Monday, January 27, 2020

Utilizing Self-Organizing Heterogeneous Networks

Utilizing Self-Organizing Heterogeneous Networks A Disaster-Resilient Modern Cellular Network: Utilizing Self-Organizing Heterogeneous Networks, Device-to-Device Communication enabled LTE-Advanced Abstract The goal of modern communication networks is to keep every corner of the world connected at all times. This goal is of utmost importance especially during a disaster. Todays mobile communication networks fail to showcase fast disaster resilience due to the lack of a distributed communication architecture that would work even if a part of the network fails. With current technological advancements, this resilience can be achieved by creating an overlay of various techniques. Heterogeneous Networks (HetNet) and Internet of Things (IoT) play significant roles in the next generation 5G networks. Having this in mind, this paper discusses how Self Organizing Networks (SON) when applied to HetNet, and a distributed Device-to-Device (D2D) communication enabled architecture when applied to Long Term Evolution Advanced (LTE-A), can strengthen the disaster resilience of a modern cellular network. Self-configuring, self-optimizing and self-healing heterogeneous small cell networks reduce the nee d for human intervention and ensure reliable communication during calamities. A D2D type communication is important because in most cases, physical damage to operators network elements is the cause for network failure. Hence there is a need to be able to communicate emergency messages without total dependency on a carriers network. The means of achieving these two goals will be addressed in this paper. I. Introduction The earliest forms of communications were intended to send emergency messages during wars. While communication technology has evolved from sending pigeons to next generation 5G, the industry has not been able to ensure perfectly reliable communication for disaster-struck regions with the unaffected areas during times of emergency. The existing methods for emergencies such as the earthquake and tsunami warning system (ETWS), Public Safety Networks, only serve the purpose of communicating broadcast messages to public and information sharing among officials. However it is important to also have a reliable communication means between victims in affected areas and the outside world. In 2011, around 29,000 eNBs were damaged during the Great East Japan Earthquake and Tsunami, which caused network outage and affected communication of safety messages and emergency requests [12]. Problems in wireless networks during disaster scenarios include increase in traffic beyond the networks capacity, physical damage of network components including backhaul, unnecessary handovers due to improper neighbor list and limited availability of human resources [1]. The methods discussed in the paper will address these problems. A Heterogeneous Small Cell Network (HSCN) is one in which there is an umbrella created by the macro cell and small cells are deployed within the region to help fix coverage gaps and capacity needs [14]. The co-ordination of different cells within the same region without interfering is the challenging part of an HSCN. D2D communication is one in which the User Equipment (UEs) can exchange information directly. This paper will start by discussing the architecture of a SON-enabled Disaster Resilient HSCN (DRHSCN). We will discuss how self-configuration of power, automatic neighbor relation (ANR), Physical Cell Identity (PCI), self-optimization of coverage, capacity, mobility robustness and self-healing capabilities help in achieving minimal human intervention during disasters [1]. The next section of the paper will discuss how a multihop D2D communication system realized through smartphones relay can help in disaster resilience [3]. We will then discuss how the current LTE architecture can be made distributed in order to minimize the dependency between User Equipment (UE) and the core network [2]. We will discuss how D2D communication can help in this regard and increase the disaster resilience of an LTE-A network [2]. II. Utilizing SON in DRHSCN The primary purpose for using SON in Disaster Resilient Heterogeneous Small Cell Networks (DRHSCN) is to reduce the operational expenditure (OPEX) and human intervention. The DRHSCN architecture as shown in Figure 1 [1] consists of a macro cell and several small cells (femto cells) within the macro cell. Satellite link provides the backhaul. The SON entity of the network is present on the base station side. The Heterogeneous evolved Node B (HeNB) serves the femto user equipment (FUE) while the macro base station serves the macro user equipment (MUE). Figure 1. Architecture of DRHSCN [1] During disasters, there will need for deployment of new nodes such as cellular on wheels (CoW), adaptation of the existing nodes to the changes, and healing of the nodes that were damaged physically. Self-configuration means a newly added node during a disaster scenario automatically selects the network parameters and schemes such as physical cell ID (PCI), power configurations, neighbor lists and other basic settings needed for proper operation [4]. The newly added nodes are configured into the network and then the existing nodes involve in self-optimizing as a reaction to the environmental changes caused by the disaster. Self-optimization means automatically changing the radio resource management parameters such as power parameters (pilot, control and data), tilt, azimuths, handover management parameters, and others needed to optimize the performance of the network [4]. Self-Configuring new nodes We will discuss the methods for self-configuring the transmit power, physical cell ID and Automatic Neighbor Relation (ANR) in DRHSCN. Let us assume a new HeNB is entering the network and its boundary ends where the path loss is 2 dB from the HeNB. When it powers on, the HeNB will receive Reference Signal Received Power (RSRP) measurements of the macro eNB as well as other HeNBs in the vicinity. Based on this self-discovery, the HeNB will configure a suitable transmit power to mitigate the co-channel interference with the macro or other small cells [1]. A FUE will be covered by the HeNB if Signal to Interference and Noise Ratio (SINR) from the HeNB