Monday, January 27, 2020

Corporate Social Responsibility (CSR) in the UK

Corporate Social Responsibility (CSR) in the UK ABSTRACT 1. INTRODUCTION Corporate social responsibility (CSR) involves with differentiating right from wrong and doing right (Scott, 2007). CSR is the compulsion to make choice and take actions that will contribute toward the wellbeing, interest, and benefits of the society as well as the company. 1.1 Problem of CSR CRS does not act like law which require people to follow. In contrast, it covers wide range of issues and many of which are unclear with respect to right and wrong (Frankental, 2001). As CSR is a self-interest practice, thus it is difficult to control the use of CSR because different companies which have different beliefs about which actions improve the welfare and benefits of the society (Luck, 2006). Companies can find themselves in difficult situations where they do not know how to act or what to do. In recent years, CRS is the key issue in all business sectors, including retailing industry. It is rather controversial to discuss whether supermarkets like Waitrose and Tesco should focus on driving toward or go beyond the field of strategic management. In countries with a dynamic market economy like the UK and the US, it is widely agreed that firms should not only concentrate on pursuing strategies that make economic profitability, but they must also have certain social responsibilities that must be fulfilled as well (Enquist et al., 2006). However, the agreement for firms to pursue both profitability and social responsibility and this should be the end of the discussion. Opinion about the issue, however, differs more or less with regard to the importance of profitability and social responsibility (Downey, 2004). Some people in a society look at the view of profitability as the most important purpose for economic organisations and that only social responsibility of companies is to achieve and pursue profitability within the boundary of law. Tesco is the UK leading supermarket with largest market share in retailing industry. As a face of capitalism, Tesco has been accused, criticised and involved in many social responsibility issues. According to the British Broadcasting Corporation (BBC, 2007), with substantial evidences, Tesco was revealed to make huge profits at the expense of farmers, communities and the environment. It is also abusing the power that results from its huge market share. In Tescos CSR report (BBC, 2007), Tesco was exposed to fail in supporting the UK farmers. In 2002, at the height of the UK apple season it was disclosed that less than half of apples on Tesco shelves were UK sourced. This practice is obviously contrasted with the Supermarket Code of Practice, which was meant to redress the balance between the biggest supermarkets and their suppliers. The big four supermarkets, including Tesco, were still using the same unfair trading practices that the Code was meant to stop. In response to such claim, Tesco states: We have a long-standing commitment to source as much UK produce as possible (Tesco, 2007). Tesco refers to its commitment to UK farming and claims that it has always provided support to British farmers in the past years. It said that as its business grows, so has that of its suppliers. It claimed that it has been developing long term working relationships with its suppliers and by working together, they can both meet customer needs and have both grown their market share together. In addition, according to the BBC (2006), Tesco has been blamed after one of its suppliers, Northern Foods which announced that it will close its Trafford Park Bakery in Manchester and this action lead to 690 jobs cut. The closure of Northern Foods is part of a shake-up announced in May after poor sales triggered two profit warnings. Critics claimed that as part of CSR practice, Tesco should be more supportive as promised in its CSR policy which stated that it has always been supportive to everyone involved in its business. In contrast, Tesco surprised and shocked the General Workers Union by doing nothing to support these 690 workers. Critics stated that this action of Tesco showed that it is throwing its buying power weight about by depressing prices and moving production at will to other plants (BBC, 2006). In response to the claim that it does not employ CSR practice and abuse power, a spokeswoman of Tesco said in respond that Tesco is regret to learn that Trafford Park is closing and that Northern Foods have taken the decision to resign Tescos pastry business at the site. Tesco spokesman said that they have been as supportive as they can be to improve the performance of the site. A spokesman of Tesco also added that when it was told by Northern Foods about the closure of Trafford Park, Tesco did ask if it could move this business to another site or sites. However, Northern Foods told that there is not enough capacity to do the business. Tescos spokesman also said that Tesco will continue to work closely with Northern Foods who will still supply it with a significant number of other products across other areas of its business. Tesco also emphasised that it will be working with its supply base to ensure the availability of sausage rolls, pies and quiches for its customers (BBC, 2006). However, from the eyes of critics, Tescos action does not fall into the scope of CSR practice. In the past years, many retailers have been taking part in Fare Trade products as they have become in the interest of customers. Thus, as the demand in for Fair Trade products, especially bananas has been increasing, Tesco has decided to support the scheme. However, a survey has revealed that Fair Trade bananas in Tesco are fall in the scope of Unfair Trade (Friend of the Earth, 2003). Banana Link, a small and dynamic not-for-profit co-operative founded in 1996 to campaign for a fair and sustainable banana trade, approximated the weekly profit from banana in Tesco for  £1 million and this is enough to employ 30,000 full-time banana plantation workers at a living wage. And this would be twice of what they are earning now. This means that workers in banana plantation are paid just a penny for every pounds worth of bananas sold in Tesco and this without a doubt is not enough to feed their families. While Tesco takes  £0.40p, importers hardly hit break even point just to stay as Tes co suppliers. If Tesco finds that suppliers make a mistake in packaging requirements, they have to pay Tesco  £25,000 as emergency product withdrawals (Friend of the Earth, 2003). Tesco requests suppliers to make the payments to cover the costs of its compliance with the Ethical Trading Initiative. This means that this demanded payment would be tough for smaller businesses. Supermarkets, including Tesco use bananas as a key item in their price wars. However, Tesco is not the one that suffers the cut in price. Since 2003, Tesco banana contract put its suppliers in the position where they cannot pay legal minimum prices in most banana exporting countries and are forced to supply fruit from the most environmentally and abusive socially sources. To rid such claim, Tesco insisted: Tesco supports the work of the Fair Trade Foundation. This year we launched our own brand Fair Trade bananas sourced from the Windward Islands (Tesco, 2008). However, many critics still find that this statement is unjustified and that the public did not get the whole truth, suggesting that Tesco needs to fully employ CSR practice. In term of sustaining communities, Tesco failed to meet the code of CSR practice. According to the BBC (2004) Tesco is facing a challenge to its purchase of the London-based Europa, Harts and Cullens stores. Trade body the Federation of Wholesale Distributors (FWD) made an appeal with the Competition Appeals Tribunal with an aim to block the deal. Tesco had received a clearance from the Office of Fair Trading to buy the convenience stores from their parent company Adminstore. However, the FWD said the deal would be both bad for consumers, competition and communities. This is because the FWD found that every time a large supermarket like Tesco opens, there would an average 276 jobs lost (BBC, 2007). The FWD said that Tesco may use convincing evidences to perverse that it boosts the local economy every time it opens new stores. However, what Tesco does is the opposite when it opens new supermarkets. It has been approximated that a supermarket opening will cause the closure of all village shops within a seven mile radius (BBC, 2007). And Tesco tends to import food into the area, making local sourcing to be just a niche market. To deal with such criticism, Tesco states in its official website and CSR policy: Tesco invests in all types of communities throughout the UK, providing jobs and careers for local people. Making jobs and economic activities stay in, or close to, local neighbourhoods starts to boost the local economy (Tesco, 2008). With regards to environment, the BBC (2007) disclosed that Tesco recycling campaign and its claim in the CSR report do not relate to the products on Tesco shelves. It was revealed Tesco stated its success rate of recycling in its CSR report as nearly 80% of its packaging waste relates to waste from its own operations, mainly from a long distance transit of produce which requires additional packaging. Thus, critics suggested that the best way for Tesco is to reduce packaging waste is to lessen the use of packaging materials in the first place rather than to recycle the materials after use. In response to this critic, Tesco say in its CSR report: Tesco is committed to protecting the environment by doing what we can to reduce our waste. We are looking for ways to minimise product packaging recycling wherever possible (Tesco, 2008). CHAPTER 2 2. LITERATURE REVIEW 2.1 Overview of Corporate Social responsibility (CSR) According to Kotler. P and Lee.n (2005, p.2) doing the most good for your company and your cause. By comparing good it has too many sights to give attention. A quick browse of different web sites for the fortune 500 reveals that good goes by many names, including corporate social responsibility, corporate community involvement, community relations, community affairs, community development, corporate responsibility, global citizenship, and corporate societal marketing. In order to do the best practice of CSR the authors prefer to use following definition: Corporate social responsibility is a commitment to improve community well being through discretionary business practices and contributions of corporate resources. A key element of this definition is the word discretionary, it referring to business activities, which are managed by law or moral ethics. Like as voluntary commitment to its serving community. If this sort of practices is managed by the company than it will be describe as socially responsible. According to Price Waterhouse Coopers (2005-2008) the greatest asset of any retail and consumer product company is its reputation and its perceived value among consumers. Today, consumers around the world, particularly in Europe, are concerned how a company manufacturers its product and whether it is managing for continued sustainability through attention to economic, environmental, and social performance. If not, a brands reputation can decline, and with it, an attendant decreases in future sales and profits. It is especially important for retail and consumer product companies to maintain the reputation integrity of their brand and to be socially responsible throughout their business operations since their products and services are usually marketed directly to product purchasers. According to the World Business Council for Sustainable Development (WBCSD) defines CSR as the commitment of business to contribute to sustainable economic development, working with employees, their families and the local communities (WBCSD, 2001). Hence the fundamental idea of CSR is that business corporations have an obligation to work towards meeting the needs of a wider area of stakeholders (Clarkson, 1995; Wad dock et al., 2002). More generally, CSR is a set of management practices that ensures the company maximizes the positive impacts of its operations on society or operating in a manner that meets and even exceeds the legal, ethical, commercial and public expectations that society has of business(BSR, 2001). 