Friday, November 29, 2019

Homeless Shelters free essay sample

Homelessness is the condition and social category of people who lack housing, because they cannot afford, or are otherwise unable to maintain, a regular, safe, and adequate shelter. Did you know that in the whole wide world there are over 100 million people that have no shelter, and in Canada there are about 200,000 people that experience homelessness in a year? This leaves about 30,000 homeless people every night. This is a big problem worldwide and it may not seem as a big problem within Canada but it really is. We as a society need to address this issue and get the minister of social services to raise the amount of homeless shelters within an area. This is a problem that needs to be solved. As a Canadian Citizen I feel very strongly about this topic for 2 main reasons number one being that I am able to show empathy towards others . Empathy is being able to understand another persons circumstances, point of view, thoughts, and feelings and number two trying to make a difference not only in the country I was born and raised in but in the world. We will write a custom essay sample on Homeless Shelters or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Simply by getting people of the street by petitioning to the Minister of Social services. This issue is being address to you out of the common good of my heart and will hopefully will come out of your heart, take a minute and imagine yourself living on the streets for just 1 day without no food, water or heat and if you’re able to put yourself in that persons shoes and realize how hard it must be for them and now wants to help raise the amount of homeless shelters within in an area you just showed a great amount of empathy. We need to make a change and stop making stories like this be in the news http://www. theguardian. com/society/patrick-butler-cuts-blog/2013/jun/26/homeless-nightshelter-crisis-ministers-find-own-money and this http://www. theguardian. com/society/patrick-butler-cuts-blog/2013/sep/05/homelessness-housing-benefit-starts-to-hit-home more stories that show us morally good humans making a change.

Monday, November 25, 2019

Asthma Research essays

Asthma Research essays In order to conduct a search on the topic. Does education of the patient and the family in self-care management result in improved health and functional health in adult asthmatics?, I first looked for key words in the question. First I put in patient, education and asthmatic. The responses did not fit properly; they were more schooling oriented. I next put in adult, self-care, asthma and education. I was closer, but the education was skewing the responses. Finally, I put in adult, self-care and asthma. I also requested articles after 2003, because I wanted newer studies. This brought up about 227 articles; many of them were oriented toward specific ethnic/cultural groups; these were not applicable. I thus went with the two that appeared to be the most comprehensive and informative on the subject. The first article, Can asthma control be improved by understanding patients perspective I thought should be included. This was not only because of its subject and abstract that closely related to the above question, but also it consisted of responses from a panel of professionals at the International Primary Care Respiratory Group who considered the evidence to date on the subject and discussed the implications for primary care practice. This article, then, would provide an overview of a number of different researchers on this topic. Based on research to date, these healthcare professionals debated the following questions: 1. What levels of asthma control are patients currently achieving? 2. What are the common causes of poor control?, and 3. What are the main patient-related determinants of asthma control? In response to the question about education and self-management, these professionals concluded: It is possible to improve current levels of asthma control if healthcare professionals do four things: 1) use appropriate, patient-centered tools to assess control; 2) identify ...

Friday, November 22, 2019

Risks Facing Financial Insitutions Essay Example | Topics and Well Written Essays - 2500 words

Risks Facing Financial Insitutions - Essay Example alth and wealth of such financial institutions. (Aharony, 1986) Its 1988 Basel Accord deals with credit risk and has extensively guided international banks in their risk management.Similarly the Basel II(International Convergence of Capital Measurement and Capital Standards) deals with the problem of operational ,legal and strategic as well as those arising out of the loss of goodwill. ( Hsaio 2008) , This paper therefore discusses the risks faced by modern financial institutions,international efforts to resolve such risks as well as the techniques used by banks to calculate interest risks. The past two decades have indeed seen an increased banking response to the systemic risks in the financial system which emerged in response to the 1930's banking crises of the 1930s.Banks and other financial institutions perform the functions of financial intermediaries that distinguish them from other businesses. They intermediate liquidity between economic subjects and in this process face a number of risk atypical of non-financial firms. (Aharony, 1986)This financial risk measurement and management becomes very important for banks than for other companies.The modern financial institutions are very complex as they increasingly offer fee-based financial services and relatively new financial instruments and this has led to the creation of a number of new risks.Essentially the riskier the bank's business, the more capital it should hold to be able to cover future fiscal losses. Although various banks face different risks (with regards to their category) some risks are common to most banks like Credit risk , Liquidity risk , Solvency risk , Operational risk , Market risk and Interest rate risk. (Aharony, 1986) In the above paragraph a number of risks have been identified and while many of them have been overcome by regulation many still sting the face of financial prudence as unresolved dilemmas. (Aharony, 1986) These are risks like operational risks (which have been defined by the Basel Committee(Basel II) as arising from 'inadequate or failed processes, people and systems or from external events'. ( Hsaio 2008) , Operational Risks cover a wide category of risks which pertain to human error or technical deficiencies.(Black,1972) and are related to all other types of risk such as capital needs, inflation, concentration of revenues (by customers, products, geographies, etc.) new competitive conditions and environmental remediation obligations(reinforced by the new concept of Corporate Social Responsibility).(Black,1972). Operational risk is the newest area of focus in the the arena of the financial institutions but there are theoretical and practical difficulties involved in it's assessment as well as statistical irregularities in the data available. ( Hsaio 2008) , However more serious risks pertain to losses which arise due to the failure of the obligator to perform(Credit Risk) and such losses are reported to be responsible for more

Wednesday, November 20, 2019

Answer question no more than two Essay Example | Topics and Well Written Essays - 500 words

Answer question no more than two - Essay Example I would be pleasantly surprised the next day to revisit the project and find that I had solved the problem using my subconscious. I have learnt to allow my mind to work for me. The reason I find this interesting is that, during the process of rewriting the paper, I went over my word limit despite having trouble tackling the project the previous day. I found out that I did not have to overhaul the entire paper but only to revise it and build on earlier ideas. However, because there was only a short time, probably days, between the tasks and the deadline to hand them, I found that two thorough re-workings of the paper was the best I could do. Writing two drafts allowed me to expand on and improve my ideas from the first draft, as well as to rectify my mistakes and make a final copy that adheres to the project task’s word limit. While this approach is time consuming, using it on writing enhances my time management skills (Speck 22), while it also ensured that my work appeared well researched. Working together in a team has always been an exciting prospect for me until it is time to write my part of the paper. I have always been anxious of writing the first sentence in a collaborative project, especially because it has to flow with the rest of the project. The most challenging part, therefore, has been writing the introduction for a project. I have had to learn how to write the â€Å"final† introduction after finishing the initial draft and reading through the others’ drafts. In this case, the real introduction had to be written after completion of the initial draft (Speck 56), which was a challenge for me. In addition, even the initial draft required some form of introduction, meaning that I could not escape that uncertain moment. It took me more than five minutes to think about the introduction to the initial draft, especially because it would be the most durable part of the paper even after the rewriting. While my thinking when doing my part

