Thursday, August 27, 2020

Twilight Movie free essay sample

We as a whole have our own top choices, for example, main tune, most loved vocalist, most loved book. We as a whole have a most loved film, as well. A few people like to watch satire, spine chiller, activity, or show film. I for one prefer to watch dream film. There are magnificent enhancements and extraordinary occasions which appear to be energizing. Especially, I truly appreciate viewing the young vampire film ‘ Twilight ’ which is dream and sentiment. The embellishments, areas, and entertainers are on the whole astonishing in this film. The main explanation I love to watch Twilight is that the enhancements are astronishing. For instance, there is a scene wherein Edward conveys Bella on his back and moves up to the exceptionally high tree extremely quick at that point hops to another tree. Additionally, in the scene wherein Edward battles with James, the embellishments make this scene significantly all the more energizing. Besides, the view is incredible. The town of Forks, Washington is the place the story happen. We will compose a custom article test on Dusk Movie or on the other hand any comparative theme explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page The Swan living arrangement is utilized as the Cullen family’s home. Vancouver, British Columbia, Canada , La Push’s first Beach, and Portland, Oregon, USA are likewise utilized as significant areas in the movie.In expansion, Kristen Stewart is the main on-screen character and Robert Pattinson is the main on-screen character. The two of them have won numerous honors for Twilight and have been named for some honors in the previous years. Kristen won MTV Movie Awards for Best Female Performance and Best Kiss additionally imparted to Robert Pattinson in 2008. Robert won MTV Movie Awards for Best Fight, Best Kiss, and Breakthrough Performance Male in 2009. At long last, Twilight is certainly the best film I at any point seen. The extraordinary enhancements, magnificent areas, and capable entertainers make this film extensively superb. What's more, I trust you would appreciate it as I do.

Saturday, August 22, 2020

Leader interview free essay sample

Presentation â€Å"The hireling pioneer is worker first†¦ It starts with the common inclination that one needs to serve, to serve first† (Greenleaf, 1977, p. 27). For the worker chief, the necessities of others will be the essential driver instead of addressing the requirements of the individual themselves. In this paper, fusing a pioneer meet, the understudy will feature the interviewee’s reactions to hireling administration ideas and their impressions and encounters as a worker chief. Foundation The interviewee that was picked for this paper was Kathy Krueger, secondary school advocate for the student’s child at Seattle Preparatory School. Seattle Preparatory is a Catholic, Jesuit secondary school for grades 9-12 with an enlistment of 700 understudies. Their statement of purpose is to â€Å"form observing, transformational pioneers who are mentally capable, profoundly alive, open to development, adoring and focused on justice† (Seattle Preparatory Mission Statement, â€Å"n.d.†). Ms. Krueger has been at Seattle Preparatory since 1970. She was first employed as low maintenance instructor, giving guidance to Collegio (consolidated English, history, and religious philosophy class) and low maintenance advocate. Her present job has been to work with junior and senior understudies with a concentration in school guiding. Preceding coming to Seattle Preparatory, Ms. Krueger started her training profession in 1969 as an individual from the Sisters of Holy Names Order. She left the cloister in 1970 and instructed at St. Aloysius Grade School in Spokane. In 1976, after moving to Seattle, she started her secondary school educating profession. On Wednesday November 6, an in person meet was led with Ms. Krueger at Seattle Preparatory school. The meeting was led over around one hour long and comprised of fifteen inquiries. ( Appendix A) Discussion â€Å"The characteristic worker, the individual who is hireling first, is bound to drive forward and refine a specific speculation on what serves another’s most elevated need needs than is the individual who is pioneer first and who later serves out of promptings of soul or in similarity with standardizing expectations† (Greenleaf, 1977, p. 28). Before the meeting starting, worker administration was investigated with Ms. Krueger. A worker head buts an accentuation on others first and serving them; driving is auxiliary. The individuals who need to be pioneers first will regularly be obliging their own inner selves and looking for power. Hireling initiative can't be something one turns on and off dependent on the circumstance, it must be a piece of the individual; it will be what you inhale day in and day through activities and words. â€Å"Servant initiative is in excess of a negligible idea, a style, or a hypothesis of administration, yet rather an unmistakable point of view, a way of thinking, a new world view-a method of being in the world† (Horsman, 2013, p.4 ). The establishment of worker initiative began through job demonstrating by her folks. K. Krueger (individual correspondence, November 6, 2013) â€Å"Each of us felt genuine love They granted a ton of qualities, particularly that we have to give back in service† (Appendix A). Ms. Krueger was keen on both help and training as a profession. Two of her siblings entered the Jesuit request and she settled on the choice to enter the Holy Names Sisters’. Following six years in the religious circle, one year before definite pledges, Ms. Krueger settled on the choice to leave the cloister and keep on filling in as a layman. Around then in the Church, the comprehension of lay service was starting to frame and not only individuals from the strict requests could be called for administration however all individuals could be call to serve. K. Krueger (individual correspondence, November 6, 2013) â€Å"As a layman, I am a friend with the Jesuits in their strategic show youngsters to be adoring, open to development, mentally equipped, profoundly alive, cherishing, and focused on justice† (Appendix A). â€Å"Servant â€leading is in excess of a style, it is a way of thinking a method of being-a world view which may use diverse administration styles-styles that are viewed as suitable to the circumstance and the condition that might be applied with worker first approach† (Horsman, 2013, p. 10). Ms. Krueger includes this in her everyday job as a school instructor and hireling pioneer. When solicited to give a model from how different pioneers serve, K. Krueger’s reaction (individual correspondence November 6, 2013) was â€Å"Good hireling pioneers draw out the best in individuals. They energize a person’s development. They have a profound feeling of regard for every person. Educators who experience a worker chief trusting in them need to purchase in to the crucial the school and are unmistakably increasingly gainful and help make a sound school† (Appendix A). At the point when you include a solid network inside the working environment it assembles kinship among the representatives and staff individuals. In a more joyful working environment, staff will be all the more ready to get each out and coordinate so each other succeeds. â€Å"Servant authority is centered around the improvement of the individual and the association to make an all the more serving, caring society† (Horsman, 2013, p. 10). As a secondary school instructor that centers around junior and senior understudies preparing them for school or the subsequent stage after secondary school, Ms. Krueger assumes a urgent job in these student’s lives in setting them up for the following stop in life’s venture. Horsman (2013) battles stewardship from the hireling authority point of view incorporates job demonstrating for other people and guaranteeing persistent improvement of their kin which incorporates advancing of other worker pioneers. As a secondary school advisor, Ms. Krueger good examples worker administration for her understudies. As a worker chief, she needs to guarantee the constant turns of events and development of others. K. Krueger (individual correspondence, November 6, 2013) â€Å"At Seattle Prep, we are urged to encourage adapting as opposed to the top down model of educator and student† (Appendix A). In the model of educating at Seattle Preparatory School, the pyramid has been flipped with the goal that understudy and educator cooperate cooperatively as opposed to the instructor on top driving the data to the understudy. In optional training at Seattle Preparatory school, lay educators and advocates are sidekicks in the service of the Jesuits. Worker initiative has been incorporated into the homeroom through the Ignatian instructional method (Seattle Preparatory Magis Christian Service, â€Å"n.d.†). K. Krueger (individual correspondence, November 6, 2013) â€Å"This process incorporates setting, experience, reflection, activity, and evaluation† (Appendix A). As a secondary school advocate concentrating on school guiding, Ms. Krueger helps her understudies with finding the required assets while, giving them consolation for the school application process. She sets desires with the understudies so they comprehend what they are responsible for. Ms. Krueger is depended with the assets of Seattle Preparatory school toâ optimally bolster the understudies in their fruitful excursion to advanced education, for example, Naviance, a school application following project, and time for customary registrations with the understudies Ms. Krueger has been a basic job in a student’s life at Seattle Preparatory School. She determines her capacity by engaging her understudies and collaborators. K. Krueger (individual correspondence, November 6, 2013) â€Å"In the Jesuit model force dwells in lack of concern. Genuine force is the point at which we have receptiveness to taking a gander at an assortment of perspectives and solutions.† (Appendix An), As a worker chief, having the option to step back and take a gander at the entire frameworks view and how things are interconnected and identify with the entire versus a solitary microcosm. This gives the capacity to see different points of view versus just storehouses. Ms. Krueger invites contribution from guardians, understudies, and staff to ceaselessly improve correspondence forms inside the school and smoothing out of the school application experience from all perspectives. Ms. Krueger’s accomplishes her work not for the wonder or the force however for the love it gets serving the students’ every single day. The student’s de pend on Ms. Krueger’s unassuming, directing hand to keep them on their way. Like Leo who left his gathering, in The Journey toward the East, if she somehow happened to leave Seattle Preparatory School the acknowledgment would be made â€Å"†¦that the more certain his misfortune turned into, the more crucial, he seemed† (Hesse, 1956, p. 39). Much the same as Leo, Ms. Krueger is a worker first; this is the sort of person she is and who she has been inside herself. End As Greenleaf composes â€Å"servant-pioneers vary from different people of altruism since they follow up on what they believe† (Greenleaf, 1977, p. 341). For Ms. Krueger, this started with a solid establishment of qualities and the significance of administration first job displayed by her folks, with her mom first as a medical attendant spending numerous years working in the House of Charity in helping vagrants. Her folks showed the significance of putting the necessities of others before one’s self. As a lay educator, instructor, and ally to the Jesuits, she proceeds with this way of thinking of worker authority with every relationship she has with understudies and staff at Seattle Preparatory School. Worker pioneers as in Ms. Krueger’s case might be in our essence consistently, accomplishing for others with the information they are having any kind of effect in every life they contact. Serving first needs to turn into our method of being, our naturalâ way to act. In rehearsing administration first, we will cultivate connections of trust, helping individuals, and creating participation among others. Our most significant asset will be our kin, as a hireling chief in preparing it manufactures a solid network in our working environment, which prompts more joyful sta

