Free Essay

Related Documents

In:

Submitted By dumz21
Words 2071
Pages 9
SOCIAL CONTROL

• What is Social Control?

In sociological dictionaries, “social control” is defined to include all social processes, institutions and methods that produce (or attempt to produce) conformity or regulate the individual and collective conduct of its members.

Social control refers generally to societal and political mechanisms or processes that regulate individual and group behavior, leading to conformity and compliance to the rules of a given society, state, or social group. Many mechanisms of social control are cross-cultural, if only in the control mechanisms used to prevent the establishment of chaos or anomie. Some theorists, such as Émile Durkheim, refer to this form of control as regulation. Sociologists identify two basic forms of social controls:
1. Internal Control- Internalisation of norms and values by a process known as socialization. Socialization is defined as "“the process by which an individual, born with behavioral potentialities of enormously wide range, is led to develop actual behavior which is confined to the narrower range of what is acceptable for him by the group standards.”
2. External Control- External sanctions, which can be either positive (rewards) or negative (punishment). These sanctions come from either formal or informal control.
While the concept of social control has been around since the formation of organized sociology, the meaning has been altered over time. Originally the concept simply referred to society’s ability to regulate itself. However, in the 1930’s, the term took on its more modern meaning of the individual’s conversion to conformity. Social control theory began to be studied as a separate field in the early 20th century. The means to enforce social control can be either formal or informal.[5] Sociologist Edward A. Ross argued that belief systems exert a greater control on human behavior than laws imposed by government, no matter what form the beliefs take.

Informal social control
The social values that are present in individuals are products of informal social control. It is exercised by a society without explicitly stating these rules and is expressed through customs, norms, and mores. Individuals are socialized whether consciously or subconsciously. During informal sanctions, ridicule or ostracism can cause a straying towards norms. The person internalizes these mores and norms. Traditional society uses mostly informal social control embedded in its customary culture relying on the socialization of its members
Informal sanctions may include shame, ridicule, sarcasm, criticism and disapproval. In extreme cases sanctions may include social discrimination and exclusion. This implied social control usually has more effect on individuals because they become internalized and thus an aspect of personality. Informal sanctions check 'deviant' behavior. An example of a negative sanction comes from a scene in the Pink Floyd film 'The Wall,' whereby the young protagonist is ridiculed and verbally abused by a high school teacher for writing poetry in a mathematics class. (Another example: About a boy, who hesitates to jump from a high springboard, is possible to say, that he is effeminate. By the fact, that he eventually jumps, he escapes from this denotation. His behavior is conditionally controlled by a shame, which is unpleasant.)

As with formal controls, informal controls reward or punish acceptable or unacceptable behaviour (i.e., deviance). Informal controls are varied and differ from individual to individual, group to group and society to society. For example, at a women's institute meeting, a disapproving look might convey the message that it is inappropriate to flirt with the minister. In a criminal gang, on the other hand, a stronger sanction applies in the case of someone threatening to inform to the police.

Formal social control
Informal social control is often not sufficient in a large society in which an individual can choose to ignore the sanctions of an individual group. Thus, there is a need for formal control to supplement informal control. This form of control usually takes the form of government action. Government and organizations uselaw enforcement mechanisms and other formal sanctions such as fines and imprisonment. In democratic societies the goals and mechanisms of formal social control are determined through legislation by elected representatives and thus enjoy a measure of support from the population and voluntary compliance. Douglas D. Heckathorn notes that the effectiveness of any type of formal control is determined by the relative strength of the sanction in terms of extent of punishment, monitoring ability, and degree of group or informal control on the individual

