250 Matching Annotations
  1. Jun 2025
    1. How does emigration affect the workforce?

      While emigration opens up jobs in the home country, there are still some negative effects on the home country's workforce. One of these effects is known as "brain waste," where immigrants will move overseas for education but then work in fields unrelated to their degree or training.

    2. What are remittances?

      Remittances are financial transactions from an immigrant to someone in their home country. When an immigrant travels abroad for economic reasons, they will usually send money back to their family that still lives in their home country. These remittances make up a significant part of the GDP for countries with a large emigration rate.

    1. What is immigration? What is migration?

      Migrants are people who move from place to place, usually for economic reasons. Immigrants are a type of migrant who make the conscious decision to leave their home country to settle in a new one. There are many more types of migrants, delineated by why they are traveling, what their intentions are, and political relationships between the host country and other countries.

    2. What happens to refugees if their asylum claim is denied?

      If a refugee's asylum claim is denied, their future is uncertain, potentially falling into one of three prospects.

      They could be stuck in the host country, residing in camps, in a "limbo" state without any formal protection from the government.

      They could be forced to return to their home country, of their own volition or against their will.

      They could be sent to a new country as a result of negations between governments over who takes in refugees.

    3. How do refugees seek asylum?

      After fleeing their home country, refugees have to travel to another country and apply for asylum. Generally, it is the job of the first safe country they reach to process their application. This is a difficult and lengthy process that can take years. After the host country vets the asylum application, they will either approve or reject the refugee. Refugees may be rejected if they don't meet the host country's standards or if they are unwilling or unable to apply (or reapply) for asylum. If approved, however, the refugee with be granted asylee status and may resettle in the host country.

    4. What is the difference between a refugee and an asylum seeker?

      Distinctions vary based on country or organization, but in the US, a refugee is someone who is located outside the US at the time of application. Asylum seekers apply when they arrive in the US.

    5. Asylum Seekers

      While migrants are still in the process of requesting refugee status from a host country, they are called "Asylum Seekers". Once granted asylum, they are called "Asylees" and provided the same rights and freedom afforded to citizens and other legal residents of the host country. Asylees are also granted certain protections, such as the right to work, access to education, and health care.

    6. Refugees

      The UN Refugee Convention defines a refugee as a migrant who, due to a well-founded fear of being persecuted on the basis of race, religion, nationality, membership of a particular social group or opinion, is fleeing or wishes to flee their home country.

      However, host governments ultimately decide whether to recognize that person as a refugee. If they do, then the refugee is granted a protective status known as asylum.

    7. Legal Immigrants

      Legal immigrants are ones that need and obtain permission to live in the host country. Once granted permission, they are granted some rights that allow them to have a place to live, work, and education. Illegal or Undocumented Immigrants are ones that migrate to a country without permission or authorization.

  2. May 2025
    1. When trade deficits result from unfair practices

      China has been accused of artificially inflating the deficit by cheating at trade. This gives China an unfair edge over the US in the global market. However, reducing the US trade deficit is not the same thing as addressing unfair Chinese trade practices. The deficit could increase after solving the problem or decrease without solving it. How? I don't know the reading doesn't say. If China is the US' biggest exporter, that means they have a significant portion of USD. Because they inflate this deficit through unfair practices, don't they have more control over the value of the USD than they would otherwise? I could see how decreasing the deficit could assuage this problem, but targeting their trade practices directly would still probably have a more concrete effect.

    2. When trade deficits are unsustainable

      Some economists warn that the US trade deficit is unsustainable because the US has to borrow from the rest of the world to make up the difference between their spending and selling. However, this has worked because the US dollar has always been in high demand, with other countries seeing it a safe bet to buy some of the US debt - treasury bonds being one way to do this. If the value of the dollar changes, however, then this all falls apart.

    3. Many economists believe the United States will and should always run an overall trade deficit

      The US' overall trade deficit has global implications because the USD is essentially the global currency - meaning that USD is exchanged beyond the scope of US trade. If the US maintains an overall trade deficit, then there will be more USD circulating, strengthening its value. This is good for the economy because, in exchange for dollars, the US receives goods and foreign investment.

    4. United States’ biggest trade deficit, the one with China.

      China has structured its economy around exports thus maintaining an overall trade surplus. As a result, Americans invest hundreds of billions of dollars into the Chinese economy. And China has to do something with all this USD or else they risk making the yuan more expensive. So, China invests those dollars back into the United States by investing in US businesses, purchasing US real estate, and buying US treasury bonds. By decreasing the value of the yuan (i.e. keeping their currency from getting too expensive), they can sell their goods for cheap.

    5. Bilateral trade deficits

      Bilateral trade deficits describe ones between two countries, where there is a deficit between the goods imported by Country A from Country B and the goods exported by Country B to Country A. These occur when the two countries each have advantages that play into each other. Trade policies have little effect on deficits in bilateral trade.

    6. WHAT IS A TRADE DEFICIT?

      Countries that import more than they export are in a trade deficit. Countries that export more than they import are in a trade surplus.