Catch

Lose-lose situation Essay In Catch-22, Joseph Heller uncovers the corruptions of the human character and society. Utilizing different topics and an exceptional style and structure, Heller ridicules war and its qualities just as utilizing the war setting to caricaturize society on the loose. By controlling the great war setting and language of the novel Heller can portray society as dim and wound. Heller shows his delineation of society through the establishment of war (for example its belongings and issues during and after war). Heller’s parody of war and his enemy of war topics bring out joy and disquietude to show the wreckage of war, the exploitation of the recruits, and the tremendous conceit of the big shots. Individuals from this board have the ability to rebuff anybody for anything. For instance, one day Clevinger faltered while walking to class; the following day he was officially accused of ? breaking positions while in development, felonious ambush, unpredictable conduct, mopery, high injustice, inciting, being a brilliant person, tuning in to traditional music, etc.? This was totally welcomed on by Lieutenant Scheisskopf who had an individual issue with Clevinger. Not exclusively were the charges brought against him over the top, however the preliminary was too. There were three individuals from the activity board, the enlarged colonel with the ig fat mustache, Lieutenant Scheisskopf, and Major Metcalf. Lieutenant Scheisskopf was one of the appointed authorities who might gauge the benefits of the body of evidence against Clevinger as introduced by the investigator. Lieutenant Scheisskopf was additionally the investigator. Clevinger had an official protecting him. The official protecting him was Lieutenant Scheisskopf. This is another way that the military can remove power from the lower positions. Individuals of higher positions can do nearly anything they need to by manhandling their capacity and controlling the individuals of lower positions. One more case of lunacy in war and the military comes as avarice and debasement. During the war, Lieutenant Milo Minderbinder began a business called M Enterprises. The greater part of the cash he made originated from purchasing and selling Egyptian cotton. At the point when the market for his cotton vanished, he attempted urgently to prop his business up. So Milo began taking agreements from the Germans to bomb his own men. One case of this happens on pages 263-266. Milo utilizes his own men, who he has recruited, to utilize Twenty-Seventh Air Force planes to bomb a Twenty-Seventh Air Force base. From this agreement, Milo brought in enough cash to repay the administration for all the individuals and property he devastated, and still have enough cash to keep his business running. However, Milo didn't repay the administration, asserting that, in a popular government, government is the individuals, and by keeping the cash he would simply be removing the go between. This is a fine case of how the objective of a war can be ignored by some with the end goal for them to bring in cash. Milo conflicted with his own kin for cash. This shows not every person thinks about war which is another catch of the military. The military powers individuals to battle regardless of whether they wear? t care about the reason for which they are battling. Numerous individuals don't concur with war, and imagine that there are better methods of taking care of issues. Others believe that war is essential. Regardless of whether it is vital or not, it will consistently be genuine that war and the military are loaded up with lunacies, gets, and injustice. Individuals of higher positions in the military are given an excessive amount of intensity, particularly during war time. Conundrum by Joseph Heller works superbly of demonstrating this to the peruser.

