Friday, December 27, 2019

Outsourcing for RBS - Free Essay Example

Sample details Pages: 9 Words: 2566 Downloads: 7 Date added: 2017/06/26 Category Business Essay Type Narrative essay Did you like this example? 1.0 Introduction As industries become increasingly competitive, businesses look towards developing competitive advantages. The transferring of operations to another business, known as outsourcing has become an important aspect of many businesses strategies in achieving this. Advancements in technology have seen the rise of businesses outsourcing on a global scale. While outsourcing offers numerous benefits including cost saving and increased performance, outsourcing also presents considerable challenges and risks (McIvor, R. 2010). 2.0 Royal Bank of Scotland The Royal Bank of Scotland Group (RBS) is a large multinational banking and financial services company. Established in 1727 and headquartered in Edinburgh the RBS group provides services across three divisions including Personal and Business Banking, Commercial and Private Banking and Corporate and Institutional Banking. Operating through a number of subsidiaries including its own name bank Royal Bank of Scotland as well as NatWest, Citizens, Ulster Bank and Coutts. With a customer base of over 30 million the RBS operates in over 50 countries across the United Kingdom, Europe, America and Asia (RBS, 2014a). In terms of the UK the RBS has over 24 million customers with over 1.9 million Ulster Bank customers in Northern Ireland and the Republic of Ireland. (Keynote, 2014) In 2009 RBS received government intervention in the form of a bailout as a result of the financial crisis, which led to government ownership of 80% of RBS as of March 31st 2014 (UKFI, 2014). RBS have continued to report a loss for each financial year since the financial crisis with annual reports for RBS year ending 2013 show a turnover of  £26.458bn and an operating loss of  £8.243bn (RBS, 2013). However 2014 3rd quarter results have shown promising progress with profit before tax estimated at  £1.27bn (RBS, 2014b). 3.0 Financial Services External Business Environment 3.1 Financial Crisis The financial crisis of 2007/2008 threatened the collapse of many large financial institutions not only in the UK but across the world. In order to prevent this in the UK the government provided bailouts to a number of financial institutions including RBS and Lloyds. Despite this bailout RBS is still considered one of the dominant five banks within the UK which includes RBS, Lloyds Banking Group, HSBC, Barclays and Santander (Keynote, 2013). However as a result of the financial crisis the financial sector has seen a number of new stricter regulations forced upon it by the government, including the introduction of the Independent banking commission on Banks in 2010 and the Banking Reform Act in 2012. All of which have been set up to ensure tighter regulations on banking practices, increase competition and to rebuild consumer confidence in the financial services sector (Gov.uk, 2013). 3.2 New Technology The availability and adoption of high speed internet connection, n ow estimated at 87% of all UK house households (44.3million adults) has seen a major trend in how the financial service sector delivers its services. In particular the financial sector has increased the online services for personal banking, in order to meet the demand of customers to provide 24/7 banking services (Keynote, 2014). Mintel (2014) highlights the importance of consumer smartphone usage with data revealing that online and smartphone interaction is the most frequent format of interaction with financial services. Mintel (2014) further highlights thatà ¢Ã¢â€š ¬Ã¢â€ž ¢s firms can gain a competitive edge by integrating smartphone applications and offering differential features. RBS has embraced this consumer technological adoption and provides both online and smartphone application banking and has reported a 200% increase in mobile banking in the last three years. (RBS, 2014c) 3.3 Branch Closures The increasing use of technology by consumers has offered the financial se rvice sector more cost effective platform to provide services as online services reduces the level of branch visits and customer interaction. This has however resulted in the closure of branches or reduction in operating hours by many banks (Keynote, 2013). In 2014 alone RBS is planning to close at least 5% of its branches equivalent to around 154 branches (Treanor, 2014). 3.4 Financial Service Sector Outsourcing Trend The outsourcing of information technology is not a new concept and has long been a trend within the financial service sector. According to Gonzalez et al (2012) some of the first information technology outsourcing contracts within this sector date back to the 1980à ¢Ã¢â€š ¬Ã¢â€ž ¢s. Further to this Gonzalez et al (2012) highlights outsourcing of Information Technology is a continued practice and has in fact increased over the past number of years. However as with other operations within the financial service sector outsourcing practices also have regulations an d guidelines enforced by Financial Conduct Authority (FCA, 2014). 