    1. barriers to free trade

      To maximize their profits, countries will often institute different trade barriers. Some violate one or more of the five WTO principles, though all inhibit free trade in some way or another. These trade barriers will further a country's interests but almost always have unintended consequences.

    2. SANCTIONS

      Sanctions describe measures a country takes to limit or entirely prevent trade with another country. Sanctions are used as a tool to further a country's foreign and/or geopolitical interests.

    3. EXPORT CONTROLS

      Export controls are regulations implemented on exported goods that help protect national interests. Governments apply these to goods that they think should not be traded freely across borders (e.g. nuclear materials, scarce goods, intellectual property).

    4. DUMPING

      Dumping occurs when a company sets the price of their product lower than it's normal price. This increases the company's market share - if they can control enough of the market for that product, it is easier to change the price and quality because there is less competition.

    5. CURRENCY MANIPULATION

      Currency Manipulation is when a country takes action to change the exchange rate of its currency. Generally, countries will try to make their products cheaper in USD because it is the most widely accepted currency. For example, 1 USD is worth 100 yen, a product that costs 400 yen to make is worth only 4 dollars, meaning that it will probably sell well in the US. While this is great for exports, it makes it harder for Japanese citizens to buy foreign goods.

    6. SUBSIDIES

      Subsidies don't refer to specific action, rather, it covers a broad range of actions that a government could take to financially boost an industry (e.g. giving money or tax breaks). Subsidies can be used to stabilize prices or struggling domestic industries.

    7. QUOTAS

      Quotas are limits on how much of a product a country can import. Sometimes this is a hard limit, though often a tariff is put on every product above a certain limit - quotas themselves don't generate any revenue. Quotas are used to keep domestic manufacturing viable to foreign alternatives.

    8. U.S. President Donald Trump imposed heavy tariffs on Chinese goods in 2018

      Trump imposed tariffs on China in response to what was viewed as unfair trade practices. China implemented counter-tariffs on U.S. imports. This trade war cost the U.S. economy billions of dollars and hundreds of thousands of jobs.

    9. The WTO

      The WTO is an intergovernmental organization that was created to help settle trade disputes between countries. Any given WTO agreement is meant to ensure that trade should be: 1. nondiscriminatory between products produced domestically and abroad, 2. predictable and transparent, 3. more competitive 4. more beneficial for less developed countries, and 5. better for the environment.

    10. What is free trade?

      Free trade describes the ability for individuals and companies in different countries to buy and sell goods to and from each other (i.e. trade) with out any government interference.

      Though free trade generally leads to greater economic prosperity in the long run, governments sometimes find it necessary to prioritize immediate goals by putting up trade barriers.

    1. How Is China Involved in International Development?

      The Belt and Road Initiative (BRI) focuses on infrastructure investment to enhance Chinese interests in developing countries.

    2. How Does the United States Finance International Development?

      Administered by multiple government agencies, but primarily USAID. Aid spending flows have been liked to major US security interests like the war in Ukraine

    3. What Are the Categories of International Development?
      • Humanitarian aid - relief for people affected by natural and manmade disasters
      • Foreign aid/assistance - benefits a country's infrastructure (e.g. economy, military, disaster response)
      • Official development assistance (ODA) - development financing from governments managed by the Organization for Economic Cooperation and Development (OECD)
      • Philanthropic aid - NGOs like the Bill & Melinfa Gates Foundation to support specific focus areas
      • Bilateral aid - by one country to another country
      • Multilateral aid - by multiple countries to one country
      • Grant aid - Financial support or direct assistance without expecting repayment
      • Conditional aid - contingent on the beneficiary country doing something
      • ODA loans - Primary source of development financing. Managed by the OECD.
      • Private sector investment finance - companies and/or individuals investing in developing economies
    4. International Development Today

      Multiple government (e.g. the US, Germany, and Japan), international (e.g. the UNDP and the World Bank), and private organizations (e.g. the Bill & Melinda Gates, Mastercard foundations) make up contemporary global development.

      Nearly 90 percent of financial flows for developing countries come from private sources.

    5. What Is the “Global South”? What Are Low- and Middle-Income Countries?

      Another framework groups countries formerly known as the third world into the "Global South". This divided the world into the "developing" south and the "developed" north. The Global south includes countries south of the US, Western Europe, and most of Eurasia -- excluding Austrailia and the pacific islands.

    6. What Are the Origins of International Development?

      Frameworks for international development started with splitting up countries into the first, second, and third world. Though later replaced for less polarizing frameworks, this framework supported Cold War era efforts for geopolitical influence.

    7. International development challenges

      International development challenges include growing inequality within countries, the ever-growing climate change crisis, and a worldwide gender pay gap.

    8. International development: signs of progress

      Signs of progress in international development include a decrease in poverty, more access to safe-drinking water, and increased world literacy rates.

    9. Many contemporary understandings of development

      The level of a country's development has historically been measured by their GDP. More recently, the understanding of development has broadened to include questions like: * Are people able to move freely without discrimination? * Are people able to access education and access decent work opportunities? * Can they access quality health care and live in environments free of pollution? * Do they have political equality and strong, free, and fair elections and institutions?