2.2 Definition of CSR The Institute of Directors, a UK-based trade group, has also presented another Good definition of CSR: CSR is about businesses and other organizations going beyond the legal obligations to manage the impact they have on the environment and society. In Particular, this could include how organizations interact with their employees, suppliers, customers and the communities in which they operate, as well as the extent they attempt to protect the environment (Lea, 2002). I think the above definition captures most of what CSR is all about. According to Tom Cannon (1994, p, 32, 33, 38, 44, 45,) corporate responsibility, the role of business in society is depending on business types and as well time of change. Business corporations exist primarily to produce goods and service that society wants and needs. Achieving this objective is their first and foremost responsibility; if they are unsuccessful in this mission, they cannot reasonably be expected to assume others. Simultaneously, business depends for its survival and long-term prosperity on society providing the resources such as people, raw materials, services, infrastructure which it needs to convert inputs into profitable goods or services. Business relies on society supplying a means of exchange typically money to allow it to convert the goods it produces into assets. Society is expected to provide an environment in which business can develop and prosper, allowing investors to earn returns while ensuring that the stakeholders and their dependents can enjoy the benefits of their involvement without fear of arbitrary or unjust action. An organization must support the established or prestigious programme; develop those activities, which endorse or sustain its position; and concentrate its investment in certain areas. Society expects many things of its corporate sectors, from the corporate its stakeholders expects lots of outcomes and they are classified by the relationship to the business. For the owners point of view the primary expectation will be financial returns, if the corporate is able to return good financial returns to its owners then the corporate will added values to the company. Same like the employees pay and additionally the working environment and training facilities. For customer it needs to supply of goods and services and secondly the quality of goods. Creditors need to have the assurance and secondly the security of money backs on time. The supplier wants firstly their payment and secondly long-term relationships. The community wants safety and security and secondly wants contribution to community. And the government wants from the business the compliance and secondly wants the improved competitiveness. According to Ramanathan (1976) argued that there is a social contract between organization and society. Jaggi and Zhao (1996) also agreed with the social contract view when they argued that organizations do not exit in a vacuum, but are part of a society, which creates and supports them. Society will not take too kindly to corporations, which fail to recognize and support important social values. Organizations are aware that society will not hesitate to use different sanctions to punish or bring to book any irresponsible act or omission by an organization as and when deemed necessary. In work done by (Gray et al, 1995, 1996; Guthrie and Parker, 1990; Patten, 1992; Roberts, 1992). Holland and Foo (2003) noted that the unregulated nature of the disclosure in CSR reports could only allow the development the relationship of reporter, which provides a degree of accountability. Corporate stakeholders have the right to know what contributions corporate entities are making to society. The provision of information, which satisfies this need, is known as accountability; hence Gray et al. (1996) defined accountability as the duty to provide an account of action or reckoning of those actions for Which one is held responsible. Hackston and Milne (1996) also supported the view that corporate entities should be held responsible for their actions that affect society. In the light of this, a recent survey (DTI, 2001) of 45 global and large companies operating in the EU showed that over 90 per cent reported on their mission, vision and values, workplace climate, community involvement, local economic development, market place and environmental impact. 2.3 History of CSR The nature and scope of corporate social responsibility has changed over time. The concept of CSR is a relatively new one—the phrase has only been in wide use since the 1960s.In the eighteenth century the great economist and philosopher Adam Smith expressed the traditional or classical economic model of business. In essence, this model suggested that the needs and desires of society could best be met by the unfettered interaction of individuals and organizations in the marketplace. By acting in a self-interested manner, individuals would produce and deliver the goods and services that would earn them a profit, but also meet the needs of others. The viewpoint expressed by Adam Smith over 200 years ago still forms the basis for free-market economies in the twenty-first century. In the century after Adam Smith, the Industrial Revolution contributed to radical change, especially in Europe and the United States. Millions of people obtained jobs that paid more than they had ever made before and the standard of living greatly improved. Large organizations developed and acquired great power, and their founders and owners became some of the richest and most powerful men in the world. In the late nineteenth century many of these individuals believed in and practiced a philosophy that came to be called Social Darwinism, which, in simple form, is the idea that the principles of natural selection and survival of the fittest are applicable to business and social policy. This type of philosophy justified cutthroat, even brutal, competitive strategies and did not allow for much concern about the impact of the successful corporation on employees, the community, or the larger society. In the 1960s and 1970s the civil rights movement, consumerism, and environmentalism affected societys expectations of business. Based on the general idea that those with great power have great responsibility, many called for the business world to be more proactive in (1) ceasing to cause societal problems and (2) starting to participate in solving societal problems. Many legal mandates were placed on business related to equal employment opportunity, product safety, worker safety, and the environment. Furthermore, society began to expect business to voluntarily participate in solving societal problems whether they had caused the problems or not. This view of corporate social responsibility is the prevailing view in much of the world today. 2.4 Benefits of CSR Disclosure Implementing the CSR concept in an organization, there are lots of benefits an organization can get examples are: increased customer loyalty, more supportive communities, the recruitment and retention of more talented employees, improved quality and productivity and the avoidance of potential reputational risks which may arise from environmental incidents. However, Cooper (2003) noted that the practical experience of early adopters of CSR reports was mixed. Some companies noticed that instead of the provision of the reports enhancing companies reputation, it actually attracted adverse comments by drawing attention to divergences between the values espoused by the company and its actual behavior. One can only view this as an inevitable teething problem, which would over time disappear from the corporate scene. Coopers survey of FTSE 250 companies found that less than 33 per cent of companies considered that their CSR activities resulted in improved customer loyalty while only 20 per c ent believed that it enhanced staff recruitment and retention. Cooper concluded that the benefits may be more subtle and realized over a longer timescale than is sometimes suggested, but there is no doubt that the resulting benefit will be enormous in the long run. Despite these perceived benefits, Schaltegger et al. (1996) have argued that one of the driving forces in the popularity of CSR reports was the need to appease some user groups, e.g. environmental activists. 2.5 Framework of CSR CSR framework provides a standard for social and ethical accounting, auditing and reporting. It includes mandatory external verification and stakeholder engagement. Tescos CSR report published in annually and it has KPI, where the CSR people have to work hard to develop in next financial year. Work has done by the Institute of Business Ethics covers the fairness to employees, suppliers, customers, equity and loan creditors, contribution to community and protection of the environment. The framework provides that an independent verifier should assess the company performance annually. According to Social Accountability (SA) there are lots of fields to look at which are trade union, and non-governmental organizations (NGOs) on the basis of International Labors Organization (ILO) conventions the Universal Declaration of Human Rights and the UN convention on the Rights of the Child. This standard focuses on child labors, forced labors, health and safety, working hours, discrimination, discipline, free association and collective bargaining. Any organization recognizes that it has a duty to act as a responsible corporate citizen, by meeting its obligations to all its stakeholders shareholders, customers, employees and the local, national and global communities in which it operates. In this work done by Peter Jones, David Hillier, Daphne Comfort, Ian Eastwood in Management Research News, at Patrington: 2005. Vol. 28, Iss. 1; pg. 34, 11 pgs describes the awareness of consumerism and sustainable development. It provides the basic outline of sustainable development and how it relates to the business as a successful retailer. Here the retailers are increasingly recommending on social issues, for example, social inclusion, ethnical trading, healthy living, training, health and safety, community support initiatives under a broadly sustainable agenda. However, on this report there is no model used for measuring the standard of CSR. Here the author looking in different companys report and letting the reader, sustainable development is important and it gives the stakeholders enough confidences to invest or employees to work for the company. If the author add the model of Key performance Indicator (KPI) then it will be good enough to measure the level of CSR. In this wor k done by Peter Jones, David Hillier, Daphne Comfort, Ian Eastwood in International Journal and Retail and distribution Management, Bradford: 2005. Vol. 33, Iss. 2/3; pg. 207, 8 pgs suggests that the majority of the major retailers are addressing sustainability agendas, that they recognize, albeit in varying measure, the impacts their businesses have on the environment, the economy and society and several of them are looking to measure and benchmark their performance. But on this report the author did not mentions about fair trade and how it will impact on the supply chain on the organization. If any organization can build up a good relation between supplier and consumer providing good money to the supplier and best product and service to their customer then it will increase the market loyalty, which will increase the goodwill to its whole stakeholders. 