Saturday, December 28, 2019

Ethical Issues Of Drug Abuse - 1381 Words

A new family come into the transitional housing agency. They were a couple, most likely in their 40s. They had two children. There was an anticipatory energy in the room as they entered, relief, gratitude, and incredulity at their good fortune of finding a place to sleep that night after being expelled from their apartment. The intake interview began with regular questions; everything looked fine, then it happened just a simple question with a simple wrong answer change the atmosphere in the room. The drug-testing results must be â€Å"clean† before he and his family could be eligible for housing. The men had to reveal his recent marijuana use. The space instantly changed, from many possibilities to desolation. The intake coordinator confirmed†¦show more content†¦This is often attributed to the prominence of the twelve step approach to addiction. Some people argue that this is a co-optation of the twelve steps, which are inclusive of anyone with the desire to stop dr inking. The author argue that excluding individuals who do not commit to abstinence is illogical given our acceptance of the disease model of addiction and ethically problematic in its exclusion of individuals in need of psychosocial support and basic services. Abstinence-Only Service Delivery says that addiction is a disease and an individual must be abstinent from their problem drug before they can helped. The â€Å"one size fits all† model of abstinence only provides no place for help seeking users unless they are able to cease (or lie about) their use. The results are that providers serve only clients who demonstrate a high level of readiness for change, and where the most in need are least able to get help. The disease Model characterizes addiction as a disease and informs mainstream service delivery. Prior to the disease model, the moral model framed alcoholism as one of moral model failing for which the disease model offered a humanistic challenge. It no longer attribute moral failing from the drug user by assuming underlying physical dependency attributed to predisposing physiological factors. (Marlatt, 1985) Twelve steep Facilitation and Abstinence-Only Service Delivery: Not the same.Show MoreRelatedThe Ethics of Drug Use and Drug Abuse1579 Words   |  6 PagesEthics of Drug Use and Drug Abuse For any professional working in the substance abuse treatment field, they will very likely come across situations and be presented with dilemmas relating to personal beliefs, judgments, and values. Drug or substance use and abuse have been a controversial and heated topic around the world for centuries. Drug abuse, in a way, is a facet of human culture that has been present for a great deal of human history in general. Every culture handles the issue of drug abuseRead MoreDrug And Alcohol Testing On The Workplace1663 Words   |  7 PagesDrug and Alcohol Testing in the Workplace Due: Monday Dec 1, 2014 COMM-220-F Rebecca Walsh By Brett Tate and Brandon Bracko November 17, 14 Introduction People often question drug and alcohol testing in the work place. It is a controversial subject that has a range of mixed emotions. But where do you draw the line when it comes to crossing the boundaries of prying into one’s personal life? This report will explain the legal, and ethical issues surrounding the topic of drug and alcohol testing inRead MoreThe Effects Of Substance Abuse Among Adolescents1296 Words   |  6 Pages Substance abuse has become a notable public health threat to today’s adolescents. Substance abuse is associated with an array of behavioral and psychological consequences that can jeopardize the future of the young people. Lifelong dependence is another possible consequence of drug abuse among adolescents. Ultimately, counselors are supposed to come up with effective programs to address addiction issues among the adolescents to prevent them from relying on drugs in future. Counselors rely onRead MoreEthical Dilemma at the Workplace1714 Words   |  7 Pagesï » ¿Examine an ethical dilemma that can occur in the workplace Ethical dilemmas are particularly sensitive issues in the workplace because the well-being of the individuals and the organization as a whole are at stake. Employees must feel as though they are being supported and not punished, and should not feel as though they were being put on display; their dignity should always remain intact. This paper examines how, as a high school principle, I would address the issue of one of the high schoolRead MoreNurses with Addiction1024 Words   |  5 Pagesemotionally and physically. While the profession is rewarding for most, the constant stress can become a catalyst for all kinds of self damaging behaviors. The American Nurses Association estimates between ten and twenty percent of nurses will abuse drugs within the workplace at some point during his/her career (ANA, 2002). This percentage is similar to that of substance abusers within the general population. Due to the ease of access to narcotics on the job, it can be difficult to recognize a Read MoreThe Ethical Implications Of Prescribing Narcotics1058 Words   |  5 Pagesproviders, one will care for many people that have chronic pain issues. Therefore, assessment of both the physical and psychological aspects of the pain is essential for appropriate treatment. For the purpose of this discussion, I will explain how to evaluate and treat an individual that has this issue. I will also discuss the importance of recognizing the signs of drug abuse in this population. I will also evaluate the ethical implications of prescribing narcotics. Evaluation of Low Back PainRead MoreCode of Ethics1568 Words   |  7 PagesMarch 18, 2014 jessie fox PHL/323 March 18, 2014 jessie fox PHL/323 Doctor Shopping PHL/323 March 18, 2014 Robert Philip Doctor Shopping The illegal narcotic drug problem in the United States is a growing problem and is On the rise. This problem is growing at a rapid pace, but, the fastest and one of the Deadliest drug problems in the United States is doctor shopping, which not only affects The young addict, but also the senior citizen as well. This is the fastest growing problem InRead MoreThe Ethical Implications of Involuntary Treatment for Substance Abuse1251 Words   |  6 Pages235 The Ethical Implications of Involuntary Treatment for Substance Abuse Every time health professionals claim to speak for the rights of others many questions arise within the bioethical community. Although altruism is a motivating mechanism of selfless care for others, it may have a dark side. Involuntary treatment for alcohol and drug abuse is a controversial tool used in medical care. The question of whether or not such treatment can be applied has been an unresolvable issue in bioethicsRead MoreEffects Of Marijuana Abuse On The Health Of Teens Aged 13-19 Essay1684 Words   |  7 PagesWhat is the Impact of Cannabis (Marijuana) Abuse on the health of Teens aged 13-19 in UK CONTENTS What is the Impact of Cannabis (Marijuana) Abuse on the health of Teens aged 13-19 in UK 1 Contents 1 1. Rationale 2 2. Aim 5 3. Objectives 5 4. Methodology 5 5. Data Search and Data Sources 7 6. Inclusion and Exclusion Criteria 7 7. Anti-oppressive Practices and Ethical Considerations 7 8. Project Outline 8 9. Time Scale 8 References 10 1. RATIONALE According to Plant (2016) 36% of teenagersRead MoreSubstance Abuse On The Workplace1724 Words   |  7 Pages Substance abuse is one of the largest growing problems in the world. In addition to the growth and wide-spread popularity of alcohol and ‘recreational drug use, the international drug trade and alcohol distribution garners tens of billions of dollars a year in both legal and illegal revenue. This simply serves as an indicator for how common drug and alcohol has become on a global scale. Although there is a portion of the worldwide population which uses substances in a moderated and controlled

Friday, December 20, 2019

Essay about Knights and Thier Role In Medieval Society

Knights and their role in medieval society. Knights were an integral part of medieval society. They originally began with primitive warriors such as the Mongols who fought on horseback for added speed and power, but quickly advanced to chivalrous gentleman such as the Normans. Much has been written about medieval knights with the most famous being a series of legends about King Arthur and his Knights of the Round Table. Arthur and his knights were the ultimate example of what a perfect knight should have been. They were brave and skilful in battle, but merciful to their enemies once vanquished. They were courteous to ladies, and never ate or drank to excess. Knights associated in groups which they called orders. They vowed loyalty to†¦show more content†¦Any knight in those days who became a knight also had to take religious vows to live as monks as well as defending the king. To become a knight you had to go through three different stages; page, squire and knighthood. When a boy turned seven, they would leave home and start their training to be a knight. As a page, he joined the household of another knight or a nobleman. There they would train him how to use and handle small weapons. They also taught him manners, and the behaviour of knights. Then at fourteen they would advance to squire. In this position he would be a servant to the knight who had become his master. Training progressed and advanced to that of a mounted soldier. This would come in handy when he was called to assist his knight in battle. This would usually last around seven years. Then the squire was eligible for knighthood. Any knight could bestow knighthood on another. They would simply put the armour of the squire on him. Later it became more complicated with a tap of the sword and the words, I thee you knight along with bathing and praying ceremonies. Knights lived under a strict code of chivalry. This meant that he had faith and a deep love of the Christian religion, even to the point of death. They also had strong loyalty towards their land of birth, and gave generously to all. They had a duty to protect women and the weak. Knights always fought for good over evil and never surrendered orShow MoreRelatedEssay on The Economic Structure of Matewan1293 Words   |  6 PagesThe Economic Structure of Matewan The film Matewan, written and directed by John Sayles, depicts the small rural townof 1920s Mingo County, West Virginia as a society undergoing complete social unrest, a result of clashing ideals and economic systems. The film is an illustration of how different social systems come to be so intertwined that they cannot be defined independently of one another. Unfortunately for the people of Matewan, the feudalistic economic system imposed on them by the