is above 3dB. An MUE will be served by the macro eNB if SINR from macro eNB is above 1dB. Based on these assumptions, the self-configuration will make sure that for FUE outside the 2dB boundary, SINR is below 3dB. For MUE outside the 2dB boundary, SINR is above 1dB. This way the HeNB cannot affect the MUE outside its boundary [1]. Figure 2. (a) Self-configuration of PCI [1] (b) Self-configuration of ANR [1] A physical cell ID needs to be unique for each cell in its operating area in order to avoid collision and confusion. Since the primary and secondary synchronization signals (PSS, SSS) are based on the PCI, any collision would result in synchronization problems. There are only 504 possible PCIs [4]. Hence in a dense deployment of heterogeneous networks, it is difficult to guarantee uniqueness. Instead of manually configuring PCI during network planning or randomly selecting a PCI, an automatic PCI selection algorithm [1] as shown in Figure 2a [1] would result in lesser collisions and confusions in a disaster scenario. The HeNB first detects neighbors in its vicinity and composes a deny list. It then requests a reserved list from the SON-enabled OAM (Operations, Administration, and Maintenance) system. Based on these, an available PCI is selected and confirmed with the OAM. It is a periodic procedure and the HeNB reselects its PCI based on the neighbor PCIs seen in UE measurement repor ts. In order to ensure handovers are managed properly in the absence of human resource during disasters, an Automatic Neighbor Relation (ANR) feature should be added. This enables the self-configuration of the Neighbor Relation Table (NRT) and deletion of unnecessary neighbor relations (NR). The algorithm is shown in Figure 2b [1] and is very similar to the PCI selection algorithm. Instead of a PCI list, a neighbor list is composed. The neighbor PCI and Cell Global Identity (CGI) are obtained from the UE measurement reports. ANR reduces the need for handover selection from a long neighbor list by removing unnecessary NR periodically. [1] Self-Optimizing existing nodes Self-optimization in the existing HeNB in DRHSCN is achieved in two ways Mobility Robustness Optimization (MRO) and Coverage Optimization. In a heterogeneous network, the occurrence of unnecessary handovers due to complex mobility patterns and cell boundaries, results in large consumption of resources which cannot be afforded especially in a disaster scenario. The purpose of self-optimizing handover (HO) parameters is to detect such unnecessary handovers and to avoid them while not compromising on handover failure rate. A Mobility Robustness Optimization algorithm is proposed for a DRHSCN [1]. A cost function is first calculated as a weighted sum of five types of handovers [5]. These include ping-pong handover which return the HO back to the serving cell, early handover when Radio Link Failure (RLF) occurs since the HO was executed earlier than required, late handover when the HO is processed too late which results in RLF, continuing handover when the HO after execution is immediately is handed over to another cell which is not the serving cell, wrong handover when the HO was made to the wrong cell resulting in RLF [6]. In order to optimize the handover process, each HeNB has a timer which starts when handover complete message is received from UE. This timer stops as soon as an RLF occurs or is reported by other eNBs/HeNBs. From the UE status after RLF the HeNB will be able to recognize if it was a late, early or wrong handover, or call drop. Based on the performance metrics collected by a single eNB/HeNB, the parameters are optimized [1]. As shown in Figure 3 [1], the optimized parameters are calculated based on the cost function. This calculation is repeated iteratively after detecting unnecessary, too late, too early and wrong handovers, and fixing the weights of the cost function accordingly. The SON-enabled OAM (Operations, Administration, and Maintenance) system collects the performance reports. The RLF and unnecessary HO are reduced significantly by the optimization algorithm which will help in efficient handovers during disasters when the HeNB are randomly deployed [1]. Figure 3. Mobility Robustness Optimization (MRO) [1] Coverage optimization is done by adaptively choosing the cell boundary. This is important in a disaster scenario because fast random deployments of small cells do not take into account the interference caused by the small cells with macro cells which will reduce the performance of the DRHSCN. In the self-configuration phase, we created fixed boundaries based on RSRP measurements of eNB and other HeNBs. This boundary is not realistic since we will deploy small cells indoor such as in buildings. The RSRP measurements of the FUE during the self-optimization phase will help in determining a realistic coverage radius. Large changes in RSRP is observed when the FUE enters or leaves a building due to penetration loss associated with walls. The algorithm given in Figure 4 [1] shows how after self-configuration, either an adaptive or fixed boundary is chosen based on whether a house boundary was got from the decision module. This process is iteratively applied and an optimal boundary is chose n. The performance analysis of the power self-configuration and coverage self-optimization algorithm together shows better macro and small cell coverage. It helps provide better coverage and manage capacity efficiently [1]. Figure 4. Coverage and Capacity Optimization [1] Self-Healing triggered by failed nodes Self-healing is the process of handling the coverage gaps or capacity overloads resulting from the failure due to physical damage of a base station (either macro or small cell) during disasters [1].