Thursday, September 3, 2020

Corporate Social Responsibility within Islamic prospectives Literature review

Corporate Social Responsibility inside Islamic prospectives - Literature survey Example The qualities and the standards which have been set up since the hour of Prophet Mohammed fill in as the CSR establishment in Islam. Islam essentials are not liable to change. They incorporate aqidah, alluding to conviction and confidence, ibadah, which means adore and akhlaq, which alludes to profound quality and morals. In optional fields, for example, financial matters, business and different exercises the indication of these essentials will require adaptability and improvement as per the existence. Henceforth, in Islam the possibility of CSR is consistently liable to change contingent upon the different needs of the network and the general public. As per Islam human speaks to God and that the entire creation was shaped by God. Individual God’s delegate along these lines, has an extraordinary commitment to take care of the formation of God. The CSR idea In Islam covers a broad significance, in that it grasps God awareness measurement which is alluded to as the taqwa. In all circumstances, gathering of people takes up various jobs and obligations as hirelings. As per Hassan (2002), estimations of honesty, decency, consideration, uprightness rather than jealousy and separation moves the relationship with God. This regularly showed normally in different exercises in business and even in the relationship with all the partners.

Saturday, August 22, 2020

Systematic Review of Studies on Compliance with Hand Hygiene Essay

Orderly Review of Studies on Compliance with Hand Hygiene Guidelines in Hospital Care - Essay Example As a medical attendant, it is my most extreme want to work amicably with my patients and partners in an all encompassing way, and in actuality, I chose to fundamentally survey this article not exclusively to ensure my patients, however for a higher point of getting myself and my associates far from this preventable and destructive emergency clinic †obtained disease. Another explanation that forces me to do this paper is the yearly increment of mortality and portability rate optional to nosocomial disease just as ill-advised hand washing method consistence among the social insurance staff, disregarding monstrous crusade for appropriate hand washing practice. A few crusades that energize appropriate hand cleanliness practice were propelled over the previous decades, yet consistence rates among the nursing staff in the emergency clinic were not significant, and have no enduring impact in forestalling the spread of disease. This article was painstakingly picked in light of the fact that it introduced a few information available cleanliness consistence and rules close by cleanliness in the clinic set up. This paper was investigated utilizing the biggest web search tool in the web to date, www.google.com. The catchphrases and terms utilized were hand cleanliness, medical clinic care, consistence, non †consistence, diaries, nosocomial disease, and emergency clinic †gained contamination. All diaries distributed before January 2009 were incorporated in the inquiries, and the best diary scanned for in this examination was downloaded and checked on. Hand searches and checking of the articles were among the methodologies used in looking through the diaries. An article on the deliberate audit of studies on consistence pace of hand cleanliness rules in medical clinic care was checked on to survey the pervasiveness pace of emergency clinic †obtained disease and correspond it with the consistence and non †consistence pace of rules of hand cleanliness i n the emergency clinic set up. This paper expected to improve effectively the pace of consistence utilizing the conduct sciences to follow an arranged methodology for the advancement of intercessions later on. Precise surveys of 96 distributed observational examinations that were led to the all inclusive communities of created nations were finished in this article. The way toward looking through databases begins with screening the title, edited compositions, and whole article to guarantee that the measures in choosing the paper are met. Extraction and the board of information followed with summarization of different discoveries in the investigation were made. From this examination, it was assembled that individuals with poor consistence rate were for the most part from high movement gathering. This comprise of doctors (having 32% consistence rate) trailed by the medical attendants (with 48% consistence). From the article, it was noticed that the consistence rate was a lot of lower i n the Intensive Care Unit (ICU) with a rate extending just from 30 †40%. Then again, laborers connected with grimy errands were those seen to have higher pace of consistence close by cleanliness. As a result of inadequate subtleties introduced in the investigation, Erasmus, et al (2010) inferred that further research and checking of standard estimates must be carried on in the following examination, and to more readily clarify the complexities of hand cleanliness, hypothetical models from conduct sciences ought to be utilized and adjusted in the paper. Erasmus et al. (2010) included that more research centering the determinants of conduct is required

