StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Well-Rounded Story Based on the Series of Car Audio System Theft - Example

Cite this document
Summary
The paper “Well-Rounded Story Based on the Series of Car Audio System Theft” is a  great example of a report on the law. Only music players were stolen or something else too? Around what time do you think, the robbery must have taken place? Is there a pattern? Provide the names of the people whose cars were broken into?…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful

Extract of sample "Well-Rounded Story Based on the Series of Car Audio System Theft"

Stage one Primary sources Secondary sources 1. Victoria Police station 2. Residents association, Sector 7 3. Victoria Ward commissioner office 4. M Row Housing society 5. N Row housing society 6. P row housing society The above sources need to be contacted for the news story because they are both directly and indirectly involved with the incident. Being the reporter I would personally seek appointment with each of these sources and seek their interviews to form the report. For this, I will prepare the following address list:- 1. Victoria Police station: web: www.victoriapolice.net 2. Wellingham Residents association, Sector 7, Victoria 3. Ward commissioner office: web: www.victoriawardoffice.gov.in 4. M Row Housing society, Wellingham, Sector 7, Victoria 5. N Row housing society, Wellingham, Sector 7, Victoria 6. P row housing society, Wellingham, Sector 7, Victoria Stage two Set of questions to be asked to the primary sources Questionnaire for PSI Tim Smith Q.1.Was there a series of robbery in the cars parked in the lanes of Sector 7, Victoria? Q.2. Who reported it to? Q.3. How many cars were broken into? Q.4. Please name the cars? Q5. Only music players were stolen or something else too? Q6.Around what time do you think, the robbery must have taken place? Q7. Is their a pattern? Q8. Provide the names of the people whose cars were broken into? Q9. What is the police doing? Q10. How much time does it usually take to lodge an F.I.R.? Q 11Residents of sector 7, complain that the police is not helping much. Why so? Q 12 Why is that people don’t trust police? Q13. Have there been similar incidents of theft in the past? Q14. Do you have doubt on any gang which might be involved in the robbery? Q15. Some say the police take bribe for even giving a NC. Is this true? Q16. Have you recovered any of the stolen Audio players yet? Q17. Is the security system of sector 7 fine? Q18. What could be the loopholes? Q19. Have you interrogated the watchman? Q20. How long do you think, you will take to catch the robbers? Questionnaire for Mrs. Abdul Rafique Belif Q 1.Was there a series of robbery in the cars parked in the lanes of Sector 7, Victoria? Q.2. Was your car broken into too? Q.3. Which car do have? Q.4Which company’s music player you had? Q.5.Only the player was stolen or something else too? Q.6.How and when did you come to know about the robbery? Q.7.How much loss do you think you have suffered? Q.8.Is it the first time you car has been broken into? Q.9.How many cars were broken into? Q10.Around what time do you think, the robbery must have taken place? Q11. Is their a pattern? Q12. Provide the names of the people whose cars were broken into? Q13. What is the police doing? Q14. How much time does it usually take to lodge an F.I.R.? Q 15 Why is that people don’t trust police? Q16. Do you have doubt on any gang which might be involved in the robbery? Q17. Some say the police take bribe for even giving a NC. Is this true? Q18.Why are you not lodging a complaint this time? Q. 19 Have you recovered any of the stolen Audio players yet? Q20. Is the security system of sector 7 fine? Questionnaire for Mr. Paul Watson Q 1.Was there a series of robbery in the cars parked in the lanes of Sector 7, Victoria? Q.2. Was your car broken into too? Q.3. Which car do have? Q.4Which Company’s music player you had? Q.5.Only the player was stolen or something else too? Q.6.How and when did you come to know about the robbery? Q.7.How much loss do you think you have suffered? Q.8.Is it the first time you car has been broken into? Q.9.How many cars were broken into? Q10.Around what time do you think, the robbery must have taken place? Q11. Is their a pattern? Q12. Provide the names of the people whose cars were broken into? Q13. What is the police doing? Q14. Have you lodged a complained? Q 15. How much time does it usually take to lodge an F.I.R.? Q 16 Why is that people don’t trust police? Q17. Do you have doubt on any gang which might be involved in the robbery? Q18. Some say the police take bribe for even giving a NC. Is this true? Q. 19 Is the Ward Commissioner helping to solve the matter? Q20. Is the security system of sector 7 fine? Questionnaire for Mr. Euan Rodriguez Q 1.Was there a series of robbery in the cars parked in the lanes of Sector 7, Victoria? Q.2. Was your car broken into too? Q.3. Which car do have? Q.4Which company’s music player you had? Q.5.Only the player was stolen or something else too? Q.6.How and when did you come to know about the robbery? Q.7.How much loss do you think you have suffered? Q.8.Is it the first time you car has been broken into? Q.9.How many cars were broken into? Q10.Around what time do you think, the robbery must have taken place? Q11. Is their a pattern? Q12. Provide the names of the people whose cars were broken into? Q13. What is the police doing? Q14. How much time does it usually take to lodge an F.I.R.? Q 15 Why is that people don’t trust police? Q16. Do you have doubt on any gang which might be involved in the robbery? Q17. Some say the police takes bribe for even giving a NC. Is this true? Q18.Why are you not lodging a complaint this time? Q. 19 Have you recovered any of the stolen Audio players yet? Q20. Is the security system of sector 7 fine? Stage Three The report is obviously based on the series of car audio system theft that occurred at sector 7, Victoria, in the night on June 10, 2010, Thursday. However, the