2.6 CSR in UK Practice Within the last few decades corporate social responsibility (CSR) has been fast momentum across the business community and it is seen to be gradually higher on boardroom agendas. Many of the UKs top retailers are major employers, they continue to be very much at the leading edging of innovation and growth and many of them recognized the impacts they have on the environment, on society and on the economy. They are increasingly keen to communicate their commitment to CSR to their shareholders, their customers, their employees, to government and to the public at large. Mixtures of factors are cited as being essential in building the current momentum behind CSR. Ernst Young (2002) recommend that there are five key drivers, which have influenced the increasing business, focus on CSR namely greater stakeholder awareness of corporate ethical, social and environmental behavior; direct stakeholder pressures; investor pressure; peer pressure and a heightened sense of social responsibility. Th e Governments approach is to encourage and incentive the adoption and reporting of CSR through best practice guidance, and, where appropriate, intelligent regulation and fiscal incentives. The government also looks at Pensions Act Amendment, Transparency. The Government encourages companies to report on their CSR performance in a number of ways such as Issued guidance on environmental reporting, Supported initiatives promoting company reporting, Provide the guidance for the financial services sector and the ACCA sustainability reporting awards, Supported the Global reporting Initiative and The enhanced business review requirements of the Companies Act. The UK government focusing their attention in four key areas, namely promoting good practice, supporting work to demonstrate the business case, promoting international action on CSR and joining up action across government (DTI, 2001). The recommendations in the European Unions Fifth Action Programme on the Environment embedded in the report Towards Sustainability (1992) has contributed to the current interests in this area. The report calls on organizations to provide information on a number of areas, namely: details of their environmental policy and activities and the effects thereof in their annual reports, their expenses on environmental programmers, and make provisions in their accounts for environmental risks and future environmental expenses. A number of the top ten retailers report on the improvement and/or use of CSR Key Performance Indicators (KPIs). Tesco, for example, employs some 18 CSR KPIs covering economic, environmental and economic issues and containing 24 specific targets. In choosing these KPIs the company uses one or more of four criteria, namely customer priorities; staff priorities; business priorities; and compliance with legislation or public policy. The companys CSR report provides a brief description of the annual target for each KPI, outlines the actual performance against each target and sets a target for the following year. During 2003/2004 the company exceeded expectations on 18 of its targets, met 13 and was below target on three. Where possible verification of the data used for the KPIs is carried out using external sources including market share data, independent surveys, services bills and audits for the Emissions Trading Scheme and Climate Change Levy Agreement. 2.7 Criteria of CSR practices and Effectiveness In order to practices effectively it needs accuracy of commitment, facing the challenge and work with coordination in between corporate bodies in the entire business. In this case the effective can be measured by (KPI) at annually while doing the financial report. It also monitored and justified their work by different independent person for whole year and makes a comment for improvement if needed. By doing survey, how the business can improve such as expectation from stakeholders, community, and government and for its own employees then it can find some direction, which they can follow. By following those steps the company can reach its most effective practices at CSR level. 2.8 Conclusion This chapter has reviewed the literature regarding the CSR, measuring the performance within organizations. The literature review has examined some common themes emerging from the implementation of the CSR in real practices. After reviewing the past works, it is very clear that CSR is vast growing concern and its important in business is essential. So in real business CSR is seen quite common and practices by the corporate bodies effectively. In order to measurement the performances of CSR, they have to maintain the model, which called (KPI). Around the business many related groups looking for improvement of CSR performances because of their profit interest. CHAPTER 3 3. METHODOLOGY 3.1 Data collection After some deliberation, we decided on asking for perceptual data from the middle management individual responsible for CSR activity at the firm. Previous studies have principally relied on aggregate measures of financial performance that have provided inconclusive evidence for a CSR-financial performance linkage. Accordingly, we have focused on the firm project level in order to discover how value is created by strategic CSR. We began this paper by stating that Corporate social Responsibility in Tesco . As we argued earlier, there is no consensus that CSR can, or even should, be managed for profit, just as other business processes are managed for profit. As a result, well-intentioned CSR researchers have sought to find a way to demonstrate CSR profitability without having to claim that management takes strategic action to create value. This research agenda did not succeed because it could not specify how competitive advantage and value are created. In order to do so, we have chosen to focus on middle management, precisely because they are in the best position to explain the strategic intent of their portfolio of social action projects, Working from managerial intent requires accepting certain trade-offs. By shifting to a more micro focus, we also leave behind more objective indicators of value creation. On the project level, one would almost have to engage in a cost-benefit analysis of each project in order to determine the value created. Firms do not yet engage in such fine-grained evaluation of their CSR projects. Given the current state of the art of CSR management and reporting, we decided that we needed to rely on the perceptions of the managers responsible for CSR regarding the strategic goals of CSR projects. Such perceptions of firm benefits and of the quality of stakeholder relations may be biased. In response to this issue, we have applied the necessary methods to control for possible bias. Support for using perceptual managerial data rather than external stakeholders and other secondary databases come from the theoretical literature and from practical research issues. There is considerable theoretical support for using perceptual data if, in fact, managerial decision making is driven by the beliefs of top management, it makes sense to ask how management perceive the environment and the extent to which they believe they are responding to CSR challenges in a strategic fashion. It is crucial to test the extent to which top management seeks competitive advantage and value creation via CSR in an uncertain environment. On a practical level, external databases of CSR and reputation surveys in UK principally ask top management which firms they most admire. The resultant reputation and CSR rankings overweight firm size and profitability. External stakeholder groups, in particular NGOs, rarely deal with a large cross-section of firms and either speak favourably of partners with whom they collaborate or negatively of large firms that have conflicts with specific stakeholders. However, the managers we questioned are well aware of their firms PR and marketing programs for CSR and corporate reputation. These managers from the kinds of large companies we surveyed are well aware of their rankings in the CSR and reputation surveys. Our use of perceptual measures

Sunday, January 19, 2020

Voting System

CHAPTER I INTRODUCTION 1. 1 B ACKGROUND OF THE STUDY Students’ Union is asked to work beyond its capacity. It would be useful to have a voting (democratic) system to ensure that the Student Council’s rulings are not lost in an overload of demands and those students ’ union workload priorities match student priorities. One of the most crucial factors for a voting system to be successful is to exhibit a Voting Protocol that can prevent opportunities for fraud or for sacrificing the voter's privacy.The Voting Protocol that will be designed and implemented for this voting system will combine the advantages of existing protocols and techniques, while at the same time it will aim at eliminating most of the identified deficiencies and problems. The voting system includes three actors: Voter, the voting system’s operator, and the administrator. Eligible voters have to register themselves, assisted by the Administrator, before the â€Å"election day†.The sys tem ensures that only registered voters can vote and vote only once on the election’s day, and collects the cast votes and tally the results of the election. Voter privacy is somehow maintained and vote tampering is prevented in this system. 1. 1. Historical background Since the San Miguel National High School started to elect their SSG officers, they have been using manual voting system, where they have to use more time just to prepare the materials for the election.The election will start by posting the list of name of the candidates, giving the exact number of sample ballots in every class rooms, and disposing one ballot box in each class rooms. The San Miguel National High School always elect officers every 3rd week of February for every year just to ensure that there will be someone to watch the students during the vacation. 1. 1. 1 Organizational Chart See Appendix A 1. 1. 3 Organizational Function President-the highest-ranking member of an organizationVice President-an official rank below a president, who can take the president’s place if necessary. Secretary-somebody elected or appointed to keep records of the meetings of an organization such as a club, society, or committee, and to write or answer letters on its behalf. Treasurer-somebody who manages the finances of an organization, usually the chief financial officers. Auditor-somebody who checks accounts or conducts an audit of an organization.PIO -somebody who make sure that the public, the media and every organization involved in the crisis are constantly informed on the progress being made to resolve the emergency at hand. Project Manager-somebody who matches available resources (time, money and people) against business project aims Sergeant at Arms-somebody appointed to keep order within an organization such as a legislative body or court of law, and to perform various other duties such as making arrest. Representatives-somebody who speaks, acts, or votes on behalf of others. 1. 2 Objectives of the study 1. 2. 1 General objective of the study To create an automated voting system for San Miguel National High School, to promote student use of technology in the election process for the school’s Student Council, thus making their digital inclusion possible and viable, and to show that technology can facilitate the student participation in school life and prepare them to become conscious and responsible citizens of the greater society. 1. 2. 2 Specific objective of the study * To lessen the time consume during the student council system. * To permit only eligible voters to vote and ensure that each eligible voter can vote only once. To reduce the manual procedure of task and to prevent human error for someone to prepare the election each year. * The system should allow and assist voters to cast their votes quickly, in one session, and with minimal equipment or special skills. 1. 3 SCOPE AND DELIMITATION This proposed system is designed to provide fast and a ccurate student’s council election of San Miguel National High School. This voting system is capable in storing voter’s registration as well as calculates their votes for finalizing the winners of the election. All computations during the election are done in a reasonable amount of time.It will also provide a printed result of the election. 1. 