Thursday, December 12, 2019

Communication Issues in Data Solutions-Free-Samples for Students

Question: Discuss about the Communication Issues in Data Solutions. Answer: To: From: Date: Subject: Communication Issues in Data Solutions The process of the communication audit might refer to the various ways of research that the concerned company might need to follow for the identification of the strengths as well as the weaknesses that it might have been facing at the given point in time. The following essay attempts to look into with the major issues that were pointed out through the process of communication audit that was conducted at the Data Solutions, Brisbane, a concern dealing in software for data management. The essay attempts a qualitative analysis of the issues and proceeds to provide recommendations that might help the company to deal with the numerous issues that have been revealed through the process of the communication audit. Data Solutions is located in Brisbane, Australia and deals in data management software. The company has been facing a number of communication issues as pointed out by the communication audit processes. The major issue that has been troubling the company is the erroneous choice of the communication channels by the various staff of the organization. This might lead to the creation of communication gap among the members of the workforce of the company. The erroneous choice of the channel for communication on the part of the employees might lead to the conditions wherein the intended message is not transferred to the audience of the concerned communication, thereby leading to a loss of the data that should be conveyed to the concerned staff members of the company. The company has also been facing issues that result due to the limited nature as well as the partial nature of the communication that has been taking place within the firm. The conducted communication audit within the organizat ion has revealed the fact that the internal communication of the organization does not reach all the concerned members of the organization. There are various sections of the workforce that claim to be in the dark regarding the various strategies that have been taking place in the business concern. This might result in hampering the overall growth of Data Solutions. The conducted communication audit has further revealed that the company has been facing the issues that stem from the ineffectiveness of the numerous inter-organizational meetings that have been arranged and attended by the concerned management of the company. This might lead to a decline in the overall growth of the concern due to non-receipt of information on the part of the employees of the organization. The company might need to follow a few major recommendations in order to combat the various communicational issues that they have been facing in the communication matters. The primary issue faced by the company is the issue of the erroneous choice of the communication channels by the concerned staff. In order to deal with the problem, the company is advised to arrange for the educational seminars, workshops and visual presentations that might help the concerned staff members to learn about the various communication channels that they might use in certain contexts and for the certain audience. The company has also been facing severe issues due to the partial nature as well as the limited nature of the communication that has been taking place within the business concern. In order to deal with this issue, the concerned company might take steps to make the use of the official communication channel mandatory among the employed workforce of the organization. The staff of the organization i s further advised to maintain the records of all the official information exchange that they might engage in. This documentation might help them in case of any discrepancy that might arise in the future times. The use of the official communication tool might help the employees to get rid of the various disparities that might arise in the future. The company in discussion, Data Solution, has also been struggling with the issues that regard the ineffectivity of the numerous inter-organizational meetings that they have been participating in. The experts suggest that the best way to deal with this is to share the various minutes of the meeting with the concerned staff members of the organization thereby motivating the staff of the concern to perform better for the growth of the organization. Thus, from the afore-mentioned discussion, it might safely be concluded that Data Solutions should implement the concerned recommendations to deal with the identified communication issues that it might have been facing according to the reports of the communication audit. The implementation of the recommended measures might assist the company in motivating the staff of the company thereby leading to the overall growth of the concerned company in discussion, Data Solutions, Brisbane.

Wednesday, December 4, 2019

Financial Markets and Institutes

Question: Discuss about theFinancial Markets and Institutes. Answer: Introduction Top-down analysis is a method through which analyst first look at the big picture and then analyzes the other small details. In this approach traders analyze the economy and then forecast the industry which provides good returns to the investors, and after analyzing the industry they choose companies in that industry and purchase stocks of those companies. Investors look for the macro variables at the time of using this approach such as GDP, balance of trade, inflation rate, movement of currency, rate of interest and other factors of an economy, sectors which are performing good at that time or in future or countries (Investopedia, n.d.). Harvey Norman Holdings Limited is largest retailers in Australia and deals in products related to home and lifestyle. There is 30% increment in the profits of HVN till the date 30 June 2016. Sales in HVN operated stores increase by 11% i.e. $1.8 billion and sales in the franchisee stores increase by 7.6% i.e. $5.3 billion. Net profit of the company increases by 20.2% i.e. $314.7 million. According to chairman and chief executive report of HVN, macro economic conditions in which company operates can change and conditions related to housing in Australia are strong and favorable for the company. Earnings per share of the company is increase from the last year, therefore HVN pay more dividend from last year. Not only HVN but other retailers of lifestyle products had favorable market conditions this year. Currently HVN trades in market at 13x EBITDA and industry in which HVN operates trades at 11.6x EBITDA. Therefore, we can say that industry in which HVN operates has favorable market conditions in Australia. Investors can get good returns if they invest this time in the company and shareholders of the company are advised not to sell their shares at this time (Simply Wallst, 2016). Richard Murray is a chief executive officer of JB Hi-Fi and he runs his best teams in the retail market of Australia. From the last few years company share price are growing day by day. Richard Murray faces new challenges after the deal of The Good Guys. This deal was announced on Tuesday, and after the deal Richard Murray shifts his focus in the field of home and lifestyle products. JB Hi-Fi taken over The Good Guys, and enter into the market of home products. This takeover increases the market share of JB Hi-Fi from 3% to 29%, and electronic market related to consumer increases from 19% to 24%. JB expect that in next three years a rise in synergies rate from the $15 million to $20 million. Therefore shareholders of JB can expect good returns on their investment and new investors can invest in the stock of JB (Financial Review, 2016). References: Financial Review, (2016). The Good Guys deal is a huge challenge for JB Hi-Fi's Richard Murray. Retrieved on 20th September 2016 from : https://www.afr.com/business/retail/the-good-guys-deal-is-a-huge-challenge-for-jb-hifis-richard-murray-20160913-grf8xa. Investopedia. Top-Down Analysis. Retrieved on 20th September 2016 from: https://www.investopedia.com/terms/t/topdownanalysis.asp. Simply Wallst, (2016). Harvey Norman Holdings Limited (ASX: HVN): Is It A Buy On 30% Jump in Profits. Retrieved on 20th September 2016 from : https://simplywall.st/news/2016/08/31/harvey-norman-holdings-limited-asxhvn-is-it-a-buy-on-30-jump-in-profits/.

Thursday, November 28, 2019

5 Illegal Interview Questions and How to Deal with Them

5 Illegal Interview Questions and How to Deal with Them When it comes to job interviews, honesty (okay, maybe enhanced honesty in some cases) is the way to go. But what if the interviewer is asking you questions they have no right to ask? Out of ignorance or slyness, an interviewer might try to get information out of you that the company is not allowed to factor into their hiring decisions. However, you’re not obligated to answer them- and in fact you shouldn’t. Your battle plan should be to figure out why they’re asking (whether it has direct consequences for the job itself), and to decide whether you should answer. In most cases, the answer is â€Å"no,† but there are ways to redirect the conversation and/or call attention to the inappropriateness of the question without alienating the interviewer. After all, it may just be someone talking off the cuff without realizing it’s actually illegal to talk about certain personal issues. Some of the hardest interview questions you’ll encounter might be illegal.Here are some examples of illegal interview question areas, and how to get around them.1. Religion/Race/Sexual OrientationDo you volunteer with your church? That’s an interesting last name, what’s your background? These questions all sound pretty harmless†¦just making small talk, right? Yet each one gives away information known as â€Å"protected class.† Employers are prohibited by federal and state law from hiring (or not hiring) based on categories like race or ethnicity, religion, or sexual orientation. Talking about topics like your church (or lack thereof), your spouse, or your family’s ethnic background can give information that could tip the interviewer against you if there’s a bias involved. Even if it happens in a pre-interview chat, before you get down to the brass tacks of the job itself, you’ve given information that the interviewer had no real right to ask.The way to handle this is to redirect the question. If you r efuse to answer, even though you’re in the right, it could set you up as â€Å"combative† or disagreeable in the eyes of the interviewer. It’s okay to be vague and try to channel the conversation elsewhere. On church activity: I do volunteer at my local soup kitchen- I like to give back to the community when I can. On family background: Gotta love the American melting pot, right? 2. AgeYou have a pretty long and distinguished resume, do you see yourself retiring soon? Age (particularly 40 and up) is another protected class. If an interviewer tries to get information about how old you are, he or she might be trying to suss out whether you’re likely to be a long-time employee at the company†¦or whether this job is a pit stop on your way to the golf course.You should never feel obligated to give your age. Instead, take the chance to re-emphasize your commitment to the job for which you’re interviewing: On the contrary, I’m looking forward to talking about a long and productive relationship with this company, and bringing the fruits of that experience to my work for a long time to come.3. Family StatusIf you’re pregnant, have children, or may want children some day†¦doesn’t matter. An interviewer is not allowed to use your family status as part of the hiring decision. Even if you’re eight months pregnant in your interview suit, he or she can’t ask when you’re due, or about your childcare plan afterward.In a case like this, the best tactic is to try to push it back on the asker. Without being overly antagonistic, it’s okay to ask, Can you help me understand why that matters? I just want to make sure I better understand what this job entails.4. Whether You’ve Been ArrestedConvictions are fair game for interviewers and job applications, but arrests (without convictions) are not. Even that’s starting to change in some places: New York is looking at phasing out e mployers’ ability to ask about particular kinds of convictions. For now, however, convictions are askable, but arrests are not.If you’re asked, have a simple response ready to go (taking too long can trigger the kind of reaction you’re trying to avoid): I have never been convicted of anything, no. And if you do have a conviction, it’s essential to remember not to lie about that, because a background check would likely uncover that information.5. Your Military ServiceI see from your resume that you’re in the National Guard. Does that take up much of your time? Employers are not allowed to use active military service as criteria in hiring. Basically, the interviewer can’t factor in your military service at all. If you choose to answer this one, emphasize that you’ve never had a problem balancing your service with your career.6. Disability StatusIf you don’t mind my asking, how did you get in that wheelchair? Will you be on crutch es long-term? I see you have glasses- is that a pretty strong prescription? The Americans with Disabilities Act (ADA) is pretty clear- employers are not allowed to discriminate against employees that may need physical accommodations. Instead, they are allowed to ask if you would need any specific accommodations to do the job.If it seems like the interviewer is fishing for information about a disability, deflect it. Are you asking whether I would need special accommodations? Or, I’m not sure I see how this relates to my ability to analyze sales reports- can you clarify and help me understand?The most important thing to remember is that if you feel uncomfortable, you don’t have to answer- but you also don’t have to disqualify yourself by putting up a defensive wall or walking out of the interview. It’s fine to call attention to the reasons behind asking (in as non-confrontational a way as you can manage), then try to segue back to the interview and job desc ription as quickly as possible.If you have concerns about any of the areas outlined here, definitely check with the Equal Employment Opportunity Commission (EEOC), and know your rights as an applicant.