ÂÂ   Self-healing consists of automatic fault detection, fault classification and cell compensation schemes [7]. Figure 5 [7] shows the flow chart of a self-healing process. Fault classification into degraded (sub-optimal operation), crippled (major faults causing low SINR) or catatonic cells (complete outage) can be done using Bayesian systems to determine type of fault with certain probability [9]. Learning algorithms are important to make the detection more intelligent by having a log of faulty alarm detections. The Trigger Conditions of Self-Healing (TCoSH) satisfy when anomalies occur for a particular duration and cause sufficient performance degradation. The logical steps for self-healing are provided by Third Generation Partnership Project (3GPP) in [8]. The compensation scheme s, depending on type of fault, might involve automatic reconfigurations which would direct the neighbors to up tilt antennae, increase power, or enable relay-assisted handover [10]. It is critical to continue monitoring the faulty base station through X2 interface to check if it has recovered, so that neighbors can return to their optimal configurations. Much research is needed in self-healing in terms of the various learning, classification, and compensation algorithms before it can be deployed practically [7]. Figure 5. Self-Healing Process [7] III. D2D communication during disasters In the previous section, we discussed how a SON-enabled DRHSCN implementation can help operate a 4G network reliably and efficiently during disasters. However, we need to note that the dependence on cellular operators networks is high in a DRHSCN. During a disaster, the physical damages caused to the operator network in a significantly large area, are difficult to be handled using self-healing alone. Hence there is a need for a decentralized network architecture as an overlay over DRHSCN that will ensure reliable communication of emergency messages. Figure 6. D2D communication during disasters [3] Access and Network technologies in D2D communication In this sub-section we will discuss a multi-hop D2D communication realized using relay by smartphones [3]. As a minimum requirement, unacknowledged, best effort delivery of small packets of messages such as text, voice should be possible. The types of messages may be emergency communication between affected areas and outside world, broadcast messages to the affected areas, local information sharing within refugee areas, etc. as shown in Figure 6 [3]. The interconnection of the D2D network with the outside world can also be achieved through Satellite, unmanned aircraft system (UAS), etc. [3]. The various technologies that can be used in multihop D2D communication as shown in Figure 7 [3] will be discussed next. Figure 7. Technologies in D2D communication [3] The wireless access technologies need not be limited to one. Multiple technologies such as Bluetooth, WiFi, Zigbee, LTE-A, WiGig (Wireless Gigabit) can be used based on the environment, data needs, physical distance, spectrum availability. The developments in mobile equipment technologies such as battery technology, antenna design techniques enable the use of various wireless interfaces on a single mobile terminal [3]. Bluetooth, WiFi and Zigbee are used currently. While WiGig has the advantage of being de-centralized and having high speeds (up to 7 Gbps for 60 GHz bandwidth), it is a short range technology (10m). LTE-A has the advantage of having a good channel quality and lesser interference due to a base station acting as controller. To overcome the disadvantage of dependence on operator network during disasters, we will discuss a decentralized D2D communication architecture for LTE-A in the next sub-section. The networking (routing) technologies used in smartphone relay cannot be fixed, like in other multihop communications due to the unpredictable mobility of the terminals. Hence each device selects its own routing method based on its situation. Hence integrating various routing technologies is inevitable. For a stable dense mesh network such as WiFi ad hoc, which is are almost immobile, mobile ad hoc networks (MANET) type routing is preferred. MANET sends a message via an established path from source to destination. Delay/disruption-tolerant networks (DTN) is suitable for both single and mutihop communication since it is a network layer technology [3]. For wireless access technologies that work on a single hop such as Bluetooth, Zigbee, DTN-type routing has to perform multihop through various single hops. Since the best type of routing depends on the scenario, implementing a fusion of the two routing types would be the most efficient. Interconnection of the multihop D2D communication system with external networks such as satellite, movable and deployable resource units (MDRU) [11], unmanned aircraft systems (UAS) is possible. Longer distance communication with areas not affected by the distance is possible through such interconnection. The gateway between the D2D system and outside networks filters out redundant messages received from DTN type routing which tends to send duplicates [3]. The gateway should advertise its presence so that the terminals can direct their messages to it. For certain applications, it is important to ensure confidentiality, integrity, and availability. Hence a security functionalities are added. In order to ensure that all types of smartphones can participate in the D2D communication, all operating systems (Android, iOS, Windows, etc.) should be compatible. In order to ensure independency from cloud services, it is suggested that the terminals have a mutihop D2D mode for emergency purpose s. In [3], a prototype based on fusion of MANET and DTN routing technologies was developed and its performance was tested to be good. D2D communication enabled decentralized LTE-A architecture The dependencies between the UE, eNB and Evolved Packet Core (EPC) reduce the resilience and flexibility of a 4G network. We will discuss a D2D enabled LTE-A architecture that will reduce this dependency [2]. The EPC is an all-IP core network that performs the access control, authentication, etc. Failure of any entity within the EPC can cause a cascading effect and might take long time to fix. A novel software architecture, which virtualizes certain fundamental EPC services and resource management functions within the eNB to reduce the dependency between the eNB and EPC is proposed in [2]. A new component called Flexible Management Entity (FME) is suggested to be added to the architecture. The eNB along with the FME which includes the virtual EPC entity would now be called the Hybrid eNB (HYeNB). The detailed design and distributed protocols associated with the FME are discussed in [2]. Wired or wireless technologies such as IEEE 802.11, 802.16, optical, satellite networks, etc. are used to maintain connection between HYeNB and physical