Friday, August 21, 2020

Evil In Dante And Chaucer Essays - Divine Comedy, Afterlife, Italy

Malicious in Dante and Chaucer We in the twentieth century would be considerably more hard-squeezed to characterize malicious than would individuals of either Chaucer's or Dante's time. Medieval Christians would have a hotspot for it - Satan - what's more, if could without much of a stretch devise a progression of clerical agendas to test its essence and its capacity. In our common world, abhorrent has come down to something that damages individuals for no logical reason: the besieging of the Federal Building in Oklahoma City, the consuming of dark places of worship in the South. We have removed wickedness from the hands of Satan, and put it in the hands of man. In doing thus, we have made it less outright, and from various perspectives less genuine. In any case, it must be perceived that in before times detestable was genuine as well as tangible. This paper will take a gander at fiendish as it is depicted in two unique works - Dante's Divine Satire, and Chaucer's Canterbury Tales - and break down what the nature of wickedness intended to every one of these creators. The Divine Comedy is an epic sonnet where the creator, Dante, takes a visionary excursion through a lot of hardship, Purgatory, and Heaven. The motivation behind Dante's visit to Hell is to find out about the genuine idea of insidiousness. He is guided in this excursion by the apparition of the Roman old style writer Virgil, who, as savvy in the methods of the soul as he might be, can't go to Heaven since he is certifiably not a Christian. Virgil's involvement with the black market, nonetheless, make him an expert on its structure, and he is more than ready to impart his insight to Dante all together that Dante may come back to life and offer his disclosures with others. In Hell Dante is given understanding into the idea of underhanded, which, he is told, must be seen and experienced to be comprehended. At any rate, simply subsequent to having glanced the Devil in the face and seen with his own eyes the ghastliness, the ineptitude, and the foolishness of Hell, is Dante prepared to move out of the Inferno and back up toward the light of God's affection. Dante thought about Hell as a cone-formed opening, terraced into seven concentric rings. The highest level, Limbus, really isn't a Hell by any stretch of the imagination, however simply a home for good individuals conceived into the way of life of Christianity however who themselves had never been sanctified through water, just as those conceived before the hour of Christ. Underneath Limbus, notwithstanding, the rings of Hell yawn further and more profound, also, the torments develop increasingly extreme, finishing at the base with a solidified lake which is simply the residence of Satan. Each unique sort of transgression justifies its own ring. The appalling occupants of each ring and pocket and area of Hell get an alternate

Find a Professional Paper Writing Service

Find a Professional Paper Writing ServiceIf you're in need of some quality writing, you can find a wide variety of different types of professional paper writing services available to you. These services can be used for a variety of reasons. They can include general writing, business writing, press releases, essay submissions, and many other types of documents.Although the services provided by professional paper writing services can vary greatly, the work that is completed will ultimately be produced for your specific needs. In order to get a quality document that is made to order, it is essential that you hire a writer who has experience writing for a publication. This means that they have the knowledge and the experience to produce a great piece of written material that will meet the needs of your particular business or organization.To be able to find a reliable service, it is essential that you know what you are looking for. For example, if you need a press release then you will ne ed something to get out to the media. For this type of document, the use of professional paper writing services is essential.As you will see, there are many types of documents that can be completed with the use of these services. Another benefit is that you will get a document that will be custom-tailored to your needs. This means that you will be able to get a better result when using the services of a professional writer. Even though the services can vary greatly, you will still be able to find a writer who is experienced with writing press releases, content for online articles, and other such documents.One of the benefits of working with a professional service is that they have access to a high level of professionalism. A great number of writers will often times write for free in order to get their name known. It is important that you find a service that has a reputation for delivering quality work.If you need to hire someone to write a large amount of work, you should also be aw are that this can be quite expensive. While it may be possible to find an experienced writer for a cheap price, it is possible to go a little over budget. The cost of hiring a professional paper writing service should always be considered carefully before making a final decision.Professional paper writing services are definitely needed if you are looking to provide an accurate and detailed document. This can be done with the use of a good quality writer. Because these services are so important to your success, it is important that you find a writer who can give you the kind of quality that you need.The best way to find a writer to work with is through referrals. You can use one of your current employees or even another company or individual that you know to find the right writer for your document. This can help to ensure that you have someone that can get the job done quickly and accurately.

Saturday, June 27, 2020

Gender Equality Essay - 550 Words

Gender Equality (Essay Sample) Content: GenderNameInstitutionThe issue of gender equality has become very common in the whole world. There has been a message being sent to the world that all people are equal regardless of the gender. A poll was conducted to collect various information about what both men and women thoughts about the issue of à ¢Ã¢â€š ¬Ã‹Å"Tomboys and Sissiesà ¢Ã¢â€š ¬. Men were to explain their views about being à ¢Ã¢â€š ¬Ã‹Å"Sissiesà ¢Ã¢â€š ¬ when growing up. Most of the men said that being a à ¢Ã¢â€š ¬Ã‹Å"Sissiesà ¢Ã¢â€š ¬ was not accepted in the society as compared to being a tomboy. Most of them said that their parents were so harsh on them if they were identified to have such behavior. They insisted that they preferred being men as they grew up. The reason to that was that they were convinced that men were more superior to the women (Susan M. Shaw Janet Lee, 2015, p.Â117). The society brought them that way. For the few who opted to be Sissies, they said that there were so ma ny challenges. The mode of dressing for them would not be tolerated by most people. They explained that if one chose to follow that path, it was not easy since they would face much rejection in the society. For the women, most of them admired being men as they grew up. They explained that being a young boy was fun since one was entitled to more activities such as sports and hiking and other advantages. Women were perceived to be weaker than men and thatà ¢Ã¢â€š ¬s why most women chose to be tomboys. The tomboy behavior was accepted in the society its mode of dressing. Most girls felt alright acting like boys. In conclusion, most men thought that being a woman was hectic because of the giving birth process. The women admired the position that the men had in the society.The description of a man or a woman is important. When a woman is said to be a slut it means that she has slept with many women. For a man who is said to be more sexually active, he is referred to be a stud. Some of t he other commonly used names are à ¢Ã¢â€š ¬Ã‹Å"Niggaà ¢Ã¢â€š ¬ referring a man to be a Negro and. A bitch is also used and it refers a woman as a female dog. Another word used to explain a lady is a chick and dude for a man. All this words are in a way sarcastic or insults. Men are referred to be much stronger, authoritative and active. For the women it is always the opposite of men. They are impassive and weaker compared to the men. This is according to the societyà ¢Ã¢â€š ¬s view on the issue of gender. The women are said to have submissive, emotional, dependant, intuitive and sensitive characteristics. For the men they are characterized by dominant, independent, analytical and sensitivity characteristics (Susa M. Shaw Janet Lee, 2015, p.Â123).Looking at this matter in a cultural context, the society ...