Sunday, November 24, 2019

Biography of Bill Clinton, the 42nd U.S. President

Biography of Bill Clinton, the 42nd U.S. President Bill Clinton was born on August 19, 1946 in Hope, Arkansas, as William Jefferson Blythe III. His father was a traveling salesman who died in a car accident three months before he was born. His mother remarried when he was four to Roger Clinton. He took the Clinton name in high school. At the time, he was also an excellent student and an accomplished saxophonist. Clinton became ignited to a political career after visiting the Kennedy White House as a Boys Nation delegate. He went on to be a Rhodes Scholar to Oxford University. Family and Early Life Clinton was the son of William Jefferson Blythe, Jr., a traveling Salesman and  Virginia Dell Cassidy, a nurse. His father was killed in an automobile accident just three months before Clinton was born. His mother married  Roger Clinton in 1950. He owned an automobile dealership. Bill would legally change his last name to Clinton in 1962. He had one half-brother, Roger Jr., who Clinton pardoned for earlier crimes during his last days in office. In 1974, Clinton was a first year law professor and ran for the House of Representatives. He was  defeated but remained undaunted and ran for Attorney General of Arkansas unopposed in 1976. He went on to run for Governor of Arkansas in 1978 and won becoming the youngest governor of the state. He was defeated in the 1980 election but returned to office in 1982. Over the next decade in office he established himself as a New Democrat that could appeal to both Republicans and Democrats. Becoming the President In 1992, William Jefferson Clinton was nominated as the Democratic nominee for president. He ran on a campaign that emphasized job creation and played to the idea that he was more in touch with the common people than his opponent, the incumbent George H. W. Bush. Actually, his bid for the presidency was helped by a three party race in which Ross Perot garnered 18.9% of the vote. Bill Clinton won 43% of the vote, and President Bush won 37% of the vote. Events and Accomplishments of Bill Clinton’s Presidency An important protective bill that passed in 1993 soon after taking office was the Family and Medical Leave Act. This act required large employers to give employees time off for illnesses or pregnancy. Another event that occurred in 1993 was the ratification of the North American Free Trade Agreement that allowed for non-restricted trade between Canada, the U.S., Chile, and Mexico. A huge defeat for Clinton was when his and  Hillary Clintons plan for a national health care system  failed. Clintons second term in office was marked by controversy surrounding relationships he had with White House staffer,  Monica Lewinsky. Clinton denied having a relationship with her under oath in a deposition. However, he later recanted when it was revealed that she had evidence of their relationship. He had to pay a fine and was disbarred temporarily. In 1998, the  House of Representatives  voted to impeach Clinton. The Senate, however, did not vote to remove him from office. Economically, the U.S. experienced a period of prosperity during Clintons time in office. The  stock market  rose dramatically. This helped add to his popularity. Post-Presidential Period Upon leaving office President Clinton entered the public speaking circuit. He also remains active in contemporary politics by calling for multilateral solutions to issues facing the world. Clinton has also started working with former rival President George H.W. Bush on several humanitarian endeavors. He also assists his wife in her political aspirations as a Senator from New York. Historical Significance Clinton was the first two term Democratic president since Franklin Roosevelt. In a period of increasingly divided politics, Clinton moved his policies more to the center to appeal to mainstream America. Despite being impeached, he remained a very popular President.

Thursday, November 21, 2019

Managing Business Organizations (business studies) Essay

Managing Business Organizations (business studies) - Essay Example and these differences and similarities a multi-national organisation â€Å"ZARA† is compared with a local UK architecture firm Purcell Miller Tritton (PMT) LLP. Zara is a renowned brand and flagship chain store of Inditex Group. It has gradually gained major popularity since its first store was opened in Spain. Zara has operated with an aggressive management style towards the business. It has proven many theories wrong, theories related to economies of scale, supply chain, etc. The company’s operation can be divided into philosophy, capability and payoff. Zara has kept a philosophy to keep 5 fingers touching the factory and five touching the customer i.e. they have kept a very quick movement between the production of their stock and the immediate transfer of that stock to the stores. Their main capability is to design, produce and deliver in 15 days as compared to the six month industry average. This is the major area in which the company has excelled over its competitors and has kept them way behind and it is because of these unique strategic capabilities that the company took over the clothing industry giant GAP in their first quar ter of 2010. Zara’s main and the innovative approach is their fast fashion trend, which makes their product available in stores after just two weeks in the designing process. Besides such a fast and flashy approach, they keep their production limited i.e. the batch of clothing in merchandise is only available for just that two weeks time period and after that it is not available in the stores. This approach of scarcity and the customer’s perception towards rarity has helped Zara to boost their Revenues significantly. (Bonnin, 2002; Tokatli, 2008) The main distinctive feature about Zara is its co-operative nature i.e. every staff member of the organization is involved in some business process for the entire organization. Each store manager and the store assistant are really participative in collecting and providing information

Wednesday, November 20, 2019

I wondered how a person can be developed to be a leader Essay

I wondered how a person can be developed to be a leader - Essay Example An effective leader knows what needs to be done to bring life back to the company, to deal with the company’s debt and financial burdens, to manage burgeoning and diverse groups of employees or to introduce more consumer-relevant products. The leader is the person who knows how to bring results. This is the reason that company leadership is the first variable that is changed when it hits rough patches. Conversely, the asset that is most appreciated and valued when the company is gaining speed. I understand that an innate set of leadership characteristics is essential in a person to be a good leader, combined with relevant education and training. I attained that education in business school right at the onset of my career and it has proved instrumental in my career progression and leadership capabilities. I have surmised that leadership is very contextual in nature and exists in many forms and manifestations. There are no didactic rules surrounding leadership; leadership is suc cessful when it is addressing change and bringing results. What is Leadership? While there are countless definitions of leadership in textbooks, the one I found most relevant was presented by Kotter, saying that leadership addresses change in organizations and prepares it for the ensuing struggle (2001). The world is in a state of constant change and dynamism, affected by a multitude of factors including newer technologies, economic shifts, globalization, social responsibility, the internet and scarce resources. As a result, today’s companies need people at the helm who are capable of dealing with change and deciding strategies that bring about change. The legendary Steve Jobs is commended as being one of the best leaders of our times because he steered Apple single-handedly not only towards profit, but made the company the most innovative company in the world which affected billions all over the globe. The idea crafted by Jobs, in retrospect, seems so simple: to enable the e veryday consumer to have simple yet artful gadgets for everyday entertainment. It was that vision of change, combined with Jobs’ management of Apple’s resources to steer it towards achievement of that vision that has allowed Apple to become what it is today. Thereupon, I take leadership as the force that not merely creates a vision for betterment, but also communicates it to all stakeholders, making it possible for that vision to be realized. The Leadership Role With the understanding that leadership exists to address change, I attempted to understand the exact role leadership plays in this process. Leadership is about refusing to limit one’s mind to ‘either this or that’ scenarios, says Martin (2007); the author explains that leaders do not simply consider two three options and select among them, but rather they create new, unheard-of solutions. Effective leaders are not afraid of complicated problems and nor do they develop strategies that fit som e pre-conceived mould. Instead, leaders strive to find a special solution that meets the unique business need. The innovativeness in leaders’ thinking is represented by creative solutions to problems that are a result of multidirectional factors and often opposing options (Martin). McShane and VonGlinow (2009) state that leaders use all the persuasion tactics at their disposal to motivate people to understand and implement their creative solutions. I learnt

Sunday, November 17, 2019

The Berlin Wall-Why did it come up Why did it go down Research Paper

The Berlin Wall-Why did it come up Why did it go down - Research Paper Example During the pre-war period, Eastern bloc’s authoritarian systems and erosion of political powers in pro-Soviet governments led to circumventing and defection of 3.5 million East Germans into the West where they could travel to other areas and neighboring countries. As a result, to strengthen the Eastern bloc emigration and defection restrictions; where legal migrations was in most cases meant to reunite families or when members of the minority groups were to return to their homelands (Mur, p.7), led to the construction of the Berlin Wall. The wall was intended to restrict movement which together with the Inner German Border, which was more separate and longer, help in implementing the emigration policy between the Eastern Block and West Europe. Reasons for Construction After the World War II, Germany was divided in to four occupation zones which were based on different social and economic ideologies from four allied powers such as United States France, United Kingdom and the So viet Union; whose ideological differences led to further political divisions in the economy. For instance, the Soviet Union expected to undermine the British position within their occupation zones with an aim of directly influencing the United States to withdraw from their positions to a point that nothing would stand along their communist rule. This would later be followed by establishment of Marxism-Leninism system with the major communism party required to channel down Soviet orders down the administrative apparatus; leading to nationalization of property and industries in East Germany Zone, and this led to internal wrangles within the zone and those of the allied powers (Major, p.2). This led to massive emigration of people from East Germany to the west; with creation of an elaborate police force and administration that was to oversee indoctrination of Marxism systems which were introduced in the school curricula and close surveillance of the implementation. In case of violation of the stated communism lines, punishments such as imprisonments, torture and death would apply and reprimands for the persons outside the public attention; which instigated the need to control movement of the people out of East Germany, and to protect the interests of the new communism establishment (Maltz, p.7), the wall had to be created. This was also influenced by the 1950’s Soviet approach of controlling the emigration and national movements; which presented a quandary for some Eastern blocs that were more economically advanced and those that were liberalized, which led to many citizens escaping the East for the West. By 1961, German Democratic Republic wanted to de-Nazify their occupation zone and to promote socialism system as means of public policy and development, which could only be achieved by restricting movement of people with different ideologies in to the zone and thus the construction. In addition, emigrants seemed young and well educated and the East German y officials feared â€Å"brain drain†; leaving for political reasons of communism at the expense of economic expectations by the East Germany would ruin their socialism agenda thus they needed to be controlled. Contraventions by the Soviet Union in and other allied powers in a bid to take full control of East Germany such as the closure of the Inner German Border and