4.0 RBS Outsourcing Operations and Outsourcer 4.1 Infosys Infosys was established in 1981 and is a global leader in consulting, information technology and outsourcing solutions. Headquartered in Bangalore India, Infosys operates through a number of subsidiaries throughout America, Asia, Europe and the Middle East. With over 165,000 employees Infosys provides services to customers in over 50 countries. At the end of Infosys financial year 31 March 2013 it reported a turnover of  £5.264bn and an operating profit of  £1.262bn (Infosys,2014a). RBS selected Infosys to outsource part of their Information Technology operations and has been engaged in IT outsourcing contracts with RBS since 2002, having worked on a number of initiatives including the development of software and testing services (Infynews, 2007). In 2007 Infosys received the RBS Best Technology Supplier Award, RBS Director of IT devel opment Mike Errington stated that Infosys is à ¢Ã¢â€š ¬Ã…“consistently enabling commercial benefits while also working with us to provide an exceptional level of service and quality improvementsà ¢Ã¢â€š ¬Ã‚  (Infosys, 2014b). 4.2 RBS IT Outsourcing Failure A major challenge with outsourcing is the risk that the outsourcer may fail to carry out the required task with the potential to seriously damage the reputation of the business outsourcing. In June 2012 RBS experienced this, a technical glitch that affected over 6.5 million customers across RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s own brand bank, NatWest and around 100,000 Ulster Bank customers (Hall, 2012). The glitch affected costumers for several weeks, with Ulster Bank customers receiving the longest delays in service. The computing error meant the customers were unable access their funds which caused costumer uproar (Hall, 2012). The cause of the computer error was widely blamed by RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s IT outsourcing practices in India (Furness, 2012). The outcome of the error resulted in RBS paying  £175 million in customer compensation and an investigation by the Financial Conduct Authority resulting in a fine of  £42 million and  £14m fine by the Prudential Regulation Authority for failure to put in place a sufficient IT system that could handle the risk of IT failure (Financial Conduct Authority, 2014). 5.0 HR Opportunities and Challenges relating to Outsourcing 5.1 Labour Market/Advanced Infrastructure According to McIvor (2010) outsourcing to foreign country can offer many opportunities, emerging economies such as India have heavily invested in information technology infrastructure and have significance high levels of education making them an attractive outsourcing market for businesses. Javalgi et al (2013) further highlights that India has a strong emphasis on mathematics, science, and technology resulting in a large number of graduates within these areas. Alongside worl d class universities and an estimated 350 million English speaking population with around 100 million fluent in the language both written and spoken. 5.2 Implementation and Management Businesses outsourcing any operation must insure that the outsourcer has been sufficiently trained. Taplin (2008) stresses that the transfer of skills from the business to the outsourcer is critical to the success of the outsourcing operation. The design and process of training should incorporate attributes from all levels of the organisation from HR and Managers to the users of the system to ensure knowledge is effectively transferred. This point has particular relevance to RBS with some aspects of RBS legacy computer system and coding formats dating back 40 years, it is of particular importance that outsourcer Infosys has a complete understanding of the system (Flinders, 2014). 5.3 Employee Morale The outsourcing of operations within a businesses can have a negative effect upon the remain ing employees within a business. Gonzalez et al. (2012) indicates that employees within an organisation that is outsourcing operations can become uncertain of their employment situation and can develop low morale which can lead to reduced levels of productivity. 5.4 Security Issues The privacy and security of customerà ¢Ã¢â€š ¬Ã¢â€ž ¢s financial information is a specific issue to financial service sector outsourcing. Unlike the outsourcing of manufacturing RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s outsourcing of IT system will mean the transferring and processing of high volumes of personal financial information of millions of customers to Infosys. RBS needs to ensure that the correct measures are put in place to protect this information, as June et al (2010) indicates that the financial service sector in the EU and US accountable to full liability of all operations including those that have been outsourced. 