peg is also about why residents have lost their faith in the police. Among the four primary victims, only one decided to lodge complaint against the theft. It was observed that in sector seven, Victoria, the cars are parked on the road itself as the row-houses in this area do not have parking space. It is also not for the first time that the car audio systems have been stolen. The residents complain that it has become a frequent problem. The police, on one hand assures action, the residents on the other hand, believes the police is useless. The police make them run around and even take bribes for paper work. Incidentally, during the research, it was found that all the cars, which were broken into did not have central lock systems. One, person, Paul Watson, confirmed that the ward Commissioner came to his help and urged the police to take stern action. In order to create a well-rounded story based on the above information, the formula of five Ws and one H, would be followed. The news value of the story is of course, reporting the theft of the car audio systems at Sector Seven, Vitoria. However, the second most important news value that is linked with the story is the residents’ disregard for the local police. The police however, refute this allegation and claims that the security of a residential area is also the social responsibility of the housing societies along with police. The idea is to give a complete picture and get viewpoints from all the corners so that a well balanced news report is written. A good headline should tell what the story is about in just one look. Since this is a report, I have given the headline: “A series of auto music system thefts in Victoria”. This head line gives a clear cut picture of what happened and where it happened. The headline is followed by a sub-head, which says: “Residents lose faith in the police, tiered of paying bribes for getting the paper work done.” This gives the idea of the second lead and also generates interest and curiosity, which implies that people would read the story further. While writing the story the model of the inverted pyramid would be followed. That is, the most important information would be given first and the least important information in the end. A close-up photo of the broken inner- portion of the car, whose audio player was stolen, would be suited to use with the story. The story should be printed in the local community paper as an Anchor story on the first page as it not only about a major theft but also about people’s distrust in police. It is a community story that generates interest in readers. Head: A series of auto music system thefts in c Victoria Sub head: Residents lose faith in the police, tiered of paying bribes for getting the paper work done Thursday/ June 11, 2010 In an incident which seemed like a planned robbery, 10 music systems and a couple of AC Ducts were stolen from ten different cars last night from sector 7, Victoria. Residents of the M, N and P row of the posh row houses in this area woke up today to the rude shock of the series of auto music system theft. The pattern of the theft was similar in all the case. The robbers broke the rear window glass of the cars and took out the players. Incidentally, all the cars which included a Logan, a Swift, a BMW, a Santro, an Alto and a few more, didn’t have central lock systems. PSI Tim Smith came on the spot on the complaint of Paul Watson, owner of the broken BMW to take an overview. However, he was more interested in blaming the watchman and having tea in the locality. When asked how he would carry the case forward, he said, “These incidents keep happening. Society members should be more careful and employ separate watchman for every lane. The police will do its duty as per the norms but there’s only up to a level that police can help.” It’s not for the first time that such a theft has taken place in this area. Residents complain these thefts have become a routine feature. Apart from the music players, Auto logos and also the vehicles themselves have been stolen from the area in the past. The police have still not found any clue to these thefts. Mrs. Abdul Rafique Belif, from whose Logan the player was stolen, said in an angry tone, “The police are good for nothing. Some time ago, my brand new Scorpio was stolen from this same locality. When I went to lodge an FIR, I was not only made to run from Pillar to post but also pay bribes several times just to get an NC for insurance claim.” Paul Watson claimed that he was the only person who went to lodge an official complaint for the last night theft since others didn’t want to get into police’s legalities, which they believed to be good for nothing. “I was a fool to think contrary. I had to pay $ 1000 bribe to the duty officer just to get the NC on time,” he lamented. Ward Commisioner Linda Gavin assured the residents that the police will co-operate and try and nab the thieves as soon as possible. She even accompanied Paul to Vashi police station. Despite that the person had to pay bribe for an NC. It’s not surprising what another resident, Euan Roderigues said, “These thefts have become so common now that I have got a package with the garage owner for repair and damage control. I know I have no option but get the repair done every time as I know the police is never going to do anything.” Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Well-Rounded Story Based on the Series of Car Audio System Theft Report, n.d.)
Well-Rounded Story Based on the Series of Car Audio System Theft Report. https://studentshare.org/law/2033621-news-writing
(Well-Rounded Story Based on the Series of Car Audio System Theft Report)
Well-Rounded Story Based on the Series of Car Audio System Theft Report. https://studentshare.org/law/2033621-news-writing.
“Well-Rounded Story Based on the Series of Car Audio System Theft Report”. https://studentshare.org/law/2033621-news-writing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Well-Rounded Story Based on the Series of Car Audio System Theft