4 Significance of the study` An election is a decision-making process by which a population chooses an individual to hold formal office. Elections rely heavily on manual tallying and canvassing of votes thus making them vulnerable to control and manipulation. To ensure a credible and transparent electoral process, the modernization of the electoral system through computerization shall be supported to ensure the credibility of polls and correct the deficiencies in the electoral system.It is extremely fast, allowing obtaining final results in a matter of minutes. It has a very complete and user-friendly interface for system operato rs and as well as the voters. Furthermore, the challenge is to develop the student’s appreciation of their vote as a means to reform the administration and receive better services from it. This type of voting system encourages the student’s to promote suffrage. 1. 5 Summary of the study `The proposed system will lessen their effort and time in reading, storing, and calculating of the students’ votes.It will be easier for COMELEC officer to conduct election in their school. It will provide accurate result of voting and fast type of automated election for the student council in San Miguel National High School. CHAPTER II CONCEPTUAL FRAMEWORK 2. 1 Theories used in analyzing the system The current voting management in student’s council election is manual, thus resulting in time consuming on part of the electoral officer. Everything need to be done on paper. All files are on the envelope and transferring of files needs an effort of the electoral officers. We a re now in age of the echnology. We should be able to use technology to a much greater extent it is in the current manual system. This encourage the proponents to conduct an interview, research and study to have an idea in making a system that can be used to easily store, calculate and finalized the result of automated election without the effort of election officer and the voters. The researchers finally come up with the Student Council Voting System which provides the LAN links to transfer and transmit the data of votes with high security and accuracy. 2. 2 Review of related studies Based on what Alecks P.Pabico said, â€Å"Six years ago, the idea of automated elections for student council posts in the University of the Philippines in Diliman was unimaginable, at least for me. It wasn’t necessarily because we couldn’t muster the technology and logistics, but there was simply neither a need nor a clamor for paperless voting. A lot of things have changed since then, an d automated elections are no longer a thing of the past in UP Diliman. Now on its second year, and notwithstanding minor glitches in the system, electronic voting has proven to be a worthy improvement in one of the basic democratic processes in modern society.Alecks got to UP a little past 2 p. m. last February 24, the day of the student council election this year. As a registered graduate student, he had made sure to drop by the campus to cast votes, first time to participate in the automated system on a university-wide scale. There was already a long queue outside the designated voting center at the College of Arts and Letters. Some students were waiting for their names to be located on the list, while others were waiting for their turn at the computer terminals. There were no paper ballots or ballot boxes in sight. † 2. 3 Findings on related studies and theories According to Alecks P.Pabico (a writer of the investigate Reporting Magazine), for the more important aspects of the electoral process from voter registration, voting, vote counting to canvassing – touches of modernity have been an elusive as replies with substance from candidates. Yet for the most part the problem stems not from a lack of available technological solutions. A comprehensive computerized voting system encompassed the three major phases of the elections; registration, voting and tabulation. Pilot tested in council elections in universities, it has proven to be an effective safe-guard against fraud and manipulation like dag-dag –bawas. . 4 Terms Adopted in the Study 2. 4. 1Technical terms Automated election system – a system using appropriate technology for voting and electronic devices to count votes and canvass/consolidate results. Computer literacy-defined as the knowledge and ability to use computers and technology efficiently. Data – a collection of facts, figures, and statistics related to an object. Database – a collection of related or si milar records that are mostly used together. Data security – the means of ensuring that data is kept safe fromcorruption and that access to it is suitably controlled.Existing system- a system that is currently being used by the institution. Networking- the act of working using computer network or the act of connecting computers into network. System design- the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. User friendly-a system that is easy to learn and to use. 2. 4. 2 Operational terms Automation- the automatic operation or control of equipment, a process, or a system. Election – is a formal decision-making process by which a population chooses an individual to hold public office.Input – the term denoting either an entrance or changes which are inserted into a system and which activate/modify a process. Output – the term denoting either an exit or changes which exit a system and which activate/modify a process. Registration- the act of registering or being registered. CHAPTER III ARCHITECTURIAL DESIGN 3. 1 The Existing System The existing system of San Miguel National High School when having a Student Supreme Government (SSG) election, all transactions like voters’ registration and voting, is done manually. The election is held during the 3rd week of February for every year.To be one of the candidates for the election the student must have a grade of at least 85% and above. The student who is running for president must be a 3rd year student. During the election, the SMNHS’ COMELEC will prepare a sample ballots and a ballot box for each class room. To vote, the students have to write the names of the candidates for every position that they want to elect. For the validation of votes, every student will have to put thumb marks on the sample ballots. After the election, the COMELEC, along with the SSG adviser, will count the votes one by one in front of the entire student. . 1. 1 Data Flow Diagram See appendix B 3. 2 Problem Identifications of the Existing System This section presents all the problems identified by the researchers after gathering all data by means of interviewing the SSG Adviser of San Miguel National High School. 3. 2. 1 Presentation of the Problems The following are the problems identified by the researcher based on the gathered data. 3. 2. 1 . 1The process of counting the votes one by one is kind of time consuming process. 3. 2. 1 . 2The votes cannot be secured or can be falsifies. 3. 2. 1. The writing of the student may not be clear. 3. 2. 1. 4The COMELEC officers disregard the student that did not vote. 3. 3 The Proposed System 3. 3. 1 Needs for the System The system needs maintenance to maintain the security, accuracy and the capacity of the system. 3. 3. 2 Data Flow Diagram of the Proposed System See Appendix C 3. 4 Objectives of the Proposed System To help the School especially the San Miguel National High School to their manually voting of their organization (SSG). 3. 4. 1 General Objective of the proposed System To create an automated voting system for the San Miguel National High School. 3. 4. 2 Specific Objective of the proposed System 3. 4. 3. 1 The system functionality should ensure that no one can falsify or modify the result of the voting by eliminating a valid vote or counting an invalid vote in the final tally. 3. 4. 3. 2 A system that provides a log-on security to secure the votes and to ensure that only authorized person can access the system. 3. 4. 3. 3 The system that permits only eligible voters to vote and ensure that each eligible voter can vote only once. 3. 4. 3. To ensure that no one can duplicate his or someone else's vote and no one can change someone else's vote. 3. 4 Users of the System The SMNHS Student Council Voting System is intended for the use of San Miguel National High School’s student, SSG president and COMELEC officers. It will help the COMELEC Officers to register students, prepare the election, and calculating the votes. It will lessen the time they consumed conducting a student council election. It will lessen the effort of the SSG president and COMELEC officers preparing and distributing the sample ballots and ballot boxes to each room. 3. Environment of the Usage System The following are activities that can be done by the use of the new system: 3. 6. 1 The system accept data inputs to create student records such as their student number, name, address, age, gender, year and section. 3. 6. 2Lessen the time consumed during the counting of votes. 3. 6. 3 Student who has already voted cannot vote again. 3. 6. 4Automatically prints the result of election. 3. 6. 5 Administrator is the only person to access the system. 3. 7 Components of the Proposed System 3. 7. 1 General features of the Proposed System The general features of the proposed system are the following: 3. . 1. 1 Menu Driven –pertaini ng to software that makes extensive use of menus to enable users to choose alternatives and guide program operations. 3. 7. 1. 2Help Facilities–in which offer the users to support in the learningprocess. 3. 7. 1. 3 User Friendly-it provides user friendly features that will help the user to interact easily in manipulating the system. 3. 7. 1. 4 Reliability –the system performs specific task correctly to support the transaction entered. 3. 7. 1. 5 Security –it will include password to ensure that unauthorized user cannot read or use the data to make sure that the ystem files are safe in unnecessary information and for the privacy of counting of voting. 3. 5. 3 Functions of the System 3. 5. 4. 5 Visual Table of Content – Program Level See Appendix D 3. 5. 4. 6 Visual Table of Content – Module Level See Appendix E 3. 5. 4. 7 Visual Table of Content – System Level System Level PASSWORD 0 Main Module Menu 1. 0 Voting Menu 2. 1 Select 2. 2 Submit 2 . 3 Exit 2. 0 Official Ballot 3. 4 Submit 3. 5 Back PASSWORD 0 Main Module Menu 1. 0 Admin Menu 2. 1 Add Voter 2. 2. 1 Generate Student’s ID 2. 2. 2 Generate Password 2. 2. 3 Add Voter 2. 2. 4 View 2. . 5 Save 2. 2 Voters’ list 2. 3. 6 Select 2. 3 Candidate list 2. 4. 7 Delete 2. 4 Search 2. 5. 8 Search by ID 2. 5. 9 Search by Name 2. 5 About 2. 6 View 2. 7. 10 Candidate list 2. 7 Application Form 1. 7. 1 Candidate Registration 2. 8 Report 2. 9. 11 Canvassing Report 2. 9. 12 Voters’ Report 2. 9. 13 Section/Year Report 2. 9 Tool 2. 10. 14 Password 1. 10 Exit 3. 7. 3 Systems Inputs The following are the input of the system: 3. 7. 3. 1Password that contains a set of characters uses to log-in the Administrator for the system to operate (to register students and begin the voting). . 7. 3. 2 The students’ number, name, address, age, year, and section. 3. 7. 3. 3The students’ vote for every position. 3. 7. 4 System Outputs The following will be the output of the system: 3. 7. 4. 1 The system will produce the printed result of the election. 3. 7. 4. 2The list of the registered student who did not vote. 3. 7. 4. 3 The list of candidates in their selected position. 3. 7. 4. 4 The current status of the election 3. 7. 5 Input – Process – Output – Charts 3. 7. 5. 1 System IPO See Appendix F 3. 7. 