Tuesday, May 26, 2020

Cast and Crew of 3 Idiots - 990 Words

Date: November 21, 2013 From: Anubha Bang To: Cast and Crew of 3 Idiots and Chetan Bhagat Re: Story Credit Row 3 Idiots is the highest grossing box office hit in India’s movie history. To date, the film has collected USD 60M worldwide from theatrical ticket sales. But, 3 Idiots is better known for the story credit controversy that surrounded its release in December 2010 than the actual content of the movie. The author of the book Five Point Someone, from which the movie is allegedly adapted, has accused the makers of the film from denying him due credit. This is a classic problem in the Indian movie industry where unknown writers are pushed over by more financially secure directors and producers. However, in this†¦show more content†¦He was a fairly well known author, but having a Bollywood film under your belt is a whole different game and he may have been all too eager to get this achievement on his resume. His BATNA to the contract he entered in, was to not have the movie made at all and this was definitely such an undesirable outcome for him that his reservation/ind ifference point was way below that of the filmmakers’. The producer of the film was aware of Bhagat’s reservation point and was thus able to strike a deal without clearly specifying the credit clause. The producer created value for himself by withholding critical information and capitalizing on Bhagat’s overindulgence in trading information. Thus, Bhagat would have been better off by reserving some of his enthusiasm and maybe biding time and approaching other production houses to ensure a fairer negotiation. While writing this memo, I contacted both the parties involved and was fortunate enough to get a comment from the author, Chetan Bhagat. He confirmed the following, â€Å"At the time of signing a contract my writing career had just started to take off and there were substantial bargaining asymmetries between an individual author and a production powerhouse with ample financial and political muscle. So much for the freedom of contract!† Thus, if the m akers were not as involved in selfShow MoreRelatedO Brother Where Art Thou1597 Words   |  7 Pagesgangs and old Ford model â€Å"T† roamed the long dirt roads. The film begins with the three main characters: Ulysses Everett McGill (George Clooney), Pete Hogwallop (John Turturro), and Delmar O’Donnel (Tim Blake Nelson) escaping from their chain gang crew in the middle of nowhere. As these hardened idiotic criminals embark on their treasure seeking journey, they quickly find that their old foolish ways of lying, cheating, and stealing is no way to live if you’re trying to be a proper gentleman. WithRead MoreProblems and Aspirations of Youth as Highlighted in the Novels of Chetan Bhagat5079 Words   |  21 Pagespeople on the streets. CHETAN BHAGAT:- A BIOGRAPHICAL SKETCH Chetan Bhagat (born on 22 April,1974) is a contemporary Indian author who has written four novels namely :- â€Å" Five Point Someone- What not to do at IIT†, â€Å" One Night @ The Call Center†, â€Å"The 3 Mistakes of My Life† and â€Å"2 States: The Story of My Marriage†, respectively. He grew up in Delhi in a Punjabi family in an uncertain home environment where his parents used to fight a lot. His father, an army officer, was very strict and he wasn’t allowedRead MoreHow Bollywood Uses New Media Tools For Marketing Its Film2012 Words   |  9 Pageswas also realised and it led to wider box office successes. Major successes during this period were Hum Aapke Hain Kaun (1994), Dilwale Dulhaniya Le Jayenge (1995), Lagaan (2001), Kal Ho Na Ho (2003), Rang De Basanti (2006), Chak De India (2007),Dhoom 3(2013), Happy new year(2014) Lagaan was even nominated at the Academy Awards (Stadler, 2005 and Athique, 2008). 2.2 Marketing in Bollywood: Then and Now In the earlier days film posters were good enough for promotion of films and the films used toRead MoreMedia Consumption Habits7878 Words   |  32 Pagesbehavior, flavor, environment, technology, and modernization economic growth. By comparing the result with current scenario we can find out some interesting conclusions, which will help us to understand the media business well. 1 INDEX S.No 1 2 3 4 5 6 7 8 Particulars Introduction Indian Entertainment Media Industry Literature review Methodology Research Instrument Data Analysis Conclusions Limitations Page No. 03 04 07 09 10 15 49 50 2 Introduction We all watch TV, read newspapersRead MoreAnalysis : Moonlight Essay2233 Words   |  9 Pages1 Moonlight cast a shadow over the girl as she crept along the arid desert turf. Her body was thin and sun stained, as she looked like a woman cut from the stake. Un-kempt hair hung dry and damaged from beneath her hat. It’s brim shaded a hollow gaze and eyes drained of lively color. They held far too much for a girl of twenty five. Within them were memories of the tree they would walk to, who’s leaves basked in southern warmth, and who s limbs were lush and weighed down with the fruits of theRead More Euro Disney Essay6225 Words   |  25 Pageswas also expected to stem the flow of bad publicity which EuroDisney had experienced from its inception. Phase Two development at EuroDisneyland was slated to start in September 1993, but in light of their drained cash reserves (FFr1.1bn in May 1993)3 and monstrous debts (estimated at FF421bn),4 it was unclear as to how the estimated FFr8-10bn Phase Two project would be financed. Despite this bleak picture, Michael Eisner, CEO of Walt Disney Co., remained optimistic about the venture: â€Å"Instant hitsRead MoreMovie Analysis : The Movie The Film 2659 Words   |  11 Pagesvideos produced a decade old. All the youngsters in these educational doldrums had fluffy feathered mullets and strong cockney accents, film locations were churlish high-rise council blocks that surmounted concrete doom in its infrastructure. And a cast of dreadful actors so utterly depressing to look at you had to wonder where their future in acting ended up. We had to view these insipid films on a geriatric Sony trinitron, snuggled in a cardigan of wood, volume exceedingly loud you could hear aRead MoreCulture Is Defined As The Shared Patterns Of Behaviors And Interactions Essay2880 Words   |  12 Pagesculture and society, better to speak of its multiplicity of cultures and societies. In this novel we see that old practices and customs have not changed yet and our status of being modern has not removed the past ideologies. Although he system of cast practice has been abolished years ago but people I India still follow them blindly to find a ‘perfect match’ for their children. Of late, externally we are very modern but initially we still live in the past. 2 States: The Story of My Marriage is anRead More The Navigation of Christopher Columbus and the Age of Discovery4963 Words   |  20 Pagesthat was to follow, he was not the high-stakes risk taker that some historians would have us believe. However, neither was he the bumbling quixotic figure presented by those who, for their own reasons, attempt to present him as some sort of insane idiot, or, at best, an extremely lucky savant. What is true about Christopher Columbus is that, for the times in which he lived, he was a well read and learned geographer. Columbus was a student of navigation and sailing, and as such, his understandingRead MoreProject Mgmt296381 Words   |  1186 Pagesprojects 2.3 Stakeholders and review boards 12.1 RFP’s and vendor selection (.3.4.5) 11.2.2.6 SWAT analysis 6.5.2.7 Schedule compression 9.4.2.5 Leadership skills G.1 Project leadership 10.1 Stakeholder management Chapter 11 Teams Chapter 3 Organization: Structure and Culture 2.4.1 Organization cultures [G.7] 2.4.2 Organization structure [9.1.3] 9.1.1 Organization charts 1.4.4 Project offices Chapter 4 9.2 Building the team (.1.3) [3.5.3] [App G.2 Building teams] 9.4 Managing