Friday, November 15, 2019

Forensic Analysis of Personal Data Leakage on Android Phone

Forensic Analysis of Personal Data Leakage on Android Phone Sheriff Drammeh  Ã‚   RESEARCH STATEMENT The proposed research will explore personal data leakage on the android mobile application platform through forensic analysis of volatile and non-volatile memory. PROPOSAL SUMMARY The proposed research will employ both volatile memory forensic techniques and traditional disk forensic techniques to the android platform in order to identify privacy breaches primarily in android mobile applications [1]. The proposed research also aims to demonstrate that forensic artifacts can be found both in the disk drive (non-volatile) and memory (volatile). AIMS AND OBJECTIVES OF THE PROPOSED RESEARCH 1. Acquire non-volatile data from an android device using the traditional forensic approach and the memory dump, analyse the acquired data for any forensic artifacts and make a comparative analysis of both approaches. This will be achieve by conducting an experimental simulation of both approaches. 2. Develop an effective methodology to improve the detection of personal data leakages and sensitive information from android mobile applications. RESOURCES The major part of this proposed research will be conducting an experiment, hence few equipments are essential to be in place in order to carry out the experiment. The proposed research is mainly memory dumping and disk drive imaging for forensic analysis. Some open source tools will be highly utilize during the course of this proposed research, such as android studio SDK, Odin, ADB and mem. Additionally, books on android forensics, mobile forensics, journals and YouTube video tutorials will also be utilize. As the research progresses more resources might be needed. The following is a non-exhaustive list of resources currently available for use: à ¢-  Window 10 OS with processor Intel (R) Core(TM)i7, install memory of 16.0GB is the host operating system and forensic workstation for disk image analysis à ¢-  Linux Ubuntu 15.10 x32 with kernel v2.6 is our forensic workstation for memory analysis à ¢-  VMware Virtual Machine v11.1.2: Will be used to install guest operating system à ¢-  Physical android phone Samsung galaxy S3: Is the subject of the experiment à ¢-  Android SDK developer tool for Linux x32: Is a software development tool used for application development and analysis. à ¢-  mem is an open source tool for dumping running process on android phone à ¢-  Odin3.-v3.10 is open source tool that enable us to rooted android phone à ¢-  Samsung usb drive for mobile phone used to enable debugging bridge between android phone and forensic workstation à ¢-  CF-Auto-Root-2dcan-2dvl-sghi747m is used to update firmware during rooting process. à ¯Ã¢â‚¬Å¡Ã‚ · AccessData Forensic tool kit version 3.4.2 ( Download FTK Imager 3.4.2) is forensic software tool used to analysis disk image file 3 | P a g e CONNECTION TO THE COURSES OF MISSM PROGRAM This proposed research is closely related to Digital forensic course (ISSM536), which is one of the course we had covered in our Information Systems and Security Management program. The proposed research used the techniques learned from this class and applied them in the android environment to reveal several types of personal information such as username, password, date of birth, postal addresses contact, photos, account number, messages etc. The comparative analysis method used covers the principles of digital evidence collection learned in Information Technology Security Laws and Ethics course (ISSM561). The proposed research has a beginning and ending, as a result it need to be managed in order to deliver the end result. Therefore, the knowledge learned from (ISSM545) System Development and Project Management. REVIEW OF RELATED RESEARCHS Fuchs, et al., [2] presented the first analysis tool for android called SCanDroid, a framework for Android to perform information flow analysis on applications in order to understand the flow of information from one component to another component. Consider a case where an application request permission to access multiple data stores i.e., public data store and private data store. The application requires permission for reading the data from the private store and writing data to the public store. SCanDriod analyzes the information flow of the application and reports whether the application will transfer the information in the private store to the public store or not. However, SCanDroid also suffers from the same limitation of security policy expressibility. In order to consider some information flow to be dangerous, the policy writers must define certain constraints prior to executing the policy. Similarly, if an information flow is not explicitly added to the set of constraints the f ramework will consider it to be safe. In 2012, C. Gibler, et al., presented AndroidLeaks, a static analysis framework for automatically finding potential leaks of sensitive information in Android applications on a massive scale[4]. It informed the user if applications are leaking their personal information. AndroidLeaks drastically reduces the number of applications and the number of traces that a security auditor has to verify manually. To secure privacy information, they set up a mappings between Android API methods and the required permissions as the sources and sinks of private data for data flow analysis. However, AndroidLeaks does not yet analyze Android-specific control and data flows. This includes Intents, which are used for communication between Android and application components, and content providers, which provide access to database-like structures managed by other components. Sasa Mrdovic et al., [3] proposed a combination of static and live analysis for memory image, which is obtained by hibernation mode (power management feature that exists in most portable computers). After they obtained the physical memory image, they used it to boot the investigated system in the virtual machine (live view) to resume the system to the same state before it went into hibernation mode. Their proposal of using hibernating feature was to obtain the memory contents without violating the evidence integrity, but during their analysis they found out that they lost all the information about network connections because hibernation mode terminates the network connections before it starts in Windows environment. As one of best well-known analysis approaches, Taint Droid detects privacy leaks using dynamic taint tracking [5]. Enck et al. built a modified Android operating system to add taint tracking information to data from privacy-sensitive sources. They track private data as it propagates through applications during execution. If private data is leaked from the phone, the taint tracker records the event in a log which can be audited by the user. In 2015,Young ho Kim et al., proposed a methodology and an architecture for measuring user awareness of sensitive data leakage, which features runtime application analysis over timing distance between the user input event and actual privacy data leak[6]. 4 | P a g e Nai-Wei Lo, Kuo-Hui Yeh, and Chuan-Yen Fan present a user privacy analysis framework called LRPdroid[7]. LRPdroid has been proposed for an Android platform to offer a user privacy management model. In the LRPdroid framework, they defined required models to achieve user privacy management: App execution data flow, user perception, leakage awareness, information leakage detection, privacy disclosure evaluation, and privacy risk assessment. To support the proposed privacy analysis model, two information capture modules for LRPdroid were designed to acquire incoming data inputted by a mobile user and outgoing data transmitted from a targeted App. A system prototype based on the LRPdroid framework was developed to evaluate the feasibility and practicability of LRPdroid. Two general App usage scenarios were adopted during the usage of Line App to evaluate the effectiveness of LRPdroid on user privacy disclosure by social engineering attack, user information leakage from normal operations o f a running App, and privacy risk assessment of targeted running App. In 2015[10], Pasquale Stirparo, Igor Nai Fovino, and Ioannis Kounelis developed a novel methodology called MobiLeak, for analysis of security and privacy level of mobile applications, which focuses more on user data instead of application code and its architecture. Their research work addressed and solved the problems related to the following three research questions for mobile environment and applications: (1)what are data and where can such data exist? (2) How is personal data handled? (3)How can one properly assess the security and privacy of mobile applications? They start their research work with a fundamental prerequisite in order to be able to properly treat them, which is studying and identifying every possibility state at which data can exist. After this step, they analyzed how real life mobile applications and operating systems handle users personal data for each of the states previously identified. Based on these steps they developed MobiLeak, which also combined concepts and principles from the digital forensics discipline. DESCRIPTION OF PROPOSED RESEARCH THE FOCUS OF THE RESEARCH The aim of this proposed research is to examine user data storage mechanism on a mobile application in a context of android platform. Analyzing mobile application for personal data leakage require extensive analysis and in-depth understanding of both the OS and application architecture. The analysis is expected to be conduct to data at rest and data in motion. The result of this proposed research will help to create awareness to both application developers and the android community that users personal data information such as username, password and other sensitive information are at risk both in volatile and non-volatile memory. Finding user sensitive data on android smart phone could be in three (3) locations: disk drive, memory and app server. Our research is limited to two out of the three application data store which is disk drive and memory, both storage areas could prove strategic locations for finding vital information for android smart phone users. The motive of this research is to examine whether applications encrypt user sensitive information both in the memory and the disk drive. This pose the following questions: 1. Does user credentials are encrypted on a memory ? 2. Among the two method which one is more forensically sound? 3. What information could be found in disk drive and not in memory? During the experimental phase of the proposed research certain applications will be examining, such as VOIP applications, social media applications, financial applications and telecom applications. I chose this samples of android application from various categories. Because these applications are fairly popular and are used by millions of people around the globe. For each application I will look at how user sensitive data, such as user name, password, date of birth and account number are store both in the disk drive and the memory. 5 | P a g e The rest of the proposed research section is divided into 4 parts: First I am going talk about my methodology, next I will present the series of preliminary result both in the memory analysis and disk analysis, third I give the highlight of the expected result and finally, I will discuss about certain obstacles that may arise. METHODOLOGY The method used in carrying out the experiment of the proposed research consist of four phases. Phase One: Gather the require tool both in term of hardware and software As the proposed research required memory dump and disk drive imaging analysis a physical android phone is needed to conduct our experiment. 1. Window Host OS and Ubuntu Guest OS as our forensic workstation 2. Android phone Samsung Galaxy S3 3. Installing Odin3.