Saturday, December 28, 2019

Adventure Essay The Trip - 1353 Words

Preface â€Å"Shahkam, hurry! We mustn’t be seen! † My mother said in an undertone. â€Å"Wait, mama! I need my necklace!† I replied. â€Å"You needn’t a necklace, Shahkam. You are a boy!† â€Å"But mama, it is a gift! From the King! And I’m sure people in Canada wear them!† I pleaded. â€Å"No! We must leave! We can’t afford to miss the ship. It’s our only chance to get out of Iran!† She sounded irritated. â€Å"And sit in a refugee camp for a year.† I said testily. Then my tone changed. â€Å"Can we at least say goodbye to Grandmamma?† I sobbed. â€Å"We can’t. But she left us a note.† She held out a battered envelope addressed â€Å"Farah and Shahkam†, and I began to sob harder. â€Å"Shh†¦Ã¢â‚¬  She said as she raised her finger to her lips, then put her hijab back over her†¦show more content†¦My heart was pounding hard against my chest. I didn’t want to fall. I pushed harder towards the middle before I was pushed forward. Thankfully, we were in the middle, although people either side of us were stumbling at the edge. We were pushed through, entering the side of the boat. I let out a sigh of relief and we were escorted down a hallway. The interior of the boat had a strong, bitter smell, causing a burning sensation inside my nose, continuing down the back of my throat deep into the pit of my lungs. A large man was guiding us down the hall, taking us to our dormitories. We walked, and walked, and walked, the boat was like a labyrinth. Eventually, we reached a large room, with a huge iron door. The man stopped at the door and beckoned us forward, through to the room. It was dark and dank inside, and there was no furniture, only old, soggy looking mattresses. The man roughly cleared his throat before speaking. â€Å"My name is Amjad. While you are on this boat, you will stay here. Meals and amenities will come to you.† *** I had no idea how many days I had been on the ship when it happened. It was just like any other time. All the other children around me sat, crying with hunger pains, their mothers telling them to hush. I was filthy, and my eyesight felt weak from being in the dark so long. I was lying on a mouldy mattress, thinking about whether or not breathing in the spores would affect me, when the ship rocked sharply overShow MoreRelatedRalph Waldo Emersons Nature Analysis708 Words   |  3 Pagesto value the idea of having the freedom of it and to realize there is more to life than what you are living. In the essay, â€Å"Nature†, by Ralph Waldo Emerson he finds himself challenged by the honesty of nature, which compares to Chris McCandless adventure in the book, Into the Wild, by Jon Krakauer. First, one must enjoy things as how they come. Emerson explains this feat in his essay by shadowing there is more than what meets the eye to nature. His purpose for thinking this is shown in this, â€Å"NatureRead MoreLiterary Analysis of Into the Wild1669 Words   |  7 PagesSince he was young, he enjoyed a life of adventure and action. According to the article This Is Your Brain on Adventure by Florence Williams, risk takers have three major emotional ingredients: desire for adventure, relative disregard for harm, [and] impulsivity. These assertions are persuasive because McCandless possess all these characteristics and he demonstrates them throughout the book. In Detrital Wash, Krakauer describes McCandlesss adventure throughout the United States and Mexico.Read MoreTravel, A Part Of Education1111 Words   |  5 PagesJaykumar Poddar Professor Shubhamitra Adhikari Academic Writing 28 August 2014 Travel â€Å"TRAVEL, in the younger sort, is a part of education, in the elder, a part of experience.† (Francis Bacon). People travel for different reasons; they travel for fun, adventure, learning, worshipping, etc. People from different age groups have different motive behind traveling. Children travel to have fun or learn something new. Whereas adults travel to experience different things. Either ways everyone gets to learn somethingRead MoreTravel, A Part Of Education1111 Words   |  5 PagesJaykumar Poddar Professor Shubhamitra Adhikari Academic Writing 28 August 2014 Travel â€Å"TRAVEL, in the younger sort, is a part of education, in the elder, a part of experience.† (Francis Bacon). People travel for different reasons; they travel for fun, adventure, learning, worshipping, etc. People from different age groups have different motive behind traveling. Children travel to have fun or learn something new. Whereas adults travel to experience different things. Either ways everyone gets to learn somethingRead MoreThe Damnation of a Canyon Essay1004 Words   |  5 Pagesused really good arguments and view points to support his case, I support his essay. He maintained giving us many examples of how the canyon used to look like. Abbey used his experiences like when he and his friend made a float trip in little rubber rafts down through the length of Glen Canyon, or when [he] worked as a seasonal park ranger. He was mainly targeting the general people that experienced nature life. The essay starts off with Abbey feeling that [he was] in position to evalu ate the transformationRead MoreAbsent And Ill Behaved Mothers1427 Words   |  6 Pagesbeen examining thus far and the young adult literature that I have experienced prior. More often than not, the mothers in our favorite childhood tales are given a negative reputation, whether that is dead, non-existent or demented and evil and this essay explores the multiple effects that may result in tales from negative impacted mothers. For instance, a tale may have the mother’s existence removed altogether to have the main character (typically a child) embark upon their own journey with no parentalRead MoreAnalysis Of Farther Away By Jonathan Franzen1470 Words   |  6 Pagessomething that was valuable to you often results in feeling grief –and everyone manages it in their own way. What’s important is that in the end, you understand yourself, your emotions and you let go. In Jonathan Franzen’s essay called ‘Farther Away’, the author is describing his trip to an isolated island where he goes to escape, tired and bored after his long book tour, with the help of which he was trying to ignore his feelings and inner problems. Jonathan goes to see some rare types of birds, whileRead MorePeter Hessler and China702 Words   |  3 Pagesfellow Peace Corp. volunteer were placed in Fuling, and poor town on the Yangtze River in rural China. River Town is more or less a journal of what it was like being in Fuling on a day to day basis. He illustrates his experience through stories of trips he took, people that he became close with, and situations that required an open mind. Peter’s job was teaching English literature at a small college in the town; and through this was able to learn both about the tightly controlled nature of being aRead More Analysis of A Description of New England by John Smith Essay646 Words   |  3 PagesThe purpose of this essay is to compare and contrast both authors and their books. John Smith wrote about the wonderful place the New World was, on the other hand, William Bradford wrote about the realities and difficulties of the New World. In â€Å" A Description of New England †, Smith starts by describing the pleasure and content that risking your life for getting your own piece of land brings to men. On the other hand, Bradford reminds us how harsh and difficult the trip to the New World wasRead MoreChina: A Reflective Essay1129 Words   |  5 PagesChina: A Reflective Essay Standing atop the highest peak of the Great Wall in Beijing, China after nearly two hours of climbing up the uneven, ancient stairs, I couldn’t help but to think about my life and all the decisions I have made thus far. Drenched in sweat and gasping for breath through the thick, heavy, polluted air, I stood quietly in amazement. I was not only speechless because I had actually braved the nearly 7-mile climb but also because of the picturesque landscape that surrounded