Monday, May 18, 2020

The Extraordinary Man in Dostoevskys Crime and...

The extraordinary man in Dostoevskys Crime and Punishment is presented in three fashions: the first is Dostoevskys theory of the extraordinary man, the second is the main characters, Raskolnikovs notion of himself as an extraordinary man and the third is Dostoevskys view of the protagonists attachment to his self-identification with the extraordinary. Dostoevskys ideas about the extraordinary man are given in Raskolnikovs speech to Porfiry Petrovich on pages 242 and 243. Dostoevskys view is expressed as Raskolnikovs, and is concerned with defining what exactly an extraordinary man is. Lending the protagonist definition, however, does not signify the authors acceptance of Raskolnikovs supposed extraordinariness. Dostoevsky†¦show more content†¦Raskolnikov is not the hero of the novel, but the fool. Raskolnikovs speech to Porfiry, in which he defines what it is to be extraordinary and where he justifies the actions of extraordinary men, is a definition and idea that can be attributed to Dostoevsky. Raskolnikov gives the speech as though he were detached from it; he doesnt realize the implications of what he is saying, he doesnt realize that what he is describing is not him. This speech should have made Raskolnikov reflect; it should have made him question his situation, especially after the murder he commits and his self-identity crisis (extraordinary or ordinary). But Raskolnikovs speech has no such effect; he speaks as though reading a transcript or reciting a memorized poem, as if somebody is talking through him and as if the words had no affect on his conscience. He looks at the ground while speaking, as if frightened of the implications of the theory for his own life, but he never voices this fear, he simply moves on. Why doesnt Raskolnikov ever stop to reflect on his own e ssay, when it holds the key to his self-identity crisis? Why does he never question the murder he committed, why doesnt he try and discern whether his crime is extraordinary or ordinary? He has not come to terms with his identity or the nature of the crime, yet he never tries to reconcile these identities with his own essay. Raskolnikov also ignores the fact that he is acting, outShow MoreRelatedCrime and Punishment by Fyodor Dostoevsky Essay1585 Words   |  7 PagesBefore the interactive oral, I noticed the numerous dreams and hallucinations in the novel Crime and Punishment, but I was not quite able to grasp the deeper meaning of some of the dreams and hallucinations. After this interactive oral, I see how important dreams are in this novel. They serve to illuminate the state of a character in a way that would not otherwise be clear. During this interactive oral, it was pointed out that the dreams in this novel are very influential to a character’s stateRead More The Subconscious Mind in Fyodor Dostoevsky’s Crime and Punishment1394 Words   |  6 PagesThe Subconscious Mind in Fyodor Dostoevsky’s Crime and Punishment In Fyodor Dostoevsky’s psychological novel, Crime and Punishment, the suffering and isolation of the late nineteenth century Russia becomes reality. As a young man who has left his studies in the university, Raskolnikov finds himself wallowing in poverty and self-pity. With his dreams of becoming a prominent â€Å"Napoleon† of Russia destroyed, he feels that he is one of the many worthless citizens that he has learned to detestRead MoreCrime and Punishment: Dostoevskys Portrayal of Anti-Nihilism 1443 Words   |  6 PagesNihilism. According to Whitney Eggers on Philosophies in Crime and Punishment, Nihilists argued that there was a distinction between the weak and the strong, and that in fact the strong had a right to trample over the weak (Eggers). Nihilism is commonly linked to utilitarianism, or the idea that moral decisions should be based on the rule of the greatest happiness for the largest number of people. Raskolnikov, the protagonist in Crime and Punishment, is a Nihilist, which is his main reason for committingRead MoreFyodor Dostoevskys Crime And Punishment1378 Words   |  6 Pagesand does not better society. In Dostoevsky’s book Crime and Punishment, this belief is developed through a criticism of the theories and acti ons of the main character Raskolnikov. Raskolnikov believes that he has the right to kill an old pawnbroker because he views himself as extraordinary and her as a negative member of society. Porfiry, an older, logical detective, invalidates Raskolnikov’s extraordinary man theory through his questions and his own theory about crime. In this way, Dostoevsky conveysRead MoreFyodor Dostoevsky Crime And Punishment Analysis1214 Words   |  5 Pages Dostoevsky’s disapproval on the Superman theory In the novel â€Å"Crime and Punishment†, by Fyodor Dostoevsky, Dostoevsky expresses his disapproval of the Ubermensch theory by using his main character; Raskolnikov who tries to become an extraordinary person but fails to do so. Raskolnikov is put in a group where people maintain the idea that man is not actually equal but are divided into two separate groups which are; the ordinary people who are locked within the laws and tradition of society by onlyRead MoreCrime And Punishment And The Idiot Analysis900 Words   |  4 Pagesin that sense, everyone is the same. Their differences come from their own unique dispositions and temperaments. Crime and Punishment and The Idiot, two of Dostoevsky’s novels, have two very seemingly similar protagonists, creating an illusion for the readers. When in reality, the characters can be labeled as being near opposites. Through the use of the novels of Crime and Punishment and The Idiot, Dostoevsky creates the protagonists of each n ovel similarly, but alters their destinies to differentiateRead MoreEssay on Salvation Through Human Suffering in Crime and Punishment1200 Words   |  5 PagesSalvation Through Human Suffering in Crime and Punishment â€Å"All men must suffer, and salvation can not be obtained unless this suffering is present† (Boland, p.4). All of the characters in the novel experience some sort of internal or external suffering. The main character, Raskolnikov, must grow and realize this in order to overcome his conflicts and reach the salvation of peace within. Dostoevsky’s concentration and focus is on why suffering must exist and how this suffering can be conquered.Read More Life Defined by a Single Moment in Scarlet Letter, Red Badge of Courage, and Crime and Punishment733 Words   |  3 PagesA Life Defined by a Single Moment in Hawthornes The Scarlet Letter, Stephen Cranes Red Badge of Courage, and  Dostoevskys Crime and Punishment    Life can be changed by a decision made during a single moment. Despite the natural gifts of courage or intelligence of a person, a single mistake can isolate him from the rest of society. In one case this can be cause by public conception. The public believes that this person is morally inferior and singles out that person for ridicule. However, itRead MorePhilosophies In Fyodor Dostoevskys Crime And Punishment1095 Words   |  5 PagesFor a recent reading assignment our english class was introduced to the master-work that is Fyodor Dostoevsky’s Crime and Punishment. Set in 1860s Saint Petersburg Russia, Dostoevsky goes to great lengths to describe his dark and decrepit world in which his characters to inhabit. The events of an axe murder and eventual redemption could have taken place in any setting, but Dostoevsky on the contrary chose this specific time in which to make his commentary on society. Many of the characters of theRead More Nature and Nurture in Crime and Punishm ent Essay1362 Words   |  6 PagesNature and Nurture in Crime and Punishment       In the news today there is an article about a high-school boy who brought guns to school and shot several students. The parents of the victims are suing various computer game companies saying that the violent games present shooting and killing people as pleasurable and fail to portray realistic consequences. A representative of one of the companies released a statement saying that this is another example of individuals seeking to elude responsibility

