Premium Essay

Graffiti Is Vandalism Research Paper

Submitted By
Words 227
Pages 1
Have you ever been offended by something said or written on a wall? There is an ongoing war on wether graffiti is vandalism or art. Graffiti is something that people paint or draw the the sides of trains, old buildings, concrete wall, and anywhere there is an open space. Graffiti is vandalism. First, Graffiti cost the government a lot of money. Secondly, people don’t feel safe with graffiti. Finally, people are dissatisfied with the solutions to the problem.
Some may argue that graffiti is art because it is freedom of expression. However, some graffiti is offensive and inappropriate because they use inappropriate words and pictures. The article states, “... Graffiti is mildly insulting and can be aesthetically immature.”
People are dissatisfied

Similar Documents

Premium Essay

Graffiti Vandalism

...GRAFFITI VANDALISM IN BARANGAY BUGO: A STUDY A research proposal Presented to Mr. Bonifacio R. Labadan Mindanao University of Science and Technology Cagayan de Oro City In Partial Fulfillment of The Requirements Of Research 10 Submitted by: Sheen Ruby O.Salcedo Marcela R. Salas Anacel C. Senagonia March 2012 Chapter I THE PROBLEM Introduction Look around a certain community; do you see spray-painted gates? Walls covered with irritating drawings? Spray-painted walls? Damage posters due to unnecessary markings? Cars polished with markers? Or any obscene and violent language scrawled on brick walls? This is what you call graffiti vandalism; any unknown person damaging properties by writing, drawing, and painting, spraying or etching on it or otherwise marking on it without the full awareness of the owner (Local Government New Zealand, Beat Graffiti Guide 2006). Public buildings and facilities are the usual prey for graffiti vandals. Private properties however, are not...

Words: 2272 - Pages: 10

Premium Essay

Graffiti Vandalism

...GRAFFITI VANDALISM IN BARANGAY BUGO: A STUDY A research proposal Presented to Mr. Bonifacio R. Labadan Mindanao University of Science and Technology Cagayan de Oro City In Partial Fulfillment of The Requirements Of Research 10 Submitted by: Sheen Ruby O.Salcedo Marcela R. Salas Anacel C. Senagonia March 2012 Chapter I THE PROBLEM Introduction Look around a certain community; do you see spray-painted gates? Walls covered with irritating drawings? Spray-painted walls? Damage posters due to unnecessary markings? Cars polished with markers? Or any obscene and violent language scrawled on brick walls? This is what you call graffiti vandalism; any unknown person damaging properties by writing, drawing, and painting, spraying or etching on it or otherwise marking on it without the full awareness of the owner (Local Government New Zealand, Beat Graffiti Guide 2006). Public buildings and facilities are the usual prey for graffiti vandals. Private properties however, are not...

Words: 2272 - Pages: 10

Premium Essay

Intro to Security

...SUMMARY  EXECUTIVE SUMMARY  The Maryland Public Safety Education and Training Center is located in Sykesville, Maryland. The physical plant is generally divided into two areas on grounds totaling approx. 700 acres. The firearms Training Facility (FTF) and the Drivers Training Facility (DTF) are co-located approx. 2 miles from the Academic Center. These training areas are un-fenced, and goes through public roadway and to several residential communities; closest houses being approx. . . .25 miles. The FTF facility has staff offices, classrooms, armory, weapon cleaning area and outdoor ranges which is approx. 25 miles from the FTF.  The Academic and administrative Complex (AAC) is located on the ground of the Maryland Springfield State (Mental) hospital, and hosts approx. 400 patients. AAC has offices and classrooms, computer labs, a food preparation area and dining hall, and shops. Two residential dorms for overnight guests/students, a physical training center and it include offices, classrooms, basketball gym, weight room, and swimming pool.  PSETC has 122 staff members, including DTF, FTF, and there is currently no security for PSETC. The hours of operation are 7:30 am to 5:00 pm, Monday through Friday for all facilities and it has about 450 students daily in law enforcement and correctional training programs. 150 guests/students can stay overnight; there is a contractor who prepares food, for them. The record maintenance for all administrative reports for PSETC members...

