Thursday, January 30, 2020

Aircraft Solutions Essay Example for Free

Aircraft Solutions Essay SecurityAircraft Solutions Security and Policy Assessment Table of Contents Executive Summary1 Company Overview1 Security Vulnerabilities1 Decentralized Anti Virus1 Access Control List Policy3 Recommended Solutions6 Bitdefender6 AlgoSec Security Management Suite7 Impact on Business Processes7 Budget8 Summary8 References9 Executive Summary As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours. Company Overview Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered. Security Vulnerabilities Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable alternative to network based IDS, the same cannot be said for anti-virus software in this scenario. Given that the company operates two individual physical locations that run the gamut from design to production, it can be assumed that their employee pool is not small despite actual numbers not being mentioned. With these numbers, it is quite unlikely that all employees are maintaining their due diligence in ensuring that they are properly updating their anti-virus applications and operating them in such a manner that they are being used efficiently. The primary weakness of this policy is that the end user is responsible for its upkeep. It is reasonable to assume that someone working in a loading dock may not have the same level of computer aptitude as an engineer and would be more likely to cause a break in security by allowing a virus into their computer and threaten the network (Department of Homeland Security, 2012). As security is only as strong as the weakest link, this opens the proverbial floodgates of illicit access to the company network. This is problematic in that official statistics gathered in 2012 estimated that the United States ranks third in the world with 50. 1% of all unique users detecting threats from a virus (Kaspersky Security Bulletin, 2012). The most common virus credited with 75. 01% of all online attacks with 712,999,644 instances are malicious URLs (Kaspersky Security Bulletin, 2012) that can infect a computer without the user even realizing what has occurred. Not even anti-virus software will keep a user completely safe as it is reported that 32% of all users have been infected with a virus despite such protection measures (Zorz, 2010). Once infected, viruses can either cause extreme lag with the network, slowly gather information to be used against the company or sold to anyone willing to purchase it, or even cause damage to physical components used in the business (Weinberger, 2012). There are many other nefarious effects of an infected computer within a network that can cripple productivity and cut into the revenue generating capacity of the company. When you take into consideration that a slower network will cause a decrease in company production and will not reduce the cost of daily operations in terms of equipment, utilities or workforce then you must look at the financial ramifications of such an event. The creation and dissemination of viruses has become big business that will grow exponentially as it has moved from the stereotypical basements of hackers into the realm of organized crime and legitimized aspects of armed services for many nations the world around (Fisher, 2012). It is reported that worldwide, viruses have stolen approximately $1. 6 trillion (CMP Media Inc. , 2013) from the global economy. Access Control List Rule policy Security policy at Aircraft Solutions dictates that all firewall and router access control rules pertaining to packet flow be evaluated on a bi yearly basis. Network infrastructure documentation for the company lists one firewall and two routers that are currently in operation that fall within these parameters. Within the San Diego headquarters, all of these devices act as a bulwark against any unwanted intrusion from the Internet at large. Documentation also details there are contractors and suppliers along with customers to contend with regarding external access to the network through these devices. Looking at the internal physical topology it is seen that there is a single router providing packet control for all traffic between the Defense Division in Santa Anna and the rest of the company consisting of Human Resources, Accounting, Direct Computer Numerical Control, Sales and Marketing, IT, and information from the database. Conversely, this same router would also have to act the single point of control between all internal departments at San Diego as it is the only piece of equipment that possesses layer three functionality before passing the firewall. Given these relationships this demonstrates these three devices, particularly the router connecting Santa Anna and San Diego, require extremely detailed and expansive routing rules to effectively run the business. Departmental access list rules could for the most part remain static and not require a great deal of attention once implemented as IP schemas would be established ahead of time for each department. Issues begin to arise when you take into account that over the course of two years, multiple projects will most likely be spun up, numerous unique circumstances, and growth of the network will create a myriad of antiquated access control rules that will represent gaping holes in security that can allow unauthorized access to sensitive company materials and intellectual property. This would also lead to a lack of documentation of access control rules so that there would be no manner in which to simply reference which rules were in place and for what reason. Each annual security review will then sideline the IT department as it analyzes the access control list rules and begins to path them out to their respective devices. At this point, ownership of the device would have to be established, the purpose of that device, and then verifying if access was still warranted. Disagreements at this juncture would result in managerial oversight as department heads would then have to present their cases for and against access. Obviously, this would draw management, especially that of IT, into contracted deliberation that would distract from day to day business. A lack of an overall firewall policy, a bi yearly evaluation of access control list rules, and the previously mentioned issue of non centralized anti-virus software creates a very dangerous environment for data security. A port that is opened for user access is a window into the companys network that can ultimately be exploited. The more ports that are left open, the greater the opportunity for intrusion. This same lack of a detailed firewall policy also entails that these multiple holes in security can vary in scope since there is not a set control in place to reign in the extent of the security exception being