• SOCIAL CONTROL AIMS FOR CONFUMITY

• REGULATES HUMAN BEHAVIOR

This report considers social control in terms of its role in securing conformity with established norms by preventing, adjudicating, remedying and sanctioning non-compliance. It focuses on intentional, planned and programmed responses by state authorities and corporations to activities, behaviours or status that are perceived to be criminal, problematic, undesirable, dangerous or troublesome. The anchors of this form of social control are institutions that deal with crime, dangerousness, delinquency and other social problems, including the criminal justice system, the health system, immigration and border control, the welfare system and urban planning authorities.
For purposes of human rights policy, this enquiry is concerned with:
• Forms of social control that are state-centred: criminal justice (criminal law, policing, courts, prisons) and other systems of legal and administrative regulation (e.g., immigration controls, welfare, urban planning);
• Privatised systems of formal social control and security, such as private prisons or policing; National, regional and global regimes of control and regulation (e.g., IHR, the IOM, Europol);
• Less explicit but significant social control dimensions of other state or non-state institutions, such as the media or institutions engaged in education, planning, and health and welfare.
The report gives little attention to forms of informal social control that are “outside” the State’s purview (such as socialisation, shame, gossip, public ritual, peer pressure). The importance of such measures and of related non-state actors is undeniable, but it was beyond the scope of this research to look at them in any detail.The report and the research on which it relies draw on an approach to social control that can be traced back to “critical” or “radical” sociology at the end of the 1960s.It will be referred to as “social control theory” or as the “social control perspective”. The approach adopts a social constructionist analysis of social problems. It assumes that social problems consist of an “objective” condition (e.g., the existence of homeless people, undocumented migrants, sexual offenders) and also a “subjective” condition (i.e., the perception that certain behaviors’ are undesirable or threaten dominant values or interests). A social problem goes through stages of “claims-making” which run from the initial creation of a problem to its categorisation (e.g., as a crime, an illness, a human rights violation) to a method of intervention (punishment, treatment, or political action).
For example, consider the category of “anti-social behaviour” in the United Kingdom (UK). The Crime and Disorder Act (1998) declares that behaviour causing (or likely to cause) “...harassment, alarm or distress to one or more persons…” can be characterised legally as anti-social. The anti-social character of an act does not lie in the act itself but in the reaction of others to it. Parmet signals how important it is to understand the social construction of risk, and address it in policy, arguing that “public health theory and international law overlook the role that social factors play in determining the nature and extent of health risks, as well as how risks are perceived and what interventions are chosen”.
A social control perspective questions how a behaviour or activity comes to be constructed as a social problem or crime and seeks to throw light on the forces that shape attitudes and policy formation, shifts in those forces, and their relationship with larger socio-political processes and institutions.“Naming” a category can be controversial. This is clear from discussions of prostitution, where the descriptors “women in sex work”, “women in the sex trade”, “sex workers”, or “commercial sex workers” each imply different, often nuanced understandings that reflect distinct worldviews and political or moral positions. Use of the term “irregular migrant” rather than “illegal migrant”, or “person who uses drugs” versus “drug abuser” can be significant in exactly the same way.
Once categories have been created, people and behaviours must then be attributed to them. An important aspect of subjective attribution is that at different times and in different places the same behaviour may be perceived and responded to in quite different ways. A psychologist working with sex offenders in the US, commenting on changes of attitude (that now a 17-year-old teenager who has sex with his 15-year-old girlfriend or a drunk who exposes himself in public may be categorised as “sexual predators”, whereas a man exposing himself on a popular TV show was once considered funny) wonders how we come to “fear and hate what we once found pathetic or even humorous”.
Categorisation determines who is labelled as criminal or dangerous, and this judgment is then liable to be articulated in criminal law and governance practices. A vast apparatus of procedures, personnel, expertise and organisations is now devoted to the selection and application of judicial and non-judicial controls to identify people and behaviours that fit categories (“rule enforcement”). Some agencies that do this work have long been the focus of human rights attention, including the police, immigration and border control authorities, and parts of the criminal justice system. Others (e.g., welfare agencies, the health service, urban planners) have been scrutinised far less. These institutions increasingly employprivate agencies to whom States have devolved the delivery of certain services.
Individuals or groups may be regulated by or subject to social controls because their existence is perceived to be threatening or to lie outside the dominant norms of society: they are considered deviant or dangerous, not necessarily for what they have done, but because of who they are or the traits they possess. Non-compliant behaviour or status, or its consequences, may be considered criminal, deviant, or asocial problem, or even a human rights violation and may be subject to measures of social control as a result.
In Visions of Social Control (1985), Stanley Cohen traces four key changes in modes of social control that occurred in the course of the nineteenth and the mid-twentieth centuries:
• The locus of social control moved from informal social institutions to the State;
• Deviants were classified and differentiated in various categories, each meriting scientific examination and expertise;
• Different types of custodial institutions emerged;
• Policy focused on changing the hearts and minds of offenders rather than on infliction of physical suffering.
In the 1960s, a counter-discourse emerged, which, according to Cohen, called for decentralisation, deprofessionalisation, decarceration and decriminalisation. Such “destructuring” movements downplayed due process in favour of non-intervention, inclusionary controls and pursuit of alternative correctional justice mechanisms. Cohen and other scholars have documented that this movement had the unintended consequence of excluding targeted groups because the alternative measures of control they espoused did not replace but only complemented the criminal justice system. As a result, the range of controls to which people could be subject broadened. An upsurge of interest in the rights of people who became enmeshed in the criminal justice system (particularly in the penal context), apparent in the second half of the 20th century, was overtaken during the 1990s and early 21st century by a preoccupation with risk. Concern about the risks that crime poses to potential victims caused a significant shift in social control practices. Governments focused increasingly on finding effective forms of control and crime prevention and paid less attention to the causes of crime and deviance. Social control today is characterised by the following features:
a) Continued expansion of exclusionary practices, especially detention (often referred to as “hard” measures), including imprisonment in a criminal context but also civil commitment for mental illness or drug dependence, detention for irregular migration, etc.;
b) Continued expansion of inclusionary practices (“soft” measures), such as CSMs, electronic tagging, home confinement, etc.;
c) Emergence of pre-emptive inclusionary controls, notably the use of surveillance;
d) Justification of the above policies in terms of protecting the public from crime, immigration and insecurity more generally (especially after the terrorist attacks in the US in September 2001).
Groups may be subject to social controls because they are perceived as a threat or abnormal, considered deviant or dangerous, not necessarily for what they have done, but because of who they are or the traits they possess.