Monday, November 18, 2019

Justice within Business Essay Example | Topics and Well Written Essays - 3000 words

Justice within Business - Essay Example This allusion to the new Testament teaching to do unto others as one would have done unto oneself places a moral context to the description. Mandeville will describe a group of people who are basically dishonest They are full of those who have "conceal'd" defects within the products they are selling, or who sell their "Ware beyond their Worth:. Here is the basic principle that a businessman seems to adhere to according to Mandeville: making a profit at any cost, whether the means are honest or otherwise. In the story of Decio and Alcander, Mandeville showswhat complications may occur when two equally dishonest businessmen attempt to take advantage of the other. In many ways there is no "right" or "wrong" within this story but rather kind of Machiavellian story of the manipulation of one person by another (Machiavelli, 1982). The story of the buyer and the seller of sugar both attempting to manipulate the other in order to get eh best price possible for what they consider to be the situation is both funny and revealing. The fact they both will use "inside information" to attempt to deceive the other is a common practice today as much as it was in the Renaissance period. The irony that "both understood the market very well" and yet also seem to have been self-deceived as to the surety of what they are hearing is wonderful. Alcander hears that a large shipment of sugar is about to come from the Indies and so realizes that the price is about to fall and thus seeks to remove Decio from knowledge of it. Decio of course hears that the fleet has in fact sunk, and so the prices are expected to increase 25%. Both men attempt to manipulate the other, and are essentially portrayed as rather skilled actors. So "how desirous soever he was to sell, the other was yet more eager to buy; yet both of them afraid of one another, for a considerable time, counterfeited all the Indifference imaginable". There is an element of gamesmanship present within the businessmen as Mandeville describes them. They appear to enjoy the cheating and manipulation that is part and parcel of the business world that they inhabit. Neither is influenced by conscience in any way. 2) Discuss how persons with such a character has reason to act fairly (appendix b) With characteristic irony and pragmatism, Hume tackles the question of how the "knave" should act in particular situations and also as a general rule. Hume states that the idea "that honesty is the best policy, may be a good general rule, but is liable to exceptions". The knave has a reason to act fairly when his specific circumstances mean that he will gain the most through doing so. Thus the knave will observe the "general rule" whenever possible, as this is the safest course within life and people will think well of him. But when the "exceptions" arise, as they often seem to do within Hume's observations, he should take advantage of them. To be simple, a knave will only act fairly when it is in his best interests to do so. A Kantian prism may help in understanding how fairness can possible occur among such apparently selfish and purely individualistic people. Kant's idea of the categorical