Friday, August 21, 2020

McAfee Spyware Blocker Essay Example for Free

McAfee Spyware Blocker Essay McAfee, an Intel organization, has been an industry chief for antivirus programming to ensure PCs for a long time. The organization has extended its administrations from ensuring PCs to securing cell perusing too, the product can be utilized on the iPhone, and Android telephones. Item McAfee is presenting another line of programming planned explicitly for Android and iPhone gadgets to square undesirable spying from applications downloaded on the cell phones. McAfee Spyware Blocker will target applications intended to gather individual and private data. The applications on the clients telephone that are focused on are; photographs, email, perusing history, camera, contacts, passwords, and all data posted in referenced applications. Statement of purpose McAfee Spyware Blocker for the iPhone and Android follows a similar crucial the items for its PC programming. Our crucial the McAfee Spyware Blocker application is to secure each client’s character and individual data while utilizing their cell phone with a progressed inventive programming program intended to ensure all data on the cell phone. The McAfee Spyware Blocker will channel all developments on cell phones and caution the client with undesirable following, or spying from designers of uses. This additionally incorporates outsider applications, for example, the famous Facebook, Pinterest, Yelp, Instagram, and other online life destinations who expect access to the clients data. Client Need As the first of its sort, McAfee Spyware Blocker, has separate itself from other spyware blockers. The product gives insurance on cell phones, and from undesirable sharing of data while downloading applications. The product makes a different profile dependent on client inclinations, which obstruct all genuine data of the client. It at that point powers applications to utilize bogus data, made by the client, to run applications that expect access to individual data. Customers of McAfee are ensured by the historical backdrop of the organization, and its demonstrated achievement and development of its different items, which set the organization apart from the present rivalry. The organization is in steady advancement of its items to improve, develop, and meet the snappy changing needs of innovation and customers. McAfee follows patterns and see’s the requirement for a propelled spyware blocker for the versatile market. The division has created, what it feels, is a propelled, unrivaled item for its present customer base, and has built up an arrangement to accomplish another market of clients. Vision Model The vision of the McAfee Spyware Blocker is to make the best versatile spyware blocker in the market. The organization began with the iPhone and Android showcases first, however will include the iPad, iPod, tablet, and in the long run every single remote gadget. Remote gadgets might permit applications to be hacked and checked for individual and private data. With the developing business sector of individual portable and remote gadgets, McAfee will ceaselessly develop and propel the present programming innovation. The advances created will give moves up to current customers and new programming for new gadgets and stages. The interest for security insurance in today’s speedy moving and developing innovation advertise says a lot for the requirement for new propelled programming for the developing network of versatile and remote gadgets. The choice to make the McAfee Spyware Blocker division and be an innovator in the market was a simple choice, and one that will develop the organization toward the ever-extending innovation development. Plan of action Since the commencement of McAfee items, the developing improvement of new innovation has realized a popularity and requirement for assurance of client’s data. The need to shield customers has developed from PCs to versatile and remote gadgets and has our customers requesting further developed assurance while utilizing a variety of gadgets Versatile perusing on an Android or iPhone gadget, permits spies to get to individual data. Lately, breeches have caused an expansion of data fraud straightforwardly identified with cell phones. The data put away, or applications utilized while on the gadget are probably going to give a specialist programmer to increase significant individual data. To fulfill the purchaser requirement for assurance, McAfee built up the spyware blocker division. The worth made to offer propelled insurance while working the Android or iPhone gadgets, is unmatched to some other spyware security claims. No other spyware created by contending organizations has given the client outright certainty of assurance while utilizing their cell phone. The product is a headway of our present items, and the premise of the spyware is equivalent to in our different items. Since we have added to a current item, the item, arranging, advancement, and inventive