Friday, May 15, 2020

James M. Mcpherson An American Civil War Essay - 1397 Words

James M. McPherson: James McPherson was born on October 11th 1936, he is an American Civil War historian. He received the 1989 Pulitzer Prize for Battle Cry of Freedom, his most famous book. McPherson was the president of the American Historical Association in 2003, and is a member of the editorial board of Encyclopedia Britannica. In his early career McPherson wanted to leave a legacy as being known for the historian who focusses on more than one point. Through skillful narrative in a broad-ranging oeuvre of essays and books, McPherson has succeeded in telling both stories, combining social, political, and military history to reach a broad scholarly and popular audience, emphasizing all the while that the Civil War constituted a â€Å"second American Revolution.† Examining thousands of letters and diaries written by soldiers to gather a better insight and understanding, McPherson argued that deep political and ideological convictions about liberty, slavery, religion, and nation were the fundamen tal reasons that men on both sides enlisted and fought. McPherson’s views on the Civil War are broad in comparison to many other writers, he believes there are multiple causes to the war but that the underlying cause was slavery and that Southern states used the saying â€Å"States’ Rights† to justify their actions of slavery and secession. It became a psychological necessity for the South to deny that the war was about slavery that they were fighting for the preservation, defense andShow MoreRelatedThe American Civil War, By James M. Mcpherson1045 Words   |  5 Pagesformer,† wrote James M. McPherson in 1995.   â€Å"Why couldn’t I be both?† McPherson responded. â€Å"Surely it is possible to say something of value to fellow professionals while at the same time engaging a wider audience.† McPherson is indeed both.   In a career that has spanned four decades and garnered many of the historical profession’s top accolades, i ncluding a Pulitzer Prize, two Lincoln Prizes, the NEH’s Jefferson Lectureship in the Humanities, and a term as the president of the American Historical AssociationRead MoreThe Civil War: The Second American Revolution? Essay examples1083 Words   |  5 PagesThe Civil War has been described as one of the most important occurrences in the life of the United States. It was period in time when the United States was no longer united, but instead was split between the north and south due to the ongoing feud over of the legal standing of slavery nationwide. For four years, many people were subjected to horrific measures, especially the soldiers that participated in combat. Despite the brutality of battle, soldiers experienced a numerous amount of daily hardshipsRead MoreBattle Cry Of Freedom By James M. Mcpherson1244 Words   |  5 Pageshis book Battle Cry of Freedom, James M. McPherson, is a great american civil war historian. Born in Valley City, North Dakota on October 1 1, 1936 McPherson attended St. Peter High School. After graduation he attended Gustavus Adolphus College and in 1958 earned his bachelor’s degree with Magnum Cum Laude. He later attended John Hopkins University and earned his Ph.D. in 1963 and is now currently working as Professor Emeritus at Princeton University. McPherson is most well known for his workRead MoreEssay on What They Fought for708 Words   |  3 PagesWhat They Fought For 1861 - 1865 This book was a good analysis of Civil War soldiers diaries, and letters to their loved ones. Which explains what they were going through in their lives and what they fought for and risked their lives for in this conflict. In the book the author James M. McPherson uses information from l00s of diaries and letters from the soldiers to learn why they fought in this war. The Union soldiers fought to preserve the Nation that was created in 1776, to save itRead MoreHow A Soldier Can Fight And Kill People From His Own Country1562 Words   |  7 PagesThe American Civil War was gruesome war that was fought between a country divided. Abraham Lincoln once said â€Å"A house divided against itself cannot stand.† Even though we were all brought together as one nation, these two sides were polarized by their environment and beliefs. This war that tore apart a country, costed more than six hundred thousand lives. The Civil War altered history and is still relevant in the present. A bi g question people have today is how a soldier can fight and kill peopleRead MoreAnalysis Of The Book Crossroads Of Freedom By James M. Mcpherson1167 Words   |  5 PagesEssay Two The book Crossroads of Freedom: Antietam, was written by James M. McPherson to argue why the Battle of Antietam was the battle that changed the cause of the Civil War. While McPherson argued this he also argues that the Civil War had many other turning points and was not settled by just one battle. McPherson’s targeted audience would have to be those interested in the Civil War and the events that led to it. McPherson wrote this great book which came to be an important contribution toRead MoreWhat They Fought For By James M. Mcpherson880 Words   |  4 Pages150 years, the Civil War had been the bloodiest war in the American history, also known as â€Å"The War Between the States† or â€Å"Brother Against Brother†, it was fought between the Union or the United States of America and the Confederate States of America. The war lasted four years from 1861 to 1865. What motivated these men to fight and what is the cause of the Civil War is a subject that many histor ians tried to find out. The book â€Å"What They Fought For† by the author James M. McPherson focuses moreRead MoreWho Freed the Slaves871 Words   |  4 Pagesï » ¿Who Freed the Slaves The long standing question of â€Å"who freed the slaves† has been under debate since the conclusion of the Civil War. One side of the argument takes the more obvious claim that emancipation came at the hand of the great Abraham Lincoln. The other side of the argument claims that the Slaves themselves attained their freedom. Both sides have been heavily researched and strongly supported with many facts. Do we give credit to one person for generating the political backing andRead MoreComparative Analysis of Research Articles on Slavery1451 Words   |  6 Pagesthe freeing of slaves in the Civil War era. Two historians, James M. McPherson and Ira Berlin, respectfully express their contrasting views over these topics in this assignment. While I absolutely agree that the slaves in the Civil War era played a pivotal role in emancipating themselves and securing their civil liberties, it was unequivocally the actions of President Lincoln that led to their eventual freedom. McPherson, a professor at Princeton University and Civil War historian, describes in hisRead MoreAbraham Lincoln And The Second American Revolution957 Words   |  4 PagesMacPherson, James, Abraham Lincoln and the Second American Revolution â€Å"Abraham Lincoln and The Second American Revolution†, written by James M. McPherson, one of America’s historians. McPherson has also written,† Battle Cry of Freedom: The Civil War Era†, â€Å"Tried by War: Abraham Lincoln as Commander-in-Chief†, â€Å"Crossroads of Freedom: Antietam† and many other history related books. â€Å"Abraham Lincoln and The Second American Revolution† consists of seven essays throughout on important themes in American history