6 Data DictionaryA Data Dictionary of San Miguel National High School (SMNHS) Student Council Voting System Table Name| Attribute Name| Contents| Type| Format| Range| PK| Users| UserID| UserID| Autonumber| xxxxxx| N/A| PK| | Username| Username| Text| xxxxxx| | | | Password| Password| Text| xxxxxx| | | Table Name| Attribute Name| Contents| Type| Format| Range| PK| Position| PositionID| PositionID| Autonumber| xxxxxx| N/A| PK| | Position| Position| Text| xxxxxx| | | Table Name| Attribute Name| Contents| Type| Format| Range| PK| Voters| VoterID| VoterID| Autonumber| xxxxxx| N/A| PK| | Username| Username| Text| xxxxxx| | | Passwo rd| Password| Text| xxxxxx| | | | Name| Name| Text| xxxxxx| | | | Year| Year| Text| xxxxxx| | | | Section| Section| Text| xxxxxx| | | | Voted| Voted| Text| xxxxxx| | | Table Name| Attribute Name| Contents| Type| Format| Range| PK| Candidates| CandidateID| CandidateID| Number| xxxxxx| N/A| K| | PositionID| PositionID| Number| xxxxxx| | | | Name| Last;First Name| Text| xxxxxx| | | | Year| Year| Number| xxxxxx| | | | Section| Section| Text| xxxxxx| | | | Photo| Photo/Image| OLE Object| . jpg/. png| | | | Votes| Votes| Number| xxxxxx| | | A Data Dictionary of San Miguel National High School Student Council Voting System Entity ___________________________________________________________________ Label:Voters Entry Type: Description: Alias: Values and Meanings: Input Data flow: Vote Output Data flow: Notes: Long Name: Registered Student ____________________________________________________________________ Label:User Entry Type: Description: Alias: Values and Meanings: Input Data flow: Outpu t Data flow: Notes: Long Name: Admin ____________________________________________________________________ A Data Dictionary of San Miguel National High School Student Council Voting System Elements ___________________________________________________________________ Default System:San Miguel National High SchoolStudent Council Voting System Label: Student’s ID Type and Length: Source: Voter Registration Form/Candidate Registration Form Security:Admin Description and Comment: Date: Alias: Default Value: Acceptable Value: User Responsibility: Admin ____________________________________________________________________ ____________________________________________________________________ Default System:San Miguel National High SchoolStudent Council Voting System Label: Student’s Password Type and Length:Source: Voter Registration Form/Candidate Registration Form Security:Admin Description and Comment: Date: Alias: Default Value: Acceptable Value: User Responsibility: Admin __ __________________________________________________________________ ____________________________________________________________________ Default System:San Miguel National High SchoolStudent Council Voting System Label: First Name Type and Length: Source: Voter Registration Form/Candidate Registration Form Security:Admin Description and Comment: Date: Alias: Default Value: Acceptable Value: User Responsibility: Admin __________________________________________________________________ ___________________________________________________________________ Default System:San Miguel National High SchoolStudent Council Voting System Label: Last Name Type and Length: Source: Voter Registration Form/Candidate Registration Form Security:Admin Description and Comment: Date: Alias: Default Value: Acceptable Value: ————————————————- User Responsibility: Admin _____________________________ ___________________________________________ Default System: San Miguel National High School Student Council Voting System Label: Year levelType and Length: Source: Voter Registration Form/Candidate Registration Form Security: Admin Date: Alias: Default Value: Acceptable Value: User Responsibility: Admin ________________________________________________________________________ ________________________________________________________________________ Default System:San Miguel National High SchoolStudent Council Voting System Label: Section Type and Length: Source: Voter Registration Form/Candidate Registration Form Security:Admin Description and Comment: Date: Alias: Default Value: Acceptable Value: ————————————————-User Responsibility: Admin 3. 5 Development Flowchart and Schedule 3. 8. 1 Gantt chart See Appendix G 3. 6. 4 System Flowchart See Appendix H 3. 6. 5 Program Flowc hart See Appendix I CHAPTER IV DETAILED DESIGN 4. 1Standards and Conventions This chapter will explain the standard and convention used in design of the proposed system to ensure the uniformity throughout the system and to emphasize the system very well. 4. 1. 1 Design Methodology The proposal used the top-down programming approach as the design technique in the process of developing the simulation of the system.This approach refers to a problem solving technique which involves in voting, analysis to the total of vote, design of the program or solution in terms of large objectives, designing the modules and subroutines needed in the program and finally writing the detailed code. 4. 1. 2 Program Naming and Convention A special name was given to all programs of every module in a way that it describes each subprogram in order to represent the function to be performed. Names are related to each subprogram giving emphases on what each module is performing. This can be seen in the module specification section on this chapter. 4. 1. File Naming and Convention Each record of the student used in the program was classified with their student number so that the user can easily understand and can vote wisely for the running candidates. Each student who already voted is automatically save in the database of the system for validation of the processes performed by each subprogram. 4. 2 Module Specification This section discusses all information about modules of the proposed system. Name:System Password Purpose:To protect and secure the election to illegible voters Entry:Password Exit: Inputs:Valid Password Outputs:Main Menu Errors: Calls:Voting MenuCalled by: Remarks: Name:Voting Menu Purpose:To provide ballot form for the students Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Official Ballot Errors: Calls:1. 1 Select, 1. 2 Submit, 1. 3 Exit Called by: 0 MAIN Menu Remarks: Name:Official Ballot Purpose:To show the list of elected candidates Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Your Choice Errors: Calls:2. 1 Submit, 2. 2 Back Called by: Voting Menu Remarks: Name:System Password Purpose:To provide and secure votes to unauthorized person Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Admin Menu Errors: Calls:2. 1 Submit, 2. 2 BackCalled by: 0 MAIN Menu Remarks: Name:Admin Menu Purpose:To display Admin Menu Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Your Choice Errors: Calls:1. 1 Add Voter, 1. 2 Voters’ List, 1. 3 Candidate List, 1. 4 Search, 1. 5 About, 1. 6 View, 1. 7 Application form, 1. 8 Report, 1. 9 Tool,1. 10 Exit Called by: Voting Menu Remarks: Name:Add Voter Purpose:To Register new voter Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Your Choice Errors: Calls:1. 1. 1Generate Student id, 1. 1. 2 Generate Student Password, 1. 1. 3 Add voter, 1. 1. 4 View, 1. 1. 5 Save Called by: Admin Menu Remarks: Name:Voters’ ListPurpose:To View the list of voters and update voters’ status Entry:Choice Ex it:Choice Exit Inputs:Choice Outputs:Voter’s Registration Form Errors: Calls:2. 1 Select Called by: Admin Menu Remarks: Name:Candidate List Purpose:To View the list of candidates and delete former candidates Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Your Choice Errors: Calls:1. 3. 1 Delete Called by: Admin Menu Remarks: Name:Search Purpose:Search the voters record Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Your Choice Errors: Calls:1. 4. 1Search by ID, 1. 4. 2Search by Name Called by: Admin Menu Remarks: Name:AboutPurpose:About the system and the Developers Entry:Choice Exit:Choice Exit Inputs: Outputs:Display information Errors: Calls: Called by: Admin Menu Remarks: Name:View Purpose:You can view the candidates list and voters list Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 6. 1 Candidate list Called by: Admin Menu Remarks: Name:Candidate list Purpose:You can view the candidates list Entry:Choice Exit:Choice Ex it Inputs:Choice Outputs:Display information Errors: Calls:1. 6. 1. 1 President List, 1. 6. 1. 2 V-President List, 1. 6. 1. 3 Secretary List, 1. 6. 1. 4 Treasurer List1. . 1. 5 Auditor List, 1. 6. 1. 6 PIO List1. 6. 1. 7 Project Manager List, 1. 6. 1. 8 Sergeant at Arms List1. 6. 1. 9 4th Yr. Representative List,1. 6. 1. 10 3rd Yr. Representative 1. 6. 1. 11 2nd Yr. Representative List, 1. 6. 1. 12 Gr. 7 Representative List Called by: Admin Menu Remarks: Name:Application Form Purpose:The Application Form of the candidates and voters Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls: Called by: Admin Menu Remarks: Name:Candidate Registration Purpose:Display the registration form of the said position Entry:Choice Exit:Choice Exit Inputs:ChoiceOutputs:Display information Errors: Calls: Called by: Admin Menu Remarks: Name:Report Purpose:The canvassing report and the candidate displayed Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display inform ation Errors: Calls:1. 8. 1 Canvassing Report, 1. 8. 2 Voters’ Report 1. 8. 3 Section/Year Report 1. 8. 4 Result Called by: Admin Menu Remarks: Name:Canvassing Report Purpose:To know the outstanding report of the candidates Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 8. 1. 1President Candidates,1. 8. 1. 2 V-President Candidates,1. 8. 1. 3 Secretary Candidates,1. 8. 1. Treasurer Candidates 1. 8. 1. 5 Auditor Candidates, 1. 8. 1. 6 PIO Candidates 1. 8. 1. 7 Project Manager Candidates, 1. 8. 1. 7 Sergeant at Arms Candidates, 1. 8. 1. 8 4th Yr. Representative Candidates 1. 8. 1. 9 3rd Yr. Representative Candidates, 1. 8. 1. 10 2ndYr. Representative Candidate, 1. 8. 1. 11 Gr. 7 Representative Candidates Called by: Admin Menu Remarks: Name:Voters’ Report Purpose:The numbers of voters who vote and who did not, and the total of votes Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 8. 2. 1Sear ch, 1. 8. 2. 2 Refresh, 1. 8. 2. 3 Print Called by: Admin MenuRemarks: Name:Section/Year Report Purpose:The numbers of registered voters Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 8. 3. 1Search, 1. 8. 3. 2 Refresh, 1. 8. 3. 3 Print Called by: Admin Menu Remarks: Name:Result Purpose:To display the result of the election Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 8. 4. 1 Refresh, 1. 8. 4. 2 Print Called by: Admin Menu Remarks: Name:Tool Purpose:Display the student password Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls:1. 1. 9. 1 Password Called by: Admin MenuRemarks Name:Exit Purpose:Close the system if you want Entry:Choice Exit:Choice Exit Inputs:Choice Outputs:Display information Errors: Calls: Called by: Admin Menu Remarks: 4. 2 Module Specification MODULE: MAIN Menu This section calls the other modules or program. Mouse and menu driven may used to ac cess each subprogram. MODULE: PASSWORD The module requires users’ ID and a correct password. If the password is correct, the Voting Menu and Admin Menu that we used by only one module at a time will be automatically display. MODULE: VOTING MENU The module provides ballot form for the registered student to vote. MODULE: ADMIN MENUThe module provides menu for the admin to access, manage, maintain and secure files. DATA ENTRY For the Voting Menu the different option includes Select, Submit, and Exit. For the Admin Menu includes Generate, Add Voter, Save, View, Select, Delete, Find, and Print. OFFICIAL BALLOTS Show the candidates to be elected. APPLICATION FORM The module provides registration form for Voters and candidates. ABOUT Show information about the system. EXIT Close the Menus 4. 4 File Specification System: San Miguel National High School Student Council Voting System Record Size: File Name: Student Council Voting System Storage Media: DiskTable name: Candidate Organiza tion: Index Field Name| Data Type| External Length| Candidate ID| AutoNumber| | PositionID| Text| | Name| Text| | Year| Number| | Section| Text| | Photo| OLE Object| | Votes| Number| | System: San Miguel National High School Student Council Voting System Record Size: File Name: Student Council Voting System Storage Media: Disk Table name: Position Organization: Index Field Name| Data Type| External Length| PositionID| Text| | Position| Text| | System: San Miguel National High School Student Council Voting System Record Size: File Name: Student Council Voting System Storage Media: DiskTable name: Users Organization: Index Field Name| Data Type| External Length| UserID| AutoNumber| | Username| Text| | Password| Text| | System: San Miguel National High School Student Council Voting System Record Size: File Name: Student Council Voting System Storage Media: Disk Table name: Voters Organization: Index Field Name| Data Type| External Length| VoterID| AutoNumber| | Username| Text| | Passwo rd| Text| | Name| Text| | Year| Text| | Section| Text| | Voted| Text| | 4. 5 Screen Format See Appendix J. 4. 6 Report Format See Appendix K. 4. 7 Hardware Specification ITEMS| SPECIFICATIONS/BRAND| PRICE|Computer Terminal| Compaq(Compaq435)- AMD-Windows 8 Pro-2 GB DDR Memory-500GB Hard Disk Drives-Less than 25 mm thin and 2. 