asked (Hogg, 2011). These open ports make the company susceptible to port scanning as outside entities search for network soft spots that can be exploited to gain entry. These scans occur with such constant frequency that they are referred to as Internet background radiation (Notenboom, 2008). Given these factors it is a foregone conclusion that there will inevitably be a breach of the network as a result. Such an event would result in loss of intellectual property, decrease of production, and repeated incidents would create a devastating loss of trust in the eyes of customers. An ancillary security risk is derived from the time and energy spent by IT during each manual review of all access control listings in the firewall and routers. It is feasible that each rule will take an average of an hour to complete if all goes smoothly with tracing the routed path from beginning to end, complying with internal ticket work, verifying the device, and accepting a reason for the route to be in existence. More time would be expended by both engineering staff and then management if there was a dispute as to if a rule should be left in place or not. In terms of just the basic work to go through all the established rules that will accumulate over the course of 2 years, a conservative estimate of 25 requests for new rules per week (based on personal experience within a mid-sized company) would yield a total of 2600 new lines to be analyzed. Assuming approximately a third of these rules could be associated together as projects are increased or decreased, that leaves roughly 866 lines that translates into as many employee hours that will be occupied for this task over the course of 108 days. A team of five in the IT department would require just over 21 full working days to effectively handle this task at a cost of $2,898. 75 to have entry level Network Engineers (Salary. com, 2013) dedicated to the task . If a quarter of these rules are disputed, then the company will pay out another $9,964. 70 (Salary. com, 2013) of lost productivity as the IT manager has to contend with other managers to mediate the need for the rules. It is likely that this endeavor would constitute a major departmental project at the end of the 2 years instead of being worked on throughout the duration. During this time, other work will be assigned to secondary status and put projects and perhaps updates that could be critical in risk of being done on time as all energy and focus resides on the access evaluation. Recommended Solutions Bitdefender To effectively control antivirus from a central source that will push updates to all network devices, demand all equipment connecting has antivirus and allow for mobile devices to be used without issue, Bitdefender small business pack would be the ideal choice. Given that this application suite will provide service to all Windows OSs from XP to Windows 8 along with Macintosh and Linux support [ (Squidoo. com, 2012) ], it is perfect for allowing outside vendors who may not conform strictly to the Windows platform adopted by Aircraft Solutions. Support for the product is offered by email, and phone coupled with configuration assistance free of charge. As it was not definitely declared how many employees are with Aircraft Solutions, there is a pricing scale of $449. 95 per year for 20 computers and 20 mobile devices [ (Bitdefender, 2012) ]. AlgoSec Security Management Suite In terms of Access Control List management on the firewalls, industry reviews would recommend a single piece of software, Algosec Security Management Suite. With this application, all a user is required to do is simply enter in the IP of the device wanting entry to the network as well as the IP of the device is wishes to access. Algosec will then compute the path from source to destination, provide a listing of all firewalls in the path, and then list out what changes would need to be made to firewall configuration. With a click of a button, it would even implement these changes thereby freeing an inordinate amount of time on the part of IT staff and management [ (AlgoSec, 2012) ]. Cost of the application is approximately $10,000 [ (AlgoSec, 2013) ] which also include support of the product and updates. Impact on Business Processes Implementation pains felt as both Bitdefender and AlgoSec are introduced will be minimal at best. In each instance, less work will be required of employees as they are no longer responsible for their own antivirus and the process by which firewall flows are drafted and put into configuration will be dramatically increased. The point of contention that might make itself known will be at the onset of these applications being installed as they will require some new policy changes. At first, there will most likely be an uptick in questions asked of IT as employees want to know what is required of them with Bitdefender antivirus. It will also require new policy on the part of IT in terms of management of the application as well as procedures for pushing updates into the network. AlgoSec will be almost entirely without incident as it will create a process by which a request is put in for access and instead of being delayed as the path is verified, it can move directly into managerial oversight for approval. Budget Product| Features| Cost| Bitdefender| Centralized AV updatesScalable user supportInternal firewallIntuitive GUIApplication supportInstallation assistance| $449. 95 per year per set of 20 computers/20 mobile devices| AlgoSec| Firewall path operation automationFirewall configuration change automationNegates access control rule auditsProduct support and updates| $10,000 (approximate quote)| Summary Without changes made to IT policy, requests upon the IT department for access to the network and the bi yearly audit of existing rules will eventually grind all departmental progress to a complete stop for months at a time. Automation in this arena as well as a universal standard for antivirus are dire in maintaining a secure network with the necessary resources to make changes as needed. In the face of company growth, if automation is not embraced, then it will become necessary to increase the IT staff by at least 50% within the next 2 years to simply maintain the status quo. Assuming an employee pool of 100, an investment in Bitdefender and Algosec at this time will cost $12,249. 75, with reoccurring annual fees of $2,249. 75. Such an amount if a far cry from an extensive uptick in staff. The end result will be a far more efficient IT department that will be able to accomplish more sustentative work with existing staff at hand. References AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec. com: http://www. algosec. com/en/products/products_overview AlgoSec. (2013, January). How to Buy. Retrieved February 18, 2013, from algosec.