Saturday, November 16, 2019

Strategies to Protect Sensitive Corporate Data

Strategies to Protect Sensitive Corporate Data Jasjeet Singh What are the steps project managers must incorporate to uphold the security, privacy and disaster recovery policies to prevent Companies sensitive and vital corporate Data? Abstract Security, disasters and privacy are risks to a project and to a project manager. But project managers are trained to deal with risks. These risks are best addressed when the project manager fully understands them. In a nutshell, we can say its all about protection of vital data and its critical element CIA(confidentiality, integrity, and availability) including the machines and process that use, store, and transmit that data. Security is a risk to project managers for both implementing a project and perhaps the project itself if it is IT or telecom related. In this paper, I will include the data security risks facing a project manager, How to protect the CIA Triad using various security policies, standards, and procedures. And I will try to touch some more information security related aspects like Security Awareness and privacy protection, etc. Keywords-Project management; Project Manager; Data Security; Privacy; Security Policies; Confidentiality; Security Awareness. Almost every project generate or use, some form of information and information technology. Mostly, this information needs to be preserved or isolated by some form of security. Security planning and implementation is an integral part of the overall project life cycle which also include many different issues to be considered when planning a project. Whereas finally what is being safeguarded is the data produced by the machines, the information that data is used to create, and in some manner, the conclusions made based upon that vital data. A security threat is something that jeopardizes any of the CIA Triad (availability, confidentiality, and integrity) of a machines data. Security flaws and risks emerge from such threats. Solutions and planning to manage such items begins in the very initiation stages of a projects life with the identification of any of these security related flaws, risks, and threats. In parallel with each phase, efforts work towards constantly identifying new threats and reducing the identified security risks through the diligent planning and proper implementation of risk mitigation strategies specifically developed to resolve each unique threat specifically. Security of vital data and associated technology systems must be considered when planning projects, developing applications, implementing systems, or framework etc. So as to be effective and efficient, security must be organized for and embedded into the systems from the very starting, and monitored periodically throughout the life of the proje ct, and be maintained all along the life of the system. Thereby the result is planning as soon as possible in early stages and embedding security into all phases of a projects life cycle is usually considerably easier and much less cost consuming than waiting till the later project phases to consider it. On the moment when addressing the security for the majority of the data frameworks, it might be a chance to be decayed under three principal segments that are; communications, hardware, and software. Arranging how every from claiming these zones may be ensured includes not the main attention by the people, policy, practice etc. and also, financial considerations with furnish for those Audit from claiming the framework, asset procurement, execution of security solutions, progressing security maintenance and so on. Figure 1: CIA Triad The image shows the main goal of such efforts which are to maintain the availability, confidentiality, and integrity of vital information. All information system must maintain: Confidentiality disclosure or exposure to unauthorized individuals or systems is prevented Integrity data cannot be created, changed, or deleted without proper authorization. Availability information and the security controls used to protect it are functioning correctly when the information is needed.   Ã‚   An ordinary Project Management technique doesnt incorporate subtle elements regarding guaranteeing integrity, confidentiality, Furthermore availability for the majority of the data or those protections about particular data. Background need to be demonstrated that mostly the information security or privacy experts would not consult regarding the undertaking until those test phase, alternately much more terrible The point when the project needs with be marked off or executed Also about to go live. These conditions will feel thick, as commonplace on the majority of the data security experts Also privacy officers indistinguishable. This cautiously might prompt postponements previously, sign-off Whats more go-live alternately significantly more repulsive another information skeleton being moved under preparing without expanding security Also security controls completed. This means exploitation of risks such as: Breaches of legal requirements, for example, the Privacy Act, Unauthorized access to systems and information, Disclosure of information Moreover bolting on security instruments controls alternately privacy controls toward those end of the development, for example, another provision or the usage of a new data framework is really unreasonable Furthermore drawn out. Data information and framework security Whats more security methods oughta chance to be inserted under the organizations venture administration procedure. This ensures that majority of the data security Also security dangers would identify, assessed, figured out how Whats more tended to ask and only an undertaking. This approach Might make associated for during whatever endeavor regardless to its character, e.g. an endeavor for focus profits of those business process, IT, office organization Moreover different supporting manifestations. Venture supervisors would continuously set under a considerable measure from claiming weight to guarantee they convey on time Whats more inside plan. On accomplish execution of a secure Also industry consistent legitimate a dministrative necessities data system, it may be vital to take part for the majority of the data security and security topic masters from those minute a feasible ticket may be recognized to Creating. The two main approaches to project management are: The waterfall approach (delivery is all-in-one-go, for example, Prince 2 and PMP); and A release-based iterative approach (delivery is in bursts of functionality spread over time, for example, Agile Scrum/Sprint methodology). Both methodologies need pros Furthermore cons Furthermore, we wont talk about whatever points of these two approaches, rather it takes a gander during the place whats more entryway data security Also privacy ought to a chance to be joined under those project management cycle, in any case about which methodology is picked. Process Steps Everyone dares organization methodologies to take after a tantamount high-cap convert starting with asserting 4 alternately 5 steps, in the passages underneath those steps to that Agile technique would previously, (brackets). Every for these steps needs their goal/objective, in addition, an arranged starting with guaranteeing deliverables to that step. For every to these steps, those one assignment director ought to should incorporate a security proficient. Incorporating security under exercises beginning with that start will Abstain starting with each moment abstain? In addition (often very) irrationally additions later on in the project. The individuals taking then afterward slug concentrates give to an Audit of the lions share of the information security Also privacy-related considerations for each phase. More details on this topic can be studied on the internet. Scope/Initiation/Discovery (Stage 1 Vision) Might be specific information included in this project alternately converted at that passed on information system? Assuming that something like that the individuals or security officers necessities around an opportunity to be contacted at this stage. What is the order alternately affect the ability of the data processed? Ensure that the Information Security Officer (or equivalent role such as ICT security, CISO, ITSM) is involved in communicating security requirements; these must be an important part of the business needs. Is there a requirement for compliance with legal or regulatory needs, national or international standards (ISO27001) or contractual security and privacy obligations? Business Case/Planning (Stage 2 Product Roadmap and stage 3 Release Planning) Indulge with the respective subject matter professionals to discuss in detail the security and privacy needs, so they can be implemented during the design of the project. Pre-define the acceptance methodology for all the business needs, including security and privacy protection. Identify security and privacy risks and perform risk and privacy impact assessments. Depending upon the results of these assessments, identify security and privacy countermeasures and techniques which need to be included in the design. Development/Execution (Stage 4 Sprint Planning and Stage 5 Daily Scrum) During the design implementation the identified security and privacy controls? Perform compliance checks and security reviews against requirements and selected controls, against existing policies and standards. communicate with external security experts such as penetration testers, code reviewers, and auditors, etc Plan for performing vulnerability scans (internally) and checking of the patch fixing status. Consider meeting the Operations team that will handle the solution from a security perspective after moving on to production. Test Evaluation/Control Validation (Stage 6 Sprint Review) Indulge with security and privacy subject concern experts to assist with communicating and understanding the resulting reports (test). Execute all security testing: penetration test, code review and/or ISO audit. Have Security operations team go through with the operational documentation? Regularly check the risk register and review all risks, based on the solution as it has been formulated. Launch/Close (Stage 7) Pass on the formulated security and privacy treatment plans, which have been accepted and agreed by the business owner. Start the business normally with security operations, monitoring of risks and compliance. Milestones or gated Approach The waterfall project management techniques discuss that for managing Also controlling the one project phases, An amount from claiming checkpoints, turning points or gateways ought further bolstering be presented. Figure 2: Gated approach The main motive of these gateways is to make sure that all criteria or needs are fulfilled or not, all required deliverables for that phase are done or not, and to review if the project is still on time/within budget. These gateways are the instances in time during a project where security and compliance milestones can be introduced to safeguard that the project in compliance with all agreed business needs, including security and privacy formulations. Underneath are some checks, decisions, and lists that should be implemented from an information security and privacy point of view: Scope gate High-level business, information security, and privacy needs identified. The seriousness of information assessed and considered. Business case sign-off gate By in-depth study on the risks assessment, note down all security and privacy controls and procedures. In-depth security and privacy requirements formulated and acceptance criteria accepted upon. Indulge with IT design architects and information security subject matter professionals to compose a Risk management Plan (which will include a resource plan/budget). Maintain a risk register that lists down all privacy risks, security risks, and initial level of risk (gross risk). Design sign-off gate Assessment of privacy, security and reviews and compliance points against agreed sign-off criteria. Go through the project risk register that lists down all security risks, privacy risks, and potential residual risk. Communicate with 3rd parties to agree on the scope of a penetration test, Certification Accreditation audits, code review or other security tests that are been outsourced. Communicate with the operational security team to put forward the solution and manage if the document set is complete, acceptable and up-to-date. Final business sign-off gate Check weather all formulated security and privacy controls and procedure implemented as designed? The job of Information Security is primarily to ensure CIA in place but there is a common misconception that only IT is responsible for it. But theyre not!! Then who is responsible for Information Security in your organization or say for the project youre managing? Lets think of below: Who is the information owner in the organization for this project? Its senior management or business heads (on behalf of the customer). Remember IT is the custodian of information while the owner will decide about classification and protection/access requirement. Who is to understand and conduct impact assessment? The owner should be the one who is gonna tell us how important ( or say risk level) the information is and assess what will happen if we fail to protect. How to secure information