6.0 Strategic HRM and Planning 6.1 Core Business Processes A key strategic adv antage of outsourcing is that it allows businesses to focus on core operations (McIvor, R. 2010). Businesses can use outsourcers to carry out non-core, time consuming and routine activities while businesses can focus on the development of operations that add value and competitive advantage to the business (Tayauova, 2012). Within Information Technology outsourcing in the financial services there are many routine tasks, RBS can insure that routine tasks such transaction processing are carried out by Infosys while RBS can focus on developing new information technology strategies and policies, such as RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s announcement that it is investing  £1bn by 2017 in its digital services for personal and small business owners (Dunkley, 2014). 6.2 Opportunity to integrate new technology The use of IT within financial organisations such as RBS may no longer be seen as a simply back office operation instead Gonzalez et al (2012) highlights that IT can be seen as a cruc ial part of the financial service sector enabling efficient operations and also creating competitive advantages and services. Outsourcing not only allows for the processing and maintenance of existing IT operations but also enables the access to develop new technologies and competitive advantages. RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s has adopted this principle and has signed a contract worth  £300 million with both Infosys and IBM in order to design a state of the art computer system for a new bank William Glynà ¢Ã¢â€š ¬Ã¢â€ž ¢s, which RBS are planning to launch in 2015. The new banks computer system will be based around RBS existing IT platform (Quinn, 2013). 6.3 Staffing Requirements/Workload Flexibility The outsourcing of operations which are subject to varying levels of demand and workload can be particularly beneficial to businesses. This is significant within the financial services industry and RBS, as the demand for transaction based services varies on a daily basis. Oversta ffing increases expense and reduces profitability while understaffing can reduce efficiency and may cause problems. By outsourcing part of the operation financial organisations can design contracts with outsourcers to handle the changing work load levels while providing financial organisations with much more predictable operating costs (Basu and Nair, 2012). 7.0 Cultural Considerations 7.1 Communication and misinterpretation barriers Offshore outsourcing can pose potential miscommunication and misinterpretation problems. Raju (2012) highlights that foreign countries such as India have a large English speaking and educated population however cultural and linguistic variations of its spoken form can cause confusion in cross cultural outsourcing teams. In turn this confusion can lead to inefficiency and reduced work productivity. In order to ensure that cross cultural outsourced operations are carried out effectively, outsourcers must ensure that there are sufficient intercult ural training programs in place. 7.2 Religious Practices Indiaà ¢Ã¢â€š ¬Ã¢â€ž ¢s culture is religiously diverse with the main religions including Hindu, Muslin, Christian and Sikh. This diverse range of religions sees many religious holidays and festivals take place throughout the year in India. When outsourcing to India RBS should aware of these religious practices and any affect that these might incur. (Melik, 2012) highlights one of the largest Muslin religious festivals is Ramadan in which Muslin cannot eat or drink during daylight hours. During this period of Ramadan it has been reported that working performance and productivity declines due to shorter working hours and changes in behaviour. 7.3 Time Zone When outsourcing to a foreign a county RBS should be aware of the potential difficulties of working across different time zones. India for example where outsourcer Infosys is based is 5 hours and 30 minutes headed of the UK time zone. While this is not the largest time zone difference it still represents a significant communication limiting factor. As communication between RBS and Infosys may be limited to certain number of working hours, specifically if complex tasks need to be queried, if the working time of either country has finished confirmation and progress may be delayed until the next day (Lee-Kelly and Sankey 2008). 8.0 Financial Assessment 8.1 Lower wages Outsourcing to an outsourcer in another country can offer significant savings for RBS. Because of lower wage rates companies such as Infosys can offer significant savings to carry out the same tasks. Bummer (2012) reported that graduate jobs with experience of using the software program CA-7 which is used for a number of operations within RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s computer system were advertised with salaries between  £9,000 and  £11,000 which is a significant saving on what a worker would be paid for carrying out the same job in the UK. However RBS should be a ware of the increasing levels of inflation within countries such as India, as high levels of inflation can increase the cost of outsourcing, this is of particular importance in long term outsourcing contracts (Javalgi et al., 2013). 