Free Essay

Multilayered Security

In:

Submitted By Colombia8
Words 1667
Pages 7
Argument for Public School Uniforms
Sydney Slifka
University of Colorado Denver

School uniforms have created a debate to whether or not they are an effective addition to a school environment and to individual students themselves. Over the last decade, uniforms in public schools have increased, bringing a great deal of controversy along with them. With this public controversy there have been lawsuits, increased media attention, criticism from parents and complaints from students as well as increased academic research. There have been many recent studies done that offer evidence that school uniforms have been effective in many different ways. The purpose of this paper is to argue in favor of the implementation of school uniforms in our public education system by addressing these different articles and studies on the implementation of school uniforms.
Ann Bodine wrote an ethnography about a city in the United States and the introduction of school uniforms. In her article she writes about the introduction of school uniforms and how it intersects with different aspects of life. Bodine describes students’ clothing as a “screen on which are projected all kinds of beliefs, anxieties and aspirations about children” (2003, p. 60). Through her observations of people and their clothing she noticed that the concept of dress as a form of free speech is only a tiny part of the meaning they are actually trying to convey with their clothing. (p.67) Clothing is used to express identity through terms of socioeconomic status, membership in certain groups as well as other factors of identity that often marginalize students who don’t fit specific criteria. Bodine examines the results of her study in terms of gangs, violence, social equality, family stress, student rights and childhood environment. Her observations regarding childhood environment indicate that in the last few decades there has been a drastic change regarding the impact of the media during childhood and that this change is primarily based on a child's want of a certain reputation (p.61) In Bodine's article she cites a marketing professor who argues that children are the perfect market for products that promote identity and serve to align them with certain groups and divide them from the rest (p. 60). With these companies at work, students are drawn to find their identity and express themselves through clothing, and not in their writing and schoolwork. Students are more likely to judge themselves by focusing on physical appearance and wealth as being successful. This will make students become more and more less aware that they have other talents and abilities that can make them successful. Overall Bodine sees that uniforms are beneficial, especially in the developmental years of a child.
When public schools adopt uniforms one concern that is eliminated is inappropriate and offensive dress among the students. Marcha Boutelle wrote and article, Uniforms: Are they a Good Fit, about the implementation of school uniforms in California (2008). One incident she included was that of a sixth grade student who came to school in provocative clothing, a mid drift halter and a mini skirt. This student was taken home by her principle and when they got there the mother was offended that the school thought she was dressed inappropriately and that she thought she looked very "cute" (p. 34). This story leads into first hand accounts of multiple administrators who support the implementation of school uniforms in California. Boutelle quotes a principal of an elementary school that says, "uniforms promote school safety and enhance the learning environment, and diminish the clothing competition" (p.35) This is one of the largest arguments for uniforms, and that eliminating the competition of uniforms gives way into creating a school community and a more accepting environment with less competition among peers. She continues to receive feedback from different administrators who support a uniform policy claiming that it promotes respect, job skills and equality among students. Most importantly school uniforms are in place to diminish distinguishing each other based on clothing but rather on interactions with each other.