Similar Documents

Premium Essay

Case

...polices are ill-defined and in consistently applied. Facts: 1. 1995 Employment of relatives rule in included in General Operational Manual – Not all employee have access to it. Use of word “antinepotism” term used in this manual. 2. In 1998 employee hand book is published using “antinepotism” language. 3. 01/05/1999 Keith W. Walton applies for employment and declares that he had no relatives working in the company. He did not know of his uncle being hired at that time. 4. 04/30/1999 Keith W. Walton is hired as a helper 5. 2003 Employment of Relatives policy is inserted in employee handbook. 6. 10/2006 Confused supervisor tells employee not to worry after learning that he had a relative at work after he asked whether he was related by blood or marriage. 7. 11/02/2006 Termination of Keith Walton 8. Company has a well established and consistently enforced with past precedent examples of their “employment of relatives” policy which prohibits the hiring of relatives since 1995 9. Language of such a rule, use the word “may” (be discharged) as opposed to “shall” be discharged. Is in the handbook. Company’s Position. 1. Union is trying to obtain through arbitration what they fail to obtain during negotiations the repealing or change in interpretation of the policy relating to the employment of relatives. 2. Company argues long standing, consistent enforcement and well know antinepotism policy. 3. Company argues that language of the employee handbook “May” vs...

Words: 328 - Pages: 2

Free Essay

Rlyt Task 1

...with 12 offices in the western United States stretching from Oregon to California and inland to New Mexico. Simple Gateways focuses on travel to island vacations around the world. They are challenged with poor performing Information Systems (IS). Simple Gateway IS produce multiple versions of documents utilized by staff to make poorly informed business decisions. This paper is an analysis of the challenges to the key Simple Getaways stakeholders, actual performance and desired performance. A technological solution is defined and supported to address the alignment of the IS to the Simple Gateways business objectives. Simple Getaways, Inc. Request for Proposal Response 3 Simple Getaways, Inc. Request for Proposal Response The current implemented IS in the Simple Gateways is designed to provide control benefits. The IS was intended to facilitate information to provide the stakeholder the ability to make better decisions and actions. (Chew & Gottschalk, 2009) The current IS produces multiple versions of the same documents used by the office staff. The offices are segregated from each other with their own file servers making e-mail channels the current means to share documents from one store to another. The multiple versions does not assure the information to be accurate or up to date. The staff is then left with misinformation to make decisions. The Simple Gateways IS does not provide a process to perform administrative tasks like approving sick leave or vacation...