      Contemporary understandings of development largely come from the UN Sustainable Development Goals

    1. why would one country care about helping another country groweconomically?

      To help other countries satisfy these five conditions, richer countries will engage in foreign intervention. There are a few reasons they might do this: * Humanitarian values, or, believing that helping our fellow man is just the right thing to do. * Improve their own security by preventing bad actors from taking advantage of struggling economies * Boost their own economies by investing in prospective trade partners or investment opportunities

    2. So why do some countries have higher GDP per capita than othercountries?

      For a country to grow and sustain a healthy economy, there are five conditions that must be satisfied: 1. Peace and stability - Struggling to survive every day impedes one's ability to work regularly. 2. Quality education - A population that can read, write, and do arithmetic will produce productive workers, savvy customers, innovation, and the spread of technology. 3. Access to capital (money) - Industry requires money which can be accumulated domestically over time or more immediately sourced abroad. 4. Established rule of law - People need to feel confident that their government isn't corrupt and their life, liberty, and property are ensured and protected. 5. Equality and opportunity - By eliminating discrimination against traditionally marginalized groups, people can participate in markets they want and work jobs they are best suited for.

    3. gross domestic product or GDP

      Take the total value of all goods and services traded or produced within a country's borders over a time period -- usually a year. Then divide it by the number of people that live in the country. This is called GDP per capita.

    4. We often hear people divide up the world into developed anddeveloping countries. But what do those labels mean?

      The difference between "Developed" and "Developing" countries is largely measured by a given country's Gross Domestic Product (GDP).

    1. Making It Big in China Means Making Big Changes

      To maximize potential revenue, studios need to balance their artistic vision with pandering to foreign -- in this case, Chinese -- audiences. This could include scenes filmed in China, including Chinese actors, Chinese product placement, or specific requests from Chinese financing partners. This also happens in reverse, where Chinese-led movies will use this formula to attract Western audiences.

    2. The WTO Opens the Door to China

      China's acceding to the WTO made foreign investment in the country more feasible. This ultimately lead to frequent coproduction between Chinese and American film producers. Though the Chinese government was wary of this at first, they eventually saw opening the market to Hollywood as a way to increase international influence and did so -- with some caveats: * The number of foreign films allowed into the country is capped at a quota of thirty-four. This decision followed a WTO ruling that accused China of violating international trade rules by restricting imports of movies from the United States. * Films coproduced by US and Chinese production companies can count ad non-foreign films as long as Chinese actors are cast in at least one-third of the main roles. * All films must adhere to China's state censorship guidelines.

    3. a Hollywood film’s international success can, and often does, play a critical role in compensating for a poor domestic performance.

      Hollywood film producers found that international audiences may have different attitudes towards movies that performed poorly in the United States. In recent years, the Chinese film industry has outearned American counterparts, making China a key player in global revenue for Hollywood producers.

    1. Solutions to the global semiconductor shortage

      To address the microchip shortage, there are 5 promising solutions: 1. Nationalizing Supply Chains will ensure reliable access to critical goods. The glaring drawback to domestic production, or "sovereign supply chains," is that it eliminates international competition. Under the CHIPS Act, President Biden put $280 billion towards domestic semiconductor research and manufacturing. 2. Developing Products That Use Smaller Chips can be accomplished by cutting down on the ubiquity of "smart" products. 3. Using Stockpiled Chips is a temporary solution until supply runs thin. 4. Expanding Chip Development is uncontroversial but requires competing with a field where the largest competitors have been in in business for over forty years. 5. Developing a More Resilient Supply Chain could reduce the growing threat of Chinese supremacy. Driving this is the Chip 4 alliance, an international pact between the four largest chip manufacturers -- US, Japan, South Korea, and Taiwan.

    2. The effects of global supply chain disruptions

      Global supply chain disruptions have downstream effects with broad, lasting consequences. The microchip shortage motivated governments to aim for "technological sovereignty", a goal that, when achieved, promises self-sufficient development of technology -- specifically semiconductors.

      While most people felt the effects of the shortage in their wallets, international events revealed geopolitical implications. In 2022, the US government blocked semiconductor exports to China, seeking to inhibit Chinese technological development. By doing so, the United States hoped to inhibit Chinese technological development of advanced military equipment.

    3. What caused the semiconductor shortage?

      The semiconductor shortage primarily has 2 causes: 1. The Covid-19 pandemic forced many microchip factories to close due to lockdowns and quarantine policies. At the same time, a lot more people were buying devices with microchips for work and personal entertainment. This lead to a lower supply and an increased demand. 2. The conflict in Ukraine forced the two Ukraine-based, semiconductor-grade neon gas producers to halt their operations as Russian troops escalated their attacks.

      These cases show the worldwide impact that both localized and global events can have.