expenses were negligible in importance to the general item advertised. The organization will keep on creating items that are on the forefront of what is going to come later on. By using the present programming stages, coding, scripting, and language, we can make progresses rapidly and savvy. McAfee Spyware Blocker will proceed to develop and create as the market develops, and innovation advances to incorporate new items, McAfee, Inc. (2014). Vision, Mission, Value The past dispatch of the McAfee Expanded Data Security, Application Security, and Ease of Administration in 2012, shielded clients from program attacks. The applications, be that as it may, didn't prevent organizations from utilizing data from a customers telephone, McAfee, Inc. (2014). The past dispatch of cell phone security, permitted McAfee to move toward cutting edge versatile and remote assurance, by the improvement of the McAfee Spyware Blocker. The organization keeps on moving toward innovation improvement and headways and the need to make programming to secure customers utilizing numerous stages, and from the creatorsâ of applications that expect access to individual data. The vision and mission of McAfee have consistently been to ensure and give its customers the most developed programming security from spies and programmers. The choice to make another line of safeguard against cutting edge programmers and spies originated from the need to ensure against unlawful security breeches. The estimation of the item could be depicted as significant past any dollar. To sell the item, the expense to deliver, and the market estimation of the item portrays the expense of the item to be $59.99, which will incorporate any subsequent updates, McAfee, Inc. (2014). Vision, Mission, Value Summary The vision of McAfee Spyware Blocker is that every customer will have a sense of safety and trust that their data is secured on their Android or iPhone gadgets, and later on, different remote and cell phones. The eventual fate of McAfee Spyware Blocker, agreeing the investigation of the statistical surveying, shows that the product will keep on developing with request of its customers and innovation. The mission of McAfee Spyware Blocker is to be the best in the market, to out sell, out create and eclipse the opposition. The capacity to manufacture and develop a current item to give customers the most ideal item has permitted McAfee to be a pioneer in spyware blocking programming. The work of exceptionally learned employee’s of McAfee items gives client’s trust in getting help with the item Representatives will have imperative information on the item and how the item functions. Having broad information the clients stage (Android/iPhone) won't just offer certainty to the pioneers of the McAfee Spyware Blocker, yet in addition the end clients of the product. Insurance of individual data is precious. Everybody, including the pioneers at McAfee, need insurance from burglary of data. The McAfee Spyware Blocker gives all clients precisely that, assurance. The expressed valueâ of $59.99 for the item does exclude the estimation of security, that is the extra reward of the product. Standards and qualities The standards and estimations of the McAfee Spyware Blocker division follow similar rules of the organization, McAfee, Inc. (2014). Recorded beneath are the five standards of McAfee: 1.Conduct business with trustworthiness and honesty 2.Follow the letter and actual purpose of the law 3.Treat each other decently 4.Act to the greatest advantage of McAfee Spyware Blocker and maintain a strategic distance from irreconcilable circumstances 5.Protect the company’s resources and notoriety, McAfee, Inc. (2014). The company’s business esteems in the division of McAfee Spyware Blocker follow legitimately in accordance with McAfee, Inc. They are recorded as: 1.Expertise †We have a profound dominance of computerized security, and we never quit fabricating and improving our aptitude. 2.Partnership †We have a genuine feeling of cooperation and association across McAfee capacities and with channel accomplices and clients, creating collective arrangements that offer substantial advantages. 3.Integrity †We’re in the matter of shielding information from the corrupt, performing to the best expectations of morals and duty. 4.Results †We have conclusive objectives with complete results, continually taking a stab at better and never losing center. 5.Courage †Being constantly prepared is a prerequisite for gallant administration over our business. We’re never threatened by the venturesome difficulties we face each day, McAfee, Inc. (2014). The division of McAfee Spyware Blocker vows to be inventive with respect to new innovation produced for Android, iPhone, remote gadgets, and different gadgets as they develop and change. The spyware blocker programming will proceed to progress and develop as the pernicious techniques for corrupt people and organizations grow better approaches to spy. References McAfee, Inc. (2014). McAfe

