Verified Document

Employee Theft Analogy The Reasons Thesis

Teenage pregnancy analogy

The causes of teenage pregnancy are much like the reasons that teenagers drive recklessly -- teenagers have trouble seeing beyond the needs of the moment, and their immediate satisfaction. Teens feel as if they are adults, because of the tremendous hormonal and emotional shift that occurs with adolescence. They are angry when adult rules and laws attempt to hem them in. They chafe at even the most reasonable safety requirements, in an attempt to show their independence. But the more they attempt to act like an adult, either by breaking speeding laws, or having sexual relations before they are mature enough to take appropriate precautions, the more they show their essential immaturity.

Additionally, teens who are depressed, in search of an identity, or who are self-destructive as a way of coping with life's challenges may use either parenthood or...

But rather than catapulting them into their future, it instead limits their life choices, or ends their life entirely.
Instead of demonizing sexuality, it is important to help teenagers understand the consequences of their behaviors, even if teens face developmental, cognitive obstacles that adults do not face in understanding the ramifications of negative behaviors because their brains are not fully mature. Having teen parents talk to students, having students care for real or false 'babies' (such as the 'treating a flour bag like a child' assignment conducted at some schools), and having an honest dialogue about teen struggles with their sexual identity, are all better deterrents than abstinence-only curriculums.

Cite this Document:
Copy Bibliography Citation

Related Documents

Malware Since the Earliest Days
Words: 1957 Length: 6 Document Type: Term Paper

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious

Accounting and Intrusion Detection in a Report
Words: 6872 Length: 25 Document Type: Term Paper

Accounting and Intrusion Detection In a report issued by Paladin Technologies, Inc., entitled: "Security Metrics: Providing Cost Justification for Security Projects," 273 organizations were surveyed on the topic of security. The report illustrates in quantifiable terms the depth and reach of intrusion detection on the financial viability of the organization. The combined reported losses from the firms surveyed totaled $265.6 million in 1999. The highest loss categories were reported as follows: Type

Performance Appraisals for Business Effective
Words: 8831 Length: 31 Document Type: Thesis

However, as Murphy (2008) notes, these original scores, and the weightings, are given by biased humans who may have another agenda than simply giving the most accurate appraisal possible. In addition, there is also the question about whether a truly accurate (when negative) appraisal is the best course of action due to the possible negative consequences. Management by Objectives (MBO) Sudarsan (2009) surmises that, in the past, researchers have concluded that

Market Orientation and Worldview from Cultural Perspective
Words: 43735 Length: 146 Document Type: Dissertation

Dissertation ManuscriptBySedric K. MorganGeopolitical Awareness and Understanding of the Current Monetary Policies: A Quantitative Study© Northcentral University, 2019 Comment by Author: Sedric – NOTE: take a look at the Turnitin Analysis report. Consider the areas that are closely related to student paper(s) from University of Maryland. I highly suspect this is a matter of improper paraphrasing (by you as well as these other student(s)). The areas are sourced and the

E-Manufacturing - A New Link
Words: 22785 Length: 60 Document Type: Term Paper

Ayers (2000, p. 4) describes a supply chain as "Life cycle processes supporting physical, information, financial, and knowledge flows for moving products and services from suppliers to end-users." A supply chain can be short, as in the case of a cottage industry, or quite long and complex as in the manufacture, distribution, and sales of automobiles. In fact, the automobile supply chain has its origin in the mining of the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now