    1. What are international organizations?

      Six of the most influential international organizations are: * the United Nations (UN) * the North Atlantic Treaty Organization (NATO) * the European Union (EU) * the World Trade Organization (WTO) * the Group of Twenty (G20) * the International Criminal Court (ICC)

      Though these organizations work together to promote global peace and prosperity, they must keep up with the evolving political landscape. Critics highlight organizations' reliance on political will, noting how they lack the agility needed to respond to urgent issues.

    1. 1960s: Shipping companies stop thinking outside the box.

      The first cargo ship was used in 1956 and within 10 years, the use of shipping containers -- known as "containerization" -- became a worldwide standard in the commercial industry. By standardizing how goods were stored and transported, the logistic and labor costs were drastically reduced, so much so that trade increased by nearly 800 percent in the span of 2 decades. This efficiency was great for businesses and the consumer, but when ports closed and people lost their jobs many families faced poverty.

    2. These innovations have made life easier for most—but harder for some.

      When part of the many, it is very easy to forget the effect one's actions have on the few. For efficient travel to stay efficient, sacrifices need to be made so as to cut costs in any way possible. This could mean taking advantage of weak labor laws in poor countries or lax restrictions on carbon output. By recognizing these issues, consumers are able to fully appreciate the effects of globalization.

    3. 1940s: Feel like waking up in New York and falling asleep in London? Now you can.

      The 1978 Airline Deregulation act spurred growth in the airline industry by allowing individual airlines to set their own prices and routes. Commercial enterprises also grew because they were able to use larger aircraft. Combined with reduced tariffs and further technological innovations, more goods began travelling worldwide daily.

    4. All aboard for fast, efficient mass travel!

      By 1830, trains were fast enough to become commercially viable. This lead to lower prices, faster shipping and travel, and the train industry becoming a major employer by the early twentieth century.

    1. Turkey: Clinical Trials

      Clinical Trials are conducted in Turkey because they have fewer regulations and lower costs. While this can reduce cost by up to 60 percent, the potential exploitation of low-income participants has raised ethical concerns - should they need treatment following a botched experiment they are probably unable to afford it.

    2. Here is one possible path

      For U.S. pharmaceuticals, the global supply chain starts with R&D in the US, then clinical trials are conducted in Turkey. Then, after FDA approval, the "active pharmaceutical ingredient" is manufactured in China, binders and fillers in India, and packaging in Germany.

    3. trade liberalization relaxed restrictions and introduced regulations to promote free trade among countries

      Of the drugs consumed by Americans, nearly half are imported. This is due to trade liberalization and relaxed restrictions abroad.

    1. The intertwining of countries and markets all over the world has both benefits and downsides

      Globalization means that the actions of people in one country may have a direct or indirect influence on people in another country on the other side of the planet.

      While this can be a good thing: spurring economic growth in 2nd and 3rd world countries, greater awareness on global events, widespread vaccinations, etc..., many of the worlds biggest issues like climate change and terrorism are tied to globalization as well.

    2. The growing interdependence of the world’s economies, cultures and populations

      Globalization is the "growing interdependence of the world's economies, cultures and populations..."

  3. Apr 2025
    1. I can’t write a nature poem be English is some Stockholm shit,makes me complicit in my tribe’s erasure —why shd I give a fuck abta“poetry’? It’s a containerfor words like whilst and hither and tamp. It conducts something ofpermanent and universal interest. Poems take something like an apple,turn it into the skin, the seeds, and the core. They talk abt gravity, abtAdam, and Snow White and the stem of knowledge.

      battles with his relationship as an english speaking poet and being an ndn

    2. People r so concerned abt “the Earth”in the sense of kale salad and bruisedgilShe'll be just fine. We might not make it, hopefully. We’ll exhaustourselves soon what with global population blooms and SanLoco macho nachos and ruddy from frozen margaritas you reach formy arm. You drifted off again. You ask, What are you thinking about?

      goes against what a lot of nature poems are about

      saying that the earth will be fine it's just the human race that'll die out

  4. Mar 2025
    1. I don’t like thinking abt nature be nature makes me suspect there is a god.

      VERY personal

      something that I empathize with a lot nature threatening you with the existence of god

    2. Winter is a death threat from nature, and I don’t respond well to predation —it’s not like summer, death in the form of barking mentakin issue w/the short shorts and the preen and the queenly holdinghandsgod forbid u step into the gnashing cold for a fizzy water and grapes,

      poetic and nature

      meter + sibilance

    3. My primary device is personification, says Nature. Do your associationsconsider my mercurial elements?

      Nature

      in poetry we personify nature a lot, this also builds off the other one I highlighted about nature threatening you with the existence of god