Peter Caruso’s article Individuality vs. Conformity: The Issue Behind School Uniforms presents several arguments on either side of the issue to show just how intricate the issue of school uniforms really is (1996). One argument that was addressed was the increased attendance of students. They have seen that without school uniforms there is a competition to have the best clothes, and many students will get them however they can even if that means skipping school. Also without the gang affiliation there are less student drug and gang activity and missing school. With the implementation of school uniforms there is decrease of distractions. With uniforms students are less concerned about "looking cool" and can focus more on their academics. (p. 87) With this students are more able to increase their confidence and self-esteem. "Students may develop strong feelings of inferiority when they feel they do not have the 'right' clothes(p. 84). Causo also argues that uniforms promote school community. Wearing a uniforms gives students a sense of belonging to the school. "A uniform can build the same feeling of unity and belonging that many students get from team uniforms, cheerleading outfits, or school jackets."(p. 85) Another fact that is presented is that school uniforms decrease violence and crime. Coruso states that, "Competition over appearance can result in taunts, fights, thefts, and even murder" (p. 86) With uniforms you can take away students competition over clothing which decreases violence in school. Lastly students who wear school uniforms are seen to have an increase in academic performance. It has been seen that "students who attend schools with a uniform policy attend more frequently, and when in school concentrate on their education rather than their social arrangements." (p. 86) Overall Caruso offers many different arguments for the use of uniforms in schools that benefit not only the school environment but the growth of each individual student educationally and socially.
In the study Parent's opinions of the Uniform Student Dress Code done by Helen Woods and Earl Ogletree in Chicago public schools they seeked out the parents perspective on school uniforms (1992). The attitudes of parents are an important factor in the success and great outcomes of implementing a dress code in public schools. They found that "87 percent believed that uniforms eliminated some competition" among peers (p. 1). It is stated that historically, dress regulations were not developed to teach conformity. They were established to teach that clothes do not make a woman or man" (p. 2). Today we as citizens of the united states are bombarded by media and messages portraying self identity and how to improve that. It is argued in this article that school uniforms help inner city students learn to dress appropriately for the world ahead of them. The only way to make school uniforms successful is to have "school officials solicited active parent involvement in the decision making" (p. 2) This is a sound argument because having parents involved in the process of implementing uniforms means that more people will be on board and that the process will go smoother.
There are many opposing opinions that argue that school uniforms are not beneficial. One of the main arguments that arise is that requiring student to wear uniforms is an infringement of first amendment rights (Caruso 1996, p. 86). School districts have the right to regulate students' attire and implement a dress code, so this argument doesn't really stand. Also, businesses and other establishments enforce dress code or require a certain uniform. Having students wear uniforms at school prepares them for the work force. The argument that free speech of students is infringed by wearing a dress code is invalidated by the fact that students are encouraged to share their opinions through other facets (p. 87). Due to dress code the encouragement of self expression is seen through more important ways other than their physical appearance.
Another argument opposing uniforms was that they create an economic hardship for families. (Caruso 1996) People argue that it is too expensive to have to buy school uniforms and "regular" clothes for students on the weekend. More and more are stores like Target and Walmart carrying clothing for children that fit into school uniform standards at low prices. The more and more school move to requiring uniforms the more competitive the market becomes for carrying them at low prices. Also having school uniforms reduces the stress on families to have to decide what to wear each day, because there are limited options when having a uniform. Overall there is not a sound argument for being too expensive.
Ryan Yeung’s published study Are School Uniforms a Good Fit?: Results From the ECLS-K and the NELS begins with the statement that his findings do not definitively support or reject the use of school uniforms, but rather, “strongly intimate that uniforms are not the solution to all of American education’s ills” (2009, p. 847). It is true that uniforms are not going to solve all of the problems of the education system and school, but it is a great start. Even though they may not solve all of the problems they definitely make a positive impact on school environments. Ultimately, there is not a clear cut answer to the school uniform issue. Both sides present evidence to support their arguments, but it is clear that uniforms would help to promote a focus on academics and social skills. This would as well as eliminate the some of the distractions associated with inappropriate dress and pop culture trends.