5 kg light-ODD/HDD-A large volume hard disk and 8X DVD-Super Multi drive in a small form factor for massive storage and media usage-LAN/VGA Port-Multimedia Card- Optical disk access indicator-Kensington lock slot-802. 11 b/g/n Wi-Fi| P 20,000. 00| Power Supply| | 29. 00| | | Total P20,029. 00| 4. 8 Cost Benefit Analysis 4. 8. 1 Presentation of Cost 4. 8. 1. 1 Existing System Expense A. Supplies Expense Description| Unit Cost| Qty/Day| Qty/Year| Cost/Year| Ball pen| 10/pc| 50pcs. | 50pcs| 500. 00|Bond Paper| 170/rim| 4 rim| 4 rim| 680. 00| Pentel Pen| 48/pc| 40pcs. | 40pcs| 1,920. 00| Manila Paper| 5/pc| 15pcs. | 15pcs| 75. 00| Staple Wire| 10/box| 10box| 10pcs| 100. 00| Stapler| 150/pc| 10pcs| 10pcs| 1,500. 00| Folder| 12/pc| 35pcs| 35pcs| 420. 00| Ballot Box (Carton)| 5/pc| 35pcs| 35pcs| 175. 00| Packing Tape| 45/pc| 10pcs| 10pcs| 450. 00| Printer| 3,400/pc| 1pc| 1pc| 3,400. 00| Pencil| 6/pc| 50pcs| 50| 300. 00| Ink| 300/set| 1set| 1set| 300. 00| Certification| 3/pc| 24pcs| 24pcs| 72. 00| Snacks (Teachers ;Comelec)| 100| 30pcs| 30pcs| 3,000. 00| | | Total Supplies| Expense/yr| P 12,892. 00| B. Electric ConsumptionHours/Day| Cost/Hour| Daily Rate| Cost/Year| 8| 36. 00| 288. 00| 288. 00| | Total Electric| Expense per Day| P288. 00| Total Existing System Expense P 13,180. 00 C. Equipment Expense Quantity| Item| Price| 1| Power Supply| P 300. 00| 6| Printer Ink| 600. 00| Total Equipment Expense P 900. 00 D. Maintenance Expense Maintenance Fund Expense/Day| 0| Total Maintenance ExpenseP 0. 00| E. Computer Utilization Expense Software Package Cost Visual Basic 6. 0 Microsoft Access 2007| Total Software Costs P 5,000. 00 F. Training/Seminar Exp ense 1 day Training/Seminar Expense| P 300. 00| | | Total System Expense P 6,700. 0 4. 8. 2 Presentation of Benefits YOP| Cost| Future Value| Present Value| Acc. Present Value| 0| -6,700. 00| | | | 1| | P 3,000. 00| P 2,800. 00| P 2,800. 00| 2| | 4,000. 00| 3,780. 00| 6,580. 00| 3| | 5,000. 00| 4,894. 00| 11,474. 00| 4| | 6,000. 00| 5,132. 00| 16,606. 00| 5| | 7,000. 00| 6,356. 00| 22,962. 00| Rate of Return (ROR) (E/C) – 1/nLet E = Earning C = Cost n = Number of days (P 22,962 / P 6,700) – 1/5 = (3. 4272) – 0. 2 = 3. 2272 or 0. 3227% Payback Period ( APV – C/ APV) + Previous YearLet Cost = 6,700. 00 AVP = 16,606. 00 Previous Year = 3 (16,606. 00 – 6,700. 00 / 16,606. 00) + 3 = (0. 59653) + 3 = 3. 9 (3 years and 6 months) CHAPTER V IMPLEMENTATION 5. 1 Implementation Phase In this section, the proposal will discuss the activities that they have to vote in order to the flow of the system. It is included also the maintenance of the system in order to avoid the redundancy of the voting and to keep the good performance of the system for the student of using automated election. The implementation of this proposed system though conditions will also be presented to insure it accuracy, capability in reaching the intended target, effective for producing a desire voters in the election, integrity and to further check the errors. . 2 Program Specification The Visual Basic 6. 0 was used by the system to develop the software programs. Visual Basic 6. 0 offers a file handling performance needed by the system and it is integrated with Microsoft Access 2013 on which the proposed design the database management system. 5. 3 Program Testing After all the modules of the program have been finished, the proposed system test is to see if the output is performed very well for the satisfaction of the user and to avoid the errors that will occur during the election day.Although the proposed system is simulation, the test showed that San Miguel National High School voting system performed the high standard, accuracy, and the reliability of the system. 5. 4 Security and Back Up plans The proposed system has own password for the intended user to protect the system from unauthorized access information. This system also provides an option to create back –up copies of information on the system and place it in secured place outside of the company. Authorized personnel are responsible to keep the back –up files so the in the case of system loss, regeneration is possible. . 5 Maintenance Plan The back –up files should be made in order to maintain the system from possible loss of important data and damages programs. These files are most significant when unexpected hardware failure results in damages program file and loss of data, so the user should at least make two (2) copies of all files every data processing for a better maintenance of the system. 5. 6 User Training In order to have an effective operation of the sys tem, the proposed system suggest that the user should be trained on how to interest with the system to ensure the integrity of the system.The training of the student to use the system is help by the intended administrator who knows the system. This Automated SSG election system is user friendly to ensure the success implementation. CHAPTER IV CONCLUSION AND RECOMMENDATION 6. 1 Conclusion As other School and establishments, San Miguel National High School together with their existing system, faced various problems. San Miguel National High School still utilizes the some manual procedure in preparing for their student council election.We, the researchers formulated the objective of the study: To find out the flow and functionality of the present semi-automated system and likewise. Propose and present an automated Student Voting Council system to the sufficient and more lessen of preparing for the coming student election. To cope up with the problems, the researcher’s initial st ep was to study and conduct some interview to school (e. g. SSG Adviser, Officers, and Students). We analyzed the present system so as to locate the various limitations therein.Observations were also done in order to find out the conditions and steps for the voting system. Elections rely heavily on manual tallying and canvassing of votes thus making them vulnerable to control and manipulate. To ensure a credible and transparent electoral process, the modernization of the electoral system through computerization shall be supported to ensure the credibility of polls and correct the deficiencies in the electoral system. To eliminate many ineffective features of the present system, the researcher come up with proposed system modeled basically to counter act the above limitations.Some steps that made the process quit long eliminated as the automated program was sufficient enough. Computations were accomplished by the computer itself while files were kept in order and gathered with reliab le security. The study revealed that utilizing computers will in the long run be financially beneficial to the School. Based on the findings and data gathered, the researchers have come up with the following conclusions: 1. The existing system of San Miguel National High School when having a Student Supreme Government (SSG) election, all transactions like voters’ registration and voting, is done manually. . The existing system generates many problems such as redundant voters, time consuming, heavy workload (esp. SSG Adviser). And difficulty in updating and editing the files of the voters. 3. That there is need for an enhancement of their system due to the problem of their existing system, a new system is entirely required to the substitute the present process that is quit inferior. Voting can be made available in the same day of election. The COMELEC will not be busy the week before the election to prepare all the ballot of every student.The day of the Election they can easil y print the winner of the election signed by SSG adviser. 4. That the new system would meet the limitations of the existing manual system. The proposed automated SSG voting council system is effective because the computation and manipulation of files are done by the computer, thus eliminating redundancy, voters records will be refrained these may be possibly eliminated. 5. The researchers also recommend this study to the students as a guide in doing the same study in other public or private purposes. 6. 2 RecommendationsThe researchers recommend that the proposed system be implemented as to put an end may enormous work shouldered, by the voters in the COMELEC of San Miguel National High School. In implementing this system, the COMELEC can work harmoniously have more quality time spent for other tasks, and system will be freed from deficiencies. The researchers believed that the proposed system offers quality services without spending much time and effort. It is also recommended that the school comply with the requirements of the proposed system so that difficulties may be possibly eliminated.

Friday, January 10, 2020

Orthogonal Frequency Division Multiplexing and Multi-Carrier Code Division Multiple Access

CHAPTER – 1Introduction1.1 OverviewThe involvement for wireless communications disposals has developed gigantically. In malice of the fact that the agreement of 3rd coevals cellular model has been slower than was ab initio expected, scientists are now analyzing 4th coevals cellular systems. These models will convey at much higher rates than the echt 2G models, and even 3G models, in an of all time jammed frequence spectrum. The indispensable aim of next-generation radio systems ( 4G ) won’t merely be the familiarity of new inventions with spread the demand for higher information rates and new services, to boot the incorporation of bing progresss in a typical phase. The scheme of multi-carrier transmittal has late been having broad involvement, peculiarly for high informations rate broadcast applications. The cardinal points of multi-carrier transmittal are its strength in frequence selective attenuation channels and specifically, the reduced signal processing complexnes s by equalisation in the frequence sphere. Figure 1.1: Time variant multipath extension Signals in wireless communicating state of affairss are impaired by melting and multipath hold spread. This prompts a corruptness of the general executing of the model. Henceforth, a few techniques are accessible to relieve these damages and fulfill the expanding demands. Figure 1.1 demonstrates an illustration of clip variant multipath extension. A considerable step of involvement has been placed in transition techniques like Orthogonal Frequency Division Multiplexing ( OFDM ) and Code Division Multiple Access ( CDMA ) . Multiple entree strategies based on a combination of codification division and OFDM techniques have already proven to be strong campaigners for future 4G systems. A major outfall of the higher coevals radio systems is spectral efficiency. In this study, we concentrate on Multicarrier Code-Division Multiple Access ( MCCDMA ) , a fresh digital transition and multi entree strategy. It is a promising attack to the challenge of supplying high informations rate radio communicating. MC-CDMA combines the benefits of CDMA with the natural hardiness to frequency selectivity offered by OFDM. It can be interpreted as CDMA with the distributing taking topographic point in the frequence instead than temporal sphere. Multicarrier CDMA is merger of two different techniques:Orthogonal Frequency Division Multiplexing ( OFDM )Code Division Multiple Access ( CDMA )1.2 Communication SystemCommunication is a manner of conveying information, ’ Technology alterations, but communicating lasts’ ; the handiness of communicating engineerings has made a great impact on human lives. When we communicate, we are sharing information. This sharing can be local or distant. While distant communicating takes topographic point over a distance, the term â€Å"telecommunication† includes telephone and telecasting, means communicating at a distance ( tele is Grecian for â€Å"far† ) Telecommunications can therefore grouped into two -voice & A ; informations. Three cardinal faculties that comprise a full communicating channel: The Sender – A sender encodes the message in a linguistic communication that can be understood by the receiving system.The Receiver –decodes the message.The Medium – Air, Cu wires, optical fibre. These carry the message across from the transmitter to the receiving system. Figure 1.2: Communication system Telecommunication systems have now made it possible to pass on with virtually anyone