Friday, December 20, 2019

Essay on Moral Conflict in Antigone - 1349 Words

The major moral conflict in Antigone by Sophocles is the conflict over which value is most fundamental. The play presents the moral conflict over whether the gods law or the citys law is more powerful. This seems to be the most prominent theme. The conflict arises mainly between the tragic heroes Antigone and her uncle-in-law Creon, King of Thebes. The city of Thebes had been through a war in which Antigone and her sister Ismene have lost both of their brothers to it, Eteocles and Polyneices. Eteocless fighting for Thebes was buried and honored as a hero. (lines 24-26) Polyneices was left unburied and dishonored because he is considered an enemy of the city. (lines 27-32) Creon edicts that whoever broke the law by burying†¦show more content†¦(line 89) When a messenger comes to Creon, bringing the news that Antigone has buried her brother, he begins his arguments why Antigone has broken the law. He begins by stating that a man shows what he is made of by his skill in rule and law. In other words, the law is everything and as a ruler, he must do everything for his country. He considers Polyneices an enemy of the city and a threat to the security of the city as well. Thus Polyneices will be called a traitor in life and in death and dishonored. The scene when Antigone and Creon face each other is the opportunity for both to defend themselves. Creon questions Antigone. She bases her responses on that the city laws proclaiming her as illegal are not the laws of Zeus or laws proclaimed by gods, but rather, laws made by a man that one day will also die. She will honor her brothers death because this is what the gods have proclaimed for all mankind. (lines 460-463) In the dialogue between Creon and Antigone she also defends herself when he questions her as to why an enemy should be honored. She responds by saying she loved her brothers and her family, and they are not her enemies. Creon also asked Antigone why she was the only one defying him. She answers him by saying that there are many others who do not speak out because they fear him. (lines 508-509) Antigone offers one last argument in stating that she loves her family and will welcome death because sheShow MoreRelated A Comparison of Moral Conflict in Antigone and A Dolls House1479 Words   |  6 PagesConflict Between Individual Morals and State Laws in Antigone and A Dolls House  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚  Ã‚  Ã‚   Mother, should I trust the government?   Or should I trust myself?   This dilemma is a common one in a great deal of literature.   In Antigone and A Doll’s House, the main theme is the question of whether one should be true to oneself or true to one’s state or society.   Should Nora (in A Doll’s House) and Antigone (in Antigone) â€Å"follow the rules† and do what the state and society want them to do orRead MoreEssay on Antigone Conflicts856 Words   |  4 Pages Conflicts in Antigone nbsp;nbsp;nbsp;nbsp;nbsp;There were three basic conflicts that caused Antigone and Creon to clash as violently as they did. First, was the conflict of the individual versus the state, in which Antigone represented the individual and Creon the king, the state. The second conflict can be described as following ones conscience and ideals versus following the law strictly. In this conflict Antigone makes decisions based on her conscience and ideals while Creon is the strictRead MoreEssay on Antigone1426 Words   |  6 Pagesimprudent judgments will ultimately suffer from the consequences of their actions. In Sophocles Antigone, these prejudices notably surface in the form of paternalism as demonstrated through Creons government, highlighting the importance of gender roles throughout the play. Therefore, analyzing the motif of gender roles and its effect on the definition of justice through the perspectives of Ismene, Antigone, and Creon enables the audience to understand how Sophocles macroscopic analogy to humanitysRead MoreAntigone - Paper 131697 Words   |  7 Pagesepic play, Antigone, are both very strong personalities, which naturally leads to conflict. Antigone and King Creon both have very intense beliefs and roles in this play that oppose each other, and although there is a family tie, will lead to an imminent tragedy. Antigone is a young women who believes in the loyalty of her family and fears no one and nothing. She is willing to give up her bright future and her life and disobey the edict of her uncle and bury her deceased brother. Antigone displaysRead MoreTheme Of Conflict In Antigone973 Words   |  4 Pages851) 28 September 2017 Moral Conflict and Internal Change in Antigone Beliefs are not always based on facts that you would find in a textbook-they are something that one believes is true. When I first read Sophocles’ play Antigone, my initial impression of Creon was that his beliefs of the law and the state were rational because of his role as a ruler. But as the play progressed, I began to disagree with his behavior and his values because he only focused on his own moral beliefs rather than consideringRead MoreEssay on Analyzing Antigone and Creon1313 Words   |  6 PagesSophocles play titled Antigone, embellishes the opposing conflicts between Antigone who stands for the values of family, and Creon who stands for the values of state. Sophocles explores the depths of Antigone’s morality and the duty based on consequence throughout the play, as well as the practical consequences of Creon who is passionate and close-minded. Although Antigone’s moral decisions appear to be more logical and favorable than Creon’s, a person al argument would be that both characters’Read MoreThe Production Of Antigone By Peta Tait Essay1708 Words   |  7 PagesThe production of Antigone by Company B reviewed by Peta Tait is correct in multiple instances even though the production has an incorrect central conflict. Company B’s production is correct when Tait explains how it portrays why Creon did not bury Polyneices’ body and just left it out to the animals instead (71). The production is also correct when implying why Creon treats Antigone and Ismene badly as if they have the dignity of animals (73). By looking at Sophocles’ Antigone, it portrays CreonRead MoreAn Interpretive Analysis On Conflicting Self Reassurance1337 Words   |  6 Pages Antigone: An Interpretive Analysis on Conflicting Self-Reassurance Antigone is a complex, yet debatable play, written by Sophocles somewhere around 442 BC. Chronologically, it is the third of the three Theban plays, but was the first to be written. In addition, Antigone was also one of the most famous tragedies ever to be written. The setting of the play is set in front of the Palace, Thebes, and Ancient Greece. Though most Greek playwrights were from Athens, their plays areRead MoreAntigone : Human Law Vs. Divine Law1418 Words   |  6 PagesLauren Wolfson Professor Neil Scharnick THR 3270 History of Classical Theatre 30 November 2016 Antigone: Human Law vs. Divine Law The most prominent theme in â€Å"Antigone† by Sophocles is the conflict of divine law vs. human law; it is the driving force behind the entire play. It is an issue of which law is the right law, and if Creon s and Antigone s acts were justifiable. It is also a question of what motivates them both to act as they do and if they were predestined to their fates dueRead MoreAntigone : A Complex, Yet Debatable Play1343 Words   |  6 PagesAntigone is a complex, yet debatable play, written by Sophocles somewhere around 442 BC (Johnston). Chronologically, it is the third of the three Theban plays, but was the first and also one of the most famous tragedies ever to be written (Sophocles). The setting of the play is set in front of the Palace, Thebes, and Ancient Greece, though most Greek playwrights were from Athens, their plays are hardly ever set there. (Sophocles). It begins with the death of two brothers, Polyneices and Eteocles