Friday, June 12, 2020

Jury Decision Making and Recommendations Writing Assignment - 1650 Words

Jury Decision Making and Recommendations Writing Assignment (Term Paper Sample) Content: Jury Decision Making and RecommendationsStudents Name:Course:Instructors Name:University:City and State:Date:The jury is an integral part of the judiciary system. It consists of citizens who carry out normal routines with no legal training selected to listen to evidence and provide a verdict that all or the majority of the jury can consent to. They provide a societal perspective to the cases that are presented to the courts. Moreover, the extrapolations about probable verdicts affect the decisions that are used to resolve civil lawsuits. Conversely, in the criminal lawsuits, they are used to offer and acknowledge the plea bargains (Maeder Yamamoto, 2015, p.4). In this paper, the focus will be on determining the effectiveness of jury decision making and proposing recommendations that will be used to improve the decision making process.In evaluating the decision making process of the jury from a legal or psychological viewpoint, it is difficult to state whether the jur y arrived at the right verdict in most cases. In criminal cases the successive evidence like DNA, incriminatory documents or confessions makes it easy for the jury to make accurate verdicts. However, the lack of such information casts doubt in the decisions that are arrived at after deliberations as they are based on the facts that are presented during trial and personal decision making process (Chaudhuri, 2017, p.1807).Moreover, in civil cases this is more difficult as the issues revolve around the level of degree of the scenario. For example, what was the level of carelessness exhibited by the defendant? What was the level of impact incurred by the plaintiff? Such questions do not focus on the capability of the jury arriving at an accurate verdict. However, they focus on the jury reaching reasonable verdicts that are inclined to the law and evidence presented to them. An example is in the O.J Simpsons criminal case where he was accused of murdering Nicole Simpson and Ronald Goldma n. The jurys in this case acquitted Simpson of the charges. This made many observers to question the accuracy of the verdict as many of them had an inclination that their verdict was not optimal. However, when considering the issue of reasonable verdict, it can easily be concluded that the jury was correct. This is based on the fact that there was a lot of discrepancy, police misbehaviour allegations and a high benchmark of evidence presented in the courts (Coleman et al., 2017, p.4).All jury trials are close cases where the aspect of reasonable verdict takes precedence to accurate verdict. This, therefore, leads to cases being settled, dropped, or end up as plea bargains. Moreover, the decision made by the jury is influenced by their understanding, dependance on the presented evidence, and the assessment to professional decision makers. The jury faces a lot of challenges in understanding the instructions, especially that of judges (ODonnell Safer, 2017, p.947). The testing format and subject matter in question when determining their understanding at times reach a level of below 50% This has necessitated the American Bar Association (ABA), to propose that instructions from the judges should be rewritten to facilitate comprehension and sound verdicts. ABA proposal has been implemented in most jurisdictions in the USA (Zeidman, 2017, p. 293). Despite this, the understanding of the instructions often does not mean that accurate judgement or decision will be made.Additionally, jury decision making is dependent on the legal evidence that has been presented in court. The questions that are more prominent in the analysis of the decision making process are; do the jury implement the legal and ignore the extra-legal evidence presented to them? Does the aspect of discrimination among plaintiffs contrasting in the severity of their injuries, eyewitnesses with poor versus good chances to scrutinise a crime, and capital defendants whose cases involve aggravating versus mi tigating situations? The findings of these questions are vital in providing a clearer discernment on the verdict made by the jury.According to Chaudhuri et al. (2016), the strength of the legal evidence presented by the prosecution team plays a major role in influencing the accuracy of the verdict. Moreover, in cases of a civil nature the verdict by the jury (damage awarded) is inclined towards the level of severity of the injury sustained. On the other hand, in capital cases the juries are tossed with the responsibility of finding an equilibrium between the mitigating ad aggravating factors in the decisions that they make (p. 1808). From a factual perspective, it is justified to stipulate that the evidence that is presented during the trial has a significant influence in the jury verdict. However, in cases where there are a number of plaintiffs the jury often finds it challenging to dispense awards that are consistent with each of the injuries sustained by the plaintiff (ODonnel S afer, 2017, p. 950). In such cases the evidence presented during trial is of little use and the jury has to rely on their own understanding.Lieberman et al. (2015) indicates that during the trial process testimony that is ruled as being inadmissible often influences the decisions made by the jury. The fact that the witnesses were led to admit it in the court has a major inclination to the verdict that is made at the end of the trial (p. 497). Moreover, the previous cognitive schemas of the jury regarding the law at times lead to disagreement with the legal rules pertinent to a specific case (Anwar et al., 2015, p. 41). The findings reveal that individuals often depend on heuristics which have the likelihood of leading to flawed judgements. This makes it challenging for knowledge to be compartmentalized when making decisions either in the judiciary or personal situation.Nevertheless, the jury critics have stipulated that the judges are more likely to come up with accurate verdicts wh en compared to the jury with respect to the evidence presented in the courts. Also, they indicate that judges are professionals in the legal domain while the jury are apprentice in the legal field. This means that they are more inclined to make suitable decisions in the court cases. Moreover, a number of judges have found fault in the jury verdicts. In the Apprendi v. New Jersey, quoted by Justice Breyer in his majority opinion in United States v.Booker, indicated that in complex inquiries that have their sentencing in the scheme of modern guideline the juries are incapacitated from making suitable verdict (Presott Starr, 2006, p.303).Devine Kelly (2015), indicated that in sentencing decisions, there is a need for the confession of particular types of evidence that juries are exempted from hearing during the trial stage. This means that the evidence they use to make their decisions is limited altering the accuracy of the verdict. Additionally, in the jury post there is a lot of co mplexity that poses a threat of overloading their cognitive which hinders their capability to process information and make accurate verdicts. Besides, the introduction of new and non-double sentencing questions to the jury poses a high probability of altering the facts via framing effects (p. 396). This poses the threat of confusing the jury influencing them to make wrong conclusions in the verdict process. Finally, the jury has to deliberate before making a decision. This introduces subjectivity and biases in the process through polarization or vote-trading that leads to inaccurate verdicts (Anwar et al., 2015, p. 43).Despite these assessments, according to Lieberman et al. (2016), nearly 80% of the verdicts of the jury have been agreed upon by the judges. The high level of agreement takes place in cases that have differing legal and factual complexity (p. 495). Additionally, when there is a disagreement arising between the judges and jury each side provides there evidence to suppo rt their decision. This provides an opportunity for them to work together to counter their disparities and formulate uniform verdicts in the cases that they are handling (Anderson, 2015, p. 39). The below recommendations will improve the jury decision making process.Firstly, the jury should be encouraged to focus on evidence rather than verdict driven judgements. The evidence-driven approach provides each member of the jury with a chance to form an opinion about the case, hence ensuring an objective verdict. On the other hand, the verdict-driven is subjective and prone to bias where the juries have an early vote. They then structure their verdict to ensure that they find one that is suitable to all the members in the jury panel (Feigenson, 2016, p. 27).Secondly, the jury should be able to take notes during the court case and be provided with an opportunity to ask questions. This is i...