Works Cited

Bodine, A. (2003). School Uniforms and Discourses on Childhood. 43-63.

Boutelle, M. (2008). Uniforms: Are They a Good Fit? Ed Digest , 34-37.

Caruso, P. (1996). Individuality vs. Conformity: The Issue Behind School Uniforms. NASSP Bulletin , 83-88.

Woods, Helen; Ogletree, Earl. (1992) Parents' Opinions of the uniform Student Dress Code. 1-10.

Yeung, R. (2009). Are School Uniforms a Good Fit? : Results from the ECLS-K and the NELS. Educational Policy , 847-874.

Similar Documents

Premium Essay

Project Part 1 Multilayered Security Plan

...Project Part 1 As of today, millions of threats have become reality in today’s technological world. In order to prevent our network from become one of millions affected, steps to secure all seven domains have to be implemented. The OSI Model consists of these seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical layer. Most frequent attacks start of in the Application layer, and that’s only because it is the layer most of us are familiar with. This layer deals with the user. In order to prevent an attack on this layer security measures need to be set. For example, anti-viruses can scan systems for unwanted malicious programs from contaminating the system by scanning files and drives as well as program that could be potentially downloaded either by accident or on purpose. Policies can also be provided to employees stating that they are only allowed to do certain things on company systems. Once the employee has signed such policy, if they ever violate it, they can be reprimanded or terminated, depending on the severity of their actions. In the Presentation Layer, data is encrypted. In order to protect this layer, a complex for of encryption should take effect. Encryption such as AES could be implemented in order to avoid data from being decrypted easily. The Session Layer deals with communication between hosts. We can protect this layer by using encrypted VPN’s as well as secured connections. The Transport Layer and the Session...

Words: 472 - Pages: 2

Premium Essay

Information Management

...Information management CIS/207 10/08/12 Information is identified in an organization through a data management system. In an organization communication flows in five ways.1.downward 2.upward 3.lateral 4.diagonal 5.external A Data Management System consist of programs that enable you to store, modify and retrieve information from a database. A Data Management System is important to an organization because high quality data is needed in order for an organization to be successful. The goal of a Data Management System is to make raw data into high quality data. High quality data can help an organization to Increase revenue and cut expenses. Managers need quick access to correct, complete and consistent data from around the organization if they are to improve process and performance. Decisions they make and the service given to them is based on the data available to them. The data that they rely on is retrieved from a data base or data warehouse. Data bases store information and data that an organization generates from it application. This information generated can be sales information, revenue information, employee data etc.. A data warehouse is a specialized type of database that compiles data from databases so it can be analyzed. Communication that flows from a higher level in an organization to a lower level is a downward communication...

Words: 807 - Pages: 4

Free Essay

Identifying Potential Risk, Response and Recovery

...Assignment 2 Identifying Potential Risk, Response and Recovery Karen Raglin Professor West Networking Security Fundamentals March 3, 2013 I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. You have requested that I develop a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization. With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an attack on the LAN side of the firewall. These attacks circumvent the rules and policies of the firewall to gain access to the devices that are supposed to be...

Words: 1277 - Pages: 6

Premium Essay

Unit 9 Lab Recommend It Security Policies to Help Mitigate Risk

...Unit 9 Lab Recommend IT Security Policies to Help Mitigate Risk IS3350 1. Which IT assets did you prioritize as critical to administrative or student computing? I prioritize the file servers and the teachers’ notebook as critical to administrative and student computing. 2. List your top five (5) risk exposures for which you believe this school should have specific risk mitigation strategies. - No firewall - Unauthorized access to school computers - Open connections on the WLAN. - The principals traveling notebook can carry a virus - wireless access security 3. Given the potential risks that you identified, what IT security policies would you recommend be created by the school to help mitigate each of the identified risk exposures you listed in #above? I would say create an AUP and a policy that implements the encryption of the file servers. First and foremost a comprehensive security policy that takes into consideration the variables and factors at the school. This includes students, teachers, physical access, layout of the school and property, security measures as defined by FERPA, HIPAA, etc. A password policy needs to be in place that stresses complexity, minimum length (recommendations) and recycling or expiring passwords. This could be accomplished with a minimum length of 8 characters, one being a capital letter, one being a number, and one being a special character. Physical security should be setup in a way that there are locked...

Words: 350 - Pages: 2

Premium Essay

Security Monitor

...Security Monitoring Security Monitoring Hector Landeros University of Phoenix Security Monitoring In today’s business environment an organization may consist of various applications all in which require a certain level of risk assessment and security measures must be taken. Applications being used within the organization must be reviewed to determine security risks that application might have and how to protect the company from those vulnerabilities. Another factor that must be considered is a risk may vary between internal and external applications. There are many activities which can be incorporated into an organizations security plan which will help minimize possibility of a security breach. Policies Security monitoring is a method typically used to test or confirm security practices being used are effective. Most of the time monitoring of activities such as the review of user account logs, application logs, data backup and recovery logs or in many applications being used automated intrusion detection system logs. When using security monitoring one is trying to ensure that information security controls are in place are effective and not being bypassed at any point. One of the benefits of security monitoring is the early identification of wrongdoing or security vulnerability. Rudolfsky (1983-2010), “It will be difficult for a company to achieve information security objectives without security event...