Wednesday, January 22, 2020

Phobic Disorders: Symptoms, Treatments and Research :: Phobic Disorders Research Paper

1. Introduction Although phobic disorder is certainly common, it has been more difficult to establish the extent to which it should be considered a "serious" mental disorder from a public health perspective. Recent studies in understanding the behavioral, molecular, and anatomical bases of fear extinction in animals and humans are leading to new knowledge about the nature of fear and new treatments for anxiety disorders that affect millions of Americans (news release from SFN). In those people who suffer from phobic disorders (specific phobia, social phobia and agoraphobia) excessive and inappropriate fear and anxiety comprise the core symptoms of the disorder. Collectively, these disorders are the most common forms of psychiatric illness, surpassing rates of mood disorders and substance abuse A study by Michael Davis, PhD, at Emory University (SFN News Release) that determined how human brain can used to treat such disorders. He found that a receptor for a particular protein called the N-methyl-D-aspartate (NMDA) receptor in a brain region called the amygdala is critical for the extinction of conditioned fear. Many medical professional believe and it also has been proved true in many cases that combination of drugs therapy and behavioral therapy has the most successful results. 2. Phobia - Definition The term ‘Phobia’ was not used on its own until 1801 and in late 19th century it slowly gained acceptance in the sense it has today. The word ‘Phobia’ comes from the ancient Greek word ‘Phobos’, meaning â€Å"flight†,â€Å"fear† and â€Å"terror. Phobia is a condition, which is described as an intense, obsessive, persistent and unrealistic fear of an external object or situation or feeling. In some cases avoiding such objects or situations that cause anxiety makes difficult to lead a normal and healthy life. There are hundreds of different types of phobias with technical name for each. 3. Symptoms The symptoms of phobias are the same as those that would occur when facing an actual threat, leading to a reaction. In addition, there are other symptoms that go beyond the more "normal" fear response. Typical symptoms include:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Anxiety reactions such as sweating, trembling, nausea, rapid heartbeat, worry, dread, or terror  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Intense fear of the object or situation, beyond an actual threat of danger  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Intense fear of being watched or judged (social phobia)  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Uncontrollable reactions that consume the mind and body  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Avoidance of the object or situation to an extreme that it may result in isolation  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Use of alcohol or substance in attempt to control feeling of anxiety