flow/process in your project? Once you understand customer or owners requirement and the impact, now Project Manager has to play the role. However, PMs are not expected to be security experts but be fully aware of it. PM is the one who: Should understand what are information risk concerning his/her project Interpret impact to senior management and customer for security issues Need to be able to decide on appropriate mitigating action Minimize the risk associated with information security threats/breaches. Include security considerations is integrated into every phase and process of a projectà Ã‚ ¾ and Ensure adherence to policy and standard/compliance So need to include Information Security within the project process right from the Initiation. We can fit it in when developing Project Charter Business Case  ­ Consider Impact Assessment on proposed product service from information risk perspective and also must include information security safeguard and issue during cost benefit analysis. Discuss and identify security features/requirements to be added. Project Statement of Work  ­ Review product scope to identify info. sec requirement and incorporate any additional Customer requirement for specific info ­sec standard compliance Organizational Process Asset  ­ Internal Information Security Policy, Standard and Procedure and also security control and audit requirement for process systems including a stipulated in RFP. Enterprise Environmental Factors  ­ In addition to Legal Regulatory requirement may need to consider industry standard practice on Information Security. Formulated security testing reviewing the results and make a decision if things are acceptable or not. Project Plan integrate information security Scope Management Collect Requirements Legislation, regulation and customer expectations on information security and make sure you know how you will be able to measure whether above requirements are met? Change Control process should always consider IS impact during approval/review. Data Classification should be approved by management and customer and also define control requirements in the system, 3rd party and operational process for the data type. Identify all requirements on data storage, record management and destruction for the internal and external party and then prepare data governance/ handling policy and procedure for your project based on the above. Figure 3: Threat Activity model Procurement Identify critical supplier who can have a significant impact on project deliverable and responsible for handling restricted data. Do we need sign NDA? Require Audit right to review their process and controls? Have to safeguard from relevant security flaws appropriately resolved in all your third party contracts. Quality Control Quality will include security compliance on process and record management. Quality Assurance will perform security audit and review privilege (system +operational) to review data disposal and backup process. For effective measurement, need to identify appropriate PI for security control. Next, integrate within your Project Plan. Cost Time Ensure budget and schedule covered security related activities and controls. Stakeholder Management Cross-border data transfer and data privacy issue applicable? Regulatory compliance and approval required? Engage early with concerned parties to properly plan ahead. Monitor change in regulatory and statutory policy. How to maintain requests for information from government agencies and those results from legal process? Example: Regulators response and deadline may challenge project outcome. Project Risk Management Information Risk Assessment Lets review the basics once again: Define Information Risk  ­ Risk is a factor of the likelihood of a given threat sources exploiting a particular potential vulnerability and the resulting effect of that adverse event on the organization. Qualitative Risk Assessment A method can be Overall Risk Score = Likelihood X Impact. The likelihood is a chance of this event occurring in the scale of 1 ­5 or Very Likely, Likely, Maybe, Unlikely, Highly Unlikely etc. For example, whats the chance vendor the system will compromise our data during the project? The impact is how much effect once the risk (no control in place) in the scale of 1 ­5 or Critical, High, Medium, Low, Minimal. For example, what will happen to us once the data is compromised? Define overall rating for risk, For example, can be High if > 15, Medium for 10- ­15, and Low if When required should engage information owner, customer, and security function wherever possible and then assign monitoring responsibility and activities within a risk response plan. Quantitative Risk Assessment Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk being realized over a one year period. ALE = SLE * ARO ­SLE (Single Loss Expectancy) is the value of a single event loss of the asset [impact] ­SLE = Asset Value x Exposure factor. [EF is what % of the asset will be damaged] ­ARO (Annualized Rate of Occurrence) is how often the incident can occur in a year [likelihood]. A risk occurring once in 5 years has an ARO of 0.05à Ã‚ ¾ while if occurring 10 times in a year then ARO = 10 Could use average = (Worst + 4*Average + Best) / 6. The above is kept simple and not perfect but better than nothing. Risk Response Cost Benefit analysis of feasible Safeguard/Control Compare ALE considering with and without safeguard control in place. Value = ALE (with NO safeguard) (ALE after implementing safeguard) (annual the cost of safeguard). Select Mitigation, Transfer, Acceptance, and Avoidance based on above. Note: SIME: Security Information and Event Management  ­ DLP: Data Leakage Protection  ­ DRM: Digital Rights Management. HR/People Manage Security with People Security Skills Assessment What are the resources and skill requirement for information security in your project? Does your security function have sufficient trained resources? Assign security management and appropriate level of authority to carry out this role. Security Awareness Security is not police job, rather we are protecting corporate information to safeguard our customer, our business and to comply with statutory requirements. All team members know their responsibilities to help establish security and comply with the policy. Set up ground rules on acceptable and unacceptable activities, for example, usage of social media, official email monitoring etc as per organizational procedure. Clearly, understand data classification policy and how to handle each type of data. Figure 4: Security Awareness Training Promote awareness campaign to motivate team members to be the safeguard of corporate information. Security breach/issue reporting and handling procedure should be clearly communicated. Discuss why we focus on information security and clarify concern during team building. Project Communication Secure what you communicate Comply with the security policies Comply with the policy from both client organization and project organization. In cases where policies overlap, the more restrictive policy will apply. Check whether supplier/vendor/outsource Company meets the same standard. Checkpoint for data transfers and storage Consider using method in which password protect the meetings and/or use the roll call system of the conferencing. Prefer to encrypt data during the distribution of meeting proceedings and another project documents via email. Select Instant messaging, desktop or application sharing/video conferencing via secured provider or channel. Check what information is acceptable to be left in auto responders and in voice mailboxes. Establish administrative controls Prepare Guidelines for use of social media and how to share project information. There should be guidelines or ground rules regarding forwarding work related email to personal or transfer to smart phones ­ Consequence of a security breach and data leakage should be clearly communicated. Project Execution Implement effective control Direct and Manage Project Work Segregation of Duties execution, and supervision of any process should not be performed by a single person and establish dual control or Maker Checker process on activity involving risk. Strictly follow approval and authorization limit for layered control on requesting a change. Reviewed authority and access right upon during staff transfer or exit from the project. Ensure appropriate labeling and storage of documents resulted from project activities. Remind importance of security awareness and to notify breach/incidents immediately. Engage with the supplier to increase security awareness with their employee as per your standard. Data backup and restoration should be periodically tested for project related system(s). Manage Communication When information requested by the supplier, check against requirement and policy before sharing. Maintain the record of send and receipt when documents are shared/sent to the 3rd party. Figure 5: Communication Management Discuss information security issue in the regular review meeting and notify formally when appropriate. Monitor Control Pro-active check and act Control Scope Risks Ensure security verification upon milestone achievement. Reviewed system logs, alert and process audit output to identify the potential incident. Monitor change in regulatory and other critical factors that may force information risk re ­assessment. Security Incident Management Assess impact Internal, Financial, Legal, Regulatory, Customer, and Media/Reputation. Do NOT underestimate any impact often serious consequence happens from simple case. Invoke organizational incident management process and escalate to senior management if required. Manage 3rd Party Risk Conduct an audit to see how Vendor/Outsourced company process, store and destroy your information. Review what formal information ( and their type) are being shared with external parties. Check with the critical supplier for Business Continuity drill as it may impact your project during any disaster. Project Closure -Secure disposal Formal Sign Off Conduct security audit with supplier and customer (if required) and document formal sign off. Ensure all project documents and necessary records are properly achieved. Document lesson learned from security issue and incident handling. Operational Handover Document to enforce security controls as recommended for regular operation. Revoke access rights from the system before dissolving project team. Formal handover production system, customer/business documents, manual or other records including backup data and electronic equipment containing information. Data Disposal Formally confirm with all project team members on secure destruction either stored in electronic format or paper-based document which no longer required. Confirm destruction from a supplier who may retain information belong to your company/customer. Conclusion Information Security plays a very important role in the development of every project irrespective of projects magnitude. So the project manager has to be very much alert and attentive to check and to meet the protocols so as to preserve the vital corporate data of the organizations during each phase of the project development. Figure 6: Template for Questionnaire to review security of project The project manager must use various new techniques to embed the security into the project from the very initiation phase one of such technique is to use Questionnaire to review the security of the project. Project Managers can also look for a new secured Software development life cycle model which incorporates all major aspects of the data security, privacy, and recovery for a software development. Figure 7: Secure SDLC Model Those A large cost savvy approach to managing security under products or techniques is to actualize all the security Furthermore privacy controls and mechanisms under the configuration, Including them later alternately. After the project needs to be run live, will be significantly a greater amount exorbitant and might diminish those Return-on-Investment of the project altogether. References [1] Security Issues that Project Managers at CDC Need to Address, CDC Unified Process Project Management, vol. 2, no. 6, June 2008. [2] M. Dean, A risk ­based approach to planning and implementing an information security program, in PMI, 2008. [3] B. Egeland, Learn 3 Ways to Ensure Your Project Data is Secure., Is Project Security that Important?, July 2, 2015. [4] R. J. Ellison, Security and Project Management, Security and Project Management | US ­CERT, February 06, 2006. [5] D. E. Essex, government database project outsourcing, A matter of public record, August 2003. [6] S. Fister Gale, Safeguarding the data treasure, February 2011. [7] S. Hendershot, Security guards ­ data ­security initiatives for Project Managers, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control), Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), September 2014. [8] C. Klingler, Security, privacy and disaster recovery for the project manager, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control) , Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), 2002. [9] Monique, Information Security Privacy as part of Project Management, 18 March, 2015. [10] M. Pruitt, Security Best Practices for IT Project Managers, SANS Institute, June 18, 2013. Table of Figures Figure 1: CIA Triad: https://www.checkmarx.com/wp-content/uploads/2016/06/Data-Securi