Wednesday, December 11, 2019

Reflective Questions for Managerial System - myassignmenthelp.com

Question: Write about the Reflective Questions for Structural and Managerial System. Answer: An organizational system comprises of four sub systems namely technical system, cultural system, structural system and managerial system. The technical system includes basic equipments and techniques that are necessary for the production process. The structural system includes the policies and procedures of an organization that are to be followed by the organizational employees (Cabri and Blake 2016). The cultural system comprises of the relationships between the employees and their behavioral patterns. The managerial system comprises of the activities related to directing, controlling and organizing the organizational activities towards the achievement of the objectives of the organization (Davis et al. 2014). I view organization as a combination of several sub systems. The processes within an organization cannot work alone instead, the processes are dependent on each other. For instance only technical system is not enough to generate desired outcome. Human resources are necessary to control the technical system and to manage the operations of an organization in order to obtain desired results. A single system when alone is incomplete and incapable of producing desired outcomes. All the elements within an organization are inter- related and inter- dependent upon each other (Dalpiaz, Giorgini and Mylopoulos 2013). Socio- technical system is a combination of social and technical processes. A socio- technical system is a combination of computer, software, business processes, organizational rules and human resources. Any changes in the social element can have a drastic impact on the technical activities. For instance, in case less efficient human resources replace the more efficient human resources involved in the technical processes, then the technical activities tend to slow down or create more errors (Bowker 2014). Therefore, it is necessary to maintain a balance between social and technical aspects of an organization. The socio- technical system involves several approaches such as organizing the processes, flattening the hierarchy, utilizing teams for managing activities, allowing the customers to decide the performance and rewarding the performance of the team. I believe that organizations are an open system that interacts with the environment. An organization does not exist in vacuum due to which the success of an organization is dependent upon the way it interacts with the environment. The success of an organization is largely dependent upon the interaction between its internal employees as well as the interaction with the outside customers (Jones, Artikis and Pitt 2013). I believe that efficient socio- technical systems are necessary for the success of an organization. No organization can achieve its objectives without establishing a sound socio- technical system. For instance, socio- technical system has been efficiently used by Toyota. Toyota has efficiently utilized the socio- technical system approaches along with lean production principles. The company has used the work design model that has helped the company to understand the organizations work practices and its impact upon the performance of the employees. The company has conducted several surveys through which it has come to know that the middle management in the company is necessary for the implementation of the lean system that helps in the utilization of social and technical systems (CORPORATION., 2017) Toyota Motor corporation was founded in the year 1937 by Kiichiro Toyoda as a multinational automotive company. The company has its headquarters in Aichi, Japan. Toyota is the largest automobile manufacturing company in the world. The company has a wide product line that comprises of cars, buses, motorsports, electric vehicles and is also involved in several non- automotive activities such as aerospace, robotics and philanthropy. The company has been manufacturing superior quality vehicles since 75 years and has a world- wide presence. The company has efficiently utilized its socio- technical system and the lean production system in order to achieve the desired outcomes (CORPORATION., 2017). The companys organizational structure is based upon its varied business activities all over the world. The company efficiently utilizes its structure to achieve its aims and objectives. The company has its structure linked with the Japanese traditional business structures (CORPORATION., 2017). The company has efficiently used its organizational structure in order to improve its operations and capacity utilization. Toyota follows global hierarchy, geographical divisions and product- based divisions as its organizational structure. The company has vested the decision- making power in the hands of the regional and business unit heads. The business unit heads are responsible to report to the headquarters of the company in Japan. The company also has eight regional divisions and each of the units heads report to the companys headquarters (CORPORATION., 2017). The company also has four divisions according to its products that supports the brand development and improvement in the product li ne. The managerial sub- system in my organization that is Toyota is highly effective in improving the efficiency of the organization. For example, the TPS (Toyota Production System) of the organization utilizes several conversion processes in order to motivate changes at group levels. The immediate supervisors are responsible for managing conflicts and sustaining the change within the organization. The TPS ensures that all the sub- systems of the company work together towards the achievement of the organizational objectives (Koukoulaki 2014). TPS motivates the suppliers of the company to involve kaizen without affecting the stable procedure. The company does not expect its suppliers to follow their values and principles but they are required to abide by certain basic principles of the company. The TPS system of Toyota ensures that there is proper coordination and integration among the managerial sub- systems. The management and the production system of the company work closely in order t o obtain the desired results. The human resources within the organization are responsible for ensuring proper quality production and minimizing the defects. Therefore, I would like to conclude that the various divisions of the company and the human resources of the company work together in order to achieve the desired results. Human resource interventions are very important in improving both individual and team performance. Human resource interventions help in improving inter- personal skills. I have personally participated in HR interventions that aims at improving inter- personal skills especially team- building. Firstly, the hierarchical decision- making system is removed from an organization (Saurin and Werle 2017). The power of taking decisions are no longer vested in the hands of only higher authorities instead, the focus is on the groups are prepared that have the proper understanding of the organizations aims and objectives. The employees from various departments form a group and discuss regarding the important topics. The employees are engaged in the decision- making process in order to obtain better ideas. In order to build trust among the employees, open communication is encouraged within the organization. This creates an environment of mutual trust and co- operation (Edel et al. 2017). The mana gers are required to slowly build the trust among its employees and reduce the unwanted competition within the organization. Some amount of competition is good for an organization but beyond certain limit, the competition becomes harmful for the organizations. Collaborative conditions are very useful in improving the team spirit and communication and help the employees feel important for the organization. An employee invests his or her skills, abilities, knowledge and time for attaining the objectives of an organization therefore, the employers are also required to work for the overall development of the employees and help them achieve their career goals. This can be done by providing employee benefits and other facilities to the employees in order to help him or her work efficiently. The employees are provided the opportunity to take active part in the decision- making processes. This has helped in making the employees feel important to the organization and has also helped in incre asing the loyalty of the employees towards the organization. The two types of HR interventions are as follows: T- groups: I have chosen T- group because it is the type of group training wherein the participants learn about themselves by interacting with each other. This process uses the process of feedback, role playing and problem solving techniques. A T- group meeting does not have a specific agenda and goal instead, the participants are encouraged by a facilitator to express and share their feelings and emotions in exchange of actions and words of the other participants (Guest 2015). The major focus is on expressing the emotions rather than obtaining any conclusions. The members of T- group develop inter- personal skills and self- understanding. Since ages, the organizations have been using this method for the purpose of building teams and implementing corporate culture. This process involves openness and helps the members to adopt a positive attitude towards the achievement of the objectives. Team building: I have chosen team building because it involves a group of activities that help in enhancing the social relations and defining the roles within the associations that involves collaborative tasks. This concept is completely different from that of team training as it aims at exposing and addressing the the inter- personal issues within a team. It helps in improving the performance of the entire team as it is aligned towards the goals and involves building efficient working relationships among the members (Martin, Carron and Burke 2016). It also aims at reducing the ambiguity among the team members in term of role and responsibilities and helps in finding solutions to the issues faced by the team. References: Bowker, G., 2014.Social science, technical systems, and cooperative work: Beyond the great divide. Psychology Press. Cabri, G. and Blake, M.B., 2016, June. 14th Adaptive Computing (and Agents) for Enhanced Collaboration: Adaptive Approaches for Socio-technical Systems. InEnabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2016 IEEE 25th International Conference on(pp. 1-2). IEEE. CORPORATION., T. (2017). Toyota Global Site | History of Toyota. [online] Toyota Motor Corporation Global Website. Available at: https://www.toyota-global.com/company/history_of_toyota/ [Accessed 14 Aug. 2017]. Cummings, T.G. and Worley, C.G., 2014.Organization development and change. Cengage learning. Dalpiaz, F., Giorgini, P. and Mylopoulos, J., 2013. Adaptive socio-technical systems: a requirements-based approach.Requirements engineering,18(1), pp.1-24. Davis, M.C., Challenger, R., Jayewardene, D.N. and Clegg, C.W., 2014. Advancing socio-technical systems thinking: A call for bravery.Applied ergonomics,45(2), pp.171-180.] Edel, M.A., Hlter, T., Wassink, K. and Juckel, G., 2017. A comparison of mindfulness-based group training and skills group training in adults with ADHD: an open study.Journal of attention disorders,21(6), pp.533-539. Guest, D., 2015. Team building, team challenges.Appita Journal: Journal of the Technical Association of the Australian and New Zealand Pulp and Paper Industry,68(2), p.87. Jones, A.J., Artikis, A. and Pitt, J., 2013. The design of intelligent socio-technical systems.Artificial Intelligence Review,39(1), pp.5-20. Koukoulaki, T., 2014. The impact of lean production on musculoskeletal and psychosocial risks: An examination of sociotechnical trends over 20 years.Applied Ergonomics,45(2), pp.198-212. Martin, L.J., Carron, A.V. and Burke, S.M., 2016. Team building interventions in sport: A meta-analysis. Saurin, T.A. and Werle, N.J.B., 2017. A framework for the analysis of slack in socio-technical systems.Reliability Engineering System Safety,167, pp.439-451.