-v3 which will allow us to root our android phone 4. Install android SDK tool for using ADB(Android Debug Bridge) to get shell access on our android Phone 5. Mem application software loaded into our android phone through ADB which allow us to dump the running process from the Phone Phase Two: Installation and configuration of experimental environment At this phase all the required tools, such as the hardware and software are installed and configured. Pre-experiment of memory dump and disk imaging is performed, and tools are verified. Phase Three: Acquisition of disk image and memory dump At this phase the disk image drive is acquired using dd command tool from the internal memory to internal SDcard of the phone and ADB pull is utilize to pull/copy the disk partitions to our forensic work station. Mem program software is utilize, this allow us to dump the running process. We used ADB to install mem application into our phone in order to dump the desired running application process. Phase Four: Preservation and analysis of acquired data The purpose of this phase is to examine acquired application data both in the memory and disk drive. For example, we will check if the application is encrypting users credential both data at rest and data in transit? MEMORY DUMPING ANALYSIS This section provide detail steps taken to analysis the dumped memory of certain applications selected for this proposed research. The result shows that users credential are not properly handle by the application, which can result in personal data leakage. A program called mem was used to facilities the process dump, ABD was also used to install mem program into our android phone. List the running process and dump them into the internal SDcard and finally pull it to our forensic workstation for further analysis. Strings and sqlite3 command were utilized to look for ASCII text format from the dumped memory to understand the output result. Interestingly, the result showed that users credential are not encrypted at all. The applications analyse in this proposed research are as follows: A) Africallshop App Africallshop is a VOIP application which allows customers to buy credit online to make national and international calls and send text message worldwide to friends and family at a cheap rate. The application is 6 | P a g e rated about 4.4 in the android play store and was downloaded by five thousand (5000) customers during the time of this proposed research. The prominent outcome of this application are as follow: The username, password, caller id and user account balance are not encrypted. We ran the sqlite3 and string command on the dumped memory, which produce the result below: sip.africallshop.com XXXXXXX 0017802986780 CANADA 12590 xxxxxxxxx yes CAD proxy.africallshop.com:443 574b690276bc5 [emailprotected] 0,434 B) EHarmony App EHarmony is an online dating site for singles. Those using this app can communicate freely, share picture, video and text. During the time of this proposed research the application was downloaded by five million people and rated 3.1 in the app store. The prominent outcome of this application analysis are as follow: The user credential, such as username, password and device information are all in plaintext. The result below: POST /singles/servlet/login/mobile HTTP/1.1 j_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=androidj0r1D7fg4ArJ2uSVPgSti5zcEnltO919mHUV88E%2FKUWcan9NEMgT820MygiKsWf0Sg1147vdZbXIo tLS HTTP/1.1 User-Agent: eHarmony-Android/3.1 (SGH-I747M; Android OS 4.4.2; en_CA; id f9d8a2acfec7b901) X-eharmony-device-id: f9d8a2acfec7b901 X-eharmony-device-os: Android X-eharmony-device-os-version: 19 X-eharmony-device-type: 1 X-eharmony-client: eHarmony X-eharmony-client-version: 3.1 Accept: application/json lBxp c_te j_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=android 8KTB stevedocwra on 7 | P a g e C) Virgin Mobile My account App Virgin mobile is GSM mobile application that allow user to manage their account features and usage. Users can make payment and add a buddy to their list. This application was downloaded by five hundred thousand (500,000) people during the time of this proposed research and was rated 3.4 in the app store. The prominent outcome of this application are as follow: Sim sequence number, cell phone number, UMTS number, activation date, user data of birth, subscribe date, user e-mail address, initial password, pin unlock code and account number. all this information are not encrypted. [emailprotected]:~/android-sdk-linux/platform-tools$ strings virginmobile | grep [emailprotected] We run the ps and string command on the dumped memory, which produced the result below: imeioriginal:null,simsequenceNumber:174392323,esnequipmentType:null,imeiequipmentType:{value:LTEDevice,code:T},simequipmentType:{value:USimVal,code:U}},telephoneNumber:7802356780,networkType:{value:UMTS,code:85},language:{value:EN,code:E},isBillSixty:false,isTab:false,commitmentStartDate:null,commitmentEndDate:null,commitmentTerm:0,contractType:{value:OFF_COMMITMENT,code:O},paccPinStatus:{value:NOT_ENROLLED,code:78},padPinStatus:{value:NOT_ENROLLED,code:78},initialActivationDate:1463112000000,accountCommPref:{value:BILL_INSERTS,code:66},isAccountSMSPerm:true,birthDate:512197200000,lastUpdateDate:1464062400000,lastUpdateStamp:9863,lastHardwareUpgradeDate:null,daysSinceLastHWUpgrade:null,subscriberEstablishDate:1463112000000,daysSinceActivation:16,nextTopupDate:1465704000000,cancelledSubStatusDate:1463371200000,initialPassword:5069,isCallDisplayAllowed:false,pricePlan:VHV226,portInidicator:null,primeMateInidicator:{value:UNKNOWN,code:R},primeSubNumber:null,subMarket:{value:UAC,code:UAC },telcoId:MOBL,pinUnlockKey:[36761817,63094923],manitobaIndicator:O,thunderBayIndicator:O,portabilityIndicator:O,serviceArea:N,hasOrderInProgress:false,isWCoCSubscriber:true,hasDomesticDataServices:false,hasRoamingDataServices:false,domesticDSBlockedUntil:null,roamingDSBlockedUntil:null,isAccessible:false,promotionGroupCode:null,emailAddress:[emailprotected],wcoCDate:1463112000000}]},emailAddress:[emailprotected],arbalance:{name:{http://bside.int.bell.ca/customer/profile/types}ARBalance,declaredType:java.lang.Double,scope:ca.bell._int.bside.customer.profile.types.MobilityAccountType,value:0,nil:false,globalScope:false,typeSubstituted:false},ebillInfo:{isEBillEnrolled:true,isEBillNotifyEnabled:true,ebillStartDate:1463112000000,ebillEndDate:null},siowner:{value:BELL_MOBILITY,code:MOBL},arpuamount:19.13}]},wirelineAccounts:null,internetAccounts:null,tvaccounts:null},activeHouseholdOrders:null,emailAddress:[emailprotected]},username:7802986780,guid:SCP9O0ELLDDUN2J,profileType:BUP,savedT imeStamp:2016-05-29T01:30:38.458-04:00,profilebanNumbers:[{accountType:Legacy,ban:527566075,profileSaveTime:1463945744000}],accountType:,paymentData:[[{paymentInfoList:{billAvailable:true,lastPaymentAmount:40.18,totalAmountDue:40.18,lastPaymentDate:2016-05-22T00:00:00.000-04:00,paymentDueDate:2016-06-06T00:00:00.000-04:00,billEnddate:2016-05-14T00:00:00.000-04:00,balanceForward:0,bankAccountNumber:null,creditCardNum:null,customerId:null,ban:527566075,mdn:52756607UAV580,eligibilityInd:Y}}]]}` DISK IMAGING ANALYSIS This section provided detail steps taken to conduct traditional forensic technique for non-volatile memory acquisition and analysis. During this phase the acquired memory will be examine and the primary concern will be user data stored, in particular share_pref folder. Share_pref folder is a storage location for key-value in side application database. Android application store user data within /dev/block[8]. With the use of common forensic command, such as dd, will be utilize to image disk drive partition. For this proposed research the following partitions are imaged for analysis: System file Cache file 8 | P a g e User data Persist But our proposed research experiment will be focus on user data folder, as it is consider to be the storage location for application data. To image disk drive, shell access is need through android SDK, we then look for mount file on the disk drive before executing dd commands to copy the partition from the internal memory to internal SDcard and finally pulling it to our forensic work station using adb pull command. 1. Checking the mounted file on the disk drive mount /dev/block/platform/msm_sdcc.1/by-name/userdata /dev/block/platform/msm_sdcc.1/by-name/cache /dev/block/platform/msm_sdcc.1/by-name/system /dev/block/platform/msm_sdcc.1/by-name/persist 2. Copying the user date partition and pull it to forensic work station dd if=/dev/block/platform/msm_sdcc.1/by-name/userdata of=/mnt/sdcard/test1 17399538+0 records in 17399537+0 records out 8908562944 bytes transferred in 1934.464 secs (4605184 bytes/sec) adb pull /mnt/sdcard/test1 3. Imaging the cache partition to internal SDcard dd if=/dev/block/platform/msm_sdcc.1/by-name/cache of=/mnt/sdcard/cachefile1.img 1720320+0 records in 1720320+0 records out 880803840 bytes transferred in 118.669 secs (7422358 bytes/sec) 4. Copying the system partition dd if=/dev/block/platform/msm_sdcc.1/by-name/system of=/mnt/sdcard/systemfile.img 3072000+0 records in 3072000+0 records out 1572864000 bytes transferred in 255.874 secs (6147025 bytes/sec) [emailprotected]:/ # 5. Copying the persist partition dd if=/dev/block/platform/msm_sdcc.1/by-name/persist of=/mnt/sdcard/persist.img 16384+0 records in 16384+0 records out 8388608 bytes transferred in 0.865 secs (9697812 bytes/sec) The above command will image each partition of the mounted file of dev/block with the default block size of 512 byte during bit-by-bit copy of the file and direct the output file to internal SDcard. Finally, copy it to our forensic workstation, Which can be analysis using forensic tool called AccessData FTK imager version 3.4.2. FTK is recommended forensic tool for disk image analysis by both forensic and legal community for its powerful carving capability, stability and ease of use. AccessData FTK ANALYSIS 1. PayPal App PayPal is an online payment system that allows its member to transfer funds locally and globally. Members can receive, send money and buy or pay for goods and services online. The application was downloaded by 10 million people at the time of this research and rated as a good app in the app store. We added evidence item to 9 | P a g e FTK navigate to data and com.paypal.android.p2pmobile then share_pref folder. The folder share_pref/PresentationAccount.RememberedUsersta../ reveal user data information such as user first and last name, cell phone number, and email address. 2. AfricallShop App Africallshop is a VOIP application that allow the users to make cheap international call worldwide, user can purchase credit online to communicate with peer by text message and voice call. After adding user data partition to FTK imager, navigate to com.v2.africallshop folder, expand the folder view share_pref folder. In sher_pref folder an xml file called com.v2.africallshop-prefrences.xml was view and contain user sensitive data such as app domain name, caller ID, country, ID, user password, username and account balance all in plain text. 10 | P a g e 3. Keku App Keku is a VOIP application which facilitate call or text through Wi-Fi or mobile data. User buy credit online to make local and internationally calls. The package of the application contain probative information about the user. App database store was reveal through FTK analysis and the share_pref folder contain sensitive information about the user. In share_pref folder a file called Org.keku_preferences.xml, this file contain users sensitive data and device information such as, password, username, device-mac address and user phone number. 11 | P a g e EXPECTED RESULTS During the experimental phase of the proposed research, aim and objective of the experiment is to demonstrate or show that users personnel data information are at risk during application data process in transit and at rest. The research has observe the dumped process and disk drive imaged to reveal personal data leakage and has successfully uncover vital information about App users, such as username, password, date of birth etc. OBSTACLE The obstacles encountered during the experimental phase of the proposed research as follow: 1) Lack of enough material regarding android forensic as the field is immature 2) Unable to image the whole memory of the actual phone, as the system configuration file is missing and couldnt be found to compile it with LiMe in order to acquire the whole memory. 3) Lack of enough analysis tool to cross examine or evaluate both the dumped and disk drive memory, Ubuntu Linux tool was used to do our analysis. CONTRIBUTION TO KNOWLEDGE The proposed research show that application developers are far less careful with user sensitive data when it being stored both in the disk drive and memory in running applications. Using very simple forensic investigation techniques running strings and sqlite3 on dumped memory and disk drive imaging analysis on FTK show quite a lot of private information. OUTLINE OF FINAL RESEARCH PAPER ISSM 580/581 The final research document will be structure as follows [9]: Section 1, will be the abstract then the Introduction to the paper. Section 2, will discuss memory analysis technique. Section 3, will discuss disk imaging analysis 12 | P a g e technique. Section 4, will discusses the forensic artifacts unveil during the analysis . Section 5, related work. Section 6, the result summary. Section 7; conclusion and future work. . RESEARCH DELIVERABLES This research will be conduct in Fall Semester 2016, from September 2016 to December 2016. Nevertheless, some major preliminary steps have already being taken. Most of the required tools both hardware and software for the proposed research have already being obtained and implemented. Spring 2016 April Researching the Topic of Interest Week 1 2 Finalize the Topic with Primary Advisor Week 3 4 Read the Area/Topic of Interest May Week 1 2 Read relevant Journal or Article related to the topic of interest Week 3 4 Gathering and installation of test Environment, Conducting and Experiment. June Week 1 Writing First Draft proposal and submit Week 2 -3 Edit and Improve proposal based on advisor guidance, Further Experiment and literature review read. Week 4 Final Proposal and Submit.