Wednesday, November 13, 2019

Essay on the Symbolism of the Menagerie in The Glass Menagerie

The Symbolism of the Menagerie in The Glass Menagerie      Ã‚   Tennessee Williams' play, The Glass Menagerie, describes three separate characters, their dreams, and the harsh realities they face in a modern world.   The Glass Menagerie exposes the lost dreams of a southern family and their desperate struggle to escape reality. Williams' use of symbols adds depth to the play. The glass menagerie itself is a symbol Williams uses to represent the broken lives of Amanda, Laura and Tom Wingfield and their inability to live in the present. The glass menagerie symbolizes Amanda Wingfield's overwhelming need to cling to her past and her fulfilled fear of being alone.   Amanda resents the poverty-stricken neighborhood in which she lives so much that she needs to mentally escape from it by invented romance and self-deception. Williams describes her as having "endurance and a kind of heroism, but she is also silly, snobbish, sometimes cruel and sometimes pathetic in her well-intentioned blundering"(Williams 1865).   Abandoned by her husband, Amanda comforts herself with recollections of her earlier, more gracious, southern life in Blue Mountain when she was pursued by "gentleman callers".  Ã‚   Amanda is desperate to find her daughter, Laura, a husband, the kind of gentleman caller that she herself longed for, who would not have deserted her. "Well, in the South we had so many servants. Gone, gone, gone. All vestiges of gracious living! Gone completely! I wasn't prepared for what the future brought me." (Williams 1893 ). She foists her illusions on her unwilling children, lives in the past with pretensions to glory.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Laura's collection of glass animals represents her hypersensitive nature and fragility.   The glass menagerie is ... ...tle glass animals came to represent in my memory all the softest emotions that belong to the recollection of things past. They stood for all the tender things that relieve"(Williams 64). They retreat into their own separate worlds to escape the harshness of life.   Amanda, Laura, and Tom are incapable of living in the present. Mirroring the social and economic despair in the U.S., The Glass Menagerie is nostalgia for a past world and its evocation of loneliness and lost love, which celebrates, above all, the human need to dream.    Works Cited and Consulted: Crandall, George. The Critical Response to Tennessee Williams. Westport: Greenwood, 1996. Martin, Robert. Critical Essays on Tennessee Williams (Critical Essays on American Literature). New York: Simon and Schuster, 1997. Williams, Tennessee. "The Glass Menagerie". New York: Random House, 1985.