at any clip. Early telegraph and telephone system used Cu wire to transport signals over the earth’ surface and across oceans and high frequence ( HF ) wireless, besides normally called shortwave wireless, made possible intercontinental telephone links. But now there is different types of communicating strategy. They are following:Telephone SystemCellular SystemsPacket Data SystemsSatellite SystemsMicrowave SystemsFiber Optic SystemsEvery communicating system has its ain frequence scope, system, capacity, application execution cost. On the footing of transmittal system there are two types of communicating systemWired communicating systemWireless communicating system1.2.1 Wireless CommunicationIt is the transportation of information over a distance without the usage of electrical music directors or â€Å"wires† The distances involved may be short agencies few metres as in telecasting remote control or long like 1000s or 1000000s of kilometres for wireless communications. When the scene is clear, the period is frequently shortened to â€Å"wireless† . Wireless communicating is by and large considered to be a subdivision of telecommunications. The term â€Å"wireless† has become a generic and across-the-board word used to depict communications in which electromagnetic moving ridges or RF ( instead than some signifier of wire ) carries a signal over portion or the full communicating way.1.2.2 Previous Work on Wireless SystemJagadish Chandra Bose has been credited with the innovation of the first radio sensing device and the find of millimetre length electromagnetic moving ridges. David E. Hughes, eight old ages before Hertz’s investigates, induced electromagnetic moving ridges in a signaling system. Hughes base on balls on Morse codification by an initiation device. In 1878, Hughes’s initiation transmittal strategy utilized a â€Å"clockwork transmitter† to convey signals. In 1885, T. A. Edison used a vibrator magnet for initiation transmittal. In 1888, Edison set up a theoretical account of signaling on the Lehigh Valley Railroad. In the history of radio engineering, the presentation of the theory of electromagnetic moving ridges by Heinrich Rudolf Hertz in 1888 was of import. The theories of electromagnetic moving ridges were predicted from the research of James Clerk Maxwell and Michael Faraday. Hertz established that electromagnetic moving ridges could be transmitted and caused to go through infinite in consecutive lines and that they were able to be received by an investigational tool. The research was non followed up by Hertz. The applied utilizations of the radio communicating and remote control engineering were implemented by Nikola Tesla.1.3 Drawbacks of Communication SystemCommunication system has some restriction. Bandwidth and Noise restriction is portion of the communicating system. Bandwidth is merely a step of frequence scope. It is easy to see that the bandwidth we define here is closely related to the sum of informations you can convey within it, therefore the more infinite in the frequence spectrum, the more informations you can suit in at a given minute. In a communications system deficiency of bandwidth means deficiency of throughput of apprehensible informations. So that Bandwidth restriction means curtailing the measure of information transmitted from transmitter to receiver each 2nd. The consequences of which are the debasement in the quality of information arrives. Noise will besides impact intelligibility. In an electronic device such as an operational amplifier so there is such a thing known as a addition bandwidth merchandise, in other words how fast can the end product respondent to the input and how much crud ( noise ) is added in the procedure. Thermal noise is besides a topic and Boltzmann’s changeless K finds its manner into the figure of equations. The noise is so important, a assortment of steps have been developed to quantify the consequence of noise in a communications system There is another restriction of communicating is melting. Fading is the fluctuation happened in standard signal strength at the receiving system that is, any arbitrary divergence in the standard signal can be named as attenuation. However the microwave signal travel in the medium due to different parametric quantities there is a decrease in signal strength.1.4 Multiple Access MethodsA limited sum of bandwidth is allocated for radio services. A wireless t heoretical account is compulsory to suit as many users as possible by efficaciously apportion the bandwidth. Therefore, in the field of communications, the word multiple entree could be chiseled as a manner of leting multiple users to concurrently administer the finite bandwidth with smallest likely debasement in the public presentation of the system. There are a figure of methods demoing how the multiple accessing can be attained. There are four basic strategies:Frequency Division Multiple Access ( FDMA ) .Time Division Multiple Access ( TDMA ) .Code Division Multiple Access ( CDMA )Space Division Multiple Access ( SDMA )These techniques can be grouped as wideband and narrowband systems, subjected to how the available bandwidth is allocated to the users. The duplexing method of a multiple entree system is normally described along with the peculiar multiple entree system, as shown in the cases that follow. Narrowband Systems:The term narrowband is used to associate the bandwidth of a individual channel to the expected coherency bandwidth of the channel. In a narrowband multiple entree strategy, the unfilled wireless spectrum is separated into a big figure of narrowband channels. The channels are by and large operated utilizing FDD. To diminish intervention between contrary and frontward links on each channel, the frequence separation is made every bit great as possible within the frequence spectrum, while still allowing low-priced duplexers and a common transceiver aerial to be used in each subscriber terminal. Wideband Systems:In wideband theoretical accounts, transmittal bandwidth of a individual channel is much larger than the coherency bandwidth of the channel. Therefore, multi-path attenuation does non greatly vary the standard signal power within a wideband channel and the frequence selective slices go on in merely a little fraction of the signal bandwidth at any juncture of clip. In wideband multiple entree theoretical accounts a big figure of senders are allowed to convey on the same channel.1.5 Requirement of MC-CDMAThree major multiple entree strategies exist: frequence division multiple entree ( FDMA ) , clip division multiple entree ( TDMA ) and code division multiple entree ( CDMA ) [ 1 ] . In the undermentioned subdivisions, the advantages and disadvantages of these techniques will be studied, and the necessity for multicarrier codification division entree ( MC-CDMA ) will be discussed.1.5.1 Frequency Division Multiple Access ( FDMA ) Figure 1.3: Frequency division multiple entree ( FDMA ) [ 1 ] Frequency division multiple entree ( FDMA ) was the first multiple entree technique, developed in the early 1900s [ 2 ] . With FDMA, the entire frequence bandwidth is divided into frequence channels that are assigned to each user for good, ensuing in multiple user signals that are both spectrally separated and at the same time transmitted and received. This has been diagrammatically signified in Figure 1.3. The FDMA systems require a comparatively simple algorithm and execution compared to TDMA and CDMA [ 1 ] , but there are several drawbacks. First, due to the lasting assignment of FDMA channels, fresh channels can non be utilized by other clients, the effect of which is the abuse of the communicating resources. Second, nonlinearities in the power amplifier can do signal spreading in the frequence sphere, doing inter-channel intervention ( ICI ) in other FDMA channels. Finally, the capacity of an FDMA system is limited by Thursday vitamin E figure of channels available.1.5.2 Time Division Multiple Access ( TDMA ) Figure 1.4: Time division multiple entree ( TDMA ) [ 1 ] Time division multiple entree ( TDMA ) has been developed with a similar thought to FDMA, but with TDMA, multiple user signals are separated in the clip sphere instead than the frequence sphere. Figure 1.4 shows a TDMA system with the transmittal clip divided into a figure of cyclically reiterating clip slots that can be assigned to single users, leting all users entree to all of the available bandwidth. Compared to FDMA systems, TDMA systems offer more flexibleness in the assignment of clip slots whereby different Numberss of clip slots can be allocated to different users depending on the service needed. In add-on, because TDMA users can convey signals merely in their ain clip slots, the transmittal of TDMA signal is noncontiguous and occurs in explosions, ensuing in less battery power ingestion. But, the TDMA signal needs a big synchronism operating expense due to its non-continuous transmittal. Inter-symbol intervention ( ISI ) , caused by multipath extension, is besides a serious bug for TDMA, particularly durin g high informations rate transmittals.1.5.3 Code Division Multiple Access ( CDMA )In the last 10 old ages, codification division multiple entree ( CDMA ) has been developed to get the better of the disadvantages of other multiple entree techniques such as TDMA and FDMA [ 3 ] . Figure 1.5: Code division multiple entree ( CDMA ) [ 1 ] Figure 1.5 demonstrates multiple CDMA user signals that are separated by distributing sequences. In specific, all user signal is spread utilizing a pseudorandom sequence which is extraneous to the sequence of other users. As a consequence, merely the intended user-receiver can despread and have the information right ; other users on the system perceive the signal as noise, ensuing in multiple user signals that can be transmitted within the same bandwidth at the same time. The chief advantage with CDMA is that the system capacity is limited merely by the sum of intervention ; with a lower degree of intervention the system can back up a higher figure of users [ 1 ] . CDMA systems are besides robust to narrow set jamming as the receiver signal can distribute the jamming signal’s energy over the full bandwidth doing it undistinguished in comparing to the signal itself [ 2 ] . If the spreading sequence is absolutely extraneous, it is possible to convey multiple CDMA signals without presenting multiple entree intervention ( MAI ) during synchronal transmittal [ 3 ] Assorted types of CDMA such as direct-sequence CDMA ( DS-CDMA ) and wideband CDMA ( W-CDMA ) , have been utilised and advanced in both 2G and 3G systems similar to CDMA One ( IS-95 ) , UMTS and CDMA2000 [ 4 ] . These techniques are considered to be single-carrier CDMA systems. Unfortunately when traveling into the 4th coevals of wireless communicating systems ( 4G ) , in which information is transmitted at a rate every bit high as 1 Giga bits-per-second ( bits per second ) [ 5 ] , single-carrier CDMA theoretical accounts are non appropriate. This is for the grounds as fallowWith high informations rates the symbol continuance will go sawed-off, ensuing in the channel hold spread transcending the symbol continuance doing ISI [ 6 ] .When informations rate goes beyond a 100 Mega bits per second, it turn out to be a hard undertaking to synchronise, as the information is sequenced at high velocities [ 7 ] .Because of the multipath extension, signal energy is distributed in the clip sphere: in single-carrier CDMA systems such as DS-CDMA, RAKE receiving systems are frequently used to unite the multipath signals. However, non all waies of signals can be successfully received. If the figure of fingers in the RAKE receiving system is less than the figure of resolvable waies, some of the standard signal energy can non be combined, therefore a part of the signal energy is lost [ 8 ] . But if the figure of fingers in the RAKE receiving system is more than the figure of resolvable waies, noise will be improved.Therefore an Orthodox single-carrier CDMA such as DS-CDMA is non practical for 4G systems where a high information rate is required.1.5.4 Orthogonal Frequency Division Multiplexing ( OFDM )Orthogonal frequence division multiplexing ( OFDM ) proposed in [ 9 ] has the ability