Words: 525 - Pages: 3

Free Essay

Project Part 1,

...Project Part 1 : Multilayered Security Plan The safety and security of information owned by Richman Investments is extremely important and needs to monitored constantly. Through the following outline I hope to enhance the companies security, update systems and applications and ensure the integrity of the information stored on the network. The outlined areas will be monitored and reported monthly to senior management and will be updated as needed. The following outline will touch on each domain and will include security measures needed for those domains. 1.0 User Domain 2.1 Mobile storage disabled 2.2 Admittance to work area and computer with badge only. No visitors permitted 2.3 Multi-layered authentication with username/password and either token or biometrics 2.4 Training of new hires or quarterly training of current employees on security awareness 2.5 Security software with scanning capabilities to ensure no malware or virus intrusion is allowed. 2.0 Workstation 3.6 Hardware inventory taken quarterly to asses needs for new equipment or updates. 3.7 Software database examined to asses need for updates or antivirus renewal. 3.8 Different departments will be assessed groups in active directory to prevent authorization conflicts or confusion 3.9 Admittance to workstations will only be permitted with proper credentials, badge or token. 3.0 Lan 4.10 All cabinets and server rooms will be locked...

Words: 656 - Pages: 3

Premium Essay

Chapter 8,9, 10 Study Guide

... In which OSI reference model layer do you find e-mail software and other programs that end users interact with? Application Question 3 Identify the configuration that is best for networks with varying security levels, such as general users, a group of users working on a secret research project, and a group of executives. Multilayered firewall Question 4 Identify a security objective that binds a message or data to a specific entity and adds value to relationships between businesses. digital signature Question 5 A(n) ________ addresses gaps or weaknesses in controls that could otherwise lead to an exploit. safeguard Question 6 A _________ can be a situation or method that might accidentally trigger a vulnerability. threat source Question 7 What does risk management directly affect? Security controls Question 8 Identify the primary advantage of IPv6 over IPv4. Larger address space Question 9 Which of the following is a weakness of WLANs? SSID beaconing Question 10 Identify the configuration that is best for hosting a public Web site or your own e-mail server, for which you need to allow inbound connections on a limited basis. Screened subnet firewall Question 11 Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. Nonrepudiation Question 12 Which of the following is a cipher that shifts each letter in the English...

Words: 400 - Pages: 2

Premium Essay

Unit 8 Assignment 1: Internet/Web Access Management

...executives as stated above. VPN services will be deployed or installed for 9. VPNs are a way for remote access employees to gain secure access to corporate networks. It is a secure connection over an unsecure network- and internet. Communication security in a VPN is through encryption. VPN software, appropriate protocols, and the same encryption methods are required for VPN encryption. A VPN establishes a private network over a public network such as the internet. Instead of dialing in one a telephone line, a VPN uses an internet connection that the system has already established. VPN also ensures that intranet connections within the organizations premises are also secure and VPN provides that security too. VPN requires a tunnel and 9-Iron Country Club will be deployed with the Internet protocol Security (IPSec) protocol to establish a secure network. Ina VPN, IPSec secures communication between the computer system and the corporate network. It is often used in the VPN configuration because it provides flexibility to the organization and since it is an open framework and organizations can use different configurations to achieve the appropriate level of security. IPSec also provides authentication and encryption through two security protocols Authentication Header (AH) which is the authentication protocol and used to prove the...