EPC. While the above virtualization creates a distributed architecture between the eNB and the EPC, we will discuss about how the dependency between UE and the Radio Access Network (RAN) can be reduced in LTE-A by deploying D2D feature that was introduced in Release 12 of 3GPP [13]. The D2D communication is discovered, established and maintained without any interference from eNB or EPC. The uplink channels PUCCH, PUSCH and PRACH are used for the initialization and operation of the D2D protocol. A D2D communication can be set up within the UEs in the network when needed either using the D2D-Agent present inside the FME, or the UEs can establish the D2D communication independent of the HYeNB. When connection with eNB is lost for a Time of Interruption (ToI), a selected UE (b-UE) will take up the role of D2D-A. The b-UE will establish, manage and coordinate the D2D network. It is necessary to have ToI to avoid ping-pong effect. The multiple access scheme used by such a b-UE is Single Carrier Frequency Division Multiple Access (SC-FDMA) due to less interference and battery consumption [2]. Figure 8. Handshake messages when UE joins a D2D network [2] All UEs which lost connection with HYeNB for ToI is allowed to consider transmitting direct beacon frames (D-beacons). But before a UE transmits D-beacons, it will listen to the channel for at least two D-beacon time intervals (TD) (time between two beacons which can be any multiple of frame duration 10 ms) to see if any other UE is already the b-UE. If after two TD, no beacon was received, the UE becomes b-UE and starts broadcasting the D-beacons with information such as D2D network ID, identification of UEs in the network, etc. on the Physical Uplink Control Channel (PUCCH). PUCCH is also used by b-UE to reply to UE network association requests as shown in Figure 8 [2].ÂÂ   The network joining procedure is same as the four-way handshake that occurs during LTE random access. There are 64 Zadoff Chu preambles from which the UE who wishes to join chooses from to minimize contention. The contention resolution scenario involves the b-UE sending response based on the UE ID in the D2 D network. The UE which did not receive a response backs off. The random access operations are performed using the Physical Random Access Channel (PRACH). The response which is usually sent on Physical Downlink Shared Channel (PDSCH) in traditional LTE, should be sent on PUCCH by the b-UE. Reserved slots in the Physical Uplink Shared Channel (PUSCH) are used for the third message (association request). PUSCH is also used for data and voice transmission. The resources reservation for data and voice takes place between peer UE and does not need b-UE involvement. [2] The UEs will continue search for synchronization signals and Master Information Block (MIB) on Physical Broadcast Channel (PBCH) to see is the HYeNB has been reconnected. Once reconnected, the resources allocated to the D2D network will be given up [2]. IV. Conclusion A SON-enabled DRHSCN and D2D communication enabled LTE-A are two technologies that will greatly increase the robustness and resilience of existing cellular networks as well as future 5G networks during disasters. The two methods can be implemented as an overlay by introducing D2D communication within a Heterogeneous network. The multihop smart phone relay using a multiple wireless access and a fusion of routing technology when applied to the D2D network, create another layer of resilience. These methods achieve the primary goal of making the network self-reliant and distributed so that communication can be established even when any part of the network is damaged by disaster. The future 5G architecture can be made disaster-resilient from the start if the proposed methods are taken into account even during standardization. By extending the proposed D2D protocol into Internet of Everything (IoE), we will be able to send emergency messages not only to humans but also to trains, cars, etc . to prevent major accidents. V. References H. Zhang, C. Jiang, R. Q. Hu, Y. Qian, Self-organization in disaster-resilient heterogeneous small cell networks, IEEE Network, vol. 30, no. 2, pp. 116-121, 2016. K. Gomez, L. Goratti, T. Rasheed, L. Reynaud, Enabling Disaster-Resilient 4G Mobile Communication Networks, IEEE Communications Magazine, vol. 52, no. 12, pp. 66-73, Dec. 2014. H. Nishiyama, M. Ito, N. Kato, Relay-by-smartphone: Realizing multihop device-to-device communications, IEEE Communications Magazine, pp. 56-65, Apr. 2014. 3GPP, TSG E-UTRAN, Self-Configuring and Self-Optimizing Network (SON) Use Cases and Solutions, TR 36.902 V9.3.1, 2011. W. Zheng et al., Mobility Robustness Optimization in Self-Organizing LTE Femtocell Networks, EURASIP J. Wireless Commun. , vol. 1, pp. 1-10, 2013. H. Zhang et al., Mobility Robustness Optimization in Femtocell Networks Based on Ant Colony Algorithm, IEICE Trans. Commun. , vol. 95, no. 4, pp. 1455-58, 2012. O.G. Aliu, A. Imran, M.A. Imran, and B. Evans, A survey of self organisation in future cellular networks, IEEE Communications Surveys Tutorials, vol. 15, no. 1, pp.336-361, 2013. 3GPP, Telecommunications management; self-healing OAM; concepts and requirements, 3GPP TS 32.541 v1.6.1, Tech. Rep., 2010. R. M. Khanafer, B. Solana, J. Triola, R. Barco, L. Moltsen, Z. Altman, and P. Lazaro, Automated diagnosis for UMTS networks using bayesian network approach, IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2451-2461, 2008. M. Amirijoo, L. Jorguseski, T. Kurner, R. Litjens, M. Neuland, L. C. Schmelz, and U. Turke, Cell outage management in LTE networks, in Proc. 6th Int. Symp. Wireless Communication Systems ISWCS 2009, pp. 600-604, 2009. T. Sakano et al., Disaster-Resilient Networking: A New Vision Based on Movable and Deployable Resource Units, IEEE Network, vol. 27, no. 4, pp. 40-46, 2013. ICT responses to the Great East Japan Earthquake, FUJINO, Masaru. Counselor for Communications Policy. Embassy of Japan, U.S. Telecom Assn. Boarding Room, 2011. 3GPP, Feasibility Study for Proximity Services (ProSe), TR 22.083, 2012. A. Ghosh, N. Mangalvedhe, R. Ratasuk, B. Mondal, M. Cudak, E. Visotsky, T.A. Thomas, J.G. Andrews, P. Xia, H.S. Jo, and H.S. Dhillon, Heterogeneous cellular networks: From theory to practice, IEEE Communications Magazine, vol. 50, no. 6, 2012.