    4. We are the last animal to arrive in the kingdom —even science will tellyou that.My father takes me into the hills we cut sage. He tells me to thankthe plant for its sacrifice, son. Every time I free a switch of it a burst ofprayer for every leaf.I’m swoll on knowing this? Sharing the pride of plantsMy mother waves at oak trees. A doctor delivers her diagnosis.When she ascends the mountains to pick acorn, my mothermotherfucking waves at oak trees. Watching her stand there, herhands behind her back, rocking, grinninginto the face of the bark

      nature

    5. I look too much into the mirror of my worst selfso life feels like always breakin in a pair of new shoesand my hunch is we'll be naked soon having sex like those handsoapsthat smell like parsley sort of refreshing but chemical Nothing like thereal thing n you wd prolly notice if we fucked with all my clothes onbe yr of course so hazeland stupid.Nothing can fall that wasn’t builtexcept maybe my self-esteem be I have a hunch that I was born with itintact but then America came smackedme across the face said like itn the sick thing is getting smacked across the face makes me so wet rnand that’s prolly why poetry, be in order to get insidea poem has to break youthe way the only thing more obvious than your bodyis leaving yr shirt on in the pool

      Tone

      goes with the rambling style of prose that he keeps using

    6. Grief is sneaking cigs from the styrofoam cups on the tables next to thecreamers and plates of Mary’s pineapple upside-down cake, running off tothe playground behind the schoolroom trailers to (try and) smoke the

      Poetic

      "Grief is" metaphor

    7. “Malibu” by Hole is one of the greatest songs in Americawhen I was younger I thought it was a sexy like summer story abt thesandy aesthetic wonder of aSoCal summer beach townHow you listen to something completely in yr own head.

      Personal

    8. My singing teacher tells me find your centerTornado fucking is a natural phenomenonwherein you start on your stomach,get flipped to the right side,then he slides under you slamsu into his hips, both in a sort of crab walk flip leftbefore returning to (yoga term) stomach pose.

      Tone combines nature with fucking...I think...

    1. we can find the words to describe

      similar to the first step of activism - getting people to become aware of the issue and think about it - you can't do that without the proper words to describe it

    Annotators

  5. Jan 2025
    1. discuss the difference between applied and theoretical criminology.

      Applied criminology focuses on reducing crime through actionable means. Theoretical criminology seeks to explain criminal behavior by developing and refining theories.

    2. explain the difference between determinism and positivism.

      Determinism and positivism are two frameworks that attempt to explain human behavior. Determinism argues that it is influenced by factors outside of one's control. Positivism, on the other hand, asserts that, through scientific observation, human behavior can indeed be studied and understood.

    3. restate the tenets of rational choice theory

      In the field of criminology, rational choice theory suggests that individuals engage in crimes they believe are a low risk activity through comparing the benefits of committing a crime with the risks of getting caught.

    4. summarize the history and evolution of criminology. recognize those contributions to the discipline made by Edwin Sutherland.

      Edwin Sutherland work, emphasizing the role of socialization in the development of criminal behavior, has been a key contribution to the role of criminology. Criminology has evolved to become more nuanced, with multiple frameworks emerging to explain why and what types of individuals commit crimes.

    5. describe the work of criminologists.

      Criminologists aim to advance the understanding of crime through research-based methods. Through identifying variables that contribute to crime, criminologists develop and apply theories to explain why individuals engage in crime.

    6. discuss the difference between criminal justice and criminology

      While criminology is the study of crime and criminals, criminal justice refers to methods established by the government that are used to prevent, deter, and control crime.

    7. define criminology

      Criminology is a field of study that focuses on analyzing crime and criminals to understand why crime happens, what types of people are prone to criminal action. Research is used to find ways to promote social justice and prevent crime from happening.

    1. Additionally, Equifax reported that it would provide several services to allU.S. consumers, regardless of whether their information had beencompromised, free of charge for one year.

      Frank Abagnale's video talked about why this was a bad idea- most stolen PII isn't even used for at least like 3 years

    2. After additional analysis, including a determination that thequery had, in fact, allowed the attackers to access PII from approximately2.5 million additional U.S. consumers, Equifax revised the number ofaffected individuals from 143 million to 145.5 million on October 2, 2017.

      going under my "royal fuckups" header for notes on this case study

    3. Equifax Identified SeveralFactors That the AttackerExploited During theBreach

      According to Equifax, the key factors for why they got breached were failures in identification, detection, segmentation, and data governance.

    1. Topic 7: Rules of Engagement for an Active Event or an Inactive Event

      When arriving on scene, the investigator must be able to classify the event and discern what, if any offence has been committed.

      Based on the type of offence and the classification of the event, the law provides certain powers for taking action. Officers must know the law when taking action and entering a property.

    2. More on Offence Recognition

      Officers need to be able to recognize if and what offence is taking place while also trying to classify the event.

      Knowing what offence has taken place is important because the investigator will then know what type of evidence they need to look for and under what circumstances can they enter an property legally.

    3. As part of attendance to the scene of the event

      While on the scene of the event, the investigator has to know the legal grounds to which they are able to enter the property: * consent of the property owner * obtain a warrant * exigent circumstance * in active pursuit of the suspect

    4. If the investigator determines that they are attending to an Active Event

      If the investigator determines that the event is active and the offence poses a threat to Level One Priorities, then they know that they can make an arrest if they can find evidence to support reasonable grounds to do so.

    5. Having an offence in mind, the investigator will also begin to consider their range of powers and authorities that can be used under the law regarding that offence.