8.2 Reduced Operational Costs RBS can benefit from outsourcers economies of scale, due to the fact that outsourcers such as Infosys employee a large number of employees specialised within the same areas such as IT, this enables them to carry out the same transaction processes as businesses such as RBS but at a lower cost (Hecker and Kretschmer, 2010). These efficiency savings enable Infosys offer RBS cost savings. 8.3 Recruitment Costs As mentioned previously outsourcing to India provides the opportunity to access an attractive labour market. However the cost of recruitment and training of any individual can be costly and time consuming process. However the outsourcing of operations allows for the cost to be carried by the outsourcer (McIvor, R. 2010). Offering access to Indiaà ¢Ã¢â€š ¬Ã¢â€ž ¢s skilled labour force without the negatives of recruitment and training. 8.4 Hidden Costs The outsourcing of operations can be a complex process and has the potential to undermine the cost saving strategies through unexpected costs. Larsen et al (2011) further indicates that hidden costs can occur at a number of stages of the outsourcing contact, including the cost of initial selection of an outsourcer and unexpected high levels of coordination during the implementation stage. Further hidden costs can arise from additional training when outsourcing complex tasks as well as previously mentioned when outsourcing to a foreign country cultural issues may introduce hidden additional training costs. 9.0 Conclusion In conclusion it is clear that outsourcing of non-core operations can provide the RBS with the opportunity of focus of core operations that add value and competitive advantages. While outsourcers can offer many be nefits including significant cost savings, increased workload efficiency and enabling access to highly qualified labour markets. In the case of RBS it can also be concluded that IT can also be classified as an operation that is not only a back office operation but a platform that can provide value and competitive services through the development of new technologies. However outsourcing for RBS is not without its challenges, such the training of its complex legacy system, possible communication barriers and time zone differences as well as the consideration of outsourcing on its own staff. The risks of failed outsourcing can be extremely damaging, in the particular RBSà ¢Ã¢â€š ¬Ã¢â€ž ¢s IT glitch in 2012, which results in consumer compensation of  £175m and a fine  £56m while also significantly damaging RBS reputation. Whilst outsourcing offers RBS many benefits it is unknown whether this disaster could have been prevented if IT had not been outsourced. Don’t waste time! Our writers will create an original "Outsourcing for RBS" essay for you Create order

Thursday, December 19, 2019

Gender And Sexuality A Sociological Perspective

When I read the chapter heading, I didn t really know what to expect. I knew it was going to discuss gender and sexuality, but didn t realize it would dig deeper into different perspectives of gender identity, theories behind gender inequality, and homosexuality. In the closing comments, a review of the chapter, it mentions being able to see cultural and environmental influences from a sociological perspective. I believe this whole chapter of gender and sexuality can be summed up by that comment. Besides historical events and stereotypes, gender and sexuality is heavily influenced by different cultures and the environment. The environment includes sexual and gender crimes, poverty, and health. Culture includes language, family history, and influence from the media. This chapter did so much more than just discuss gender and sexuality, It also created new perspectives and ideas. As an experiment, after reading about gender identity, I said the words gender identity out loud. This all owed the words to flow deeper into my thought process. Gender identity has been something I have struggled with almost my entire life. I always thought of gender identity as how you classify yourself, or what you wear, makes up your gender identity. After reading this section, gender identity is more than the surface, or a label. It is how you define yourself when it comes to your own sense of gender. There are two different sociological views or perspectives, in regards to gender identity.Show MoreRelatedA Male Dominant Society1816 Words   |  7 Pagesthorough understanding of the characteristics of a patriarchal society is developed. When a strong grasp of the ideas of a patriarchal society is developed then we will be in a position to argue that it is in fact the commoditization of the female sexuality through media and other popular mediums that is fueling this ‘persistence’ of male dominance. Whatever the case is, sociologists are agreed on one fact that prostitu tion and pornography are not