Sunday, May 17, 2020

Substitution Bias Definition

Definition: Substitution bias is a possible problem with a price index. Consumers can substitute goods in response to price changes. For example when the price of apples rises but the price of oranges does not, consumers are likely to switch their consumption a little bit away from apples and toward oranges, and thereby avoid experiencing the entire price increase. A substitution bias exists if a price index does not take this change in purchasing choices into account, e.g. if the collection (basket) of goods whose prices are compared over time is fixed. (Econterms) Terms related to Substitution Bias:None About.Com Resources on Substitution Bias:None Writing a Term Paper? Here are a few starting points for research on Substitution Bias: Books on Substitution Bias:None Journal Articles on Substitution Bias:None

Wednesday, May 6, 2020

Essay The Yellow Kids - 1033 Words

â€Å"In America the President reigns for four years, and journalism governs for ever and ever.† Oscar Wilde never spoke truer words. The aforementioned ability to govern â€Å"for ever and ever† comes from journalistic sensationalism, a craft perfected by newspaper owners and journalists Joseph Pulitzer and William Randolph Hearst at the dawn of the twentieth century. Sensationalism counts for only one of the numerous ties between the career rivals who, in an effort to distinguish themselves from each other, ironically knotted themselves together in journalism history. Joseph Pulitzer emigrated to the United States of America from Hungary at the age of seventeen and subsequently joined the Union army of the U.S. Civil War. After the war, Carl†¦show more content†¦Helped in large part by owning an established newspaper fresh out of college, Hearst worked his way up the small portion of proverbial ladder Hearst had yet to climb in the journalism world by pur chasing The New York Morning Journal. Coincidentally, Hearst purchased The New York Morning Journal from Pulitzer’s soon-to-be-estranged brother Albert (Therkelsen 7) and renamed the paper The Journal (â€Å"William,† Sidelights). Hearst’s first took his first notorious step with his pilfering of all of Pulitzer’s editorial staff at the New York World, followed by Pulitzer’s rehiring, and Hearst’s second theft of the same journalists (Contemporary, â€Å"Joseph†). Pulitzer, as the originator of the colorful comics section in newspapers, made sure to keep â€Å"The Yellow Kid† comic strip in the New York World newspaper despite losing the original designer in Pulitzer’s continuing battle with Hearst (Squires). The fact that the battle went deep enough into the newspapers to affect the comics section helped historians coin the term â€Å"yellow journalism† as an idiom for how Hearst and Pulitzer ran their respect ive newspapers (Therkelsen 7). This immature feud between the two grown men may sound harmless, but accusations surfaced suggesting this quarrel may have caused the Spanish-American War. Without any official word from government organizations, Hearst and Pulitzer both published unconfirmed sensationalisticShow MoreRelatedThe Censorship Of Yellow Journalism1588 Words   |  7 PagesYellow Journalism was a form of newspaper that told outrageous stories to catch the readers’ eye. Newspaper publishers William Randolph Hearst and Joseph Pulitzer II used the form of journalism as a marketing campaign to get customers, in order to buy their newspapers. They include stories, drawings, and cartoons. Instead, the journal gave birth to modern-day investigative Journalism. It was during the 1890s, this newspaper would cause a war between the United States and Spain. What would plungeRead MoreThe Problem With Yellow Journalism1207 Words   |  5 Pageswith Yellow Journalism. Tabloids are everywhere. You see them while in line at the grocery store, on the stands at street corners, in doctor’s offices, and you can even have them mailed to you. These tabloids have become so ingrained into society that many people consider them to be a true form of journalism. Though this may be one of the views of tabloids, my opinion is that they should not be considered journalism because in reality, they are modern and maybe even worse versions of yellow journalismRead MoreJoseph Pulitzer And William Randolph Hearst1932 Words   |  8 Pagesindustry in the mid 1890s, whilst competing for circulation in a