      If an officer suspects that a crime has been committed, they need to discern whether they need to catch the suspect in the act (summary conviction) or if there is already enough evidence (indictable/dual procedure) to make an arrest.

    6. Police officers may be called to action by many different means.

      When called on scene, a police officer will have to determine if the event taking place is active or inactive. If it is active, thus requiring a tactical investigative response, they need to discern if there is a threat to Level One Priorities.

      Because information is limited in these scenarios, the law allows for "exigent circumstances" - scenarios in which an officer can rely on certain powers to protect Level One Priorities.

    7. exigent circumstances

      circumstances predetermined by law for when an officer can enter a property and make an arrest without a warrant

      active event + explicit or implied threat to life or safety = exigent circumstances

    8. Topic 6: Threat vs. Action Analysis Dilemma

      This dilemma arises when a crime is actively being committed that presents a direct threat to the safety of others. For example, an active shooter scenario poses this dilemma because the responding officer must weigh the available information and decide if they should respond or wait for backup.

    9. An Inactive Event

      Requires a Strategic Tactical Investigative Response 1. The criminal act has concluded at the scene. 2. The suspect or suspects have left the scene or have been arrested or detained. 3. The situation at the scene no longer represents a danger to the life or safety of a person, including police officers.

    10. Topic 5: Classifying the Event as Either an Active Event or an Inactive Event

      When at the scene of an event, the investigator must always assume that the event is inactive until proven otherwise. Knowing if an event is active or inactive is imperative to deciding further action.

    11. An Active Event

      Requires a Tactical Investigative Response 1. The criminal act is or may still be in progress at the scene. 2. The suspect is or may still be at the scene of the event. 3. The situation is, or may be, a danger to the life or safety of a person, including the life or safety of attending police officers.

    12. Topic 4: Event Classification and Offence Recognition

      When entering an investigation, investigators must be able to identify two important situational elements to aid in the investigative process: Event classification and Offence Recognition.

    13. Is it an active event in progress that requires immediate and decisive tactical actions; or is it an inactive event where a less urgent, slower, and more strategic approach can be taken?

      Event Classification

    14. Topic 3: Distinction Between a Tactical Investigative Response and a Strategic Investigative Response

      Criminal events fall into two categories, "active" and "inactive". An active event, where a crime is actively being committed, requires a tactical investigative response from an officer on the front lines. Once the event becomes inactive, after the scene is brought under control, an investigator will conduct strategic investigative response.

      It is important to understand these two types on response as they require different protocols and legal proceedings.

    15. Strategic Investigative Response

      Once the investigator has arrived on scene and the event is under control (event is now "inactive" and Level One Priorities are met). In court, police investigators will have to explain their thinking process based on information they were given and whether they felt the need to take action.

    16. Tactical Investigative Response

      Pertains to "active" events where operational officers take action (by using force, making an arrest, etc) as a front-line response to criminal events. In these scenarios, there is limited information at hand but critical decisions must be made. If an officer takes action, they are accountable for said action and may have to explain their reasoning for doing so in court.

    17. Topic 2: Progression of the Investigative Process

      Criminal investigations may change wildly and in unpredictable ways. As such, methodologies pertaining to the investigative process must be sufficiently flexible while also ensuring that results and priorities are met.

      When conducting an investigation - the progression from initial evidence gathering to the arrest and charge of a suspect - the results and priorities sought after in an investigation will always be the same.

    18. These include collection, analysis, theory development and validation, suspect identification and forming reasonable grounds, and taking action to arrest, search, and lay charges.

      The steps to the investigative process.

      Criminal incidents are dynamic and unpredictable. As such, the rules to conducting an investigation must be general in nature and flexible.

      These steps ensure that, in spite of the unpredictable nature of a criminal investigation, all necessary milestones are hit to ultimately lead to the arrest and charge of a suspect.

    19. And, you should always keep the desired results in mind to provide focus and priority to the overall investigative process.

      When conducting an investigation, it is important to keep your priorities straight; distinguishing from priorities and results will ensure that an investigation is conducted in a manner that will not compromise it's integrity or validity.

    20. priorities

      AKA "Level One priorities"

      The protection of lives and safety of people, including first responders. Level One priorities will always supercede Level Two priorities (results). It is justifiable to prioritize a Level One priority at the expense of a Level Two priority.

    21. results

      AKA "Level Two priorities"

      These come after "Level One priorities" (just called "Priorities") have been ensured. Under no circumstances will Level Two priorities come at the expense of Level One priorities.

      There are 4 general results which are considered equal to each other, meaning that it may be justified to concentrate on one result at the expense of another. 1. Identifying, gathering, and preserving evidence 2. Establishing reasonable grounds to identify and arrest suspects 3. Accurately recording and documenting the event in notes and reports 4. Protecting property

    22. The Distinction Between Investigative Tasks and Investigative Thinking

      Investigative tasks are concerned with the act of actually gathering the information. Investigative thinking is the analysis of this information to develop theories based on it.