Wednesday, November 13, 2019

Post wAR DEFINING moMENTS ESSAY mEDICARE :: essays research papers fc

Post War Defining Moments Essay -Medicare At the beginning of the 20th century healthcare was a necessity in Canada, but it was not easy to afford. When Medicare was introduced, Canadians were thrilled to know that their tax dollars were going to benefit them in the future. The introduction of Medicare made it easier for Canadians to afford healthcare. Medicare helped define Canada as an equal country, with equal rights, services and respect for every Canadian citizen. Medicare helped less wealthy Canadians afford proper healthcare. Canadian citizens who had suffered from illness because they could not afford healthcare, were able to get proper treatment. The hospitals of Canada were no longer compared by their patients’ wealth, but by their amount of service and commitment. Many doctors tried to stop the Medicare act, but the government and citizens outvoted them and the act was passed. The doctors were then forced to treat patients in order of illness and not by the amount of money they had. Medicare’s powerf ul impact on Canadian society was recognized globally and put into effect in other nations all around the world. Equality then became a definition which every Canadian citizen understood.   Ã‚  Ã‚  Ã‚  Ã‚  After the Second World War, illness was amongst many Canadians, and many of them did not have any chances of recovering because they could not afford healthcare. Medicare made it possible for those who did not have much money, to receive treatment for their illnesses. Tuberculosis was the most crucial disease which was spreading after the war. This bacterial infection was sometimes called the â€Å"white plague† and many Canadians were haunted by it. Residents of Saskatchewan formed together the Saskatchewan Anti-Tuberculosis Commission to try and stop the spread of it, and make plans for controlling it in the future. When Tommy Douglas, a Baptist Minister who turned into a politician, was elected to the leadership of the recently formed national Democratic Party of Saskatchewan, many other governments had began to see the brilliance in his ideas and they began to embrace them. He began to uncover many different health plans which had boundaries to the amou nt of healthcare patients were going to receive. â€Å"Most of these plans, in order to stay solvent have to eliminate great many groups of people. Because of age, because of chronic conditions, because of genital illness, past medical history and so on. And these precisely are the people who need some kind of protection.

Sunday, November 10, 2019

Possible risks Essay

Determination of pregnancy is not certain until the second trimester, at around twenty weeks, when the fetal heart beat can be heard via a fetoscope. Albeit there are presumptive and probable signs associated with pregnancy, like the early morning sickness or the growing size of the abdominal area, these could also be caused by a different pathology. Hence, it can be inevitable for a woman who is not aware of her pregnant state to be exposed to radiation, most especially if she is not aware of her current menstruation cycle. Radiation exposure usually occurs whenever a person is exposed to cosmic rays, external radiation from radioactive ores, internal exposure through radiation therapy given for treatment in cancer patients, and most commonly through diagnostic x-rays. More often than not, pregnant women who are not aware of their pregnant state could have gotten their diagnostic x-rays taken, which is equivalent to receiving 70 millirem. Also, she could have been exposed to other radiation sources, like watching the television and living next door to a power plant. But exposure to radiation can have an acceptable limit of 350 millirems for the pregnant woman. For the pregnant woman, the most critical period wherein the fetus will suffer the most health consequences is when the she is exposed to radiation around two weeks to fifteen weeks gestational age. At two weeks gestational age, if the mother is exposed to a radiation that measures greater than 5 rad or 5000 millirem, a miscarriage can take place or even death inside the womb. If the fetus is exposed to radiation at the gestational age of eight to fifteen weeks, the fetus is to suffer a severe brain damage from the exposure. This can result in lowered intelligent quotients or IQs, mental retardation, stunted growth and other birth defects. Mental retardation is defined as a general developmental disorder characterized by a lower than average intelligence marker and the child is to suffer from limited daily living skills due to limited learning capabilities. Stunted growth in a child will be evidenced by a sluggish growth and development progress, as evidenced by a lower than normal height, weight and even cognitive skills. After this critical period, the two to fifteen weeks of gestational age, the fetus will unlikely suffer from radiation exposure, unless the exposure is extremely large. Only having been exposed to at least five thousand x-rays at one time can give harm to a 16 week old fetus. At 26 weeks gestational age, the fetus cannot be harmed by radiation exposure, and if ever exposed to radiation, the fetus will unlikely suffer serious health consequences. This can be compared to a newborn being exposed to radiation; the chances of having defects are greatly decreased if not invisible already. However, some of the effects of being exposed to radiation cannot readily be seen or manifest in the early life. Studies also show that fetuses are extremely sensitive to the cancer causing effects of radiation exposure; hence this can increase their risks in acquiring cancer later in life. Radiation exposure can be limited, if not avoided. The pregnant woman needs to be aware of her physiological state. She would have to consult all of her diagnostic exams and her workplace to her physician, so that radiation exposure can be prevented early on the pregnancy.

Friday, November 8, 2019

What If Your Grad School Recommendation Is Missing

What If Your Grad School Recommendation Is Missing Recommendation letters are a vital part of your application to graduate school. All applications require multiple letters of recommendation from professionals, typically faculty members, who evaluate your capacity for graduate-level work. Selecting faculty to approach and soliciting recommendation letters is challenging. Applicants usually breathe a sigh of relief once several faculty  members have agreed to write on their behalf. Asking Is Not Enough Once you have obtained your letters, do not rest on your laurels. Stay aware of the status of your application, particularly whether each program has received your recommendation letters. Your application will not be read- not one word will pass the admission committees eyes- until it is complete. Your application is not complete until all recommendation letters are received. Most graduate programs notify students of the status of their applications. Some send emails to students with incomplete applications. Many have online tracking systems that permit students to log in and determine their status. Take advantage of opportunities to check up on your application. Recommendation letters do not always arrive on time- or at all. Now What? With admissions deadlines rapidly approaching, its up to you to ensure that your application is complete. If a recommendation letter is missing, you must approach the faculty member and give a gentle nudge. Many students find requesting recommendation letters difficult. Following up on late letters often is petrifying. Dont be afraid. Its a stereotype, but often true: Many faculty  members are tardy. They are late to class, late returning student work, and late in sending recommendation letters. Professors may explain that graduate programs expect faculty letters to be late. That may be true (or not)- its your job to ensure that your letters arrive on time. You cant control the faculty members behavior, but you can offer gentle reminders. Email the faculty member and explain that the graduate program contacted you because your application is incomplete as they have not received all of your recommendation letters. Most faculty will immediately apologize, perhaps say that they forgot, and promptly send it. Others may not check their email or reply to your message. If the professor does not answer email, your next step is to call. In many cases, you will have to leave a voicemail. Identify yourself- clearly, state your name. Explain that you are following up to request a recommendation letter be present because the graduate program has not received it. Leave your phone number by speaking slowly and clearly. Thank the professor, then leave your phone number and name again (speak slowly and clearly). When you speak to the professor, be factual (e.g., the admissions coordinator says the letter has not been received) and be courteous. Do not accuse the faculty member of being late or of trying to undermine your application. The fact is that he or she probably simply forgot to Remember that you want your professor to be a good move and think highly of you as he or she writes your letter, so be polite and deferential. Follow Up After you have reminded faculty your job is not done. Follow up with the graduate programs. Its up to you to ensure that your application is complete. Some faculty might tell you that they will send the letter soon, but they again may fall victim to tardiness. Check up. You might find a week or two later that the letter still has not arrived. Again remind the professor. This time email and call. It isnt fair, but the reality is that some faculty, though they mean well, do not send recommendation letters on time. Be aware of this and do your best to ensure that your graduate application is complete and on time.