bitter rivalry, widely considered as the greatest newspaper war in history. Their revolutionary advances in the use of sensationalist material within print gave birth to the concept of ‘yellow journalism’, compiled of a ‘toxic formula - one part news to one part hype’ (Streitmatter, 2011). This would have a monumental impact on society of the period and still has an enduring influence on the current world of journalism today. Their commitmentRead MoreThe Yellow Kid, By G. W. Cox1360 Words   |  6 Pageshe very first modern comic book made, was known as the Yellow Kid, and its arrival in 1897, generated the Platinum age of comics. It was published by G. W. Dillingham Company, and was part of a series that Dilingham did on American authors. This became the staple for future comic books to come, and even coined the name Comic Book on the back of the cover. But even before the Yellow Kid, comic books had existed in what has been coined the Victorian age, which started in 1837 with the comicRead MoreThe Importance Of Perception Management In The War983 Words   |  4 Pagesit become superior than tradition war Yellow journalism was known by William Randolph Hearst and Joseph Pulitzer after they used this type successful for their newspaper during The Spanish-American War during 1890s. What they did was inflated the situation to a higher level among people to create war. ‘The term yellow journalism came from a popular New York World comic called Hogans Alley, which featured a yellow-dressed character named the the yellow kid. Determined to compete with PulitzersRead MoreThe Modern Era1014 Words   |  5 PagesColor Theory† analysis. For example, the yellow represents joy, happiness, satisfaction. Kandinsky says, yellow is â€Å"warm,† â€Å"cheeky and exciting.† In life yellow is seen in nature and fast-food industries. The yellow sun is commonly preferred over a dark black sky at night; Vitamin D from the sun is necessary as it increases biologic hormones, hence, makes a person more positive and joyous. Similarly, the McDonald’s logo of the â€Å"Golden Arches† is bright yellow. This color was chosen because it evokesRead MoreThe Adventures Of Mr. Obadiah Oldbuck Essay1201 Words   |  5 Pagesstrip character The Yellow Kid debuted (Greenberger). Created by Richard Outcault, The Yellow Kid was seen as the beginning of the â€Å"Funnies†, the name given to comic strips in newspapers at the time (â€Å"Comic Theory†). His debut led to an explosion of merchandising, culminating in the publication of a collection of comic strips in 1897. This collection marked the first time the term â€Å"comic book† was used (Greenberger). Historically, The Yellow Kid is related closest to yellow journalism. In fact,Read MoreWhy Minions Sell A Man880 Words   |  4 PagesWhy Minions Sell A man, his two kids and a lady are standing over a counter making their orders for minions to a group of three staff behind a counter, a lady is approaching and a gentleman is walking away from the counter with a plate of minion. The environment around the minion store is neat with pictures of different tastes of minions and their preferred drinks mounted on the upper part of the counter. The customers are anxiously waiting with the two kids and the lady directly staring at the staffRead MoreEssay on What ´s Yellow Journalism?748 Words   |  3 PagesYellow journalism is a writing style that used melodrama, romance, and hyperbole to sell millions of newspapers. But the number of newspapers selling went up drastically after the blowing up of the battleship USS Maine. At 9:30 on February, 15 the USS Maine sinks in Havana Harbor. This starts the Spanish American War. Then newspaper owners William Randolph Hearst and Joseph Pulitzer began having the sinking of the USS Maine all over t he front pages. The dramatic style of yellow journalism contributedRead MoreMy First Day For Inner City Kids1069 Words   |  5 Pagescity kids that were less fortunate. The first day we arrived at the church we had to set up and meet with the other youth groups. My youth group was set up in the furthest building from the auditorium. We had about an hour before we had to pick up the kids for vacation bible school. Before we picked them up, we assigned people within our own youth group to different task groups. I was one of the oldest kids in the youth group so they put me in the yellow group. Yellow group had the oldest kids which