Words: 1040 - Pages: 5

Premium Essay

Laboratory Information Management System (Lims)

...2010) The main feature of a laboratory information management system is the management of registering and tracking if samples and test that take place in the laboratory. After the sample container arrival and registration, the LIMS tracks it and records its location. This may involve printing barcodes to identify the sample containers. However, it is also used to increase the amount of integration with instruments and applications what is done by creating files which will lead the operations on the sample; and to record and exchange electronic information what can be done through Oracle, SQL and Microsoft Access database. (Nicola 2012) Alongside the main functions mentioned above, a LIMS also manages the communication with clients, documents related to the samples and the personnel and workload. List of the main types of information that would need to be stored on a laboratory information management system: 1. Control of Substances Hazardous to Health (COSHH) records. 2. Scientific data. 3. Scientific apparatus. 4. Waste disposal. 5. Health and safety checks. 6. Training records. 7. Quality assurance. 8. Report records. 9. Specification levels. 10. Sample throughput. 11. Management. How information could be entered onto a laboratory information system: Information can be entered onto a laboratory management system using...

Words: 448 - Pages: 2

Premium Essay

Business Documents Nvq

...1.1 Describe different types of business documents that may be produced and the format to be followed for each. Business cards: These are used to give the customer information on how to contact the company. These can be electronically formatted in Word and then formatted on card when printed. Fax Document: Another type of document used in business is a Fax document; these are very useful in business and are the fastest ways to transmit documents. These are in paper format, either in colour or black and white. Agenda: Agendas tell you what is going to take place. They help people get organised so that they know exactly what they should do and what is going to happen. These are in paper format when taken to meetings, and can be distributed electronically....

Words: 1835 - Pages: 8

Free Essay

Mba Marketing Sales

...[pic] LIST OF DOCUMENTS TO BE SUBMITTED BY NEW STUDENTS AT THE TIME OF REPORTING AT THE INSTITUTION I Hostel Registration Students are required to report at the hostel as per dates specified by Joint Director Hostel Admin & submit the following documents. 1. Three copies of details of parents and local guardian along with self photographs on the prescribed registration form 2012 – 13. 2. Photocopy of Hostel payment receipt 3. 2 additional self photographs for Hostel ID card & Hostel register II Registration at the Institution Students are required to report at 10:00 A.M. at the institution for Registration on the day of commencement of the programme specified in the admission letter & submit the following documents. A. Documents related to educational qualifications List is being provided by Director Admissions B. Other Documents 1. Copy of admission offer letter 2. Print out of duly completed online Registration-cum-Enrolment Form (Amizone Print out) 3. Copy of Fee Receipt 4. Foreign Language option Form (Amizone Print-out) 5. Club / Committee option Form (Amizone Print-out) 6. 5 sets of passport size photographs 7. Two Anti Ragging Affidavits on Rs. 10.00 stamp paper each, one duly signed by the student and the other duly signed by the parent. ...

Words: 349 - Pages: 2

Free Essay

Hostel Management

...nt Hostel Management System Introduction Legal document Management system is a document management system prepared for the local court on pilot project basis. This project will help them to manage all legal cases registered in the court. Purpose The purpose of this document is to specify requirements and to give guidelines for the development of above said project. In particular it gives guidelines on how to prepare the above said project. This document is intended to be a practical guide for people who developing this software. Scope This is of pilot project prepared for the local court. We know each cases take very long time to complete, this delay depends on many factors. The one major factors is documents, when the hearing take place documents need produced in front of the court. This system help them to maintain all documents in order. Goal The main goal is computerize the local court. References Overview This is very useful application for the legal system. Once it serve the purpose all lawyers, advocates and other related people can use this software. Existing System At present all records are typed in typewriter and they are filed. Because of thousands of records searching for the required data is time consuming. Typing using the typewriter leads many problems. For each error they have to make a note and get the signatures. Also system is not pool proof. Proposed System In the proposed system all information will entered to system. All...

Words: 455 - Pages: 2

Free Essay

Lyt2 - Simple Getaways

...workflow. CHALLENGES AFFECTING KEY STAKEHOLDERS The processes currently being used at Simple Getaways for communication and the distribution of information are no longer suitable for the organization. Documents from each office are stored onsite on a Microsoft Windows file server, making it difficult for other offices to access and use the information they contain. Currently the method used to share files with other offices is via email. This results in multiple copies of the same document residing on various computers at multiple office locations. The duplicate versions are not updated when the original document is modified which leads to different versions of the same document being used. Some business decisions are being made using information from the outdated documents. For example, a document containing airline ticket pricing may be used when creating price quotes for customer travel, but the price for airline tickets fluctuates regularly. If these inaccurate prices were used in a quote, the company has the potential to lose money on the transaction and may be obligated to fulfil the terms of the quote even though it was based on incorrect information. Additionally, when a document is shared between multiple offices and they each make alterations and return the document, the...