Monday, November 11, 2019

Nike’s CRM Essay

Nike manufactures shoes also athletic clothing such as shorts, shirts, jackets and under armors; wristbands, bag packs, jerseys and socks are also sold by Nike (Rao, 2012). The Nike slogan, Just Do It, have placed it’s brand in the mind of consumers, through the recognition of it’s products and promotional tools used worldwide (Rao, 2012). Customer Relationship Management (CRM) is focusing on meaningful, long term relationships and not immediate profit with the customers (2010, p.202). According to the research, in 2012, Nike launched a new business division called Nike Digital sport (NDS). The objective of NDS was designing to develop technologies that allow the users to track their personal performance while Nike collected and stored data relating to customer needs. Because of NDS, Nike has been able to communicate more effectively with customers about their needs. Nike also has it’s own social networking service called Nike+ (Rao, 2012). This social networking service focuses on building social networks and relationships among people and communities. Nike has built relationships between the company and customer by understanding the customer’s needs and preferences. CRM programs implemented by Nike are mainly operational and strategic. For example, Nike Fuel enables customers to record their progress through the use of Nike Plus devices. These devices are designed to update customers on the latest Nike sports trends and insights, and allow them to communicate with Nike. Another CRM program implement by Nike is Nike + Connect apps. It is a free app developed by Nike that uploads customer’s Nike+ data from plus devices to their accounts. Nike also created a Nike+ running app that enables customers to share their experience on social media sites such as Twitter and Facebook. According to the research, Nike reaches over millions of fans every day in an interactive dialogue, rather than having to rely on big sponsored events to reach this number (Stokes, 2012). The massive volumes of freely shared user data produce meaningful brand insights, lead to product innovations, and allow the brand to get closer to consumers. Effective CRM has enabled Nike to collaborate with customers, drive business processes, maximize Return on Investment (ROI) and support brand development (Stokes, 2012). Nike promises to stand behind all of the company’s products for both consumer and retail accounts (Nike, 2014). Nike’s web site enables its customers to use the search function to search for information related to Nike’s customer service policies. The answers are provided by the use of intelligent automates response technology. The website also provides customers with answers of Frequently Asked Question (FAQ). Through the implementation of this program, Nike is able to have an open communication line with and a better understanding of customers. Customer facing process results in a product or service that is received by an organization’s external customer (Stokes, 2012). In 2010, Nike created a division called Nike Digital Sport (DS). DS provides skilled resources, budget, and coordination across the enterprise (Cendrowski, 2012). Nike’s goal was to create a combined consumer experience that shapes responds to the evolving preferences of consumers (Cendrowski, 2012). Nike DS leads most customer-facing digital projects, releasing products under the Nike Plus brand. Personnel, designers and a team of marketers work together to develop new digital innovations. Together, they work to find new ways to mine large amounts of highly accurate customer data, which is a key strategic asset for marketing and product development in the highly competitive digital space. Nike plans, in the future, to become ever-closer to each of its customers around the world. I think in the future, Nike should considering incorporating a link similar to zapdata.com to the Nike web site. Customers can click on the link and contact Nike in real time via text-chat software hosted by a second party such as a live person. Customers can click on a text-chat button and the  site launches a new window and have questions answered by a live representative. Customers can continue to browse Nike while a support representative answers their question(s). If after asking the question a customer is still having difficulty finding the information, the representative from Nike online can simply send the page to the customer with the information that he or she was seeking for. This might impose a high cost to Nike starting out, but the increase in sales will quickly cover the expenses and further enhance the company’s customer support and satisfaction. Reference 1. Cendrowski, S. (2012). Nike’s new marketing mojo. Fortune Magazine. Retrieved on June 17, 2014 from: http://fortune.com/2012/02/13/nikes-new-marketing-mojo/ 2. Naveed, H. (2012). Nike, Inc. Website Analysis. Website Analysis. Retrieved on June 16, 2014 from:https://sites.google.com/a/email.vccs.edu/bus100hnaveed/home/website-analysis. 3. Nesbitt, S. (2011). Measuring the ROI of Social CRM. Social Technology Review.Retrieved on June 17, 2014 from:http://www.socialtechnologyreview.com/articles/measuring-roi-social-crm 4. NIKE, INC. (2014). Business Overview. Nike Global Growth Strategy. Retrieved on June 17, 2014 from: http://nikeinc.com/news/nike-inc-introduces-2015-global-growth-strategywww.nikeresponsibility.com/report/content/chapter/business-overview 5. Rao, A.S. (2012). Digital Marketing at Nike: From Communication to Dialogue. IBS Center for Management Research. PDF Document.