Review of Real Life Security Incidents

Question: Discuss about the Review of Real Life Security Incidents. Answer: Introduction As mentioned in the previous section, a breach is an accidental exposure of data. There is no malicious intent. The working parties in a breach are insiders to an organisation. This report is limited to a publicly available information on breaches during September-December 2015. Suppose a person visits a sexual health clinic and opts for undergoing a clinical test. In the small community that the clinic serves, many people know each other by name. Now, suppose that the entire list of individuals that chose to take the test mentioned above is broadcast to each other. What would be the consequences? Would the people, most of whom may be acquaintances of each other, now see each other differently? This section explores one such incident. 56 Dean Street clinic, which specialises in family planning and sexual health, also administers HIV (Human Immunodeficiency Virus) tests. HIV test is a way to ascertain if an individual has the till-now incurable and debilitating disease of AIDS (Acquired Immune Deficiency Syndrome). AIDS itself has huge social implications that may make a person suffering from this disease at a significant disadvantage in her day-to-day life, with stigma and discrimination ("Stigma and Discrimination", n.d.), and possibly social isolation (Brown, 2016). The aim of the discussed hacking attack was money. Also, this attack was planted over two years and exploited for months. The attack was coordinated internationally, and novel methods for swindling the money were devised. The new techniques were used to avoid detection and also, the majority of the illegal transactions were of a relatively insignificant amount. All these details have made public by a private security company, which under the restrictions of Non-Disclosure Agreement (NDA), is prevented from naming the banks. Any bank affected itself has not come forward and publicly disclosed the attack. How could the secure banking systems be compromised? How could the planting of the malware go on for about two years without no one or no system detecting it Problem The problem was the fraudulent activities are done in the banking system, which led to the transfer of real money to unauthorised people (the criminals themselves). Additionally, the stealth used by the criminals fooled the individuals and the systems of the banks into letting these transactions pass off as routine. Also, the members of this particular attack impersonated as officers and staff of the banks to "oversee" operations. The failure to detect fake staff was also missed. Review of Two Real-life Security Incidents The most valuable asset of an organisation is intangible - data (Poole, 2007). Anything that is worth stealing will be stolen, and in today's information-based society, data provides a lucrative opportunity for easy ways to make money. In addition to big-name targets (Granville, 2015), smaller companies are also being targeted by attackers (Connolly, Gardiner, 2015). Also, not only are the skills and resources of the attackers increasing with time, the threat landscape itself is evolving (Security, n.d.). Thus the security of computers, networks, and data is a moving target. This report focuses on reviewing two real-life information security incidents. The first part discusses a breach, while the second talks about a successful hacking attack. To begin, let us differentiate between a breach and a hack (Landt, 2016). A breach is an accidental and non-malicious exposure of confidential information from inside the organisation. A hack is a willful and malicious attack from outside to c ompromise the organisation. Computer Security Breach Incident Problem At the 56 Dean Street clinic, as is the case with almost every organisation, newsletters are sent to people who have used their services. Whether or not the people have expressly consented to receive the newsletter when they provided their email address is not relevant to the current discussion. Individuals who opted for HIV test had their data bundled together in a group. This group was sent a regular email newsletter. What happened is that the employee in charge of sending out the email newsletter sent, in addition to the bulletin, details of name and email addresses of every person who had undergone HIV test in that clinic. How and Why the Breach Occurred The breach took place while the employee was compiling the list of HIV tested customers as a name and email pair. This was copied and then supposed to be pasted in blind carbon copy (BCC) field of the email compose screen. The employee pasted it into carbon copy (CC) field of the compose screen (Ford, 2015). Recipients in BCC field are unaware of other recipients, while in CC are aware of all those who have received a particular email message (Hoffman, 2012). This mistake resulted in all the people taking HIV test receiving the names and email addresses of all other such people (Burgess, 2016). The breach occurred because of laxity towards personal and confidential data. Such data is privileged information and not for the consumption of public. The lack of diligence is at multiple levels. At the management level, a stricter, possibly automated procedure, should have been used. At the individual employee level, he should have been alert and exercised care before hitting the send button. Possible Solutions As discussed in the previous section, the reasons for such a breach were not giving private data the respect it deserves, no formal rules, manually touching such data and carelessness of the employee handling the distribution of email newsletters. Keeping these reasons in mind, we propose the following solutions to prevent such a situation. It must be noted that once an email leaves the sending server, there is no way to cancel it. Email is instantaneous and even though the sender and receiver may be sitting on opposite sides of the Earth, still once and email hits even a single external server, it is beyond the point of no return (Hoffman, 2013). Confidential data is confidential for a reason and must be treated with respect, and this should show throughout the hierarchy of the organisation. To this end, comprehensive formal rules are suggested to make everyone clear as to what is at stake - not only the data but also the financial and legal implications, should it be breached. Next, every person touching this data must be logged, so that the actual person responsible for any action on the data can be traced, and handled accordingly. A better process can be to maintain automated lists (which only senior staff and database administrators can access) and then provide software with the newsletter content and the software will BCC the newsletter to every person in the list. No manual contamination of the process will be possible in such an arrangement. If there has to be a manual sending, then the employee in charge of each issue must be logged, and that person must be made aware that in the case of any data breaches