Saturday, January 18, 2020

Police Work and Stress Essay

Stress is part of every people’s life. No matter what profession one is practicing and whatever lifestyle an individual is accustomed to, stress is always involved. In particular, police officers embrace stress as part of their profession. The moment they decided to become a police officer, bearing with stress has become inevitable. For one, their main goal, to save people who are in danger and to protect them from harm, is stressful. In effect, they become exposed to danger themselves and face this reality as part of a police officer’s job. They are also not allowed to any kind of violation because they are the ones who impose it. When it comes to police work, stress is expected more than the regular or average jobs. It is given than this profession always put police officer’s life at risk. Stress comes from different sources and comes in various forms. There are direct and indirect factors that imply the involvement of stress in the police profession. It affects not only the life of the police officer but also the life of the people inside and outside the organization—their family, the organization, and their own life and personal identity. Occupational stress is derived from what rank a police officer holds in the organization. Police officers deal with every kind of violence and alarming assignments each day of their lives. However, since they pledged an oath to fulfill their duty to the best of their abilities, they are not thinking much about stress and focus on their service instead. There are times when police officers encounter personal troubles which have a negative implication on them. This time, it cannot be accepted as a normal part of their duty because it is already outside the profession. Dealing with family matter makes police officers lose their focus and fails to do their job properly. On the other hand, their family also experience stress because of the kind of job. Being in the said profession also requires police officers to be available at all times. The working schedule also causes them stress because of rotating shifts and unexpected call of duty. Aside from the aforementioned causes, this paper aims to delve into police-related stress, what causes it, what are the effects, and how it affects their obligations in the field of law enforcement. Defining Stress and Stressors Stress is a disorder that affects an individual’s motivation (Crane, 1996). It bring about pressure not only physically but also mentally. There are two types of stress according to Crane (1996) in his book entitled Psychology of Stress. The first stress type is known as distress. This type of stress is relentless which makes one not capable of adaptation (Crane, 1996). Distress can cause mental disorders, depression, and anxiety if not given proper resolution (Crane, 1996). Another type of stress is the eustress. This stress is accumulated through experiences that cause positive reaction. Unlike distress, this type of stress can improve the function of physical and psychological aspects of an individual through training and work (Crane, 1996). Stress occurs when one experiences pressure and demands which are not compatible to his/her ability to either physically or mentally deal with the situation (Leiter & Masslach, 1988). Conflicts, painful events, limitations, struggles, and lack of control are the common causes of stress (Leiter & Masslach, 1988). It affects the overall functioning of the individual, rendering him or her incapable of thinking and acting normally. It can also cause certain disorders including hypertension, ulcer, insomnia, anxiety attack, and many more. Stress deteriorates the individuals’ over-all health depending on how the person copes with it (Violanti, 1996). Hence, stress generally affects lives as it modifies the ability, mental functioning and behavior of individuals in fulfilling their roles, regardless of the kind of profession that they have (Violanti, 1996). Stressors pertain to the primary causes of stress. They could be an immediate superior, a family member, an event, or a profession (Shirom, 1989). Coping up with stress comes in two ways: reduction or avoidance. A person may either face the situation to put an end to the stress (reduction) or make some sort of escape to experience immediate relief (avoidance) (Shirom, 1989). Everyday, many stressors are faced by individuals that make or break them as a person. Absence of stress is impossible because everyday, new challenges and changes are experienced by everyone. The best way to deal with stress is by coping with it. Thus, it is always better to confront the situation rather than avoiding it (Shirom, 1989). Work Stress As individuals become adults and start working, they have to deal with professional accountability. Work is necessary to support every need and want in life. Most of the time spent by professionals is in their workplaces where they encounter work stress in different forms each day. Usually, stressful situations spring from pressures and demands in their job which are beyond their knowledge and capacity, or from fears and anxieties in accomplishing their tasks. Some of the professions which greatly involve stress due to the nature of job include a fireman, a doctor, and a police officer, among others (Lee & Ashforth, 1996). Stress can be positive and negative for the worker depending on the response of the individual him- or herself and the circumstances. A positive kind of stress usually makes the worker more motivated and focused in accomplishing their duties and responsibilities. On the other hand, negative stress may occur when there are unexpected events that can make them lose composure which, in effect, become detrimental to their performance (Lee & Ashforth, 1996). Police Stress Basically, police stress is the kind of stress experienced in the law enforcement community. This is brought about by direct and indirect factors that are incorporated the nature of the job and the organizational structure of the law enforcement community. As police officers are mainly responsible for protecting and serving the society and its people, they are required to be physically, emotionally, and psychologically prepared at all times because they are expected to be always available. In addition, they are expected to keep an active presence of mind and make sensible decisions especially during crucial situations such as criminal encounters and hostage takings. Because of these expectations, police officers experience stress twice of the stress endured by other professionals. The work environment of the law enforcement officers has a great impact on the employees and the employee’s level of work, including their work productivity and their general physical and emotional health (Kurke, 1995). There is a notion that a cyclic relationship persists between work and home life of police officers from which police stress develops (Kurke, 1995). Stressors in the police work