Wednesday, December 4, 2019

Cost Of Medical Decision Making From Non Medical Managers - samples

Question: Discuss about the Cost Of Medical Decision Making From Non-Medical Managers. Answer: Introduction. Procedures of clinical making decision is the essential in our day to day clinical exercises. The processes involving interactions of applications of biomedical and clinical problems solving, knowledge, probability weighing and several outcomes, and to balance risk-benefits. Crucial tasks are balancing personal experiences and common knowledge(Hajjaj, et al., 2015). Evidences based medicine protocol provides the path to physicians allowing them in making comprehensive therapeutic decision with elements of self-confidence instead of based on individual experiences. Making clinical decisions is processes and to make an informed judgments about the treatments essential for the patients(Hardy Smith, 2009). Making decision processes are complex involving numerous significant steps in which patients involvement is essential(Hajjaj, et al., 2015): Cost of clinical decision-making is defined in different ways depending on different referenced article. According to (Hajjaj, et al., 2015), it is defined as the utmost essential parts of a clinical practices, it permits the medical practitioners in making scientific, logical and valid decisions in regard of the care implementation and planning of the intervention. In any clinical situation, where patients presents their medical complications, the initial sequence of actions by the healthcare specialized requires logical clinical making decision. Consequently, the significance of the clinical making decisions are dominant when it arises to the healthcare industries(Stevenson, et al., 2012). Even though, it requires to be considered that this kind of particular actions are complicated and any single mistake while making critical clinical decision mat cost the patients even their lifes(Stevenson, et al., 2012). Henceforth, decision making in clinics may be reflected as the foundations based on which the treatments recovery and delivery of patients will be carried on. Conversely, typical misconceptions when clinical making decisions are discussed, are that it depend on the self-control of the healthcare professional, like the doctors, nurses or so on(Park Yabuuchi, 2016). Nevertheless, the clinical decision-making are parts of health care that are most influenced sectors, in both by external and internal factors. The literature review focusses on the cost in decision making. Introduction to nonclinical influences. Even though clinical decisions making, most of them are based on formally or traditionally clinical criteria for making clinical decision, they are furthermore affected by a broad range of nonclinical aspects, such as, the socio-economic conditions of the patient. Some effects cannot be distinguished whether it fall in nonclinical or clinical factors, for instance, adherence of the patient. Adherence of the patient may fall in clinical factor, but then, if associated with, such as, regular absenteeism from the follow-up appointment, it is then taken as nonclinical influence. Patient age could be considered to be a clinical rather than nonclinical influence because it is associated with physical ability and other co-morbidities. Likewise, the age of the patients may be a nonclinical effect because of the associated nonclinical features, such as transportations problem in the ageing, making follow-up appointment much problematic(Hajjaj, et al., 2015). Consequently, sometimes it is impossible to classify every effects on clinical decisions into either nonclinical or clinical, since there exists an overlap in the two. Artificial descriptors of nonclinical influences on clinical making decision can be used so as to focus thoughtful on a broad aspects of clinical medicines. The following are some nonclinical effects on clinical making decisions: Factors related to patient. These factors involves: concerns and worries of the patient, attitude and behavior of the patient, wishes and preferences of the patient, gender and age of the patient, and other individual characteristics. Race of the patient, patient's socioeconomic status and also adherence to treatment or inappropriate behavior of the patient that may influence adherence such as chaotic life style. Physician-related factors These may involve; physician's professional interaction like interaction of staffs and colleagues within clinics, time constraint and work overload of physician in the clinic, personal characteristics of physician like race, faith, culture, age and gender. Practice-related factors These type of practices such as public or private, practices size, practice organizations, geographical locations, and accessibility of health resources Literature review. The main purposes of the literature reviews are to help in understanding what other researchers and writers have documented about the importance of the economic and social cost in medical decision making from non-medical managers. Int this part few factors mentioned above are examined. Factors related to the patient The socioeconomic status of the patient The socio-economic status of the patient affects way the decisions are made in the managements. In many countries, being alert of the socioeconomic status of the patients, let say the patient have a low socio-economic may influence primary care physician to change his/her managements plans to outfit the patient with financial difficulties(Bernheim, et al., 2008). The influences of socio-economic status can lead to non-standard treatments or the patient may receive less than ideal. The ability of the patient to pay and the cost of care influences the therapeutic plan of the physician. Patients having a socio-economic status having the ability to carter the cost of health facilities are possibly able to have more medical tests as compared to patient with a low socio-economic status(Scott, et al., 2016). Physician may change his/her prescription strategies, shifts to an inexpensive drugs within therapeutic classes or they tend to shift to an alternative drug which is insured(Huttin Andral, 2010)(Hajjaj, et al., 2015). Even amid patients who are insured there may exists some with insurances plan which may give a coverage which is limited(Huttin Andral, 2010)(Shi, 2013). This socio-economic status disparities may decrease the qualities of patients care and result in unwanted consequences. The age of the patient. The age of the patients can affect cost of clinical management decisions. Physician is probably in categorizing the grievances of aged persons as ordinary or age related instead of the signs of diseases(Haug Ory, 2007). A cross-sectional study(Little, et al., 2005) of two universal practices found that aged persons are not as much of younger persons to be offered health promotions advices. The gender of the patient The gender of the patient plays an deceptively inappropriate roles in clinical making decisions. For instance, women receives more physical examination test, drug prescription, blood pressure check, laboratory test and return appointments as compared to men. Women similarly have more physicians visits per a given period of time and more services per visit(Verbruggei, et al., 2011). Physician typically perceives that the complaints of women are more possible to be affected by emotional factors and furthermore, women makes extreme demands on the time of the physician(Hajjaj, et al., 2015). The adherence to treatment of the patient The views of the adherence to medications to the patient by the physician is other essential factors which might influence management making decisions(Piette, et al., 2014). Physician might be more unlikely to treat patient who he or she suspects would abandon to treatments(Bogart, et al., 2016). The attitude and behavior of the patient Occasionally physicians may encounter patients who are rude, aggressive, demanding, violent or patient seeking secondary gain. These kind of patients visits their doctors or nurses more often than normal, receives extra prescription, having extra tests prepared, and they are referred to specialists more frequently(D Tabenkin, 2011). Other patient-related influences Management policies There are some weight put on insurance companies, hospitals, physicians and employers in considering cost when do provide care to patients. Here, there exist risks that the pressure might results to decrease in the general value of healthcare. For instance, resources constraint in ICU (Intensive Care Units) may lead in early release of patient and these may be related to an improved mortality rates(Murray, 2010). The decision making of the manager may differ from one person to another or from healthcare to another to another due to variances in treatment policies and healthcare systems(Hajjaj, et al., 2015). Physician personal characteristics The physicians decision making processes may be affected by his or her own personal characteristic. For instance, the characteristics of the doctors or nurses determines, as a minimum in parts, their approaches to patients managements. Physician can be categorized(Eisenberg, 2000) as either oriented towards health maintenances or interventionists. Health maintenance physician is patient-oriented, while Interventionist physicians are disease-oriented. In general, the health maintenance-oriented physicians are prepared in observing the situations, but, the interventionist is inclined toward immediate actions(Hajjaj, et al., 2015). The ethnicity, age and gender of the physician plays a role in decision-making Research Question, Aim/Objectives and Sub-goals Research Objective: Statistical analysis based on different hospitals data base to find out the economic and social cost in medical decision making from non-medical managers mainly those relate to patients characteristics. Research Question: What are some nonmedical Characteristics of the patient that contributes to collective medical decision making? Theoretical Content/Methodology Method Here, the observations was taken in French cancer centers in medical decision making at which nonstandard gears involves some improbability were debated on May to July 2014(Thmis, et al., 2016). Verbal statements of the physicians and predefined background parameters was collected with a nonparticipants observational approaches. Nonnumeric information collected in the forms of open notes was then coded for quantitative analysis. Multivariate and univariate statistical analyses was performed. Hypothesis: Contribution to the knowledge gap in healthcare management to highlight the loop holes of administration by non-medical managers. - Analysis of data through various aspects to improve the administration role in healthcare management by discussing decision making techniques. Results, Outcome and Relevance The final samples of records of the patient included and discussed where n=290, nonmedical characteristics was stated as n=95, that is 32.8 percent of the eccentrics. There were n=66 (that is 22.8 percent) of these cases characteristics resembled to demographics. Psychological information in 11.7 percent (that is n = 34), and relational information in 6.2 percent (that is n = 18). The patients age and his/her congeniality was found to be more frequently stated characteristic. In 17.9 percent of these eccentrics debated, the concluding decision was delayed: the outcomes were completely related with the nonmedical characteristics of the patient and with indecision about the outcomes of the therapeutic options available. Amongst completed case-records planned for debate at the medical decision making process meetings, two hundred and ninety patients cases was involved in the analysis. The cases was excluded were two hundred and forty two cases that did not meet the included criteria either due no argument was needed about the medical managements or is due to removal of the agenda of the medical decision making process. The issues to be discussed at future session can be included since main medical data was absent or a better method to collect the data was not used. The mean age of the patients used was 61.1 having a standard deviation of 14.3. The gender of the patient used were: male were 118 representing 41.8 percent while female were 164 representing 58.2 percent. Project Planning and Gantt chart. Gantt charts arranges different activities or events in synchronism and associates respectively tasks with its precedency and time. It displays activities or events as timed bars and graphically visualize the sequences of those activities/events(Bryan, 2016). TIME Activities Week 1 Week 2 Week 3 Week 4 Week 5 Research Design Layout Develop Finish Conclusion The deficiency of sympathetic of nonclinical affects by the physicians while assembling management decisions might possibly results into suboptimal individuals patients care. Nonetheless physician can try acting in a evidence based, rational and professional manners, they furthermore, must take into consideration in the unique circumstance of individuals patient in his or her clinical practices and respects the value of the patients and beliefs. Treatments policy promotes managements of all patients similarly deprived of differentiating between them since of religion or race, sexual orientation, age and gender for ensuring provision of the highest qualifies healthcare to any patient. From the literature review, it indicate that one of the highest challenge clinical medicine encountered in the current centuries are developments of strategic that can integrate and acknowledge significant nonclinical effects with evidence-based medicines deprived of affecting the standards of complete healthcares(Hajjaj, et al., 2015). Physician cannot be able to practice true evidence-based medicine unless nonclinical effects on decision making are understood, documented and cooperatively taken into account during the process of cost of clinical decision making.. References Bernheim, S., Ross, J., Krumholz, H. E.H., B., 2008. Influence of patients' socioeconomic status on clinical management decisions: a qualitative study.. Ann Fam Med, 6(1), pp. 53-59. Bogart, L., Kelly, J., Catz, S. Sosman, J., 2016. Impact of medical and non-medical factors on physician decision making for HIV/AIDS antiretroviral treatment. J Acqui Immune Defic Syndr, Issue 23, pp. 396-397. Bryan, J. W., 2016. A PROJECT PLANNING GUIDE FOR HEALTHCARE FACILITY, s.l.: Walrath. D, S. Tabenkin, H., 2011. The difficult patient as perceived by family physicians.. Fam Pract, Issue 18, p. 497. Eisenberg, J., 2000. Sociologic influences on decision making by clinicians. Ann Intern Med, Issue 90, p. 960. Hajjaj, F., M.S., S., Basra1, M. Finlay, A., 2015. Non-clinical influences on clinical decision-making: a major challenge to evidence-based practice. Journal of the Royal Society of Medicine, 103(5), pp. 178-187. Hardy, D. Smith, B., 2009. Decision making in clinical practice. Br J Anaesth, Issue 9, pp. 28-30. Haug, M. Ory, M., 2007. Issues in elderly patient-provider interactions. Res Aging, Issue 9, pp. 11-15. Huttin, C. Andral, J., 2010. How the reimbursement system may influence physicians' decisions. Results from focus groups interview in France. Health Policy, Issue 54, pp. 67-80. Little, P., Slocock, L., Griffin, S. Phillinger, J., 2005. Who is targeted for lifestyle advice? A cross sectional study in two general practices.. Br J Gen Pract , Issue 49, pp. 809-810. Murray, S., 2010. Relation between private health insurance and high rates of caesarean section. qualitative and quantitative study, pp. 1503-1504. Park, I. Yabuuchi, A., 2016. More options, more considerations: how new treatment options influence clinical decision making.. Journal of thoracic disease, 8(10), p. p.E1408. Piette, J. P., Wagnes, T., Potter, M. Schillinger, D., 2014. Health insurance status, cost-related medication under use and outcomes among diabetes patients in three systems of care. Med Care, Volume 9, p. 103. Scott, A., Shiell, A. King, M., 2016. Is general practitioner decision making associated with patient socio-economic status?. Soc Sci Med, pp. 35-46. Shi, L., 2013. Types of health insurance and the quality of primary care experience.. Am J Public Health, p. 18481855. Stevenson, L. et al., 2012. Decision making in advanced heart failure. Circulation, 125(15), pp. 1928-1937. Stough, C. et al., 2016. ignette methodologies for studying clinicians decision-making: validity, utility, and application in ICD-11 field studies.. International Journal of Clinical and Health Psychology, 15(2), pp. 162-180. Thmis, A., Anne-Dborah, B., Sylvain, G. Aurran, T., 2016. Patients Non-Medical Characteristics Contribute to Collective Medical Decision-Making at Multidisciplinary Oncological Team Meetings. Research Article, p. 15. Verbruggei, L., Steiner, R. ., 2011. Physician treatment of men and women patients: sex bias or appropriate care?. med care, pp. 610-620.