Words: 1612 - Pages: 7

Premium Essay

Cgjfjfhjgf

...ARTIFICIAL INTELLIGENCE Artificial intelligence is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956 defines it as "the science and engineering of making intelligent machines. The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity.Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science. AI research is highly technical and specialized, and deeply divided into subfields that often fail to communicate with each other.]Subfields have grown up around particular institutions, the work of individual researchers, the solution of specific problems, longstanding differences of opinion about how AI should be done and the application of widely differing tools. The central problems of AI include such traits as reasoning...

Words: 7912 - Pages: 32

Premium Essay

Php Is the Best Programming Language

...to do a document aggregation based on the total number, subjects and writers (lecturers). The development method of KMS prototype is using sharepoints which are able to collect, store and publish all digital data available at the university which can be accessed online. Aggregation is using the percentage between the number of documents, subjects, and writers (lecturers). The aggregation’s result between the number of digital files compared to the number of courses and the number of lecturers are each below 10%. In the future, the university still needs to encourage all lecturers or academic community to increase the collection of digital files that can indirectly improve the quality and educational services. The impact of the implementation of KMS can cause changes into university, therefore before applying KMS, it is necessary to do some series of activities first aimed to assess the readiness of the university and do an inventory of knowledge so that university know the knowledge had by individuals. In general, some universities are implementing KMS which focused more on the development of KM system (which emphasizes on information technology) only without noticing aspects to human-related such as socio-cultural factors and leadership. This is emphasized by Karl Wiig that the understanding and implementation of KMS should focus more on human beings (people-focused) since knowledge and empowerment are closely related to humans...

Words: 263 - Pages: 2

Premium Essay

Scribd Upload a Document Search Documents

...Scribd Upload a Document Search Documents Explore Documents Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent People Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up | Log In Your Browser is Outdated Because you are not using a modern browser you will not have access to all of Scribd's features. Please consider upgrating to a modern browser: Close This Message Five Paragraph EssayI have never read a story like The Unicorn in the Garden and it definitely it was one of the beststories I have ever read. At the end of the story you don't know if the man really saw an unicorn or made it up so his wife would call the police. It really doesn't matter if he saw the unicorn or made it upthe point is that he gained what he wanted he got rid of his wife.The story also teaches a lesson, every little bad thing you do to someone can backfire twice ashard. The woman had called the police and the psychiatrist in the most meanest intention because shewanted to get rid of him, she did not love him after all. So what the man did was that he gave her of her own medicine, when the police asked if he saw an unicorn he replied using the same words that she hadused previously when he told her that there...

Words: 1015 - Pages: 5

Free Essay

Audit

...Part of your job as a staff associate in an auditing firm is to document your findings in working papers (also known as workpapers) and schedules. Workpapers summarize your audit actions, such as planning the audit. Schedules show what steps you take to reach a conclusion. For example, to support your conclusion that cash is correctly stated on the balance sheet, you may prepare a schedule showing all bank reconciliations affirming that they reconcile without discrepancy to the balance sheet. Your CPA firm specifies how you prepare all your audit documents. However, keep in mind that every workpaper stands on its own. This means that its purpose, source of information, and conclusions must be clearly evident. To prepare workpapers, you want to use the following elements: A descriptive heading: It should include the client’s name, the workpaper’s purpose, and the date under examination. Indexing: Like a book, every workpaper has a unique page number showing its place in the audit file. Cross-referencing: To improve your efficiency, you want to cross-reference your workpaper to related and supporting workpapers. Doing so eliminates the duplication of work. For example, if you file the client’s bank reconciliations in Section A and you refer to them in Section F, you don’t need to make copies of the bank reconciliations to place in Section F. Your cross-reference could be “See bank reconciliations in Section A.” Tick marks: For the sake of brevity...