Words: 464 - Pages: 2

Premium Essay

The Greed Cycle

...Article Review: - The Greed Cycle, by John Cassidy The article by Thomas Cassidy, points out the instrumental role that greed plays in the modern corporation. Modern Economists have always seen greed as not only a necessary element in the corporate environment, but as also a vital part of the successful evolution of a public company. As the article points out, “Economists from Adam Smith to Milton Friedman have seen greed as an inevitable and, in some ways, desirable feature of capitalism. In a well regulated and well balanced economy, greed helps to keep the system expanding”. In the early public companies, greed was not seen as a danger, as the implicit trust that managers would not slack off, and would run the company in the interest of the stockholders and stakeholders was not undermined. Economist was the first to identify the issue of managers not acting in the interest of the shareholders, and instead being motivated by greed, and “self-enrichment”. Public Companies, evolved as a way to create financing for large industry, where in the owners agreed to relinquish day to day control and operation of a company to mangers, who in turn would act in their interest, and maximize revenues. As the article points out, in the beginning, “most of the professional managers were content to collect generous salaries and pensions rather than habitually attempt to rob the stockholders and bondholders. It is a strong proof of the marvelous growth in recent times of a spirit...

Words: 824 - Pages: 4

Premium Essay

Tony

...Implications Three constraints:    Scope for increasing aggregate size of public sector limited Scope for raising debt levels limited Contingent liabilities will need careful management Some implications:  PPP may help but are unlikely to be a panacea (PPP should be driven by VfM not fiscal constraints) Raising savings (revenue), improving efficiency of investment, and equitization will all have to play a role. 4  Debt Management I: Definition of Public Debt Vietnam - Gross Public and Publicly Guaranteed Debt - 2005-2009 2005 2006 2007 2008 2009 (In percent of GDP) A. Gross public and publicly guaranteed debt (B+C) B. Gross domestic public and publicly guaranteed debt (B1+B2) B1. Gross domestic public debt Securities Loans and advances B2. Gross domestic publicly guaranteed debt VDB domestic debt Other entities (Social Policy Bank, VEC, Vinashin bonds etc.) C. Gross external public and publicly guaranteed debt (C1+C2) C1. Gross external public debt Multilateral Bilateral...

Words: 1589 - Pages: 7

Free Essay

Ethics of Compensation

...The issue of ethics in the corporate world has been widely talked about over the last decade. Corporate scandals almost seem like a part of everyday life. The nation’s response is to inform students of ethical conduct and hold organizations to a higher standard. This will hold CEOs and management responsible for all fraudulent acts committed by an organization. The ethical spotlight has now turned to CEO compensation due to the recent decline in the economy. The focus point of those public discussions has been to try and get a better position to influence CEO compensation packages. Determining a CEO compensation package and commitment that does not place undue pressure on the CEO to taint financial statements, provide excessive perks, approve stock option scandals to occur, and let outrageous severance packages could be a giant step in the right direction toward an ethical foundation in the business community. Perhaps CEO compensation packages are not the cause of corporate scandals, but sometimes they do push CEOs into making improper and unethical decisions. The relationship between CEO compensation is parallel to being an ethical company, and having long term success Executive compensation has risen significantly in past ten years. These increases are difficult to comprehend considering profits and stock prices of the only increased by 11% and 23% respectively as of 2008. Although the increase in market value created an environment for increasing compensation without much...

Words: 668 - Pages: 3

Free Essay

Food-Lion Mvp Program

...Food-Lion MVP Program Charles A. Kennedy BUS_120 February 7, 2009 Mr. Belflowers Fayetteville Technical Community College Located throughout different parts of the eastern seaboard, there is a popular food store called Food-Lion. The main goal for the store is to provide quality food products at reasonable affordable prices that other stores cannot compete with. With this as their main goal, the store believes it will greatly gain profit and exposure leading to the company growing. Food-Lion is seeking to expand its operations by improving their quality and providing enough quantity. Food-Lion is seeking to take their business in a whole new direction with a Most Valued Product (MVP) program. The proposed system requirements are the system shall have three tiers of users; customers, users, and managers. Users in the “customers” tier represent customers of Food-Lion and account holders. They will be able to view their MVP savings and instantly get other coupon rewards. Users in the “Users” tier represent employees of Food-Lion. They will be able to view their MVP savings from each customer in their area. This would allow them to track pacific items. Every customer will specifically be assigned one account number that will identify the customer within the Food-Lion MVP Program. Whenever a purchase has been made and the customer uses the MVP Card account number, the savings will automatically be credited to customer purchase. When customers want to use their MVP...