occurring du e to her, she will be personally responsible for it. Computer Hacking Incident Hacking is an active process. Someone somewhere is motivated enough to use her skills and resources to attempt to attack, invade, and compromise a computer system. Malicious intent is the hallmark of a hacking attempt. The motivations may be amusement, financial, revenge, or patriotic. This report will select one publicly well-known hacking case between 2012 to 2016, and explore it. Financial and banking systems are tested thoroughly. Various laws and regulations exist which help in maintaining the security of these information systems. These institutions inspire trust in the customers as well as the employees. Still, banks are where the money is, and thus they are one of the evergreen targets. The case study chosen is about attackers infiltrating the banking systems using malware, observing the procedures and routine activities via the data sent by the malware on the computers of the banking systems (Sanger, Perlroth, 2015). Who Were Affected and How In this attacking operation, primarily the banking system was affected. Now, cash was extracted from ATM (Automated Teller Machine) machines remotely by hackers. This money belongs to the bank until some authorised person inserts his card and withdraws some amount. Money was illegally transferred from certain accounts to some fake accounts which were created for this purpose only. Most of the customers can be assumed to be alert of their balances. Now, what these hackers did was inflate (artificially of course) the balance in some account and then transfer the excess to their fake account. The original owner of the bank account which served as the launch pad still had the same balance in his account, thus not triggering any out-of-ordinary suspicion unless the detailed statement was analysed. In any case, the money was transferred. Whose money was it? It was the bank's money. Thus, it is concluded that the banks per se were affected and lost real money. The individual account holders were not affected in that their total balance remained the same. However, this incident showcases that the entire system has been compromised, and any determined and resourced attackers can bend the banking and financial system to their will. How Was the Attack Carried Out This attack too had a simple method - email links. The hackers sent emails to employees which convincingly looked as if they came from colleagues. The clicking of an innocent looking link enabled the hackers to download malware on the computers of the banks. The software then trawled the network to identify the central computers. When the administrator computers were located, a further software was downloaded from the hacker servers, which allowed key-logging, screenshots, screencasts, and then uploaded all these to the hackers. To be fair, the hackers expended a tremendous amount of effort to understand the workings of the banks. Critical to the success of the attackers' mission was mimicking the bona fide operations and staff completely. Once, the internal workings were understood, then the next phase of the attack was simpler. Show up at the right place in the right attire and leave with the cash. Remotely order some fraudulent transactions that real money to some temporary accoun ts. Other novel methods of transferring money were also devised. How Could the Attack Have Been Prevented As explained in the previous section, many chinks in the baking armour have been exposed. The faults begin with the emails that were able to bypass any automated checks and reach the employees' inboxes. Some software should have automatically scanned the emails and the links for malicious code or links. Next, the employee must always be on guard to the slightest suspicion. If necessary, the sender of the email may be personally contacted at his official email address confirming the suspected email message. The firewalls should be sensitive not only to the incoming traffic but also the outgoing traffic. Such an arrangement may have been able to intercept when the key logs, screenshots and videos were being sent back to the hackers. Finally, measures should already have been secure enough, but now need to be updated to prevent any impersonations. Additionally, expending more resources to more frequent cross-checking of accounts is recommended. Conclusion The idea from both the case studies seems to be that the human link of a security chain is often the weakest. Incidentally, both the case studies used emails as their attack medium, and critical to their success was fooling the humans into clicking target links. In addition to security alerts, perhaps logging of the links opened by the employees will serve as a motivation for the employees to exercise good diligence. Also, case-specific measures have been recommended. References Brown, A. (2016). Social Effects of HIV AIDS. LIVESTRONG.COM. Retrieved 30 March 2017, from https://www.livestrong.com/article/19464-social-effect-hiv-aids/ Burgess, M. (2016). London HIV clinic fined 180,000 for 'serious' data breach. WIRED UK. Retrieved 30 March 2017, from https://www.wired.co.uk/article/56-dean-street-fine-data-protection-hiv Connolly, B., Gardiner, B. (2015). Case study: When a hacker destroys your business. CIO. Retrieved 30 March 2017, from https://www.cio.com.au/article/569410/case-study-when-hacker-destroys-your-business/ Ford, N. (2015). Londons 56 Dean Street clinic leaks HIV status of 780 patients. IT Governance Blog. Retrieved 30 March 2017, from https://www.itgovernance.co.uk/blog/londons-56-dean-street-clinic-leaks-hiv-status-of-780-patients/ Granville, K. (2015). 9 Recent Cyberattacks Against Big Businesses. Nytimes.com. Retrieved 30 March 2017, from https://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0 Hoffman, C. (2012). Whats the Difference Between CC and BCC When Sending an Email?. Howtogeek.com. Retrieved 30 March 2017, from https://www.howtogeek.com/128028/htg-explains-whats-the-difference-between-cc-and-bcc-when-sending-an-email/ Hoffman, C. (2013). Why You Cant Undo Sending an Email (and When You Can). Howtogeek.com. Retrieved 30 March 2017, from https://www.howtogeek.com/161762/why-you-cant-undo-sending-an-email-and-when-you-can/ Landt, K. (2016). Breach vs. HackThe Differences You Need to Know to Protect Your Company. Blog.eiqnetworks.com. Retrieved 30 March 2017, from https://blog.eiqnetworks.com/blog/breach-vs.-hack-the-differences-you-need-to-know-to-protect-your-company Poole, O. (2007). Network Security (1st ed., p. 140). Routledge. Sanger, D., Perlroth, N. (2015). Bank Hackers Steal Millions via Malware. Nytimes.com. Retrieved 31 March 2017, from https://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html?_r=0 Security, E. ENISAs Cyber-Threat overview 2015 ENISA. Enisa.europa.eu. Retrieved 30 March 2017, from https://www.enisa.europa.eu/news/enisa-news/enisa2019s-cyber-threat-overview-2015 Stigma and Discrimination. Web.stanford.edu. Retrieved 30 March 2017, from https://web.stanford.edu/group/virus/retro/2005gongishmail/hivsocial.html