Words: 3210 - Pages: 13

Premium Essay

The Effects of War and Peace on Foreign Aid in Somalia

...Different kinds of computer Technology within law enforcement and courts Cover page Abstract Law enforcement units and courts have made advanced technologies in crime detection and prevention. The past technologies mainly used were mainly aviation technology such as use of planes and helicopters and biometrics. The new computer technologies involve use of crime lights, in-car camera systems, graffiti cameras, thermal imaging, lasers, language translators, less-lethal technologies diagramming systems and global positioning system. It enables the responding of a crime activity in a very short time possible and transfer of information efficiently over a longer distance. This paper involves the research on both past and present technology. Past technology Aviation Technology In the past, technology used in law enforcements or police departments included planes and helicopters which acted to save resources and time. It was used in searching for a missing person and doing a survey of a scene. Biometrics technologies This is the technology which used the physical features or behavior of a person to identify it. The methods used included identification of fingerprints, face, voice, iris, signature and handwritings to detect the criminals. Body Armor This was used to protect a criminal investigation officer or police from injury or death through protection from gun and rifle ammunitions, knife stabs and other sharp weapons .The protective vests was mainly used and was composed...

Words: 1262 - Pages: 6

Free Essay

Day Laborers

...U.S. Department of Justice Office of Community Oriented Policing Services Problem-Oriented Guides for Police Problem-Specific Guides Series No. 44 Disorder at Day Laborer Sites by Rob T. Guerette www.cops.usdoj.gov Center for Problem-Oriented Policing Got a Problem? We’ve got answers! Log onto the Center for Problem-Oriented Policing website at www.popcenter.org for a wealth of information to help you deal more effectively with crime and disorder in your community, including: • Web-enhanced versions of all currently available Guides • Interactive training exercises • Online access to research and police practices • Online problem analysis module. Designed for police and those who work with them to address community problems, www.popcenter.org is a great resource in problem-oriented policing. Supported by the Office of Community Oriented Policing Services, U.S. Department of Justice. www.PopCenter.org Problem-Oriented Guides for Police Problem-Specific Guides Series Guide No. 44 Disorder at Day Laborer Sites Rob T. Guerette This project was supported by cooperative agreement #2004CKWXK002 by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position of the U.S. Department of Justice. References to specific companies, products, or services do not constitute endorsements from the author(s) or the Justice Department. Rather...

Words: 10945 - Pages: 44

Premium Essay

Criminal Justice

...The police and neighborhood safety BROKEN WINDOWS by JAMES Q. WILSON AND GEORGE L. KELLING James Q. Wilson is Shattuck Professor of Government at Harvard and author of Thinking About Crime. George L. Kelling, formerly director of the evaluation field staff of the Police foundation, is currently a research fellow at the John F Kennedy School of Government Harvard. In the mid-1970s, the state of New Jersey announced a "Safe and Clean Neighborhoods Program," designed to improve the quality of community life in twenty-eight cities. As part of that program, the state provided money to help cities take police officers out of their patrol cars and assign them to walking beats. The governor and other state officials were enthusiastic about using foot patrol as a way of cutting crime, but many police chiefs were skeptical. Foot patrol, in their eyes, had been pretty much discredited. It reduced the mobility of the police, who thus had difficulty responding to citizen calls for service, and it weakened headquarters control over patrol Officers. Many police officers also disliked foot patrol, but for different reasons: it was hard work, it kept them outside on cold, rainy nights, and it reduced their chances for making a “good pinch.” In some departments, assigning officers to foot patrol had been used as a form of punishment. And academic experts on policing doubted that foot patrol would have any impact on crime rates; it was, in the opinion of most, little more than a sop to public...

Words: 6932 - Pages: 28

Premium Essay

Ethical Hacking

...brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients. T he term “hacker” has a dual usage in the computer industry today. Originally, the term was defined as: HACKER noun 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. 1 This...

Words: 6482 - Pages: 26

Premium Essay

Ethical Hacking - C.C. Palmer

...brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients. scribe the rapid crafting of a new program or the making of changes to existing, usually complicated software. As computers became increasingly available at universities, user communities began to extend beyond researchers in engineering or computer science to other individuals who viewed the computer as a curiously flexible tool. Whether they programmed the computers to play games, draw pictures, or to help them with the more...