helping women’s case in ‘demands’ of equal rights andRead MoreSociological Accounts on Individuals Acquiring Their Identities591 Words   |  3 PagesSociological Accounts on Individuals Acquiring Their Identities The concept of identity has been defined as A sense of self that develops as the child differentiates from parents and family and takes a place in society (Jary and Jary, 1991.) Through the process of socialization, individuals acquire their identities, but this issue cause different understandings according to sociological accounts. Here, I will show these accounts, and make an analysis understood by Read MoreFunny Thing About Sociology : Time Essay862 Words   |  4 Pagesgoes into coming up with a sociological question. Sociologists rework their questions multiple times, and then reviews for structure and sociological imagination; no surprise the rewording starts again. Finally, with great relief the masterpiece is done, the question is asked. One will sit back and admire their question only to realize the real work is about to start. Attempt one at a sociology question: Why do homosexual people â€Å"come out† about their sexuality verses naturally progressingRead MoreAnalyzing the Themes in I Now Pronounce You Chuck and Larry1105 Words   |  5 PagesAfter watching the movie I Now Pronounce You Chuck and Larry, I felt enthralled to dive deeper into the topics associated within the movie. So I begin by researching and conducting sociological analysis of the characters’ genders and sexualities. In addition, I will be examining the movie based on gender, socialization, media and evaluating the acceptance and portrayal of gay people in this particular movie. To further increase the depth and validity of the paper, I will be using terminology thatRead MoreSexuality, Sexuality And Sexual Orientation1111 Words   |  5 PagesKiara Rivas Sociology 1 Due Date: 5/5/15 Human Sexuality Sexuality is something that seems to dominate a lot of the world we live in. It’s in our schools, at work, and especially in the mass media. The way your body develops and the way you feel and respond to others sexually creates your sexuality (â€Å"Sexuality and Sexual Orientation†, Youthoria). It can shape and affect people’s lives as well as our own. Sexuality can be influenced by culture, religion, media, friends and experiences. Some peopleRead MoreThe Sociological Imagination And Common Sense1648 Words   |  7 PagesThe Sociological Imagination was a term that was first coined by sociologist C. Wright Mills. It could be said that definition of The Sociological Imagination is having the ability to look beyond personal experience and realise that society is shaped by the cross over between biography and history. Mills thought that everyone in society had the capability to think sociologically and that this was essential to gain a deeper understanding of bo th their society, and their current circumstance. ThisRead MoreShould Children Be Exposed From Gender Roles?973 Words   |  4 PagesShould Children Be Exposed To Gender Roles? In modern day America there is an ongoing disagreement between people of all ages about the topic of gender roles in children. According to Barrie Thorne and Zella Luria, the word gender is used to refer to â€Å"cultural and social phenomena- divisions of labor, activity, and identity which are associated with but not fully determined by biological sex† (Sexuality and Gender in Children’s Daily Worlds). Whether or not young males should be able to play withRead MorePhysical Body And Genitali The Biological Perspective1452 Words   |  6 PagesCompare and Contrast Essay Biological Perspective: The biological perspective posits the idea that one’s biological makeup is responsible for determining one’s gender. The idea is that a physical body and genitalia is what mandates the person’s gender. Some researchers have suggested that on top of this biological determinism, genes pass on gender stereotypes like an increased ability for math in people biologically assigned male and maternal instincts in people assigned female at birth. OthersRead MoreDisability Term Paper1491 Words   |  6 PagesRosario Student # 700316 Central Texas College For Partial Fulfillment of the Requirement for SOCI 1301 Introduction to Sociology Submitted to Dr. Duffy December 7, 2010 INTRO TO SOCIOLOGY 2 INTRODUCTION This paper demonstrates that hitherto sociological analyses of disability have been theoretically and methodologically inadequate. It is written that sociology, in common with the other major contemporary disciplines, has accepted almost without question the legitimacy of the individualistic biomedicalRead MoreFeminism, Marxism And Marxism1320 Words   |  6 Pagesestablishment of a classless society(https://www.merriam-webster.com/dictionary/Marxism) Firstly, Marxism is a widely academically known and used theory and interpretation all over literature. However, this is different in a sociological perspective. From a Marxist perspective, the proletariats are the majority and the bourgeoisie are the minority, under capitalist ideologies. The proletariats work very hard whereas the bourgeoisie are powerful and control everything. The proletariats are exploited