Words: 1205 - Pages: 5

Premium Essay

Steel Majors

...MajoA review of financing instruments by Steel majors: Innovations Tata Steel 2011 In March 2011, Tata Steel became the first company to issue Perpetual bonds (Perps) in India. A Perp has no maturity date. The investor gets income from the bond forever. The company, however, has a Call option after the end of the 10th year. The company can therefore, pay off the bond holders and extinguish the bond. The investor cannot redeem the bond ever, but can trade the bond in the secondary market. The coupon rate for the first 10 years is 11.8 percent, paid semi-annually. From the 11th year the coupon rate will be stepped up to 14.80. The coupon rate will be capped at 14.80%. The promoter stake in the company had been diluted by 2.4% in the FPO of January 2011(described below). This is cited as a reason why the company chose to issue bonds rather than equity. Similarly, taking on more debt would have negatively affected its Debt Equity ratios. The company intends to include the instrument as a separate class of capital under schedule 6 of Indian GAAP. This will not increase the interest burden of the company since the interest as and when paid will be recorded as a change in equity on its balance sheet. It can be counted as debt for tax purposes and as equity for ratings. The cost of capital through this instrument is also lower. Cost of equity for markets such as India is 16-24% and cost of debt is around...

Words: 263 - Pages: 2

Premium Essay

What Make an Army Leader

...1. Clearly define the ethical problem. Ans: The ethical problem is that SGT Day willingness to be dishonest and not report the security breach. 2. Employ applicable laws and regulations. Ans: . I would inform my supervisor of the findings and situation and while adhering to JER and Army regulations for dealing such issues. 3. Reflect on ethical values and their ramifications. Ans: I would counsel SGT Day for just wanting to cover up the findings, reminding him that not reporting the finding of the pages immediately could jeopardize our own career. 4. Consider other applicable moral principles. Ans:  I would to talk SFC Sharp and ask him why the pages weren’t destroyed two week ago and find out how to destroy them at this time. 5. Commit to and implement the best ethical solution. Ans:  I would then come up with a plan so that we can put in place a tracking system so that this situation doesn’t happen again. 6. Assess results and modify plan as required. Ans: Even though the civilian cleaning team doesn’t even clean our area and only our people ever come in here and the pages are from an alternate communications security book and were never used it’s still a Security risk.  After talking with SGT Day and having him check the inventory and destruction certificates and he discovered that SFC Sharp certified the destruction of the book these pages came from two weeks ago and also that there were no more pages. I would to talk SFC Sharp and ask him why the pages weren’t...

Words: 380 - Pages: 2

Premium Essay

Chapter 15 Investments

...E15-3 E15-4 E15-5 E15-6 Content Trading Securities. (Easy) Journal entries. Unrealized holding gain. Balance sheet disclosure. Trading Securities. (Moderate) Journal entries. Income statement and balance sheet disclosures. Long-Term Investments. (Easy) Securities available for sale. Purchase and adjusting entries. Available-for-Sale Securities. (Easy) Journal entries. Compute unrealized increase/decrease balance. Available-for-Sale Securities. (Easy) Journal entries. Balance sheet disclosure. Held-to-Maturity Bond Investment. (Easy) Premium, straight-line amortization, journal entries. Error in recording interest at acquisition. Held-to-Maturity Bond Investment. (Easy) Discount, semiannual interest receipts, straight-line and effective interest methods of amortization, journal entries. Held-to-Maturity Bond Investment. (Moderate) Discount, semiannual interest receipts, sale at gain. Effective interest method. Journal entries. Bond Investment. (Moderate) Discount, semiannual interest receipts, amortization schedule using effective interest method, journal entries. Bond Investment. (Moderate) Premium, semiannual interest receipts, amortization schedule using effective interest method, journal entries. Bond Investment. (Moderate) Premium, semiannual interest receipts, sale at loss. Effective interest method. Journal entries. Transfer Between Categories. (Easy) Reclassification from "held-to-maturity" to "available-for-sale securities." Journal entries for interest and reclassification...

Words: 17388 - Pages: 70