Thursday, November 28, 2019

Shiyuan Li Essays - Marie Daulne, Walloon People, House Slippers

Shiyuan Li Communications Learn your heritage! I once heard someone say, "It is important to learn about your heritage!" ever since then, I have been keen on to searching and digging about who my ancestors were and what kind of future they have tried to provide for his descendants. In Deuteronomy from the Bible it goes, "Remember the Days of Old, consider the years of many generations: ask your father, and he will show you; your elders, and they will tell you." This passage not only inspired me, but also became a light that guided through my conversations with my elders. When I was younger, I had no interest in what my grandparents had to say to me. Afterall, they are just people who are living in a totally different generation and their advices are cannot be implemented the same way in a modern day context. But what I disregarded is that they have so much to offer to me; their success, failures, experiences. It was then that I started to converse with them. I learned about the wars, the floods, the catastrophes and triumphs. I searched and found that the house my father grew up in is now protected and cared by the government because of its heritage and significance. I learned that my late grandfather who loved me dearly but I never was able to speak to was part of the construction of the first Chinese nuclear bomb, and that his father was one of the most famous philanthropists during the Korean War who selflessly dedicated his wealth and resources into the country that he loves and identifies with. What I am trying to say is that knowing your heritage is one part of accepting your identity. Nowadays we all want find out who we are and achieve our goal, and a good sense of your heritage will help one find that. When I hear about what my ancestors have done to pave my future, I feel a sense of comfort that I cannot find from anything else. Heritage is like an inheritance that is worth far more than monetary value. This is an inheritance that sticks and stays by your side. I feel a sense of belonging and comfort, and it inspires me to draw closer to my family. Chinese families are really really big, and being the only family that is not in China makes it really hard for us. The connections that I have built with them has turned from "oh you are my relative" to "thank you so much for the contributions that you have made to make my life better." I am now able to talk about my heritage and values proudly, and I hope that I can continue to celebrate this great history of mine by conti nuing to preserve it for my kids. In todays world, much of our heritage has been lost either through wars or neglect. More and more arts and traditions are forgotten everyday, ones that will never be recalled from time. If we just put down whatever devices that has strangled us into this mobile society, and talk to our elders about their past and their family stories. Trust me it will be worthwhile.

Sunday, November 24, 2019

Movie regulations in American and British movie industry †Film Essay

Movie regulations in American and British movie industry – Film Essay Free Online Research Papers Movie regulations in American and British movie industry Film Essay Cinema has been seen as a way of free artistic expression since its invention. Film makers assumed that they could allow themselves more than in, for instance, in theatres- they assumed that if the scenes were not acted live before the audience, they could be more daring. Un- or fortunately, the public had a different opinion on the subject. Although developed independantly, ways to fight the obscenity and immorality on both side of the ocean(UKUSA) were relatively similar. In United States. Hollywood soon became infamous for many scandals and began to be seen as a rotten city. Afraid of obscenity in movies, over 100 cities established local censorship laws. To improve the image of the Hollywood, Motion Pictures Producers and Distributors Association was founded in 1922. It was supposed to introduce a set of rules that would prevent the immorality in movies. The Association was led by Will H. Hays, who came up with the so called Production Code, better known as the Hays code. In the beginnig, he tried to persuade producers to avoid immorality, but he rarely succeeded. Matters gor even worse when talking movies appeared. Hayss Donts and Be carefuls were officialy published in 1930. I think it would be hard to find a worse period to introduce it as the Great Crisis forced producers to do everything to attract people to cinemas. Constant complaints made Motion Picture Association of America to take further steps and in 1934 Production Code Administration w as created. From then, no movie could be distributed without getting a certificate from it; if the movie was released, PCA could fine theatres where it was shown with up to 25 000$ fine. It could also demand script changes. Although it may be surprising, Britain founded its own regulatory body earlier than Hollywood. As in later in States, British Board of Film Censors was created by film industry to control and prevent immorality in movies. Unlike in American case, local authorities kept the right to object the Boards opinion, but since 1920 such thing very rarely happened. At that time, both, American and British standards were very similar- sex, nudity, provocative dancing, drug use, venereal disease, childbirth, ridiculing religion were prohibited. In other words, everything that could possibly offend anyone was prohibited to be shown in films. There were some differences, of course, as both countries varied in terms of sensitive issues. In USA these were mainly white/black people issues.Despite the fact that these examples are dealing with two completely different spheres of life, they all come from the same source. Both black-white issues and the concept of British Empire were very touchy subjects and presenting them in movie in an inappropriate way could arouse arguments and disturb the social balance. Nowadays it is considered rather as a way to preserve stereotypes and stop possible criticiscm of film makers. Therefore, Hollywood could not produce films which showed white slavery, miscegenation (sex relationships between the white and black races) (as in many states such relationships were simply forbidden, it would be presenting a crime.) As United Kingdom was then still a colonial power, BBFC had to protect its image, so in the regulations from 1916 we can read that scenes holding up the Kings uniform to contempt and ridicule and subjects dealing with India, in which British Officers are seen in an odious light, and otherwise attempting to suggest the disloyalty of Native States or bringing into disrepute the British prestige in the Empire. were not allowed to be shown in movies. Besides morally undesired content both regulations also covered different fields. For instance, Hays code listed and explained quite specifically what a good movie is: in short- an entertainment of great moral importance, it is an art that enters intimately into the lives of human beings; movies also have special moral obligations , thats why no picture shall be produced which will lower the moral standards of those who see it. We can see here a great care about Americans consience and morality, an element that is very common in USAs public life from its beginning. In UK, on the other hand, not only was the moral side covered, but also certain elements that were not seen as typical neither were wanted from a good citizen of the state. Therefore no References to controversial politics, Scenes and incidents calculated to afford information to the enemy or Incidents having a tendency to disparage our Allies were allowed. Political issues were very briefly covered in the Hays code, probably due to the fact that American entertainment was always centered on moral provocation and general respect for the state institutions seemed natural, whereas in Great Britain the idea of ridiculing and criticising the government in entertainment had a long tradition. Whats significant, the british regulations would change and become relatively flexible and more genral, though BBFC would still cut films whereas Hollywood would stick to Hays code, even just formally. Faced with social changes and development of TV producers started to dare for more again. MPPAs(which replaced Motion Pictures Producers and Distributors Association) response to thatwas makin the rules even stricter in 1952. The problem occured when in 1952 thanks to the fact that the First Amendment started to apply to movies as well, thus given producers the free speech right. Though practically useless, the Production Code lasted til 1968, when it was finally replaced by rating system. At the same time BBFC, to prevent losing practical control over movie release, as it happened in States, introduced a rating system, just like it happened in many other countries. rating system allowed to release a movie that didnt meet all the strict rules, but to supply it with a kind of warning. Because of the fact that movie industry was already back then one of the most internationalized branches of culture, since introducing the rating system there were no major differences in movie regulations between UK and America til now. The only further changes will probably make even more similar, first of all to save problems the movie producers. sources: http://en.wikipedia.org bbfc.co.uk/ artsreformation.com/a001/hays-code.html Research Papers on Movie regulations in American and British movie industry - Film EssayWhere Wild and West MeetAppeasement Policy Towards the Outbreak of World War 219 Century Society: A Deeply Divided EraTwilight of the UAWDefinition of Export QuotasThe Effects of Illegal ImmigrationComparison: Letter from Birmingham and CritoHip-Hop is ArtMarketing of Lifeboy Soap A Unilever ProductBringing Democracy to Africa