Saturday, November 9, 2019

Queen vs. Dudley and Stephens

Regina v. Dudley and Stephens There have been many criminal cases in the history, which brought controversy, whether murder could be justified under different circumstances. One of the famous cases tells a story of four shipwrecked men, which were lost in the high seas. The story was named â€Å"The Lifeboat Case†, regarding the tragic and life-changing decision that was made in extreme circumstance. Four seamen, Thomas Dudley, Edward Stephens, Brooks and seventeen year old Richard Parker were in high seas and due to the storm that hit them very bad, they had to put themselves into an open boat.They did not have any supply of water and food, except 1 lb. tin of turnips. On the fourth day of this journey, they caught a small turtle and it lasted them for few days. After the turtle was completely consumed, they spent eight more days in hunger. On twentieth day of being in the state of prostration, Dudley and Stephens spoke to Brooks as to what should be done if there will be no help. Dudley suggested that one of them should sacrifice his life to save the rest and offered to draw lots in order to pick one.Since Brooks refused to consent and as three seamen, except the boy spoke about their families, Dudley proposed to kill the Parker, since he had no family and the fact that he would die soon anyway, because he was the weakest and he was drinking sea water. Although, Brooks dissented from the crime, with the agreement of Stephens and Dudley, the act was done on July 25th. With the prayer to forgive them, Dudley came up to helpless Richard Parker and telling him that his time has come, put the knife on his throat and killed him.After eating Richard’s body and drinking his blood for four days, the seamen were picked up by a passing ship. The rescuers carried them to the port of Falmouth and they were committed for trial at Exeter. They spent all the time from that day till the court in prison. Since it was very rare case, involving the law of the sea a nd extreme necessity, it was hard to pronounce judgment. Nobody knows if they would survive till the rescuers, hadn’t they not eaten the boy. They could have died from starvation. And Parker in his weak condition would most likely die also.Jurors at the trial were ignorant and they would agree with whatever the court’s decision will be. However, due to the complication of the case, the court was rescheduled to December 4th to be argued before a Court consisting of 5 judges. Regardless of an attorney A. Collins’ objections, saying that it was not a homicide, but a self-preserving act upon the great necessity, prisoner Dudley and Stephens were sentenced to death because, the facts that were presented to the jury, including Parker’s left body parts were horrifying and there is no such necessity that allows one to take another person’s life.However, the death sentence was commuted by Crown to six moth imprisonment. Unfavorable and at the same time trag ic story of â€Å"Dudley and Stephens† begs some questions and requires details, which will be clarified below with the help of some research and articles. While reading the case story, a lot of details seem to be missing and Andreas Teuber, The Professor of Philosophy of Law at Brandeis University proposed a very thorough research with a lot of necessary information, called â€Å"The Mignonette, 1884 Queen v. Dudley†.According to Teuber, the name of the ship was â€Å"The Mignonette† and the owner was a wealthy Australian barrister, who decided to hire a crew to sail his yacht, instead of sending it as a deck cargo since the condition of the ship was not the sturdiest. †He hired Thomas Dudley as a captain, and Dudley recruited Edwin Stephens as mate, Edmund Brooks as able seamen, and seventeen year old boy, Richard Parker, as ordinary seamen† (people. brandeis. edu). Teuber states in his work. The initial reason for the men being on the high seas wa s the fact that they were hired as a crew to sail the ship to Sydney, Australia.Even though, they expected a nice weather in May, soon enough it turned foul and a heavy wave hit the ship, crushing it. As the ship started to sink, men barely managed to get into a lifeboat and by the time they were trying to save their lives, all of supplies of water and food were gone. Professor Teuber clarifies it, saying: â€Å"Unfortunately, the emergency supply of water that they had hastily thrown overboard next to the dinghy was swept away by the waves† (people. brandeis. edu). Since Teuber acknowledged that Dudley was the captain of the ship, it might also be the reason of why all decisions were made by Dudley.He might have felt himself responsible for men’s life and tried to save as much as he could, by sacrificing one. One of the details Teuber mentioned was that the rest of seamen were rescued by a German boat, called â€Å"Montezuma†, which was heading home from South America. As soon as they delivered men to Falmouth and started questioning them, it was clear that they have committed a crime. However, Brook’s name wasn’t mentioned as one of the prisoners throughout the story. And Teuber reveals the reason, saying:†The upright Dudley immediately insisted that he was the ringleader and that Brooks was completely innocent† (people. randeis. edu). So that’s why Brooks played as a prosecution’s witness. The most remarkable situation in this case, was the peace between Dudley and the Richard’s brother Daniel Parker. He even came to court and shook Dudley’s hand. By the way, the initials C. J stand for Chief Justice Lord Coleridge who refused to recognize the prisoners’ case as necessity act. Information that seems to be the most curious for everyone is how those three seamen did live their lives after committing such an act of cannibalism.According to Professor Teuber, Brooks went back to th e sea, Stephens supported himself doing odd jobs and Dudley immigrated to Sydney, Australia. He was taking big amounts of opium in order to relieve himself from painful memories and died from bubonic plague in 1900. One of the sources, that provide a reliable details regarding the â€Å"Dudley and Stephens† case is a Canadian online Law Press magazine and a legal information website www. duhaime. org. One of the founding partners of â€Å"Duhaime Law† Lloyd Duhaime wrote an article called â€Å"Cannibalism on the High Seas: the Common Law’s Perfect Storm†.Duhaime, a lawyer with 26 years of experience, reports the exact location where the homicide act happened as he states: â€Å"Suddenly, the four men were crowded in a small dinghy, lost in the middle of the South Atlantic, at latitude 27 degrees 10 south and longitude 9 degrees 50 West: 1600 miles for Cape of Good Hope, 2000 from South America† (www. duhaime. org). One of the things Duhaime declar es is Dudley’s harrowing confession words which sound like this: â€Å"I then put my knife into the side of the neck.The blood spurted out, and we caught it in the bailer and we drank the blood while it was warm; we then stripped the body, cut it open, and took out his liver and heart, and we ate the liver while it was still warm† (www. duhaime. org). But besides his confession, existing human flesh under his fingernails was enough evidence. In addition, Duhaime states some information on seamen’s further life after the trial ended. According to him, â€Å"Brooks died in 1919; Edwin Stephens buried the Parker affair with alcohol and died in 1914†.According to A. W. Brian Simpson’s â€Å"A Victorian Yachting Tragedy† book, the main role in commuting six month imprisonment was played by young Queen Victoria and Sir William Harcourt, a home secretary at the time. Apparently, strict death sentence was the only solution for murder crimes in 1884. According to the book, Sir William and Queen Victoria had some misunderstandings and a different opinion over previous few cases, but since The Queen was preoccupied with the fate of her idol General Gordon, Mr. Harcourt was responsible for the case.Lewis Harcourt, a son and the private secretary of Sir William, strongly argued about short sentence only and while he was away shooting, Sir William announced the decision which was approved by Queen. As a result, the author of â€Å"A Victorian Yachting Tragedy†, Mr. Simpson grants: â€Å"On December 12 it was decided that the sentence be commuted to six moth imprisonment, not at hard labor, to be dated from December 4, the date of judgment against them not sentence. † (A. W Brian Simpson 247). However, Phillipa Dudley was not happy with the decision and expected her husband home sooner and there were talks later on releasing Thomas earlier.Moreover, Simpson provides an information on missing initials of A. G and Q. C, w here A. G stands for Attorney General Sir Henry James and Q. C stands for Queen’s Counsel. According to book â€Å"Plutarch’s Lives: The translation called Dryden’s Volume 4†, the meaning of phrase â€Å"Necesse est ut eam, non ut vivam†, is â€Å"There was a necessity to sail, but no necessity to live† (Plutarch, John Dryden, Arthur Hugh Clough 561). Meanwhile, â€Å"So spake the Fiend, and with necessity, The Tyrant’s plea, excused his devilish deeds† was taken from John Milton’s poem in â€Å"Paradise Lost† book.It this specific case it does not mean that the act was devilish; however, it would appear that necessity was the excuse. Overall, research clarified a lot of things in this controversial case. There were many horrifying detailed accounts, such as Parker’s eaten body parts or as amusing and heart-breaking information as peace between Dudley and Parker’s brother. Moreover, the fact that in those years murder crimes were punished by death sentence and the court made an exception due to the nature of situation makes it one of the famous criminal law cases.Work Cited: 1. Andreas, Teuber. â€Å"Philosophy of Law Had-Out Page†. Brandeis University. 5 Feb. 2004: Web. 18 March, 2013. 2. Lloyd, Duhaime. â€Å"Cannibalism on the High Seas: the Common Law’s Perfect Storm. www. duhaime. org. 20 Aug. 2011: Web. 18 March, 2013. 3. A. W. Brian, Simpson. â€Å"Cannibalism and Common Law: A Victorian Yachting Tragedy†. â€Å"The Hambledon Press†. 1994. 18 March, 2013 4. Plutarch, John Dryden, Arthur Hugh. â€Å"Plutarch’s Lives: The translation called Dryden’s Volume 4†. â€Å"Little, Brown and Company†. Boston. 1884. 18 March, 2013