The History of Computer Forensics

Evidence might be sought in a wide range of Computer crime or misuse, including but not to theft of trade secrets, thefts of or destruction of Intellectual property and fraud.... The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system.... n the beginning,the classic hacker breaking into computer system was more interested in how things work than actually being malicious....
24 Pages (6000 words) Essay

Materials Handling Systems

A material handling system is when more than one item is being used in a system format.... n the evaluation of a material handling system, multiple factors should be considered, including the plant's facilities, the machinery.... Simulation techniques can be effectively used in all the phases of this process to understand the behavior of manufacturing systems, from the material handling concept definition throughout the system's final implementation (1)....
49 Pages (12250 words) Coursework

Cadillac CTS-V Series 2009

liter LSA, based on the LS9A V8 from the recent Corvette ZR-1 was developed.... The car, at once got the attention of customers of Mercedes Benz, BMW and AUDI as the CTS was supposed to give head to head competition to the 3 series of BMW, C class of Mercedes and A4 of Audi.... he Cadillac CTS has proven to be a life saver for Cadillac when its sales were going down due to competition mainly by the German car manufacturers mainly Mercedes, BMW and Audi....
8 Pages (2000 words) Case Study

The Development of Electronic Music in the age of Post Modernism

his is particularly true in terms of the graphic signal-processing software which when it came out allowed for real-time MIDI control allowing the post modern composer to use this system even with limited technical knowledge.... he nineties further paved the way for more interactive computer-assisted performance and the release of the multimedia CD-ROM meant that the MIDI sequencing programmes were all set to expand to include digital audio.... This essay question explores the development of Electronic Music over the past many decades and how the post modern era has moulded it to its styles and tastes based upon aesthetic and political motivation, as well as focus upon particular composers....
12 Pages (3000 words) Essay

Qualitative Data Analysis by Miles and Huberman

From the paper "Qualitative Data Analysis by Miles and Huberman", Miles and Huberman identify a variety of modern tools and techniques for conducting qualitative analysis in order to explore.... They warn, "Summarizing superficially across some themes, or main variables by itself tells us little"....
19 Pages (4750 words) Essay

Cloud Computing in Australian E-Healthcare System

The author of the paper "Cloud Computing in Australian E-Healthcare system" argues in a well-organized manner that organizations have adopted cloud computing as a key service provision platform.... Most healthcare systems still use a paper-based system for medical records....
18 Pages (4500 words) Case Study

A Proposed CCTV System for a New Gold Storage Facility in Western Australia

System considerations The digital cameras in the plan were considered based on their surveillance capacity.... he main target issues were a risk of theft, inadequate CCTV systems, and unlawful intrusion into the facility.... Specific objectives The system has the objective of recovering from the expenses that were caused by theft and other malicious activities within a short period of time.... This case study "A Proposed CCTV system for a New Gold Storage Facility in Western Australia" discusses CCTV as surveillance in which video cameras are connected to a loop or a closed circuit (Cieszynski, 2007)....
8 Pages (2000 words) Case Study

An Information Security Risk in Topshop Company

he summary report summarizes the significant security susceptibilities that pertain the credit card information theft which is an information security risk associated with Top shop retail.... The vulnerabilities and threats indicated in this report that is related to the subsequent main areas:Probable theft of information through manipulation of card evaluation at the sales point usually to the Point of Sales.... easible breaches inside the Top shop retail business's networkProbable information theft from the company servers and networks....
6 Pages (1500 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us