Thursday, November 21, 2019

The Principles of Management Communications Used to Successfully Research Paper

The Principles of Management Communications Used to Successfully Achieve Organizational Objectives - Research Paper Example In other words, in an organizational set up, communication has to involve the transfer of meaning and information from managers to employees and vice versa. The information communicated could take a wide range of forms that may involve symbols, words, numbers, and concepts among others. For any conveyed meaning or information to make sense, the receiver of such information has to make meaning from the conveyed elements. Therefore, considering that communication involves making meaning of the sent information, it would follow that organizations that design effective communication policies in their organizational management would perform much better than those with inferior communication strategies. Any organization has to put in place norms standards of communication that would lead to effective communication that result to change within the organization. Management involves the process of directing others to achieve organizational goals. Managers and employees have to be active listeners and pay attention to details for such communication to be effective. Research in Oncology has revealed that effective listening can be accommodating to others, leading to effective communication (Cohn, 2007). For instance, it is necessary to have communication at the same level. In other words, instead of communicating while one is standing, there is a need for both communicators to sit and have an eye-to-eye contact. Gupta (2013) further elaborates the need to have emotional contact expressed through facial or eye-to-eye contact as well as the use of maintaining a cordial relationship through proper tones, gaze or touch during such communication. Cohn (2007) further elaborates the need to av oid prejudgments during communication by allowing the speaker to express themselves fully without interruptions or unnecessary criticism. Moreover, there is a need to show emotional connectedness with the speaker by reflecting back to

Wednesday, November 20, 2019

REFLECT THOUGHT Assignment Example | Topics and Well Written Essays - 500 words

REFLECT THOUGHT - Assignment Example The main difference in these regards is the understanding that in these regions, strength is a more valued quality than intelligence, as the majority of work is farm or manual labor. It’s clear that this difference could lead to relativism as one culture places higher value than another on intellectual forms of intelligence. Even as difference value is placed on these elements, it’s clear that the different values are different because they have specific viability in the culture, leading to support of relativism. 2. Psychological egoism claims that whatever we do, we do out of self-interest. Give an example of an act you think is not done out of self-interest, and explain how the psychological egoist might try to interpret that act as selfish. One of the major acts that are claimed to be done not out of self-interest is charity work. Everyone from celebrities to billionaires to everyday citizens has regularly involved themselves in charitable activity as a means of contributing to world culture and helping disenfranchised individuals. Even as these acts are performed out of charity, a psychological egoist may claim they are done out of self-interest. The egoist could potentially argue that in performing these acts the people are not doing it out of a selfless interest to help others, but actually as a means of making themselves feel better. Similarly, the egoist might argue that these people are participating in these charitable activities to make themselves look better in the eyes of their peers and the general public. The problem of prayer in school is a hot-button issue. In the hypothetical dilemma John wants prayer, while Mary does not. One of the potential compromises that could be reached for this situation is to allow prayer in school for those individuals that choose to pray. Still, prayer must not be an institutionally sponsored activity; for instance, teachers would not be able to institute prayer sessions. This scenario

Sunday, November 17, 2019

Case study Essay Example | Topics and Well Written Essays - 1500 words - 1

Case study - Essay Example In 1993, Peter Solvik joined Cisco and made IT the central functionality of the company. He showed interest in starting many projects for the upgrading of IT in the company. He brought many changes and supported the company in adopting IT successfully. However, when Peter Solvik left the company and Boston joined as the new CEO, there were many problems revealed with the current IT adopted by the company (McAfee, McFarlan and Wagonfeld 4). ERP was introduced by Peter Solvik in the company and was installed for handling inventory and manufacturing functions but with the passage of time, other functions was also added to the ERP system due to which, problems were there (McAfee, McFarlan and Wagonfeld 3-4). Boston after becoming the CEO identified these problems and showed interest in three main projects, which were to upgrade the ERP, to develop enterprise reporting and business information solution and to develop a single database (McAfee, McFarlan and Wagonfeld 5). This paper will di scuss all the relevant details of the case in depth. IT Governance Styles at Different Levels Peter Solvik after joining Cisco changed the company’s consideration of IT as an overhead. He made sure that IT performed the role of central functionality of the company. According to his opinion, without using latest technology, the company was not able to progress. Under his governance, ERP system was implemented, which was to handle manufacturing and inventory tasks at the start. In his tenure, the company created its own internet and intranet, due to which not only the data transfer procedures were eased out but also many customers were added to the company’s profile due to which, the company was able to generate more revenue. Peter Solvik’s IT governance style was profitable and commendable for the company as it was due to this style that the company gained reputation and enhanced profits in the market. The organization was made an IT centralized organization (McA fee, McFarlan and Wagonfeld 3). At network/infrastructure level, internet and intranet were developed to control all network related functions such as sales, manufacturing and others. A website was developed with the name Cisco.com. At data level, intranet was used for data transferring while at application level, the ERP was developed to handle the manufacturing and inventory applications of the company. Problems with Cisco There were many problems with the company’s IT by 2001, which were discovered after Boston’s joining the company. Many customized tools were there to handle different functionalities for which, extra costs were paid. The investment for the customized tools was too much and information retrieval was problem. In addition, there was no central decision making for the IT functions as every department made its own decisions due to which, there were problems related to upgrading ERP system of the company as a whole. There was lack of centralized planning , which was again problematic for the company (McAfee, McFarlan and Wagonfeld 5). Many old custom interfaces were required to be put out of action in order to install a newer version of ERP, which will be problematic for the users of ERP. In addition, ERP was designed mainly to