Wednesday, November 6, 2019

Patrick Ballinger Essay

Patrick Ballinger Essay Patrick Ballinger Essay Patrick Ballinger Professor Stacey Carnes-Reyes Sociology 101 20 November 2014 The three broad sociological perspectives affected me under one very important class in my high school life. The program JROTC, had all 3 sociological perspectives, Functionalist Perspective, Conflict Perspective, and Symbolic Interactionist Perspective. We had at one point covered all 3 of these perspectives, our instructor wanted us to see a different view on how society/things work. We would be given different tasks, on a lower grader level (let) would ask us what to do in a situation. Being an older cadet in JROTC we would have to look out of our perspective and into theirs. I have a life event that uses all 3 perspectives perfectly. I’ll use our military ball for this perspective, the senior class is tasked to schedule and run the ball. That goes form calling in to hold the event to setting up the tables in an organized fashion. We divided up the tasks, I was placed into the seating arrangement and overall management of ball events. This meant I had to see where the table s where placed and where the seniors (let 4) cadets will be siting. The seniors will be spread out to keep younger cadets quite. For managing the ball events was more of a last minute job, I had to make sure everyone was here and at their place they were assigned. I was to be feed information from the other committees as the weeks came to a close. So that way I would know what’s going on and when. We came close to the last week and about half of the committees came to me with what they were doing. That went smooth, no time of arrivals bumped over one another nothing. Then about 2 groups came to me that needed someone, the same person, to get something at the exact time. I noticed it right as it happened. I told them one of you have to find a new time or a new driver. They began arguing about why their group need to change, why can’t the other one. So I jumped in and said ill drive somebodies stuff up there that morning to help out. That was the only major bump in the road of planning it. During the ball we had our respected ceremonies, color guard posted the colors, the honor guard did the POW MIA table ceremony, and then we proceeded to have our guess speak. During our guess speeches, the younger cadets started to talk. We planned ahead of this and had some Let 3 and 4 (juniors and seniors) go up quietly and ask them to be quite or we would escort them out. After the guess spoke, it was time to eat. The guess would go out first and would go to a separate area to eat, while the cadets ate then about 45 minutes later, the music, dancing and other festivities start. There was at one point a small argument that happened between a cadet and their date. I was asked to talk to the male cadet about what happened while a female talked to his date. The problem was resolved within minutes of it starting. There were more minor problems while the ball proceeded. The way some of the cadets and their dates dance was taken into question. All of those problems were immediately sought out and fixed by ether instructors

Monday, November 4, 2019

Popular resistance SC3037C Essay Example | Topics and Well Written Essays - 2750 words

Popular resistance SC3037C - Essay Example Knowing and understanding the relationship between the narratives and the perceptions which some Muslims may hold can certainly help policing protest movements and help in controlling a situation that could spiral out of control. A Muslim empire was more or less firmly established during the lifetime of the founder of the religion, i.e. Muhammad, but the golden age of the empire came a few centuries later when the Muslims had expanded their region and spread their religion from India to Africa and even into Europe as a Spanish Muslim region was formed. In this manner, the Muslims are perhaps unique amongst the major religions of the world since their empire was founded in the name of religion but divided on national lines overtime (Petersen, 2005). Even then, religion remained important and still continues to be so. While many of the narratives today focus on the battles which the Muslims have had with ‘non-believers’ in the past, the historic narratives also focus on discovery, learning and being objective in scientific experiments (Rochberg, 1992). Sardar (2004) discusses this very topic and reports that: â€Å"The Koran devotes almost one-third of its contents to singing the praises of scientific knowledge. The first Koranic word revealed to the Prophet Muhammad is: "Read." It is a basic tenet of Muslim belief that the material world is full of signs of God; and these signs can be deciphered only through rational and objective inquiry. ‘Acquire the knowledge of all things’ the Koran advises its readers; ‘Say: O my Lord! Increase me in knowledge’ (Sardar, 2004, p. 28)†. From a religion which devotes itself to peace and the search of knowledge, the narratives about Islam today are clearly more focused on the militant aspect of the religion in which victory means the blessings of god while martyrdom means seventy virgins in paradise (Turner, 1999). This changing narrative means that if the story of Islam can be retold and given to the Muslims

Saturday, November 2, 2019

Cybercrime and Digital Evidence Assignment Example | Topics and Well Written Essays - 750 words

Cybercrime and Digital Evidence - Assignment Example Nonetheless, the internet users must adopt and apply all the necessary cyber privacy policies. The currently increasing modes of cybercrimes include encryption and anonymity that are growing to advance levels. Nonetheless, computer forensic has remained a vital tool in eliminated all cybercrimes as well as convicting such related criminals including sexual predators, terrorists, and murders. Terrorists may use the internet platform to recruit members and plan their terror acts, while the sexual predators are likely to use social media sites to lure potential victims. Most of these crimes usually go undetected especially when the criminal investigation team uses technologies that were implemented before some computer technological advancements (Maras 151). However, the criminal investors must note that none is lost and they can still pursue cyber criminals even if they delete the information that may be regarded as illegal data or information. Notably, when persons use computer, they often think that when they delete such information or data, all such is erased completely. On the contrary, such files and data usually remain in the hard disc; thus, providing platform of investigating and or tracking cyber related criminal activities. Deleted file and data usually remain in the in a binary form because of â€Å"data remanence† that is also considered as residual data presentation. Extraction of such data and files are avenues that cybercrime investigators should deploy to prosecute the criminals. In fact, deleting of the file and or data is just a mere renaming the data or file and hiding it from the user. This means that the original file can still be recovered in its original content; thus, can be used for prosecution (Maras 172). Therefore, the public or persons who have experienced cybercrime related activities must not serge on the pretext that the suspected criminal has deleted the information they used against them, but they should report the same si nce such information could be retrieved for further actions. Additionally, the global position systems (GPS) software is usually embedded in the satellite a smartphones navigation systems are also modes of prosecution since they can be used to track a suspect. The GPS related information can be traced from the form manufacturers since the companies that develop this software usually develop satellite navigators; therefore, using necessary tools and technologies the computer forensic experts should liaise with the GPS developer to obtain the information that they need for crime purposes. Notably, information usually travels through internet through the GPS systems and the same is distributed through satellite. However, the use of GPS to track criminal may be turn futile since GPS software is only limited to certain address listing. In fact, the current GPS software systems do not record time when the address was achieved; thus, using them will make it difficult to determine when the alleged crime was committed. Moreover, it may be difficult to ascertain whether the address recorded in the GPS software system was automatically generated or was a mere input to implicate a person. Therefore, it would be advisable for the computer fore