Monday, January 13, 2020

4 Reasons Chinese Companies Ipo in America Essay

Reasons Chinese Companies IPO in America Why do so many good Chinese companies go public in foreign markets rather than let domestic investors share in the profits of growth? Chinese investors often complain about why would â€Å"good companies†, like Tencent (0700. HK), Baidu (NASDAQ: BIDU) and Sina (NASDAQ: SINA), choose to list in the US and Hong Kong instead of on the Chinese A-shares market. There are four main reasons: 1. If a ‘Chinese’ company takes foreign investment using a VIE structure, it can only list abroad 2. Many companies don’t meet the strict financial standards for a Chinese listing 3. China’s listing process takes a long period of time and not very transparent, a torturous examination compared with America’s speedy registration 4. China’s regulatory agencies perpetually overregulate, rather than letting the market decide 1) If a ‘Chinese’ company takes foreign investment using a VIE structure, it can only list abroad The core reason is simple. These companies aren’t at all eligible to listed on the Chinese A-Shares Market, which restrict the overseas-funded enterprises severely. To receive foreign investment, a great number of Chinese companies set up a corporate structure called the  VIE or Sina structure, because some industries such as internet info & services and financial services are restricted or even prohibited in foreign-funded investment. This structure is especially common for technology companies that raise financing early and often, frequently from foreign investors. State-owned enterprises aside, most ‘Chinese’ companies in the US are not legally Chinese at all. They’re Cayman Islands, British Virgin Islands, etc. ompanies that control Chinese entities. Chinese regulators have raised the idea of allowing foreign companies to list on the A-Shares Market, but at present that’s still speculative. A worry for foreign investors is that the entire VIE structure, which largely serves to circumvent Chinese laws barring foreign ownership, has been  called into question  by Chinese regulators  in recent months. 2) M any companies don’t meet the strict financial standards for a Chinese listing In August 2005, when Baidu (NASDAQ: BIDU) listed in US, Chinese asked this very question. Let us review. Baidu didn’t reach profitability until 2003. When it went public, it had been profitable for just 2 years. The company’s profit was only $300,000 (2. 4 million RMB) in the quarter prior to its IPO. This is far from the minimum IPO criteria for the Chinese Small and Medium Cap A-Shares Market, where â€Å"net profit in the recent 3 fiscal years must be positive and the sum exceeds 30 million RMB; aggregate cash flow from operational activities in the recent 3 fiscal years exceeds 50 million RMB, or aggregate operating revenue in the recent 3 fiscal years exceeds 300 million RMB. Baidu didn’t even live up to the standards for listing on the Chinese Growth Enterprise Market: â€Å"Profitable for the previous 2 years, with aggregate net profits of not less than 10 million RMB and consistent growth† or â€Å"profitable in the previous year, with net profits of no less than 5 million RMB, revenues of no less than 50 million RMB, and a growth rate of revenues n o less than 30% over the last two years. † Nor may capital be less than 20 million in the year prior to the IPO. )  China’s listing process takes a long period of time and not very transparent, a  torturous  examination compared with America’s speedy registration Going public is like going through a round of torture. In the prolonged process of waiting for review, they have not only to be upset by countless uncertainties, but also incur high costs off the balance sheet. 4)  China’s regulatory agencies perpetually overregulate, rather than letting the market decide Chinese regulatory agencies are actually most concerned about investors. They fear that investors will buy low-quality stocks and they therefore spare no efforts to set up strict review processes for IPOs. They are also concerned about investors losing money in the secondary market and therefore set up â€Å"protection measures† like downward limits and upward limits and make adjustments to the â€Å"IPO rhythm† to stabilize the secondary market. But these ‘good intentions’ only end up leading everybody astray from the original  market intention. The quality of companies listed on the A-Shares Market is far from satisfactory, while most of the companies with the best growth potential and highest returns to investors list abroad. Moreover, the A-Shares Market remains one of the capital markets with the largest fluctuations in the world! The conclusion should be fairly simple: regulatory agencies should not and cannot be held responsible for a company’s quality through an IPO review. The operational risk of a company does not move in lock step with static indicators like financial data. Regulatory agencies should not and cannot be responsible for the luctuations in the secondary market. Fluctuations of the market can never be contained by up or downward limits, nor can the regulator effectively set the â€Å"IPO rhythm. † Chinese companies will continue to list abroad, despite sky-high A-Share Market valuations To be fair, under the elaborate care of regulatory agencies, A-Shares do have their own magic, that is, a super financing power. Especially in the fiery Growth Enterprise Market over the last year, PE ratios frequently shoot up to 100x. Every single listed company has been overjoyed to get more funds than planned. With such â€Å"stupid wealthy people† circumstances, will companies still want to list in foreign markets? I believe so. Again, there are many companies that will never meet the standards of the A-Shares Market. For growth companies that really desperately need funds, even the listing threshold of the Growth Companies that list abroad don’t have to worry that investors will criticize them for a broad definition of â€Å"misappropriation. † For them, going public is not just a one-time IPO sale, but also a sustainable financing platform. In Conclusion To sum up, the pre-IPO review and post-IPO trading have made A-Shares Market a different ecosystem from foreign markets. It is hard to say which is better. But companies themselves have preferences. Therefore, I don’t think fewer companies will list in foreign markets despite the high valuations of A-Shares. It’s hard to tell if â€Å"quality Chinese companies† will give A-Share investors a chance to invest. Article by Simon  Fong ( ),  Founder & President of Snowball Finance, iChinaStock’s parent company. The original Chinese article was published in the October edition of The Founder.