not only affect the police officer but their family as well. It is likely that police stress negatively affects their relationship with others and their personal lives. For instance, most police officers experience marital problems because of the effects of the stressful events of their day which they unintentionally bring home with them. This gives rise to their involvement in various problematic domestic issues such as violence, alcoholism, substance abuse, and child neglect (Brief et. al, 1981). When police stress is rampant in the law enforcement community, it affects the performance of the police officers and at the same time, it puts everyone in the society at risk. Police stress is a social issue that should not be taken for granted because it affects these individuals who chose to pursue this highly important profession that constitutes the maintenance of peace of order of the society. Causes of Police Stress Many sources of police stress can be found inside the police organization. The job itself and the people within the law enforcement community cause police stress. The characteristic of the profession is considerably difficult to look at. Being a police officer requires dedication and commitment to put their lives at risk while they are on duty. They are also expected to comply with the given work schedule and special assignments. There are encounters which will cause trauma to police officers. Yet, they only receive poor compensation (Leiter & Maslach, 1988). There are also times when lack communication among administrators, poor supervision and inadequate training cause police officers to feel stressed. Another source of police stress comes from the officers themselves because they often doubt their capacity to perform a given task. There are also issues regarding favoritism and politics within the law enforcement community that discourages a police officer to carry out a given assignment (Leiter & Maslach, 1988). The following sections present the most common organizational stressors in the work of a police officer, along with other direct and indirect factors that cause police stress. Direct Factors Job Characteristics The profession itself causes stress to police officers. Fear and danger make police officers suffer from stress. They always need to set aside their doubts, gather their courage in every dangerous situation that they get into. Physical danger is always at hand because they should be ready to battle against unexpected criminals (Kurke, 1995). Adequacy and Control Perception of adequacy and control also causes police stress. The ability of a police officer to work on a job is based on his/her perception the skills that he/she possesses, and whether his/her skills are adequate to complete all the assigned task given to him/her, and. Hence, to meet the demands of the job, law enforcement officers should be well-driven. They should also have the necessary composure and confidence. When police officers doubt their capacity to serve, it definitely instigates stress (Axelbend & Vaile, 1979) Control is defined as the ability of police officers to govern on special assignments. This is because as police officers, they are expected to control every situation that they get into. When a police officer lacks the necessary control to carry out an assigned task because he/she is hindered or manipulated by others, it brings out stress and at the same time leaves the case unsolved (Tenerowicz, 1993) Role Ambiguity Role ambiguity also results in stress among police officers. This usually happens when they lack the necessary knowledge in fulfilling their roles and at the same time control the conditions of the work outcomes (Lee & Ashforth, 1996). When this occurs, police officers feel stressed as they are not yet prepared for the job. Role ambiguity is caused by a weak organizational structure and it hinders the police officer from performing his/her task. Most cases of role ambiguity is experienced by those who are in the administrative position because their functions are not clear to them. At the same time, they are not aware of up to what extent is their jurisdiction on their job (Shore, & Shore, 1995). This becomes a source of stress because it makes police officers doubtful of their capacity to serve. They tend to question themselves if they are able to perform well because they themselves are not aware of the position given to them. They are afraid of not being respected by their subordinates which gives them a feeling of insecurity. Work Schedule Police officers are expected to work based on a shifting schedule, rotating shifts, irregular days off, holiday work, unexpected overtime and involuntary overtime (Kurke, 1995). This kind of schedule apparently affects their work performance because they are not getting enough sleep and energy. It also causes their moods to change and develop negative feelings. In the end, police officers experience stress and end up with poor performance (Kurke, 1995). Special Assignments There are special tasks given to police officers which in turn are greatly prized (Kurke, 1995). However, certain assignments require more focus and demand greater pressure from the police officer. There are special assignments which are needed to be completed at a given time frame. As a result, police officers become stressed because they are expected to finish the said task as soon as possible. It also involves longer hours of training and longer working hours that separate them from their families. Because of depression and frustration when an assigned task is not completed accordingly, stress is developed (Kurke, 1995, p. 191). Role Conflict According to Kurk (1995), â€Å"many officers report difficulties related to the many demands inherent in law enforcement† (p. 191). Role conflict usually happens when police officers need to execute two roles with different conflicting demands or values. One example of this is when a police officer catches delinquent teens in the community only to discover that one of those caught is his/her son. This puts the police officer in a conflicting situation because he/she is faced with the demand of arresting the suspect but at the same time he/she needs to protect his/her son (Lee & Ashforth, 1996). Family of Police Officers Another cause of stress for police officers comes from their families. They always harbor feelings of fear and danger when they are out of their homes for duty. It develops stress to police officers because they are thinking of their families while they are on duty. This will make them lose focus and may end up not completing the assigned task. There are also instances when family occasions are set aside because of special assignments. This makes police officers more stressed because they develop sadness of not being able to participate in an important family occasion. When a family member gets sick, it is also hard for the police officers to concentrate on their jobs because they are preoccupied with family problems.