Words: 339 - Pages: 2

Free Essay

Reporting

...Executive Summary: A Business Report is an objective and presentation of information in order to achieve some purpose. It is a basic management tool used in decision making. Report may be classified in different ways. Like on the basis of formalities, On the basis of function, On the basis of frequency of issue etc. The basic objective of the report is to know the salient features of writing report & how the formal reports are important in Business Communication. Business report has no single correct answer but several solutions, each with their own costs and benefits to an organization. Report may be targeted to readers inside or outside the organization. In formal reports we have three parts. Two is Preliminary parts & Report body & the other one is Supplementary parts. With introduction parts the reader can get the assignment main topic & also helps the reader’s follows & understands information. It is an important parts of a formal business report. Supplementary parts view the readers where he found the details of the topic. In formal report readers have the clear facts views. Accuracy of facts, precision, Brevity, Clarity etc are the characteristics of business report. Often reports are structured in a way that reflects the information finding process and the writing up of the findings that is, summary of the contents, introduction or background, methods, results, discussion, conclusion and/or recommendations. The inclusion of recommendations is one reason why reports...

Words: 3609 - Pages: 15

Free Essay

Metadata

...users navigate libraries effectively and find the documents they require. * Use folders only if you need to scope unique permissions on documents or if you need to make a subset of documents easily offline-able by Microsoft Outlook. * If your library has more than 2,000 items, be sure you remove the out-of-the-box default view, which shows all items. Add views with filters so that no view returns more than 2,000 items. Paging and grouping doesn't count. You must use a filter. (BTW, in its sneak peek of SharePoint 2010, Microsoft announced that SharePoint 2010 will have large-list support, so this won't need to be done much longer.)   1. Usability. Nested folder structure is only known to the person who created it. Also, too many sub-folders tend to “hide” things. 2. URL length limitation. SharePoint adds all folder and sub-folder names to URL. Overall URL length is limited to around 260 characters. You are out of luck if you create too many sub-folders. 3. File URL. Moving file from one folder to another means change of file URL. 4. Security. Maintaining Security by folders in SharePoint is an administrative nightmare. Don’t even think about doing it! 5. User experience. User Experience (navigation, finding the documents) just stinks with folders (it is so 1990’s!) 6. File duplication. With folders you can deposit multiple copies of same file into different locations – not a good thing when you try to organize documents and data in the first place! 7. 1 Lonely View....

Words: 651 - Pages: 3

Free Essay

Control Plans

...Document design – a control plan in which source document is designed to make it easier to prepare the document initially and later to input data from the document. Written/electronic approvals – form of signature or initials on a document to indicate that someone has authorized the event. Preformatted screens – control the entry of data be defining the acceptable format of each data field. Online prompting – requests user input or asks questions that the user must answer. Populate input screens with master data – the clerk enters the identification code for an entity and the system retrieves data about that entity from the master data. Compare input data with master data – we can determine the accuracy and validity of the input data. Procedures for rejected inputs – designed to ensure that erroneous data are corrected and resubmitted for processing. Programmed edit checks – automatically performed by data entry programs upon entry of the input data. Reasonableness checks or limit checks – test whether the contents of the data entered fall within predetermined limits. Document/record hash totals – reflect a summarization of any numeric data field within the input document or record, such as item numbers or quantities on a customer order. Mathematical accuracy checks – compare calculations performed manually to those performed by the computer to determine whether a document has been entered correctly. Check digit verification – involves the inclusion...

Words: 504 - Pages: 3

Premium Essay

Home Automation System for Dragonvale

...System Trainee at Parson Land Development Company. You have received an email from your supervisor, Ir. Peter Howard. Follow the instructions below and read the data file (Documents 1-3) carefully. Then, write a report titled “Home Automation System for DragonVale”. Instructions  There is one task in this assignment. You are required to complete your assignment individually.  In 350-400 words, write a report using your research results and all information given in Documents 1 - 3. You should add your own explanations and elaboration when appropriate. Your report should have the following sections: 1. Introduction (~50 words) State the purpose and the scope of the report 2. Methodology (~50 words) Describe how and/or where you obtain the information used in the report 3. Findings (~250 words) (a) Basic functions of a home automation system  refer to Document 2 (b) Benefits of home automation systems  conduct your own secondary research, e.g. visit 1-2 related websites (c) Evaluation of Samsonite SNT-10  refer to Document 3 4. Conclusion (~50 words) Give a brief summary of the key information covered  Organise your ideas before writing and proofread your work before submission.  Direct copying from the data file or any other sources without acknowledgement will be penalised. Document 1: Email from Ir. Peter Howard From: “Ir Peter Howard” phoward@pld.com Sent: 30 May 201- To: “Alex Yip” ayip@pld.com Subject: Home Automation System for DragonVale ...

Words: 443 - Pages: 2