Wednesday, December 11, 2019

Snow Whites House Essay Example For Students

Snow Whites House Essay As Im sure many of you have now realised, Prince Charming has married several people in various stories, the main of which are Sleeping Beauty, Snow White and Cinderella. When these three meet each other at a ball and realise their husband is a disgraceful Trigamist, they plot their revenge  ACT 1  Scene 1- Snow Whites House  (Lights up on a fretful Snow white trekking up and down the stage. There is a traditional country cottage scene with table in the middle, 8 chairs surrounding it)  Snow White: Oh where could they have got to? I dont know, I slave all morning making those idiotic shrimps favourite soup and they dont even turn up! Im telling you, if they dont come very soon I swear Im just going to have to kill myse. (Door Rings with Doc at the door)  Snow White: Finally, where have you been?  Doc: Sorry Snow, I had to finish sorting out Dopeys Funeral.  Snow White: Funeral?  Doc: Havent you noticed?  Snow White: Noticed what?  Doc: The fact that strangely, every time you see us there seems to be less and less of us.  Snow White: Well, now that you mention it, I suppose so, youd better come in.  Doc: Thanks  Snow White: So where are you all, tell me everything, lets start with Dopey.  Doc: Right well, Dopey had an unfortunate accident, he wandered out onto the M1 during Rush Hour  Snow White: Oh and Happy? Snow White: Grumpy?  Doc: He was the first to go, We just threw him out!  Snow White: Sleepy?  Doc: He just wouldnt wake up  Snow White: Sneezy?  Doc: He caught Bird Flu.  Snow White: And Bashful?  Doc: Hes the Prime Minister!  Snow White: Like Phoney Blair?  Doc: The very same.  Snow White: Pity.  Doc: Yes.  Snow White: Do you still want the soup?  Doc: Id better go to be honest, Dopey needs to be cleaned up.  Snow White: Ok then, Ill see you soon, Bye!  (Doc leaves, bumps into Charming on the way out Charming Enters)  Charming: Hello Dear (Looking a bit out of breath)  Snow White: Where have you been running? Charming: Oh I just went to Beautys House.  Snow White: What?  Charming: To the Beauty Parlour. Yes. I was err, buying you a present from the beauty parlour.  Snow White: Oh how sweet, You know, if you were seeing another woman or indeed women, I would have to do something very very nasty. But thats not the case at all is it dear?  Charming: (nervously) No, not all.  (Postman comes whistling on, posts a letter through the Door)  Snow White: Oyo, what could this be? (Picks letter up and reads it aloud) Dear Princess Snow White and Spouse, I do cordially invite you to my Royal ball tomorrow at Toad Hall. All the other princesses and their spouses will be there  Charming: All the other princesses? Snow White: Thats what it says  (Charming whimpers)  Snow White: As I was saying, I do hope you can make it, Lord Toad of Toad hall. Well that sounds like fun. I shall go and find something to wear (She skips off)  Charming: Oh God, I need to go and see if Cinders and Beauty have one too. Toodles Snowy darling. (He rushes out)  Scene 2 -Cinders House  (Scene= Same as Snow White but a bit more royal palace looking. The Ugly sisters are next to their husbands Reginald and Cecil. Cinders is obviously trying to stall time until Charming comes)  Bertha: You know, my Reginald is always late everywhere, much less prompt than his richer, handsome, more considerate (Reginald kicks her) OW! Pathetic low life brother. Cecil: Yes Its true you know.  Gertha: Shut up Cecil; remember what I said about talking?  Cecil: Oh yes sorry.  Reginald: Moving on, does anyone know of an Acne, verruca, Athletes Foot, Corn and wart cream all in one?  Cecil: Ooh yes, I heard of this stuff that  Gertha: Cecil! Shut up  Cecil: Yes dear.  (Charming rushes in panting, sees Cinders and runs to greet her.)  Charming: Hello dear  (Cinders jumps when Charming greets her and looks very relieved)  Cinders: Where the hell have you been?  Charming: I was ummm buying you some chocolates. Yes thatll do.  Cinders: Well? .uf4a9d1a98dbadbc8bf07f7e0e062d14a , .uf4a9d1a98dbadbc8bf07f7e0e062d14a .postImageUrl , .uf4a9d1a98dbadbc8bf07f7e0e062d14a .centered-text-area { min-height: 80px; position: relative; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a , .uf4a9d1a98dbadbc8bf07f7e0e062d14a:hover , .uf4a9d1a98dbadbc8bf07f7e0e062d14a:visited , .uf4a9d1a98dbadbc8bf07f7e0e062d14a:active { border:0!important; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .clearfix:after { content: ""; display: table; clear: both; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a:active , .uf4a9d1a98dbadbc8bf07f7e0e062d14a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .centered-text-area { width: 100%; position: relative ; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a:hover .ctaButton { background-color: #34495E!important; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a .uf4a9d1a98dbadbc8bf07f7e0e062d14a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf4a9d1a98dbadbc8bf07f7e0e062d14a:after { content: ""; display: block; clear: both; } READ: Running in the Family Essay