    23. Investigative Tasks

      The collection of evidence and information information gathered in investigative tasks is to be later processed, or "chewed on" during investigative thinking

  6. Jun 2024
    1. Outsourcing of the various components of the infrastructure of an organizationis only part of supply chain management. Successful management of the supplychain will rely on strategic partnerships and may also extend to joint-venturearrangements.

      what supply chain management actually is

    2. Supply chainmanagement and risk management are interrelated.

      when you outsource you now have to worry about both your risks and whoever else is involved in outsourcing

    3. thepotential downside of outsourcing needs to be identified and mitigated with thesame level of diligence as the upside or assumed benefit of outsourcing is

      essence of supply chain management

      risks of outsourcing should be considered just as much as the benefits of it

    4. There may be quality and availability issues that could causedissatisfaction amongst fans and result in reduced sales. There are also questionsof corporate social responsibility that need to be addressed.

      examples of risks related to the supply chain

    5. adequate attention to risk management matters can reduce thelikelihood and magnitude of any disruption to supply

      supply chain management reduces risk to supply chain

    6. definition of supply chain

      the process of that starts by sourcing raw materials and ends with the delivery of product to end users. The supply chain includes all aspects of this process such as vendors, manufactures, factories, warehouses, etc.

    7. Typically, internal controls have the following purposes:safeguard and protect the assets of the organization;ensure the keeping of accurate records;promote operational effectiveness and efficiency;adhere to policies and procedures, including control procedures;enhance reliability of internal and external reporting;ensure compliance with laws and regulations;safeguard the interests of shareholders/stakeholders.

      purposes of internal controls

      all of these help the organization achieve their objectives in some way or another

    8. how seriously aparticular department takes risk management and internal contro

      relation of internal controls to risk assurance and the audit committee

      the internal auditor should have the answer to this question

    9. The audit committee will seek assurance that all of the significant risksare being adequately managed and that all of the critical controls are effectiveand that they have been efficiently implemented

      risk assurance is the assurance that risks are managed and that controls and implementation thereof are effective

    10. Although the audit committee may be considered to be the guardian ofcompliance within the organization, the terms of reference are usually muchbroader than just compliance

      audit committee functions: ensure compliance evaluate governance standards advocate for risk management

    11. udit committee consists of non-executive directors, with senior executive directors in attendance at auditcommittee meetings

      audit committee is meant to be objective facilitates the evaluation of activities in the organization and it's board

    12. Control environment

      the measure of an organization's risk culture a good control environment is indicative of future success with implementation of risk management and internal control activities

    13. When designing effective internal controls, the organization should look at thearrangements in place to achieve the following:maintenance of reliable systems;timely preparation of reliable information;safeguarding of assets;optimum use of resources;preventing and detecting fraud and error.

      Outcomes of effective (use of) internal control(s)

    14. internal control

      The system(s) in place that ensure a business meets its objectives. These include managerial actives that facilitate the direction of actions that increase the chance of objectives being achieved.

    15. The principles require the equitable treatment of all stakeholders and aninfluential role for stakeholders in corporate governance. Finally, the principlesrequire disclosure and transparency

      stakeholder treatment and influence, and transparency are essential parts of governance

    16. The management

      identify, analyze, evaluate, respond, monitor, and communicate risks that relate to said manager's domain compares levels of risk against predefined risk appetite

    17. The business impact analysis has three clear purposes
      1. Establish a time frame for the recovery of mission-critical activities
      2. Define resource requirements for remediation and their impact potential
      3. Determine whether the impact is within the risk appetite to determine further response.
    18. business impact analysis (BIA)

      Assesses the impact of interruption from each critical function. Required to identify the continuity stages of each function. Emphasis is on the importance of a function rather than what could influence it (that is what risk assessments are for)

    19. Establish the impact potential and the resource requirements for recoverywithin the agreed timescale.

      We are reduced to x% functionality, if we want to get to y% by the agreed date, we will need these resources

    20. the emphasis of a BIA is the identification of the relative importance andcriticality of each function, rather than identifying the events that couldundermine that particular function.

      A business impact analysis (BIA) will identify the criticality of a function while a risk assessment will identify events that could undermine said function

    21. BCP should be viewed ashaving three components

      Three components of BCP: 1. Activate crisis management plan. Respond to crisis and make stakeholders aware of situation. 2. Implement disaster recovery plan. Restore infrastructure in a capacity that allows for minimum required functionality for organizational operation. May overlap with first component. 3. Work to restore full functionality

    22. DRP and BCP can be considered to be responses for when the event occurs andthey do not take into account how likely it is that the event will occur.

      proactively making a plan for reactive measures

    23. BCP is how an organization prepares for future incidents thatcould jeopardize its existence

      definition of BCP

      the identification of potential threats to a business, their impacts, and a plan for responding to such scenarios

    24. advantages

      reduces uncertainty regarding hazard risks may save money because losses could be greater than insurance premiums can provide access to specialist services through insurer

    Annotators

  7. May 2024
    1. there are three zones onthe risk matrix

      Comfort: low-likelihood/low-impact events Cautious & Concerned: acceptable variability of the level of risk, risk tolerance Critical: outside tolerance limits

    2. There is a clear hierarchy of effectiveness of controls that is represented by theorder preventive, corrective, directive and finally detective.