Friday, November 15, 2019

Consumer Behaviour On Decline Of Sales Marketing Essay

Consumer Behaviour On Decline Of Sales Marketing Essay Introduction This report is prepared to analyse how consumer behaviour changes has led to the decline in sales volume of Xclusive perfume brands across the UK market. For the last two years sales has declined consistently across the target market of upper class consumers in UK. Xclusive is an premium perfume brand from Premium Products Ltd, a company based out of UK. Company launched this premium brand for men and women in UK market in 2006. By 2007, they had a 1.2% market share, reporting a total sales turnover of 7.96 million GBP (Esprit Magazine, 2007) In 2008 and 2009, the sales declined by 5% and 6.2% respectively. Preliminary reports show a decline in popularity of this brand and lesser movement in stores among the upper class customers. This report is intended to analyse the reasons which led to the sales decline over the last two years. Report will test the hypothesis that consumer behaviour variations led to the decline in sales. Other key objective of this report is to come up with suggestions to reverse this declining sales trend and influence a positive change in consumer behaviour to increase the sales. Current Product and Marketing Strategy Xclusive brand of premium perfume for men and women was launched by Premium Product Ltd in 2006. There were four lines within this Xclusive brand herbal, musky, woody and spicy. Musky was the popular most brands followed by Herbal. They were packaged in exclusive golden bottles, which gave exquisiteness to the whole product package. Health consciousness was on the rise among the UK consumers in 2006. That made the company launch this exclusive herbal perfume to the upper class consumers. This was launched as part of their market differentiation strategy compared to other premium brands. Main target was upper class men and women in UK with social grade A and B. (Businessballs, 2008). This market size constituted 25% of the total UK population. Premium Products Ltd used a premium pricing for all products including this Xclusive product line, with herbal being the most expensive as it was made from healthy ingredients. The company adopted a selective distribution strategy targeting only luxury zones and concentrated on boutiques and big malls like Wesfield and Metrocenter. Distribution strategy was centred around premium malls and online shops like Perfume shop. (Suite101, 2007) Company did the promotion mainly through celebrity ads in mass media like TV and upper class magazines like Glamour and Cosmopolitan. Promotion was around healthy sports men and women using this exclusive perfume. (National Readership Survey, 2007) Problem Analysis Problem: In the last two years there has been a drastic decrease in the sales of fragrance products (perfumes). Study was conducted on market and consumer buying process to understand the reasons behind this decline in sales. In the market study, objective was to test whether external market conditions were favourable to perfume business. Market study was done using the PEST method. While doing sales analysis, it was found that decline in sales actually came from women segment. Hence market and consumer behaviour study was mostly attributed to the social class A and B women segments. Buyer responses Choices of product brand dealer timing price Buy more, less, stay loyal etc buyers black box Needs wants, stimuli Product, price, place, promotion etc Environmental (PEST) factors Buying Process Analysis We looked at the typical buying process of premium perfumes by women in UK. Looking at the major players involved in a typical purchase decision. Initiator Influencer Decider Buyer User Usually, women themselves are the initiators to buy perfumes for following reasons: Long lasting scent Makes feel attractive One that others comment on Makes feel sexy Changes or enhances mood Initiators can be men also who buy gifts for women. It basically depends on the age group of women. But generally speaking, the influencers can be: Peer group Celebrities Referred by magazine (foil pouch samples preferred) Advertisements in media Women themselves and men also. Both men (as gifts) and women. Women, her friends, relatives etc. Since women play the major role of initiator and decider in this buying process, we need to understand internal and external factors which can impact the consumer behaviour of women belonging to social class A and B. Consumer behaviour characteristics Consumer behaviour refers to the selection, purchase and consumption of goods and services for the satisfaction of their wants. (Ezinearticles, 2007) There are multiple factors which can influence the consumers behaviour over a period of time, which includes both internal and external. Broadly the internal factors could be personal traits like age, income, occupation, personality, lifestyle etc and psychological factors like motivation, perception, learning, beliefs and attitudes. External factors can be social ones like reference groups, social status and influence of family. It could be cultural factors too like culture and sub-culture and social class. This is very much relevant to the premium perfume product segment too. External Factors affecting consumer behaviour Among the external factors, the key ones which directly impact consumer behaviour are demographics and social class. Next comes the influence of reference groups like celebrities, friends and family. But since the target segment is mainly upper class and upper middle, culture/sub-culture seems to be the least important variable. Demographics It is more an internal factor, which is of course shaped by external influence. Teenagers: They are more interested in citrus scents. Usually they prefer a fragrance that makes them attractive to others. They dont have any affinity towards a brand, but they like to try out different fragrances and brands. Adults: They are most likely to buy fragrances for most likely to wear a perfume to feel sexy. Older women are more likely to switch fragrances within their collection once a week or more. As they are more health conscious, they are more likely to consider Home Fragrances, Eau de Perfume, and Essential Oils as part of the Fragrance category. They are much more branding savvy. They prefer fruity and flowery fragrances and follow celebrities to a large extent. (Fragrancefoundation, 2007) In the UK, every woman between the ages 25 and 34, on an average carry  £ 71 worth of cosmetics in their handbag. (China cosmetic packing, 2010) Three out of five women were more likely to buy a fragrance samples in a magazine (foil pouch samples preferred). Now women prefer having a wardrobe or collection of fragrances too. (Fragrancefoundation, 2007) They still follow celebrity endorsements while choosing the fragrance. This is evident from the popularity of M brand introduced under the brand of Mariah Carey (Entrepreneur, 2007)). Consumers have revisited classic fragrances as the shift in buying behaviour moves towards quality, authenticity or value. (Academic Mintell, 2007) Social Class Similarly, differences in social class can create customer groups. In fact, the official six social classes in the UK are widely used to profile and predict different customer behaviour. In the UKs socioeconomic classification scheme, social class is not just determined by income. It is measured as a combination of occupation, income, education, wealth and other variables. (Tutor2U, 2007) Relevant social class segments for our premium perfume segment: Upper upper   old, established, socially prominent families Lower upper   new rich   Upper middle   professional people   Lower middle   white collar, salaried workers (Emailcommerce, 2007) Now the characteristics of each of these social classes vary as they are bound by different cultural and sub cultural elements. In the current marketing strategy the product was positioned just for upper class women and we didnt have a differentiated positioning for each sub cultural or social class groups within this broad definition of upper class women. Needs and buying process of upper middle class woman is completely different to a upper upper class woman. For example upper and lower middle can get influenced by friends and co-workers more and women tend to be mostly decision makers and purchasers. However in the upper upper and Lower upper, influence of family may be higher. Reference groups like social clubs, charity organisations, and social get together could be more relevant to influence the upper class women. Hence a segmented marketing approach is needed. However the 2009 downturn has frequency the purchase of perfumes among women. Women on average buy 4 fragrances a year. (Fragrencefoundation), due to the downturn there this has decreased to 2-3 fragrance a year. Still women spend enough on cosmetics. Among the higher social classes, penetration of social media has increased. Online purchases using cards has become common. Internet as an outlet has increased its penetration by 4% in the UK market. (Fragrancefoundation, 2007) Reference Groups Reference groups could also potentially influence the buying of premium perfume product. Reference groups can be aspirational or associative. Celebrities and socially respected ladies form aspirational reference groups for high class UK women. Associative reference groups could be members of a social club or co-workers or even members of church and some organisation. Friend circle is another major influential reference group as they could be sharing same interests and preferences. Family could be another reference group, this is however dealt separately. (Consumerpsychologist, 2007) In the target segment of Xclusive premium perfume product, reference groups are quite relevant. For example, Celebrity brands  are driving market growth among younger fragrance users. Over 30 new celebrity fragrances were launched in 2007. One in five 16-24 year olds claim to own at least one, compared with one in twenty over-45s. Celebrity fragrances provide the entry point for young people into the whole luxury sector.  (Fragrancefoundation, 2007) (As internet is becoming a key social media, reference groups like forums and fragrance review sites is also becoming key influencers in the decision making process. Sites like http://www.bestperfumeforwomen.co.uk/ provide reviews and give a ranking on best perfumes. You can no longer launch hundreds of fragrances, as the customer is more selective and wants something unique. Its not only the downturn that has forced this change in consumer behaviour. Thanks in large part to the internet, shoppers are much more knowledgeable about fragrances-more than many brands think. A look at some of the fragrance blogs or websites, such as Sniffapalooza (once derided, but now courted by fragrance brands) shows that consumers are having educated discussion and debate about fragrance, comparing different products and asking why they are all alike. Fragrance expert Michael Edwards calls this consumer the connoisseur, and compares such behavior to the foodie trend that emerged several years ago. Influence of Family In our target segment of upper and higher middle class women in UK, influence of family members is vital in making purchase decisions. Individual members of families often serve different roles in decision making process. Some individuals are  information gatherers/holders, who seek out information about products of relevance. These individuals often have a great deal of power because they may selectively pass on information that favours their chosen alternatives.  Typically husbands play the role of influencers; they let their wives know their wishes and suggestions. Husbands usually travel and get to know from social gatherings and even from online or internet means. In the case of premium perfume, the role of each individual in the family is critical be it that of gatherers who may be typically younger lot or social buffs, or that of influencers like husbands or decision makers or even purchasers. This makes marketing more tough as the messages need to reach a wider cross sec tion of UK society. Point of sales marketing can help to convince purchasers, but broad marketing conveying the features of Xclusive premium perfume should reach others like older ladies, socially respected relatives, and husbands. (Consumerpsychologist, 2007) Three out of four women say that when they find a fragrance they really like, they tell their friends about it. Every 2 in three women give perfumes as gift to partners, friends and family. Impact of culture/sub-culture elements Each culture contains sub-cultures groups of people with share values. Sub-cultures can include nationalities, religions, racial groups, or groups of people sharing the same geographical location. Sometimes a sub-culture will create a substantial and distinctive market segment of its own. OgAAAPeyJpurr1ryoFWlKXRdQZJVSyMAct7AfdHZmI-zSL4J5aoWNgxDAjv20AMfd_XlBjE5RI8O3Ge8wNG63V0VYoUA15jOjGI8ihdsXtJS1SOoJjWTF231BFIw (Source: From the Module presentation) For example, the youth culture or club culture has quite distinct values and buying characteristics from the much older gray generation. Similarly sub-cultural groups like immigrants from other countries and resident nationals belonging to other regions will show different characteristics to the UK culture. For example in the case of Asians, family relationships are much stronger and gifting is usually informal and ritual. However in UK, relationships are more loose, but gifting is done formally. Packaging is more relevant to the UK upper class when compared to other nationals. European communities give lot of importance to quality and elegance. Just like nationality as the above diagram shows, there are many more factors which shape up the cultural trait of an individual. Suggestions to influence consumer behaviour Fine grained social class segmentation: Have more targeted segments by age, by social class and by age. This is important as messages may have to be different and different fragrance products needs to be marketed to different social class and age groups Celebrity references: Continue to use references from celebrities, but widen your celebrity base to influence different segments. Musicians, film stars, entrepreneurs, sports personality and so on. For example younger lot get influenced with entrepreneurs as they look for confidence image to get associated with the perfumes they use. Older may prefer music stars and film personalities. Educational Promotions across wide cross section: Sales staff needs to be trained to improve their selling support and skills in order to advise customers correctly. Fragrances sold in self-selection should carry information on the outer box to provide consumer with the key ingredients of the product. Leaflets in boxes could also contain information for the consumer on the fragrance, on how to wear and tips on fragrance layering, and its ingredients which is a standard for many prestige skincare brands. In addition samples can be used to explain fragrance notes. Furthermore online sampling has been successfully carried out by luxury brands. Promotional messages should be targeted at initiators, influencers and decision makers. POS marketing is critical for purchases like free samples. Increasing the reach:Target to increase the number of outlets to reach a wider segmented base of upper and higher middle class women. Use internet as a channel to target convenience shoppers. Online purchase and spending is increasing in the upper class UK consumer segments. More over place reviews and customer testimonials especially of reference groups in social marketing sites to influence the prospective buyers. Differentiated products and channels for multiple segments: Thus there is a need to address the Teenage customers and Adult customers with different products according to their preferences. There are basically different types of shoppers which are Convenience Shoppers Value Shoppers Image Shoppers Experience Shoppers Luxury perfumes for women come under Image Shoppers and Experience Shoppers were, Teenagers belong to Image Shoppers and Adults belong to Experience shoppers. Understanding customers, their preferences, their needs led to the conclusion that our firm should go for two product lines, one addressing the teenagers and the other addressing the adults. The perfumes should have a variety of flavors i.e., a variety of citrus flavors for teenagers and flowers and fruity flavors for adults. Also advertising and promotional activities should be based on this segmentation. Recommended Positioning Strategy for Xclusive Premium Perfume Brand Introduction This report is prepared to suggest a positioning strategy for Xclusive brand of premium perfume for defined market segments. The objective of this new positioning strategy will be to have a positive influence on various factors which impact consumer behaviour and purchase decision of this premium product. However this report is limited to the positioning of the products for one of the target segments, which is upper class and higher middle class women. We assume that positioning strategy for the segment of men is working fine as sales has shown positive upward trend so far. Key Gaps with the Current Positioning Strategy Broad and inappropriate target segmentation: As per the current marketing strategy the target segment was defined as upper class men and women. Positioning message or current tagline Exclusive fragrance for just you was used to attract upper class men and women to feel that they own it and join a elite group of premium perfume owners. The target segment of upper class women was broader as consumer behaviour characteristics tend to differ with in the target segment of upper class women by age and social class. Hence the marketing messages failed to impress all the prospective buyers among the target segment of upper class women. Earlier, the segmentation was based on just income and status as quite evident from the positioning message. But it failed to impress all the cross sections of the prospective buyers. Lack of differentiated products and positioning: Tagline and positioning creates a perception map in the minds of consumers. Exclusive fragrance just for you suggests following characteristics it is expensive, it is exclusively for upper class only, it is unique from other products. However in real sense product was not differentiated from the competitor products. Hence there was a different between customer perception and experience which led to customer dissatisfaction and decline in repeat purchase. Teenagers Vs Adults with in the upper class target women Pure herbal Adults how to gain their credibility retain customer the core segment to be targeted.. Quality Personal body chemistry Brand image Teenagers Low price(relatively) Stress more on ambience Increase of celebrities Increase of social media usage especially in teenage networking sites Personal body chemistry Brand image As you can see above, teenagers are showing more affinity towards synthetic fragrance while adults are interested in herbal products. This itself calls for a rift in preferences and perception about the same fragrance product. Marketer need to address this with a differentiated product strategy. This kind of differences in perception mapping of the same product by two sections of the target segment was not considered while deciding the product and positioning strategy. Lack of proper celebrity references: Celebrities used for promoting Xclusive brand were mostly contemporary stars from the field of sports and films. But this is again not in line with the tagline, the company had. Ideally the company should have tried to bring in an image of a classic brand and they could have chosen somebody from old classic films like Lawrence of Arabia or actresses like Julie Andrews (Classic Movies, 2008) UK Consumers, especially the women in the age group of 30 to 60 were revisiting the classic brands and this could have been a better strategy. Couldnt reach all influencers: In the case of upper class women, a typical purchase process is influenced by friends, family members like husband, social clubs, social marketing forums and then ofcourse the aspirational groups like successful businesswomen or celebrities. Xclusive as a brand didnt have any such associations with these influencers. They were mostly targeting the decision makers and purchases with ads being targeted in magazines like Glamour. Redefine the target segments among the Women Xlusive brand has suffered a decline in sales over the last two years among the women target segment. From the market analysis and consumer behaviour study we can find that current marketing strategy was not good enough to attract all prospective consumers among the target segment of upper class women. Initial market strategy was just built around the income class, but it was not taking into account the consumer behaviour changes as per different factors like social class, age, cultural difference and so on. Shift in target segmentation from Upper class women to multiple target segments of segment 1: upper upper class and upper middle class (employed) woman segment 2: teenage women in upper middle class and upper class (with a high disposable income) Differentiated Products and Positioning Me too products or generic product line with one positioning message will not work in this changed environment. UK consumers are more going towards value shopping and they are likely to make more informed decisions rather than going by quick stimuli. Segment Product Positioning Upper class and upper middle class women Xclusive Classic range of fragrance in herbal mix Health and Class Exclusively Teenage upper class and upper middle class Xclusive Style Synthetic perfumes with citrus flavours Style and Confidence Suggesting following the Key Brand method to look at what factors would influence women in the above target segments choose a fragrance in the premium segment. (Brandkeys, 2010) Hence the differentiated products and positioning should be made around the following attributes selected from the above matrix Product Image Scent Ingredients Reactions Classic range of fragrance in herbal mix Classic Sexy Sociable Traditional Floral Spicy Natural Ingredients Fresh Original Sensual Powerful Inspired Strong Hence positioning messages are created around these product attributes for the two product lines. Packaging is also made consistent with these attributes to create that whole product image. Classic product line needs to be packaged in premium glass bottles with a golden plating. Style product line for teenagers will be in colourful glass bottles which are cut on sides to give it a style and powerful cuvy shape.   Creative Campaigns around Positioning Messages One of the problems with fragrance is that the penetration rates are not that high. However, a lot could be done to bring more consumers into the fragrance market. Critics say that marketers focus too much on youth, and that the scents and sometimes racy advertising campaigns aimed at this group have turned off older consumers. Appealing to women in their 30s, 40s and 50s and those who have lost touch with fragrance with an appropriate offer and marketing campaign could bring in much additional revenue. So having nostalgic and retro campaigns would be a good way to target the segment of middle aged upper class and upper middle class women. Celebrities can be actresses like Elizabeth Taylor and Julia Andrews. They can promote the Xclusive Classic brand around creating images of classic and vintage stuff never ceases or use everlasting films like Lawrence of Arabia. Moving away from contemprory stars to more stars from the classical age would be good to convince and influence changing UK consumers especially among the aged upper class segments. (The Freelibrary, 2007) Avertisement targeted at adult women Use of gold plated bottle cover and golden color font in a classic written style Xclusive *Julie Andres, an actress from yester years still a living legend to be a brand ambassador of the Classic product line Similarly for the teenage segment, celebrities from field like politics, business, sports could be chosen who can give an image of style and confidence. A study conducted among young UK women chose a set of role models like Margaret Thatcher, Marilyn Monroe, Kylie Minogue, Jamie Ogata (Confident Japanese UN official). (Cranfield University, 2009) We can probably use them as celebrities to push our style and confidence image in the mind of teenagers. Unlike adults, teenagers are more image shoppers. They can be triggered for an instant purchase by a sudden stimuli. (Telegraph, 2008) Advertisement targeting teenagers: Bold confident young women, curvy bottle shape with bold red font usage Xclusive Re-inventing Shopping Experience Shopping for fragrances needs to be made easier, and stores better adapted to how consumers browse and buy. Research by Paris-based JMG Research shows that the consumer is looking for new retail formats. She is looking for a new experience and is very reactive to new propositions. When something is out of the ordinary she will buy, says JMG Research managing director Jà ©rà ´me Goldberg. New retail store formats have to be tried out like eliminating counters in department stores, merchandising by fragrance family or creating areas for replenishment for the consumer who is only looking for that service. In a recent survey, majority of those questioned did want to see fragrances organized by brand, but 40% also said that they would like to see fragrances organized by the way they smell. Many UK women middle aged consumers now go in for a fragrance collection. This basically tends them to be more brand loyal. Fragrance is emotional and the industry needs to pay more attention to this rather talking about technical information. There needs to be beauty assistants who are helpful and knowledgeable and not just push the latest launch, says John Ayres, director of UK-based fragrance consultancy Pandora. Sales people should be doing a lot more educational selling rather than aggressive as consumers have more options to choose from. (Articles base, 2007) Leaflets in boxes should also contain information for the consumer on the fragrance, on how to wear and tips on fragrance layering and its ingredients. This is standard for many prestige skincare brands. Also samples can be used to explain fragrance notes. http://www.bglam.com/wp-content/uploads/2009/12/discount-3.JPG (Sample online perfume catalogue) Another trend is the moving away from class to mass channels for purchase. UK consumers now prefer Tesco to specialised classes like department stores.