Friday, January 10, 2020

Role and Function of Law

The Role and Function of Law James Williams Law/421 January 7, 2012 Gail B. Jabber Role and Functions of Law According to Melvin (2011), â€Å"A generally accepted generic definition of the law is a body of rules of action or conduct prescribed by controlling authority, and having legal binding force† (p. 4). The scope of modern law is broad with tentacles that reach into every area of public and private dealings. Essentially law furnishes a process by which the rulings and directives to regulate certain behaviors, disagreements, plus unlawful acts are available to individuals for use in resolution of disputes and to enforce promises.Law weaves into practically every aspect of the daily activities of businesses as well as individuals within the society. The evolution of law from basically a way to protect property rights to the intricate and complex system it has become is astounding. The research will examine the numerous roles and functions of law in relation to business and society. Laws govern many facets of business. They regulate—business operation, environmental standards, treatment of employees, workplace requirements—to name a few.The broad design of the law is to discourage against predatory business practices and to protect the consumer from fraudulent advertising or receiving inferior products as well as provide remediation to victims when necessary. To accomplish this, the federal as well as state governments have policing powers to enforce the rules a society chooses to govern itself. This law incorporates into the fabric of the society. For example, there are federal and state laws that control e-business commerce plus international business dealings.Congress derives its power to regulate the flow of commercial activity along interstate and intrastate highways likewise railways together with the vehicles that transport the goods from the commerce clause. The application of these powers varies. According to Melvin (2011), â₠¬Å"However, the direct and broad power to regulate all persons and products related to the flow of interstate commerce is the fundamental source of its authority. † Furthermore, manufacturing, distribution, shipping, employment, patents, trademarks, and copyrights are under government regulation as well.Federal law supplants state law when they conflict in intrastate matters, e. g. Cipollone versus the Liggett Group, Inc. Laws hold companies responsible for product safety. Therefore, manufacturers as well as sellers are liable to consumers for damaged or defective products as well as injuries or deaths that may result from their use. For example, the government establishes laws to standardize the quality of food, drink, and medicines consumers ingest while issuing additional laws to control the mechanical quality of automobiles and appliances—home and commercial.Enterprises employ these laws throughout the production process to ensure compliance. Consequently, the publi c is safer from injury and disease through quality control of products. There are numerous federal agencies that regulate business (the Federal Trade Commission, U. S. Consumer Product Safety Commission, U. S. Patent and Trademark Office, The United States Trade Commission, plus The International Trade Commission), to name a few. Finally, antitrust laws keep businesses from monopolizing markets, price fixing, similarly cornering an industry.Laws touch every aspect of social behavior across walks of life. For example, the activities of a typical day may include waking at home, preparing breakfast, getting children to school, and arriving at the workplace unmindful of the laws that manipulate these acts. The day continues with the use of an identification badge to park, clock-in for work, and in some cases to access restricted areas of the building. The day concludes with a stop at the local grocery store to purchase a few items for dinner and pay for them with a bank card giving no t hought of the numerous laws that govern this business transaction.After all, the design of the law is to function in society and business in such a way that following them requires little thought. Laws provide order and a tool for the government to enforce satisfactory behavior with a precise set of rules (public laws) for citizens to adhere to, such as civil, criminal, administrative, and constitutional laws. By the power of public law the government imposes penalties (fines or incarceration) for breaking the law through civil and criminal court actions upon members of the society.The African Methodist Episcopal Zion Church has a rigorous set of laws, policies, procedures, and committee to vet potential ministerial candidates. However, since 1984 state law requires a criminal background check from the state law enforcement agency where the candidate resides before working in a day-care facility for children or senior citizens. The law further requires a one million dollar insurance rider for sexual misconduct charges that could result from counseling or visitations.The church complies with the intent of this legal mandate to protect the congregants from predators, and to avoid potential lawsuits that could bankrupt the church. In conclusion, the influence of law upon individuals’ lives begins at birth, and ends following death and the settlement of the estate. Law functions in marriage, separation, divorce, custody of children, birth certificates, and death certificates. To start a business, a person needs a permit, business license, and an attorney. Indeed the law influences people through the entirety of life.References Melvin, S. P. (2011). The legal environment of business: A managerial approach: Theory to practice. New York, NY: McGraw-Hill/Irwin. Azria, S. M. (2008). Wills, Trusts, Estates & Taxation. Wills, Trusts, Estates & Taxation — Research Starters Business, 1. Bednar, J. (2006). Making Dollars and Sense. Businesswest, 23(5), 18. Bod en, D. (2008). How to take (legal) action. International Financial Law Review, 27(5), 96-99. Flynn, S. I. (2008). Business Estate Planning. Business Estate Planning — Research Starters Business, 1.