to back up higher information rate transmittal. When utilizing OFDM, the channel bandwidth is divided into a figure of equal bandwidth bomber channels, with each bomber channel using a subcarrier to convey a information symbol. The frequence separation of next subcarriers is chosen to be the opposite of the symbol continuance, ensuing in all the subcarriers being extraneous to one another over one symbol interval. Therefore, OFDM method can convey a immense figure of different informations symbols over multiple subcarriers at the same time, enabling this technique to back up a higher information rate transmittal. In add-on the bandwidth of each bomber channel is designed to be so narrow that the frequence features of each bomber channel are changeless, creative activity OFDM signals healthy to frequency selective attenuation [ 10 ] . The other advantage of OFDM is that the signal can be easy and expeditiously modulated and demodulated utilizing fast Fourier transform ( FFT ) devices [ 11 ] . As FFT can be easy implemented, the receiving system complexness does non increase well while transmittal rate can be mostly increased. Despite all these advantages, OFDM still has some drawbacks due to its execution of multicarrier transition. OFDM suffers a high peak-to-average power ratio that occurs when all the signals in the subcarriers are added constructively [ 12, 13 ] . This consequences in the impregnation of the power elaboration at the sender, triping inter-modulation deformation. OFDM is really sensitive to frequency offset, as the graph of the subcarriers is overlapping [ 14, 15 ] . Any frequence offset can do to ICI, which put forward that OFDM requires a high grade of synchronism of subcarriers. Besides, the conventional OFDM systems can back up merely a individual client, demanding the demand for multicarrier codification divi Zion multiple entree ( MC-CDMA ) .1.5.5 Multicarrier Code Division Multiple Access ( MC-CDMA )Based on the combination of OFDM and DS-CDMA, a multicarrier codification division multiple entree ( MC-CDMA ) is proposed [ 16 ] . Unlike DS-CDMA, which spreads the original informat ion watercourse into the clip sphere, MC-CDMA spreads the original information watercourse into the frequence sphere by ab initio change overing the input informations watercourse from consecutive to parallel so multiplying this watercourse by the distributing french friess in different OFDM subcarriers, the consequence of which is MC-CDMA signal which takes on the advantages of both DS-CDMA and OFDM. The advantages of MC-CDMA are:The capacity is interference limited [ 17 ] and any techniques that cut down intervention are capable of increasing the capacity of MC-CDMA.The signal is robust to frequency selective attenuation and can back up high informations rate transmittal.Bandwidth is used more expeditiously as the spectra of subcarrier convergence [ 18 ] .Since the standard signal is combined in the frequence sphere, an MC-CDMA receiving system can use all the standard signal energy scattered in the frequence sphere [ 19 ] . This is a important advantage over DS-CDMA, where portio n of the signal energy can be lost due to deficient figure of fingers in the RAKE receiving system.The sender and receiving system signals can be implemented utilizing FFT, which does non increase the grade of complexness.1.6 ObjectiveThe chief aim of this thesis is to develop an attack to minimise the consequence of multipath attenuation in Rayleigh attenuation environment utilizing Multicarrier CDMA ( MC-CDMA ) with RAKE receiving system and different uniting strategies viz ; Equal Gain Combining ( EGC ) , Maximal Ratio Combining ( MRC ) , Zero-Forcing ( Z-F ) and Minimal Mean Square Error ( MMSE ) Equalization.1.7 Outline Of DissertationChapter-1 Introduction: This chapter is divided in six parts ; overview, communicating system, drawbacks of communicating system, multiple entree methods, demand of MC-CDMA, and eventually nonsubjective is explained. Chapter-2 Orthogonal Frequency Division Multiplexing: This chapter gives a elaborate account about overview of OFDM, guard interval, perpendicularity, mathematical analysis of OFDM and fourier transform. Chapter-3 Multi-Carrier Code Division Multiple Access: This chapter gives elaborate information about overview of multi-carrier transition, channel synchronism and appraisal in multi-carrier systems, overview of CDMA, rudimentss of MC-CDMA and channel theoretical accounts. Chapter-4 Literature Review: This chapter gives elaborate information about old work on Multi Carrier Code Division Multiple Access. It besides elaborate the job definition sing the research work. Chapter-5Proposed Methodology: This chapter explains the proposed methodological analysis which is used in this undertaking. Chapter-6Simulation Consequence: This chapter shows the simulation consequences of the proposed work. Chapter-7Conclusion and Future Scope: This chapter summarizes the parts of the thesis. 1

Thursday, January 2, 2020

Critical Development Stages Of Addiction - 1232 Words

As a person uses drugs, the brain adjusts to excesses of dopamine, subsequently reducing the amounts, in turn lowering the ability of cells in the reward circuits in response. Consequently this reduces the high quality in comparison to the initial usage. The effect, known as tolerance, causes users to increase their dosage to achieve a similar high leading to addiction. Long term use causes a change in chemical systems, and massive health issues such as birth defects, HIV/AIDS, Hepatitis and other infectious diseases, cardiovascular effects, respiratory effects, gastrointestinal effects, musculoskeletal effects, other organ damage, neurological effects, mental health effects, possible amputations due to infected cites, and death (WebMD). So why would anyone do drugs? Other than coping mechanisms, curiosity, and peer pressure, governmental involvement may indirectly help stabilize drug trade, leading to more drug popularity. While genetic and environmental factors such as economic sta tus, etc., interact with critical development stages concerning addiction, the factors above are a general overview found in textbook. More concerning however, is governmental involvement. As their presence contributes largely to addiction, such as the legalization of alchol, nicotine, and prescription drugs, the media, glorifying usage, and their strategies in the War on Drugs. Legal intoxication are a huge problem as the drugs are either completely legal or not commonly prohibited, which canShow MoreRelatedHuman, Social, And Moral Development1669 Words   |  7 Pagesactivity selection, and implementation. While prevention and intervention efforts are important during all stages of life, they are especially important during childhood and adolescence, when risk factors may be more easily avoided and protective factors can be established that may last a lifetime (Cohen, ChaÃŒ vez, Chehimi, 2007). Brain, human, social, and moral development are critical to prevention program des ign and implementation. Developmental knowledge helps prevention professionals predictRead MoreCounseling Specializations Multidisciplinary Teams1104 Words   |  5 Pages negative consequences still persist. To combat these negative issues, an evolving process on an emphasis to develop critical thinking skills is being encouraged in moving forward with Multidisciplinary Teams (McAllister, Morrissey, McAuliffe, Davidson, McConnell, Reddy, 2011). The field of Mental Health has been an evolving process ever since its infancy. In the early stages of Mental Health, individuals who were deemed appropriate for mental health counseling were being labeled as ill andRead MoreSubstance Abuse And Drug Therapy1101 Words   |  5 Pagesfamily counseling, and other therapy approaches can help people recovering from addiction stay clean (counseling, 2017, para. 2). Psychotherapy can also treat the other mental health conditions that often contribute to addiction (counseling, 2017, para. 2). Treatment plans provide for continuity of care over time and devise treatment interventions that are specific to the tasks and challenges faced at each stage of the COD recovery process (Sacks Reis, 2005, p. 6). Chemical dependence can beRead MoreAddiction Is The Most Common Addiction991 Words   |  4 PagesAddiction is more of a condition than a disease, and can be considered to be a behavioral disorder that stems from personal choice. Addiction is a controversial issue, and many people debate on whether addiction is seen as a disease or a personal choice. There has been many studies that have proven addiction to be a disease that stems from personal choice. Addiction is a chronic brain disease that causes habitual drug use ( Drug abuse, 2012). Over time the brain changes, and the person who is addictedRead MoreThe Problems of Drug Addiction954 Words   |  4 PagesDrug addiction A reasonable number of people do not understand why other people get addicted to drugs. Some even associate drug abuse and addiction with lack of moral principles or willpower. People subscribing to this school of thought believe that drug addicts can stop using drugs by simply changing their behavior. They fail to realize that drug addiction is a complex disease whose eradication calls for many things other than changing habits. Drugs basically change the way a human brain worksRead MoreReflection Is The Examination Of Personal Thoughts And Actions Essay1624 Words   |  7 Pagesto avoid any disagreements that would arise. Tuckman’s theory of group development was used in our discussion of group development. According to Tuckman (1965), group process development goes through various stages namely forming, norming, performing and adjournment. The group consisted of five members, two opposing the motion while two were for the motion and one person was to be the group’s moderator. At the forming the stage the group was established and the members shared their contacts amongRead MoreThesis on drugs and addiction923 Words   |  4 Pages Thesis Statement Although some people argue for the legalization of drugs, addiction to these substances has caused a huge increase in violent crimes in the home, at school, and on the street. Many people do not understand why individuals become addicted to drugs or how drugs change the brain to create compulsive drug abuse. They mistakenly view drug abuse and addiction as strictly a social problem and may characterize those who take drugs as morally weak. One very common belief is that drugRead MoreA Report On Substance Abuse Treatment Essay893 Words   |  4 Pagesprogram development. SAFE FOUNDATION OP TREATMENT CENTER, BROOKLYN NEW YORK Drug addiction is a chronic disease characterized by compulsive, or uncontrollable, drug seeking and use despite harmful consequences and changes in the brain, which can be long lasting. These changes in the brain can lead to the harmful behaviors seen in people who use drugs. Drug addiction is also a relapsing disease. Relapse is the return to drug use after an attempt to stop. The path to drug addiction beginsRead MoreMental Health And Addiction Services Essay930 Words   |  4 Pagessignificant issues in New Zealand. The government has been making greater efforts to improve the quality and outcomes of mental health and addiction services for clients, families, whÄ nau, and communities for a number of years (Ministry of Health, 2012). According to Ministry of Health (2014a), approximately 148,000 people accessed mental health and addiction services in 2011/12. Of these, 54% were male while 46% were female. Furthermore, approximately 126,000 people were seen by DHBs, and over 46Read MoreAdolescence And Its Effects On Adult Behavior Essay1585 Words   |  7 Pagesof risky behavior in human adolescents; children in developed countries are educated about the potential consequences of such misconduct, particularly those of abusing alcohol and/or tobacco. However, animal studies that compare drug use during development versus in adulthood provide evidence th at adults will exercise far more caution and self-regard than adolescents when provided with an opportunity for risk taking, and this includes that adult animals will usually not initiate drug use as readily