Wednesday, November 6, 2019

Sunday, November 3, 2019

Local channel San antonio TX, channel 5 Research Paper

Local channel San antonio TX, channel 5 - Research Paper Example The news started with the marriages that were happening during the day, and it was a foregone conclusion that the day was unique in engaging in marriages. As it was a memorable day. Most of those who commented said that it would be easy to remember the day as it had the same numbers for months days and years. The possibility that it could take another century to take another millennium to have such a date. Then, the story of birthing followed. Mothers wanted to give birth on this phenomenal day in history. The first events of the newscast were targeting the family since they talked much about the family. This is evident in the themes of marriage and giving of birth in the first two segments of the news. This news could be watched by all audiences since it dwelt on the family and had no violence in it. Thus, this news segment targeted all people regardless of their ages, especially those who are about to wed or planning to wed sometime later. Crime and murder then followed. This was e vident n the news about a certain man called Jacob Mathews who went on a rampage, shooting and killing three two people and seriously injuring one. He was camouflaged and wore a bullet proof vest. It was done in Portland, Oregon. The person used a rifle in the shooting. The events in this story were not appropriate for children. The story required a mature audience. Another story involved the robbery of arms by masked men who were caught on surveillance cameras. They were not successful since the alarms went off and became a scare to them. they had stolen the a barbeque vehicle. Only the vehicle was found after the thugs escaped. Karen an employee of trust bank spoke on the issue. The story was appropriate in that there was a crime that was about to be committed, and the authorities put the public on notice to report anybody they suspected in the involvement of the crime. The audience to this was largely the banks and security firms, and to a small extent, the public since they were to report any suspect to the police. The security firms and banks were appropriate audiences because the act focuses on their securing of the banks using security systems. The robbers were not able to break through the ATMs because the alarms went off. This was to send a message to the banks to involve security firms in beefing up security to prevent cases of break-ins in their ATMs. Another story was about pilgrim’s pride being involved in 4 serious violations, and if they don’t deal with the violations in 15 business days they will face the consequences of breaking the laws. The audience to this was other organizations that are related to pilgrim’s pride. They are also put on notice though indirectly. This sent a message that any organization contravening the laws set will face legal process and could be prosecuted in a court of law. There was no happy talk in this story since it involved serous sentences and the newscaster just wore her customary smile as sh e presented the news. The next story was of two brothers who engaged in burglary. They vandalized five dorms and stole various goods. The came us a surprise to many since the two were former members of the corps. Jovan and Allison Martinez were the individuals who engaged in this act of thievery. Their intention was unknown as it caused may unanswered questions. Only one brother was caught. The audiences for this story were members of the corps and the general public. the news anchor was not smiling as much as she presented t

Friday, November 1, 2019

Disaster recovery plan Essay Example | Topics and Well Written Essays - 500 words

Disaster recovery plan - Essay Example I have a detention center that sits on 4.5 acres of area. It’s composed of approximately 196,000 sq. feet of space, comprised of laboratories, faculty offices, administrative offices, auditoriums, classrooms, gymnasium, cafeteria and housing. All of the buildings on campus are constructed with steel frames and supported by concrete spread footing as per the uniform building codes of the State of Virginia. All basement walls are reinforced concrete and are protected by waterproofing through out. To begin with a few observations are necessary. The construction in this space are all up to code and well-built. That sort of standardization makes coming up with a place much easier. Second, the size of the area is not especially large, but it bigger than an ordinary small business. That must be taken into account. The first step to take is a Risk Analysis. What kind of risks are these operations subject to? Can they be anticipated? How serious are they? Can their impact be minimized? Virginia is not known to suffer from a lot of earthquakes or natural disasters. The most likely disaster are fires and major storms. The more serious of these—a fire—can be effectively anticipated by a serious sprinkler system and well-trained security personnel. The operations do not take place on the edge of a cliff or near a large body of water so many potential risks are therefore averted. Next it is important to look at the budget for any such plan. How much are you willing to spend. In order to protect from a fire it might be a good idea to make all walls fire retardant—that, however, would be prohibitively expensive. There is only so much money in the world. Still, it is important to remember than an ounce of prevention is worth a pound of cure. Look for effective and efficient way of reducing risk, with an eye to your pocketbook. No plan should be more than five per cent of operating costs. It is possible to become too paranoid about these sorts of things. Once

Wednesday, October 30, 2019

Business Management Essay Example | Topics and Well Written Essays - 250 words

Business Management - Essay Example I believe the demand for Business Management graduates is growing since future business leaders are expected to ensure their organizations adhere to highest ethical principles in their operations in order to ensure good corporate reputation. In addition, business managers should be able to understand the effects economic and technological changes in their businesses and plan effectively in order to meet the changing customer demands.  I have good communication skills and interpersonal skills that will be essential during my study such as writing assignments or forming study groups with my colleagues. I am self-motivated and confident and thus I will take personal responsibility in ensuring that I successfully complete the degree program.  A Business Management degree will immensely assist me understand the business practices and the obligations of businesses to the society. The course will enable me understand numerous business management aspects such as the business environment assessment, planning, budgeting, employee relations and management of conflicting interests. In addition, the business skills such as decision-making, communication, presentation and numeracy are in high demand and this will accord me better employment opportunities and better pay.  I believe a degree in Business Management will prepare me enough to face challenges in the real world and assist my future employers in ensuring ethical business practices. The program will enable me understand the modern business environment and assist my future employer in running a business that is financially viable.

Monday, October 28, 2019

“Sophie’s World” by Jostein Gaarder Essay Example for Free

â€Å"Sophie’s World† by Jostein Gaarder Essay After I read â€Å"Sophie’s World† by Jostein Gaarder, I was opened up to the different ways of thinking by many well-known philosophers. Each philosopher had their own point of view and ways of thinking. Ranging from religious perspectives to over the top ideas that were unaccepted by the people of their time, these men tried to answer philosophical questions such as â€Å"What is our purpose in life?† and â€Å"Where did the world come from?†. During their times, such thinking was looked down upon and some even got executed for threatening their cultures way of thinking. Socrates, who encouraged his pupils to increase their range of beliefs, got poisoned for breaking ancient Greek religious views and was said to be ‘corrupting the youth’. A few of these philosophers had points that agreed with my own beliefs, such as Soren Kierkegaard. Kierkegaard said that the truth does not only lie in objective things such as facts, but also in subjective things. He believed that life was more about your own values and beliefs rather than reason and strict rules. I relate to his laid back since of mind, because I am a laid back type of person. Many of today’s creative ways of thinking would not have been achieved without someone just relying completely on their own imagination. Even though this book was intriguing, it really didn’t change my way of thinking. Yes, it was entertaining to learn about how ancient philosophers tried to explain the world, I’m not sure it impacted my life in any way. Like all of these philosophers changed by brain teasing ideas that were forced upon me. I did agree with some points that these philosophers made, but only ones that supported my Christian faith. The book itself said â€Å"Where both reason and experience fall short, there occurs a vacuum that can be filled by faith.† Science and philosophy can only go so far. Science can explain why things have to hit the ground after it had been thrown and philosophy can attempt to explain if it didn’t hit the ground one time why a grown person would be more shocked than a kid. But the fact is no one can explain why something happens at a  certain time, at a certain place. Only faith can do that. Even though those philosophers attempted to explain things like where the Earth came from, none of them ever came to an agreeable conclusion. This book did make me think deeper about some of the concepts that were easier to grasp, but I believe philosophy is something I am not interested in. However, I did take interest in the section of the book about psychology,and I think many of the philosophers could have also been classified as psychologists also. This section included interesting facts about dreaming and the subconscious mind. Philosophers sometimes supported their reasoning with observations from the subconscious mind. For example, unexplainable things easily classified as ‘supernatural’ actually came from the imaginative part of the brain. These chapters taught me that the brain can do impressive things, even while sleeping! Studies show that the brain usually sends messages from the conscious brain to the unconscious brain in the form of dreams. Even if you don’t realize it, your brain is secretly  telling itself what it wants during your sleep and it is receiving them and analyzing them as images that we would see when we are awake. That’s how some dreams feel so real when they are clearly just your unconscious mind â€Å"speaking† to you. All together, â€Å"Sophie’s World†, like every other book, has its pros and cons. To completely enjoy the book, let the book take you to places you never thought possible. Open your eyes and prepare for the ride of your life, one you will never forget.