Thursday, January 2, 2020

Surveillance in 1984 by George Orwells and the Modern World

A world beyond what George Orwell could imagine has been created in modern society through the use of not only government surveillance, but also corporate and consumer spying where users are often unaware of spying.. 1984 is set in a neo-communist society where the government controls production of goods and spies on its citizens in order to maintain power. In the modern era, surveillance takes a different form. Often the methods for spying on citizens in the US do not involve a direct line from the NSA to the citizen’s home, it usually takes a detour through a commercial setting. By partnering with major companies such as Facebook, Google, and Amazon, government surveillance programs are able to collect far more information than could be gained by simply tapping telephone lines. This is more disturbing since many companies including Verizon, ATT, Apple, and Amazon do not require a warrant to supply information to investigators, and do not notify users of data requests. T he government in 1984 maintains power by using constant surveillance and suppression of citizens. Unlike the modern era, all citizens know they are being watched and are cautious about their actions. Winston says of the telescreen, the Party’s method of espionage: â€Å"Any sound that Winston made, above the level of a very low whisper, would be picked up by it [the telescreen], moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well asShow MoreRelatedGovernment Surveillance And Totalitarianism In George Orwells 19841593 Words   |  7 PagesThe Correlation of Government Surveillance and Totalitarianism in 1984 During the production of 1984, author George Orwell never envisioned a tangible reality housing the society he constructed. He wrote the novel as a warning, a cautious exposà © showing those what could happen if society lost its sense of humanity; housed in a painfully relevant satire of totalitarian barbarism. In his novel 1984, George Orwell addresses the issue of government surveillance through his strategic use of point of viewRead More1984 vs Today Essay857 Words   |  4 Pages1984, a novel by George Orwell, represents a dystopian society in which the people of Oceania are surveilled by the government almost all the time and have no freedoms. Today, citizens of the United States and other countries are watched in a similar way. Though different technological and personal ways of keeping watch on society than 1984, today’s government is also able to monitor most aspects of the people’s life. 1984 might be a dystopian society, but today’s condition seems t o be moving towardsRead MoreGeorge Orwells 19841168 Words   |  5 PagesGeorge Orwell author of 1984 recently made it on Amazon’s list of â€Å"100 books to read before you die† for his widely read novel with thought provoking subjects like: the dangers of totalitarianism, physical control, psychological manipulation, manipulation of information and history, and technology. Through the themes in 1984, George Orwell demonstrates that a dystopian society created by totalitarian rule can infiltrate the minds of its citizens through various mediums. The famous novel falls intoRead MoreLiterary Context Of Dystopian Literature1746 Words   |  7 Pagescreate a dark and nightmare world, in which squalor, poverty or oppression are present. It acts as a cautionary tale for readers and brings to light the many flaws in humanity, which makes it impossible for a perfect society to ever exist. The true horrors, which compose a fictitious dystopian world, are used as a literary tool by many authors in an attempt to magnify societies issues. Their texts serve as a moralistic warning with aim to caution people against modern trends and often the threatRead MorePolitics And Politics In 1984, By George Orwell1469 Words   |  6 Pagespolitical issues, and politics itself is a mass of lies, evasions, folly, hatred and schizophrenia† (Orwell, â€Å"Politics† 5). Living in the aftermath of World War II, and seeing how political inactivity gives rise to dictators like Adolf Hitler, it is no surprise that George Orwell commented on the common man’s relationship to politics. His political beliefs fed into his work, perhaps most notably the ominous 1984. The novel details a totalitarian government dominating every aspect of the people’s lives—evenRead MoreThe Use Of Surveillance As A Mechanism Of Control1616 Words   |  7 Pagesuse of Surveillance as a Mechanism of Control Elen1003 Project 2; Topic No. 2; Tutor: Deneo Mfenyana 1036603- James Phillips â€Æ' Surveillance is an extremely effective mechanism to control a large group of people or society in our modern world. This method of control can prove to have a strong effect on a person’s sense of privacy and can induce a strong sense of fear and anxiety. There are various methods from which government agents can monitor a group of people. In the novel, 1984 by GeorgeRead MoreAnalysis Of George Orwell s Brave New World And 19841400 Words   |  6 PagesB.N.W. v.s. 1984 Synthesis Essay Hypothesis become theories and theories become laws. Brave New World and 1984 were both predictions made in the 1900s about what the future of the world would be like. Both of these books were written during the time when communism rose, and they show a world where it would have been like if communism was never struck down. Certainly, one novel makes a better prediction of the future than the other, and this case it will be 1984. 1984 is a better prediction becauseRead MoreTotalitarianism in Brave New World by Aldous Huxley and Nineteen Eighty-four by George Orwell1270 Words   |  5 Pagesgovernment in which a single person rules. Aldous Huxley and George Orwell are famous authors who opposed totalitarianism, and through their philosophical ideals, attempted to inform people of the dangers faced by society under this restricting system, where people are inhibited from holding any sort of authority. George Orwell, in 1984, discusses concerns relating to big government and big broth er and Aldous Huxley, in Brave New World, discusses predatory markets impinging on our personal freedomsRead MoreEssay on Society’s Influence on 1984 and George Orwell1391 Words   |  6 PagesSociety’s Influence on 1984 and George Orwell To say I accept in an age like our own is to say that you accept concentration-camps, rubber truncheons, Hitler, Stalin, bombs, aeroplanes, tinned food, machine guns, putsches, purges, slogans, Bedaux belts, gas-masks, submarines, spies, provocateurs, press-censorship, secret prisons, aspirins, Hollywood films and political murder (Bookshelf I). Politics, society, economy, and war during the forties had a direct impact on life at the timeRead MoreModern Society In George Orwells Dystopian Novel 19841333 Words   |  6 PagesIn his dystopian novel â€Å"1984,† George Orwell imagines a world of evil, a place where the authentic individual is repressed of any basic rights. Fearful of this, he skilfully portrays the character, Winston Smith, to embody what life might be in a futuristic society, reduced of meaning, thought, and individuality. It is under these same values that German psychologist, Eric Fromm, hints Orwell’s work to be a warning. An eccentric reservoir for readers to understand the dangers and repercussions of