Tuesday, November 12, 2019

Allegory Essay -- essays research papers

Allegory Plato’s The Allegory of the Cave is a short story specifically discussing the parallels between the shadows the prisoners sees on the wall of the cave, and the illusion, which passes off as truth in today\\'s society. The Allegory of the Cave is about Socrates teaching his student, Glaucon, certain principles of life by telling him one of his allegories. The Allegory of the Cave can be interpreted in many ways; one way is to make a comparison between the story and the way of thinking by individuals in a closed society. Socrates states that the cave is a world many of us would like to see, but is not really how the world is. It is almost like the movie \\"The Matrix\\", where Neo, the main character is to discover that the world he lives in, is not the real world, but a world generated by machines and computers. Only in Socrates\\' allegory, the world is not created by computers, but by individual minds. Socrates wants Glaucon to be a wiser, better-educated man, who will later become a ruler of the State. He wants him to know not only the right, but also experience the wrong, because only a man who knows the bad, can truly understand and appreciate the good. Socrates does this by telling him a story, to let him better understand the principles of life. Men are chained down in a cave and have a wall blocking their view to the outer world. The prisoners can only see the shadows of the objects on the other side of the wall. If the prisoners see the shadows of the men ...

Sunday, November 10, 2019

Business Continuity Plan

Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221. Business Continuity Plan Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221.