligated to breach confidentiality, especially when they feel that it is in the patient’s interest to do so. The following are implications of breaching confidentiality: “1) breaching confidentiality fails to respect patient autonomy, 2) violation of patient confidentiality is a form of betrayal, and 3) patients have a right to confidentiality that has frequently been demonstrated in common law and in some specific areas outlined in statute law” (ministryofethics.co.uk, 2010). Confidentiality is a principle in nursing that makes nurses preserve the privacy of their patients and grant them their autonomy. Respect for the patients is being shown while maintaining confidentiality. This task makes nurses, physicians, and other medical staff accountable. Breaching confidentiality has a major tendency to cause harm or the patient refusing further medical care. “Undue harm can be described as embarrassment, ridicule, discrimination, deprivation of rights, physical or emotional harm and loss of roles or relationships. One’s personal values and principles establish the foundation for ethical knowledge and decision making. There are instances, however, when breaching confidentiality is necessary to prevent harm to the patient or community” (Burkhardt & Nathaniel, 2008). “"Ethical principles...

Words: 1043 - Pages: 5

Free Essay

Ensayo

...procedures and special considerations that are used by platoons and squads throughout the planning and execution of operations in a urban area. Section I. OFFENSE While operating in urban areas, the major offensive collective tasks at platoon and squad level are attacking and clearing buildings. This involves isolating the objective, suppressing the threat, advancing the assault element, assaulting the building, clearing the building, and consolidating and reorganizing the force. Regardless of the type of urban area or the structural characteristics, there are six interrelated requirements for attacking a defended building: • Isolation of the building or objective. • Supporting fires. • Tactical movement • Breaching. • Assaulting. • Reorganization. Proper application and integration of these requirements can reduce casualties and hasten accomplishment of the mission. The platoon leader, when developing the plan for an attack on an urban objective, must consider the type of building to be assaulted, the rules of engagement (ROE), and the nature of the surrounding urban area. These considerations will determine the method of execution. For example, medium-size towns have numerous open spaces, and larger cities have high-rise apartments and industrial and transportation areas that are separated by parking areas or parks. Increased fire support is required to suppress and obscure enemy observation and fires that may be covering the open...

Words: 13697 - Pages: 55

Free Essay

Combat Engineering

...camouflage erection, field fortification construction, obstacle clearance, and obstacle construction, assault of fortifications, bridge erection, use of assault boats in water obstacle crossings, expedient road and helipad construction, general construction, route reconnaissance and road reconnaissance, and erecting communication installations. All these role activities and technologies are divided into several areas of combat engineering: Mobility Improving the ability of one's own force to move around the battlefield. Combat engineers typically support this role through reduction of enemy obstacles which include point and row minefields, anti-tank ditches, wire obstacles, concrete and metal anti-vehicle barriers and wall and door breaching in urban terrain. Mechanized combat engineer units also have armored vehicles capable of laying short bridges for limited gap-crossing. * Clearing terrain obstacles * Overcoming trenches and ditches * Opening routes for armored fighting vehicles * Constructing roads and bridges Countermobility Building obstacles to prevent the enemy from moving around the battlefield. Destroying bridges, blocking roads, creating airstrips, digging trenches, etc. Can also include planting land mines and anti-handling devices when authorized and directed to do so. When the defender must retreat it is often desirable to destroy anything that may be of use to the enemy, particularly...

Words: 655 - Pages: 3