Wednesday, May 6, 2020

Essay about Interracial Marriage - 913 Words

Interracial marriage also known as mixed marriage, miscegenation, exogamy, and multiracial, is a marriage between members of different races. It was just 44 years ago that interracial marriage was made fully legal throughout the United States, and it is becoming more common for members to marry outside of ones’ own race. The growth of interracial marriages in the United States corresponds with changes in the legal status of interracial marriages and what some would consider, little, but some changing of arrogance among Americans towards persons in interracial relationships. â€Å"Recent increases in interracial unions with Whites presumably reflect positive changes in American race relations as well as the blurring of racial boundaries and†¦show more content†¦The causes of interracial couple conflicts are stemmed from many sources. One source in which conflicts arise comes from members of society. The views on non-Blacks and Blacks interracial marriage is frowned up on. Although interracial marriage is more common members of society are not fully in agreement with these mixed unions and there are opposing views on the idea of society acceptance of this union. For example, in the article by Batson et al. research findings examined explanations that social relationships and arrogance in American society intensely suggest a strong Black and non-Black racial gap. The implication for Blacks in American society is that interracial marriages with Whites will continue to be less common than they are for other non-Black racial minorities (2006). Discrimination against interracial couples doesn’t just end there, discrimination occurs at restaurants and other public areas, people stare as if they had just seen a ghost. Sixty-four percent of African American and Caucasian interracial couples experience undesirable public reaction. This negative response can be moderately minor, such as stares, but can also take the form of derogatory jokes and comm ents, and subpar services (Leslie Letiecq, 2004). Indeed, American society may contribute to the conflicts of interracial couples’ relationship and or marriage, butShow MoreRelatedInterracial Marriage3821 Words   |  16 PagesIntroduction An interracial marriage is a marriage between members of different races, known as as Mixed marriage: marriage of two people from different races or different religions or different cultures. Miscegenation: reproduction by parents of different races (especially by white and non-white persons). Exogamy: marriage to a person belonging to a tribe or group other than your own as required by custom or law. Multiracial: made up of or involving or acting on behalf of various races, and Biracial:Read MoreInterracial Marriage Should Be Legal1365 Words   |  6 PagesInterracial marriages are still considered taboo in many countries in the world and even in the United States. While the opportunity to marry whoever one desires is a reality in America, it is not always common and sometime frowned upon in our communities. Much progress has been made as a country to allow interracial marriages to be successful, but the American population has had difficulty accepting the legal development that ha s taken place in our nation. Interracial Marriage has been fought throughoutRead MoreTraditional Belief Of Interracial Marriage1674 Words   |  7 Pagescontrast, popular culture theorizes that interracial marriages are motivated not by a desire to leave behind one’s heritage, but by love between two people who happen to be of different races. In this paper, I seek to analyze and compare these two perspectives, proposing a theory that combines the two by accounting for a person’s upbringing and beliefs when deciding what their motivation may be. I first analyze the traditional belief of interracial marriage in comparison to the popular culture beliefRead MoreInterracial Marriages And The United States1043 Words   |  5 Pagesis the institution of marriage. This is especially true when it comes to the topic of interracial marriages. Which has been described as a marriage between members of two different races. Even though, it has not been that long ago since interrac ial marriage has been made legal throughout the entire United States. It continues to be one of the biggest conflicts in society today, considering everyone has their different viewpoints on the topic. Since these types of marriages are considered to be anRead MoreEssay about interracial marriages701 Words   |  3 Pages The law forbidding interracial marriage was terminated in 1967, and in the midst of rapid racial change, one fact is unmistakable: A growing number of Americans are showing that we all can get along by forming relationships and families that cross all color lines. In the past couple decades, the number of interracial marriages has increased dramatically. Interracial dating and marrying is described as the dating or marrying of two people of different races, and it is becoming much more common toRead MoreInterracial Marriages And Its Effect On Society877 Words   |  4 PagesInterracial Marriages (relationships) have existed for years, though society traditionall y has had difficulty accepting these unions. Over the years, attitudes toward interracial relationships have changed dramatically and will likely continue to change as our society becomes increasingly diverse. An interracial marriage is generally defined as the union between two individuals who come from different racial/ethnic backgrounds, such as and African American women and a white American male. InterracialRead MoreInterracial Relationships Sex and Marriage Essay976 Words   |  4 Pages In the modern world today, there are still people that are bigots who view interracial relationships and marriage as undesirable. However, the view is contentious given that the law that allows interracial relationships and marriages was enacted in 1960. Before then, it was prohibited and against the law to have a relationship with someone from a different race let alone getting married to them. Basing this context from the film Jungle Fever that tries to describe a non-healthy relationship betweenRead MoreCauses of Friction in Interracial Marriages Essay1425 Words   |  6 PagesCauses of Friction in Interracial Marriages The United States has witnessed a considerable amount of social and cultural desegregation between African-Americans and Caucasians. However, despite years of desegregation, social and cultural differences still exist. One of these differences that still exists is in the institution of marriage. Americans have been and are continually moving slowly away from segregation. In the past forty years, a multitude of changes have transformed schools, jobs,Read More The Melting Pot: Interracial Marriages Essay1270 Words   |  6 Pages Interracial Marriages 2 The Melting Pot: Interracial Marriages To be or not to be? Once again this is the question. In the past, social scientist and society in general, categorized people involved in interracial romances as disturbed, or they labeled these relationships as acts of rebellion, or attempts to move up on the social ladder (Majete 2000, 1). Today this no longer seems to be the case. However, this can still be quite controversial. Part of the reason for this controversy begins withRead MoreInterracial Marriage Should Be Permitted Or Rejected1300 Words   |  6 PagesInterracial relationships rates have dramatically increased in the United States of America (Kalmijn 1993; Qian 1997). The mixing of cultures between whites and African Americans has considerably overcome its old barriers and is currently being witnessed throughout the country. According to Joyner and Kao 2005, dating outside one’s race has grown to be very common nowadays. In 1967, the case of Richard Loving and Mildred Jeter in the State of Virginia rose up cont roversies on whether interracial