Sunday, January 5, 2020

Why Do Juveniles Join Gangs - 1138 Words

GANG VIOLENCE PREVENTION WHY DO JUVENILES JOIN GANGS? Juveniles often join gangs to be accepted into a society of their peers. These juveniles are looking for acceptance and a sense of belonging. They join these gangs for special status amongst their friends, protection from other gangs, financial help, peer pressure, excitement and for some juveniles, they are born into a gang society and it is a family tradition. Gangs can also act like a family. They will praise, chastise and show them a form of love and respect that they are looking for but cannot get at home. https://www.ojjdp.gov/jjbulletin/9808/why.html WHAT ARE SOME SOCIAL CHARACTERISTICS (PSYCHOLOGICAL PROFILE) COMMONLY ASSOCIATED WITH AN INDIVIDUAL INVOLVED IN A GANG?†¦show more content†¦Their sense of right and wrong goes against what society believes is right and wrong, this is what strengthens the gang members to seek refuge within that gang society. WHAT CAN PARENTS DO TO HELP THEIR CHILDREN STAY CLEAR OF GANGS? As a parent, the best thing you can do to help keep your children from joining a gang or a so-called Social Group is to talk to them on a daily bases about the negative impact gangs have on the community and on people lives. Talk to them about the consequences of joining or just hanging out with people in or associated with a gang. Have family dinner time. For dinner, everyone sit at a table together, no cell phones and no TV; just conversation. Use this time to find out what is all going on in your children lives, the name of their friends and their likes and dislikes. Get the passwords to all your children’s Facebook, twitter, email and other social accounts. Make sure the family computer is in a common area and the screen can be seen by all. If your children have cell phones, switch over to a prepaid plan that you can control so they can not send pictures or text messages. Have family time. Take the family out to the zoo, trips to the country, visit museums, and other places in which the family would like to visit. Spending times like this helps to strengthen family bonds and help keep children from looking toward gangs for excitement, fun andShow MoreRelatedEssay On Juvenile Gangs973 Words   |  4 Pages The History Of Juvenile Gangs Jerry L. Page East Carolina University Introduction The History Of Juvenile Gangs Gang Types Over the course of history, there have been many gangs that have come to light. There are three different types of gangs that have been around for many years. These gangs are politicized gangs, neo-Nazism gangs, and street gangs. Politicized gangs promote political change by making other citizens scared of them. Street gangs are commonly known to cause violenceRead MoreJuvenile Crime And Juvenile Crimes1437 Words   |  6 PagesStates faces today is juvenile crime. Today the juvenile involvement in crime occurs for many different reasons in many different places. Ages still in the single digits all the way through 17 are committing illegal juvenile acts each and every day. Some of these crimes are done on purpose and with an intent and some of the crimes are done on total accident. Juveniles all over America in all different places are committing crime today and as you read this there are juveniles somewhere out committingRead MoreContributing Factors to Juvenile Delinquency162 0 Words   |  7 PagesJuvenile delinquency, according to Agnew and Brezina, is the violation of the law by a minor which is any persons under the age of 18 in most states. There are many contributing factors to juvenile delinquency such as domestic issues or stress at school, and there are also four different theories, strain, social learning, control, and labeling, to explain the different prospective of why it is thought that juveniles commence in delinquent behavior. This particular discussion however, is going toRead MoreJuvenile criminal gangs have