Words: 6481 - Pages: 26

Premium Essay

Cults and Sects

...Crime and Deviance Revision SCLY 4: Crime and Deviance with Methods in Context Sociology Department Greenhead College SCLY 4: Crime and Deviance with Methods in Context Remember: You have to revise everything, because you have no choice on the exam paper. The specification 1 Different theories of crime, deviance, social order and social control * Different definitions of crime, deviance, social order and social control * The distinction between sociological theories of crime and other theories (eg biological, psychological); crime and deviance as socially constructed * Functionalist theories of crime: Durkheim, anomie, collective conscience; Merton’s strain theory; manifest and latent functions; functionalist subcultural theories * Marxist and neo-Marxist theories of crime: classical Marxism, laws reflecting class interests; Neo-Marxism, hegemony, the CCCS studies, critical and new criminology * Interactionist theories of crime: labelling theory, the self-fulfilling prophecy * Feminist theories of crime: patriarchy, male control of women’s lives * Control theory and other contemporary approaches to crime: social bonds, communitarianism, situational prevention; postmodern theories; Foucault on individualisation and surveillance * Realist theories: New Left Realism and Right Realism * The relevance of the various theories to understanding different types of crime, and their implications for social policy. 2 The social distribution...

Words: 25825 - Pages: 104

Premium Essay

U.S Supreme Court Case Buck V. Bell

...Crime and Deviance Revision SCLY 4: Crime and Deviance with Methods in Context Sociology Department Greenhead College SCLY 4: Crime and Deviance with Methods in Context Remember: You have to revise everything, because you have no choice on the exam paper. The specification 1 Different theories of crime, deviance, social order and social control * Different definitions of crime, deviance, social order and social control * The distinction between sociological theories of crime and other theories (eg biological, psychological); crime and deviance as socially constructed * Functionalist theories of crime: Durkheim, anomie, collective conscience; Merton’s strain theory; manifest and latent functions; functionalist subcultural theories * Marxist and neo-Marxist theories of crime: classical Marxism, laws reflecting class interests; Neo-Marxism, hegemony, the CCCS studies, critical and new criminology * Interactionist theories of crime: labelling theory, the self-fulfilling prophecy * Feminist theories of crime: patriarchy, male control of women’s lives * Control theory and other contemporary approaches to crime: social bonds, communitarianism, situational prevention; postmodern theories; Foucault on individualisation and surveillance * Realist theories: New Left Realism and Right Realism * The relevance of the various theories to understanding different types of crime, and their implications for social policy. 2 The social distribution...

Words: 25825 - Pages: 104

Premium Essay

Customer Is Not Always Right

...An Analysis on How to Handle Dysfunctional Customers And how they affect on Food Servers in selected Restaurants at Eastwood City ------------------------------------------------- A Method of Research and Thesis Paper Presented to the Faculty of the Hotel and Restaurant Management Arellano University - Pasig ------------------------------------------------- In Partial Fulfilment of the Requirement for the Degree in Bachelor of Science in Hotel and Restaurant Management Presented By: Calinao, Loreinn G. Tierra, Alyssa Marie G. Encio, Mary Bless Estrada, Erik E. Romero, Jerry Arellano University – Pasig Pag-Asa St. Brgy. Caniogan Pasig City Approval Sheet In partial fulfillment of the requirements for the degree of Bachelor of Science in Hotel and Restaurant Management this Method of Research entitled “AN ANALYSIS ON HOW TO HANDLE DYSFUNCTIONAL CUSTOMERS AND HOW THEY AFFECT FOOD SERVERS IN SELECTED RESTAURANTS IN EASTWOOD CITY” was prepared and submitted to the College of Hotel and Restaurant Management. PROF. LOUIE REYES Adviser Approved by the members of panel on October 2014. With a grade of ____ ________________________________________ Chairman _______________ _______________ _______________ Member Member Member Accepted in partial fulfillment of Bachelor of Science in Hospitality and Restaurant Management PROF. KATHERINE GUEVARRA ...

Words: 13057 - Pages: 53

Free Essay

Construction Industry

...S.PALAVESAKRISHNAN palavesakrishnan@gmail.com Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Background to the Project. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Defining the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 The Nature and the Scope of the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Risk of Break-ins and Builder Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Selecting and Implementing the Preventive Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Monitoring Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Evaluating the Preventive Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Summary of the Results of the Experiment . ...