Saturday, October 26, 2019

Classroom Management Essays -- Education Teaching

Introduction: Structure, praise, humor, firmness, patience, and high expectations: Welcome to the wonderful world of the classroom atmosphere. Imagine yourself in a classroom where your teacher is there for you, both academically and emotionally. That’s how a classroom should work for both the students and the teacher. Mrs. Mary-Kay Maurer is a perfect example of all of these qualities since she is what has motivated me to become the person I am. Her support as a teacher led me as a student to achieve my highest. Her way of showing me my way furthers the idea that students need a teacher with these characteristics to achieve their best. Therefore, the purpose of this research paper is to explore effective classroom management techniques that prepare the academic achievement of students. Support from teachers: A strong teacher makes the emphasis on the students. Teachers make sure they do this by making time for their students, which means having personal meetings with them. When teachers use their own time to help students, it further shows how supportive teachers are. When students know they can depend on a teacher, the students then feel more comfortable in their learning situation and will be more likely succeed. To further emphasize this support of teachers to students, many teachers use a method of ‘Praise, Question, Polish’; which helps to critique students on a comfortable basis. By using this method, students also learn to become more independent when teachers show them, gradually, that students will learn to write better with the ease of criticism. Also, when teachers use academic guidance, students will want to continue their education which is the best reward a teacher can have, knowing their students want ... ...est of the class. Remember: Structure and fairness combined with clear expectations and a clear lesson in a caring non-threatening environment are the key elements of good teaching (Husted, 2002). Conclusion: Teaching today’s children correctly is essential since these children will grow to be productive people of society. Depending on a teacher’s style, a child could grow and look at problems differently than just being apathetic about a situation. When a teacher has an impact on a student, it lasts a life, just like Mrs. Mary-Kay Maurer did with her students. She taught them about English but still let them see how independent they were and let them grow into adults. Today’s teachers need to be more open-minded with students and form a bond with them. This way, students will appreciate what these teachers are doing for them in the long run of their lives. Classroom Management Essays -- Education Teaching Introduction: Structure, praise, humor, firmness, patience, and high expectations: Welcome to the wonderful world of the classroom atmosphere. Imagine yourself in a classroom where your teacher is there for you, both academically and emotionally. That’s how a classroom should work for both the students and the teacher. Mrs. Mary-Kay Maurer is a perfect example of all of these qualities since she is what has motivated me to become the person I am. Her support as a teacher led me as a student to achieve my highest. Her way of showing me my way furthers the idea that students need a teacher with these characteristics to achieve their best. Therefore, the purpose of this research paper is to explore effective classroom management techniques that prepare the academic achievement of students. Support from teachers: A strong teacher makes the emphasis on the students. Teachers make sure they do this by making time for their students, which means having personal meetings with them. When teachers use their own time to help students, it further shows how supportive teachers are. When students know they can depend on a teacher, the students then feel more comfortable in their learning situation and will be more likely succeed. To further emphasize this support of teachers to students, many teachers use a method of ‘Praise, Question, Polish’; which helps to critique students on a comfortable basis. By using this method, students also learn to become more independent when teachers show them, gradually, that students will learn to write better with the ease of criticism. Also, when teachers use academic guidance, students will want to continue their education which is the best reward a teacher can have, knowing their students want ... ...est of the class. Remember: Structure and fairness combined with clear expectations and a clear lesson in a caring non-threatening environment are the key elements of good teaching (Husted, 2002). Conclusion: Teaching today’s children correctly is essential since these children will grow to be productive people of society. Depending on a teacher’s style, a child could grow and look at problems differently than just being apathetic about a situation. When a teacher has an impact on a student, it lasts a life, just like Mrs. Mary-Kay Maurer did with her students. She taught them about English but still let them see how independent they were and let them grow into adults. Today’s teachers need to be more open-minded with students and form a bond with them. This way, students will appreciate what these teachers are doing for them in the long run of their lives.

Thursday, October 24, 2019

Galatians Essay

Because I haven’t read the whole book reading Gorman â€Å"Galatians Ch9† is at first a bit confusing. However, I must say that the reading is very easy to read and easy to understand. Gorman used very simple terms and easy English for his reader to read and understand. Basically in this short chapter Gorman try to exegesis the whole book of Galatians in his own understanding and research. I’ve founded that there are lacks of evidence of resources, as in not much of references quote in this chapter, Gorman strong sources for his argument in this chapter would be the book Galatians itself, he kept referring back to Galatians and because of that the arguments seemed to be persuasive but at the same time lacks of backing up from others. Many of Gorman explanations in this epistle were unjustified, for example the dating of the letter and I quote on page187 â€Å"although no firm conclusion is possible within the range of years 49-55, the most likely date, in this writer’s estimations is 50-55, properly from Ephesus† It would be more convincing if Gorman could give us more evidence about the date and place of written. Over all the exegesis of the entire Galatians in this chapter was not that of rigorous at all. Gorman definitely give us a clear view on Paul’s message to the Galatians. Anyone who read this chapter will surely get a clear understanding of the gospel, not only to the Galatians but also for the churches today as well. Gorman ended the chapter well with the 10 questions for reflection, these 10 reflections questions are the issue that we are facing right now as a contemporary Christians, especially question 10, and I would like to end this review with the same question â€Å"In sum, what does this letter urge the church to believe, to hope for, and to do?† Second critical review is on an article by Martinus C. de Boer, titled: â€Å"Galatians A Commentary† from week 4 reading. To be honest I find this reading is a bit lengthy, especially the entire article is focus on the exegesis of only 6 verses. Having say that Martinus taking the time out to clearly explained the conflict between Paul and Cephas in Antioch over the issue of â€Å"The Truth of the Gospel†. I agreed with Martinus that this is not only important for Paul and the Christians in the 1st century but also to all of us today, we odd to understand the message of â€Å"the truth of the gospel† (2:5, 14). Because this is a commentary, it is clear evidence that the Martinus gave a wide range of evidence to his arguments. I also have to say that the exegesis in this article is precised, however, if it is to focus on the truth gospel of Christ, I feel that Martinus could have mention more of Paul other letters to back up the topic of the true gospel, instead of a very long exegesis around the confrontation of Paul and Cephas, I would have looked at Paul conversion passage to prove more of Paul conviction for his true gospel. Martinus translated Jews who is circumcised as â€Å"the circumcision party† page 133. I’m not sure if I would agree with Martinus here, because lacks of evidence in this statement made by Martinus, I’m not sure if this is a political view or is it direct translation from its original text? Over all from reading this article, apart from the fact that it is a long article, I’ve founded that it is very helpful for churches today to see the historical of Paul’s letter through Martinus book. Definitely an issue arises for the use of the Bible today in our own context, for example: Paul and Peter relationship. Can two Christians have disagreements that eventually lead them to different road? The final reading is from Charles H. Cosgrove â€Å"The Cross and The Spirit† chapter 3 The Logic of the Opposing Theology. Over all I find that this is a really hard piece to read, the precise and information was great, however, I feel that there are some stuffs that he could have leave out, and that he doesn’t have to go into details as such, for example Cosgrove goes on and talk about the Torah is for Life on page 90 and from there on, I’ve noticed that he kept going back to the Torah for his arguments throughout the rest of the chapter. Cosgrove make it clear to his readers about Paul wanting to hammer us about life in crucified Jesus. Nothing important to Paul than that we have life in Jesus. Cosgrove shared some light about the Christian Jews that are actually after Paul and not the Romans, and this is consistent with what I’ve learned in the unit and also other theologians. Later in the chapter Cosgrove also pin point the agitators and one again it’s consistent with the unit teaching and also others theologians, example Barclay who concluded in his book that Agitators were Christian Jews probably from Jerusalem. Mark D Nanos also suggested the same thing, so over all Cosgrove argument was very persuasive and clear evidence of a large selective of different sources. Finally, Cosgrove really trying hard to explain to his reader the opposing theology between Paul and everyone who are at the Galatians, this would certainly help us today as we read Galatians with a more clear picture of its context and understanding of where Paul and the others are coming from.

Wednesday, October 23, 2019

My Favorite Superheroes Essay

In the world of comic books and fantasy literature, there have been a multitude of amazing superheroes. Each superhero has their own unique set of skills and personalities. My favorite superheroes are Captain America, Batman, and Iron Man. These three superheroes have come to their powers in different ways, yet they all use their awesome talents to fight for good. Captain America, Batman and Iron Man all have extraordinary abilities, which make them unique and special. Captain America has been given the gift of super-human speed and strength and the ability to heal quickly. Batman has super gadgets, such as the Batmobile, batarangs (bat shaped boomerangs), and a grappling gun. Iron Man, like Batman, relies on technology to create his advantage. His primary advantage comes in the form of his full body metallic suit. The suit features a smart computer and multiple weapons systems. The special powers and technologies these superheroes possess set them apart from the average man on the street. Even though they all have special abilities, each of these superheroes came to their abilities in a unique way. Captain America was the subject of a military experiment that had aimed to create a super soldier. His physical abilities and appearance were altered with the injection of a special serum. Contrary to the Captain’s origin, Batman derives his power from expensive, state-of-the-art technology. His motive to fight crime stems from the death of his parents, who were killed when he was a child. Iron Man, on the other hand, suffered a chest injury during a kidnapping, in which his captors attempted to force him to make weapons. In order to escape, and save his life, he created a powered suit of armor. As you can see, each superhero had a different origin but they have all used their experiences to fight for good. Captain America had been small and frail before his transformation, so he fights with a sense of protecting the weak. Captain America is an inherently good and honorable person. Batman fights crime as form of vengeance, or revenge, due to his parents’ deaths. Batman fights for good despite being a dark and tormented character. Iron Man also fights for the good side, but he does so a little reluctantly. He originally acted to defend his company’s interests, but inevitably he began to use his powers for a greater good. These superheroes may come from different backgrounds and have unique skill sets but they share a common goal. They all fight to protect the weak and the innocent from the powers of evil. Despite their superficial differences, these superheroes are very much alike.