long been a significant issue with the criminal justice establishment.1100 Words   |  5 PagesJuvenile criminal gangs have long been a significant issue with the criminal justice establishment. Youths coming together to commit criminal acts normally attributed to adult and more vicious criminal organizations are now being routinely committed by juveniles. The reasons for these youths in committing the activities have somewhat baffled author tries as well as scholars and researchers. It must be noted however, that juvenile delinquency is not new; laws in the past have sought to control theRead MoreJuvenile Gangs Essay980 Words   |  4 PagesRodriguez CJ150 Kaplan College Mr. Templeton August 30.2012 Juvenile gangs have become a serious and growing problem in many areas throughout the U.S. It is unlikely that gang control strategies can be successful as long as legitimate economic alternatives are lacking. I will be exploring the possible proactive solutions to this social problem. Juvenile gangs on the street and in prison â€Å"Violent crimes committed by juveniles are not diminishing, as other crimes, as reported by the JusticeRead MoreChapter 7 : Youth Gangs991 Words   |  4 PagesChapter 7 Youth Gangs Gangs In General The word â€Å"gang† can be defined in many ways however; there is no â€Å"agreed-upon definition† that â€Å"has been developed to apply to gangs† (pg. 201). When I think of the word â€Å"gang† I think of a group of individuals who interact, communicate, simply â€Å"hang out† and/or participate in many activities together. There is not just one type of gang. â€Å"Gangs can be large or small, long term or short term, more or less territorial, more or less criminally involved† (pg. 201)Read MoreThe Crime Of A Juvenile Gang Essay1737 Words   |  7 PagesA juvenile gang is a group of youth that causes intimidation and commit criminal acts to gain power to be in control. According to a study done by David Pyrooz, a professor at Sam Houston State University in Huntsville Texas, more than one million juveniles in the United States of America is in a gang. The study found 40% of juvenile gangs are non-Hispanic white and the rest is Black and Latino. The study also found, 30% of those gang members were females. Most youth who joins gangs do so aroundRead More Gang Violence in the United States Essay1192 Words   |  5 PagesGang Violence in the United States Gang violence in America is reaching alarming proportions. Chicago police Commander Donald Hilbring states, Gangs are everywhere. All throughout the city of Chicago, the suburbs, throughout the state, throughout the nation. Chicago police state that so far this year, more than 100 gang-related murders have occurred. Everyday an other report on the evening news relays the tragedy of a child accidently caught in gang crossfire. The image of blackRead MoreSummary : Youth Gang And Violence1615 Words   |  7 PagesIskuhi Kalantaryan Juvenile Delinquency Sunday, March 27, 2016 Analytic Essay Youth Gang and Violence Delinquent Behavior â€Å"Gang† â€Å"Youth Gang† and â€Å"Street Gang† are just labels used to describe young people consisting of three or more individuals organized to achieve a typical objective and who share a common identity. There is no single and universally accepted definition of gang, gang member and gang activities in the United States, howeverRead MoreCauses and Solution of Juvenile Delinquency in America Essay1726 Words   |  7 Pagesunder the age of 18† (Khan).Juvenile delinquency can be caused by the influence gangs,bullying, and bad parenting. This topic caught my attention because there a lot of kids getting arrested each year for crimes committed and kids getting involved in gangs, also kids getting access to weapons,drugs, or getting bully by other people. However juvenile delinquency can be prevented by offering bullying prevention, violence prevention curriculums and mentoring programs. â€Å"If gangs are dealing drugs or selling