Tuesday, December 3, 2019

Trace Evidence Essays - Forensic Evidence, Forensics, Trace Evidence

Trace Evidence Trace evidence is very important in forensic investigations. This category of evidence encompasses many diverse types of microscopic materials as well as some examples that are easily visible to the naked eye. The subject is broad and diverse because of the number of different types of evidence that are commonly encountered. Trace evidence can be thought of as evidence occuring in sizes so small that it can be transferred or exchanged between two surfaces without being noticed. Varieties of trace evidence can include, but are not limited to: metal filings, glass fragments, feathers, food stains, building materials, lubricants, fingernail scrapings, pollens and spores, cosmetics, plastic fragments, gunshot residue, chemicals, paper fibers and sawdust, human and animal hairs, plant and vegetable fibers, blood and other body fluids, asphalt or tar, vegetable fats and oils, dusts and other airborne particles, insulation, textile fibers, soot, soils and mineral grains, and e! xplosive residues. Forensic scientists routinely come into contact with a relatively few number of these. They are: hair, glass, paint, fibers, fingerprints, and flamable liquids. These will be covered more in-depth in this paper. Edmond Locard, a French scientist and one of the early pioneers in forensic science believed strongly that individuals could not enter an area without taking dust particles with them from the scene. This became known as what is now called "Locard's Exchange Principle." This principle states that when two objects come into contact with each other, each of the objects will leave particles of one on the other. It is this principle that is the foundation of the forensic study of trace evidence. Trace evidence examination is the examination and analysis of small particles in order to help establish a link between a suspect and a crime scene or a suspect and the victim of a crime. These small particles usually include such items as hair, paint, glass, and fibers. Although not considered "trace" items by definition the many Crime Labs also examine and analyze such important evidence as flammables (in arson investigations), fingerprints, footwear (shoeprints), and "fracture matches." Many also perform examinations of automobile headlamps, taillights and speedometers. The first category of trace evidence I will discuss is hair. Hair is examined grossly (with the naked eye), and with both low power and high power microscopes to determine if questioned hairs, found at the scene or on the clothing of an individual are consistent in characteristics to known hair collected from the suspect and/or victim. Some of these characteristics include more obvious traits such as color, length, and morphological shape and also microscopic aspects of the cuticle, cortex and medulla, which are the three basic components of a hair. A hair cannot be linked specifically to an individual through these methods but vital information developed as to who the suspect may be and significant elimination of other suspects can often be done. It is possible to tell the race, sex, and region of the body that a hair comes from. A relative idea as to the time since the last haircut can also be made. The second type of trace evidence is glass. When larger samples are available glass can be useful in linking a suspect with the crime scene through "fracture matches". This is when a larger piece of glass, found associated with the suspect, can be physically fitted with one or more pieces from the crime scene. More often when an individual gains access to a business or dwelling by breaking glass the perpetrator will acquire very tiny pieces of glass on his/her clothing. These cannot be physically matched due to their tiny size. However, these pieces, though smaller than a pinhead, can be characterized under the microscope. After proper gross and low power microscopic examinations are performed the Forensic Scientists use microscopic "refractive index" determination to further characterize the samples. Refractive index is a measurement of how light is "refracted" (bent) as it passes through the microscopic glass sample. Glasses having different formulations and used for differe! nt purposes have different RI's. Therefore samples can be compared to determine if the glass from the crime scene could be the source of the glass removed from the suspect's clothes. The third type of trace evidence is paint. When perpetrators break into businesses or dwellings they have the potential of acquiring small paint samples during their illegal visit. And usually when cars and/or trucks collide there is a significant chance that paint from either vehicle will transfer to the other. Many Forensic Scientists will