Words: 15894 - Pages: 64

Premium Essay

Discovery Recovery Plan for Kudler

...Executive Summary Kudler Fine Foods was first established in 1998 with an objective strongly focused on providing its clients the opportunity to buy fresh ingredients used to make delicious cuisines. Since then, Kathy Kudler (founder) has opened two more locations to satisfy her target market’s thirst for her product(s). Although this small business expansion has increased the customer base and or revenue pursued by its owner, the induction of additional services provided has also slightly altered the projected operations plan and or business plan. Kudler Fine Food’s mission states that it will “provide its customers with the finest selected foodstuffs, wines, and related needs in an unparalleled consumer environment“(Apollo Group, 2008). In order for Kudler to meet the needs of the consumer at all times, administration has proposed a review of the companies operations and or communication plan(s) be reviewed for contingency of any unforeseen threats to daily operations. Scope To assist the company in their daily functions, Kudler Fine Foods stores information used to determine market conditions, customer demographics, individual store sales, employee demographics, payroll, administrative functions, and other human resource related information. A post review of Kudler’s fixed operations reveals the company is currently unprepared for any and all potential threats that may halt daily operations for an over-extended period. Potential threats that Kudler may face are: breach and...

Words: 5884 - Pages: 24

Premium Essay

Stuff

...CHAPTER 7 DEVIANCE AND SOCIAL CONTROL Deviance 171 Social Policy and Social Control: Illicit Drug Use in Canada and Worldwide 193 What Is Deviance? 171 Explaining Deviance 175 Social Control 182 Conformity and Obedience 182 Informal and Formal Social Control Law and Society 186 Crime 185 187 Types of Crime 188 Crime Statistics 190 The Issue 193 The Setting 193 Sociological Insights 193 Policy Initiatives 193 Boxes RESEARCH IN ACTION: Street Kids 183 sOCIOLOGY IN THE GLOBAL COMMUNITY: Singapore: A Nation of Campaigns 186 TAKING SOCIOLOGY TO WORK: Holly Johnson, Chief of Research, Canadian Centre for Justice Statistics, Statistics Canada 192 Cigarette smoking has become stigmatized in Canada. This newspaper advertisement, sponsored by Health Canada, reverses the typical advertising strategy of equating smoking with sexiness. 169 H eidi Fleiss was in her late twenties when she was arrested for operating a call girl service. At the time, her pediatrician father had reacted flippantly, “I guess I didn’t do such a good job on Heidi after all.” Later, he would be convicted of conspiring to hide profits from his daughter’s call girl ring. Fleiss had dropped out of school when she was sixteen and established a liaison with a playboyfinancier who gave her a Rolls-Royce for her twenty-first birthday. In her early twenties, Fleiss interned in the world of prostitution by working for Madame Alex (Elizabeth Adams)...

Words: 18652 - Pages: 75

Free Essay

Contrato

...CHAPTER 14 Human Capitalism Parachuting cats into Borneo — Stopping the waste of people — Curitiba’s web of solutions — Faster travel without freeways — Subways on the surface — Simple, fast, fun, and cheap — When garbage isn’t garbage — No hunger pangs — A place for living — A symbol of the possible W H AT D E S T I N AT I O N D O E S O U R S O C I E T Y W A N T T O R E A C H , A N D H O W W I L L I T get there? Lessons in what not to do can often be found in cities, where most officials, overwhelmed by a flood of problems, try to cope by naming and solving them one at a time. If they are faced with congestion, their answer is to widen streets and build bypasses and parking garages. Crime? Lock up the offenders. Smog? Regulate emissions. Illiteracy? Toughen standards. Litter? Raise fines. Homelessness? Build shelters, and if that seems to fail, jail the loiterers. Insufficient budget to fund all these competing priorities? Raise taxes or impose sacrificial austerity, to taste. Disaffected voters? Blame political enemies. Sometimes single-problem, single-solution approaches do work, but often, as previously described, optimizing one element in isolation pessimizes the entire system. Hidden connections that have not been recognized and turned to advantage will eventually tend to create disadvantage. Consider what happened in Borneo in the s. Many Dayak villagers had malaria, and the World Health Organization had a solution that was simple and direct. Spraying DDT seemed...

Words: 9994 - Pages: 40