      Preventative provides the most control while Detective provides the least control

    3. Description of types of hazard controls

      Preventative: Limit the possibility of an undesirable event happening. Preventative controls become more important with the priority to prevent a certain outcome. Most controls implemented in response to hazard risks fall under this.

      Corrective: Reduce the impact of any outcomes that have already been realized and remedy risk exposure. Treatment is focused on making the risk less likely to occur and/or the impact is reduced.

      Directive: Give directions to people in an effort to ensure a particular outcome is achieved and loss is prevented. Examples include training on how to respond to a specific event. Similar to processes in PPT.

      Detective: If an outcome has already been realized, detective controls figure out when and how. The goal is to ensure that circumstances do not deteriorate further or happen again

    4. organization may not be able toterminate or eliminate the risk entirely and thus will need to implementalternative control measures

      basically just working to move the risk to the tolerable quadrant through the use of T's that are adjacent to terminate

    5. Risk hedging or neutralization maytherefore be considered to be a risk transfer option, as well as a risk treatmentoption

      there is overlap between the 4T's, I imagine that distinction comes when looking at likelihood/impact and type of control used

    6. when the risk has been treated, thenew current level or target level may become tolerable

      so does this mean that implementing controls is a form of risk treatment?

    7. tolerate a risk and the concept of risk tolerance

      To tolerate a risk means to accept and retain it, even if it is more risky than the organization would like (We may lose 40k in product but it would cost more to replace it so we're just not going to)

      The concept of risk tolerance is the range of risk that is acceptable (We've prepared ourselves so that we're comfortable with up to 20k in losses)

    8. Control effort seeks to move the risk to the low-likelihood /low-impact quadrant of the risk matrix

      the point of controls are to ultimately move risk to a tolerable level

    9. The 4Ts of hazard risk management

      Tolerate: No further action is taken. The exposure is either tolerable or the cost of taking action is disproportionate to any benefit gained. | low likelihood / low impact

      Treat: Action is taken to reduce the risk back down to a tolerable level. | high likelihood / low impact

      Transfer: A third party to takes on the risk. Cyber insurance is the most common example of this. | low likelihood / high impact

      Terminate: The only way to achieve an acceptable level of risk is to completely stop the activity. | high likelihood / high impact

    10. dominant response in relation to each of the4Ts, according to the position of the risk on a risk matrix

      the "T" that you use is dependent on the location of said risk when graphed on a risk matrix

    Annotators

    1. Finally, extreme risk exceeding the ‘confidence level’ is managed under the approach of ‘self-insurance’

      like how boise state parking will account for x many spots being taken up by trespassers when deciding how many permits to give out

    1. The three disciplines – IT security, risk management and business continuity – are now beginning to converge in the way that they analyze, identify and evaluate threats and risk when it comes to the common goal of continuity and resilience in business operations.

      3 separate things beginning to melt together into the larger cyber security pot

    1. mitigation of risk.

      mitigation actions are traced using the plan of action milestones The controls are then reassessed to determine remediating efficacy. Assessment reports and security and privacy plans are updated accordingly

    2. acceptance of risk

      The authorizing official determines what amount of risk can be accepted based on how well the organization can deal with risk (I think?) Prioritization (I call this triaging) of risk is crucial to this form of risk response. From prioritizing risk, you can then determine an acceptable amount of residual risk

    1. risk response strategies

      specific guidelines for responding to risk in the context of the risk type and organizational goals navigating risk response in a ways threat does inadvertently harm the organization

    2. explicit and transparent the risk perceptions that organizations routinely use in makingboth investment and operational decisions

      RM strategies give a guide for how organizations address risk

    1. Principles and approach

      Key Principles: 1. Risk appetite can be complex so it is best to address said complexity 2. Risk appetite must be measurable in a way that directors and stakeholders can understand. 3. Risk appetite is dynamic, changing in range and breadth based on organizational goals 4. Risk appetite should be developed within the context of the capabilities of the organization. These capabilities are influenced by the culture and resources of the organization. 5. Risk appetite should be addressed throughout every aspect of the organization 6. Risk appetite is influenced by the organization's propensity to take risk and exercise control

    1. If a risk materializes that is closely related to multiple risks, it is likely that a cluster of risks willmaterialize at or near the same time.

      risks that are closely related may snowball into each other priority is then based on the likelihood of said risks actually materializing

    2. risk prioritization that is based on current and future organizational needs

      previous questions define base for risk prioritization weighing current and future impact to the organizations

    3. When too many risks are clustered at or about the samevalue, organizations need a method to refine the presentation of risk assessment results,prioritizing within sets of risks with similar values, to better inform the risk response componentof the risk management process

      A method is needed to take risks and respond to them in a way that can be easily repeated and understood

    1. RISK RESPONSE

      Respond to findings from the monitor phase in accordance to the organization's risk tolerance. This control stresses the importance of defining appropriate responses to risks before generating a plan of action.