The Effects Of The Tragedy Of 2001 - 939 Words

The Effects of the Tragedy of 2001 When the Twin Towers fell on September 11, 2001 it affected thousands of people all over America. Death, screams, and smoke filled the air leaving people heartbroken, injured, and forever changed. The public health of people around the world was challenged by this traumatic event. All of the death tolls, injuries, and respiratory problems flooded screens everywhere. This tragedy occurred on the brink of the technology advance and will be forever ingrained into the minds of the viewers. This horrible attack killed 2,973 innocent people and injured thousands more (Sisk). In addition to all of these physical effects from the attack people were affected mentally as well. Stress, fear, and animosity infiltrated the minds of thousands of Americans and has changed them ever since. People who go to war for the first time usually come back changed. If the change is on the higher end of the spectrum then it is called Post Traumatic Stress Disorder. Surprising ly, this disorder is not exclusive to people in the military. Directly after the attacks on the Twin Towers a study showed that forty-four percent of the people in the U.S. experienced substantial stress (Perlman). The media caused this statistic because without them nobody would have known how severe the attack was. Schools and jobs were interrupted all over the nation to watch the towers fall on live television. It was so surreal that people did not want to believe it. New York City was inShow MoreRelatedThe Tragedy Of Hurricane Katrina Essay1599 Words   |  7 PagesMass tragedies occur on a daily basis in almost every nook and cranny of the world. No matter the severity, they all appear to have a similar effect: deterioration of mental health stability among those involved. Children and adults alike possess the risk of suffering from mental disorders, such as depression and PTSD, following exposure to a traumatic event. However, the circumstances of these events differ, simp ly because not all mass tragedies are the same. No matter what type of event occursRead MoreThe Effects Of Hysteria On The World Trade Center Essay1148 Words   |  5 PagesOn September 11th, 2001 tragedy struck, when two planes flew into the World Trade Center, a plane crashed into the Pentagon, and a plane that crashed down in Pennsylvania. These horrific acts of terrorism changed America into what it is today. It changed the way people thought about others and how equal the American people really are. The United States was in a panic and was ready to accuse others immediately. The Crucible showed us that a shocking, confusing event can make people almost go insaneRead MoreWhat Happened in September 11th, 2001 Essay889 Words   |  4 Pages September 11th, 2001 What happened on September 11th, 2001? A day that will be remembered and never forgotten, a day that many innocent people died because of a terrible tragedy that happened on September 11th, 2001 at the World Trade Center in New York City. To many people it probably just looked like another regular work day, but didn’t expect the worst that day. On September 11, 2001, nearly 3,000 people were killed in the terrorist attacks at the World Trade Center in New York City (†11Read MoreTphady Of The Commons : The Tragedy Of The Commons1043 Words   |  5 PagesIt is easy to imagine when Hardin (1968) wrote the Tragedy of the Commons; he anticipated things would get progressively worse over time, particularly if people did not respect the earth (Hardin, 1968). Although he did not mention any particular common, Hardin (1968) envisioned the world’s resources dwindling, as a result of peoples mishandling of them. Hardin (1968) explained that â€Å"tragedy† in â₠¬Å"The Tragedy of the Commons,† is the cruel way things work. It may have seemed as though things inRead MoreAnalyzing the Significance of the Evolution of Aeronautics in World War One and Beyond811 Words   |  4 Pagesbrought about by the initiation of World War One, has posed significant questions about the role and value of aeronautics in major world tragedies, such as the September 11 Attacks in New York City and Washington D.C., and the 1991 Air Campaign of the Gulf War: Does the continuous advancement of aeronautics serve as the true mastermind of such acts of savagery and tragedy? Is the advancement of aeronautics the culprit responsible for the deaths of the elderly, women, infants, and children? AeronauticsRead MoreEssay about Bhopal Ethical Issues1307 Words   |  6 Pagestime, but also ethical issues on the responsibility of those who would have been able to prevent the tragedy from happening and those who denied or intentionally decreased the responsibility of causing it. 2. Background of the involved organization: It was declared by the Union Carbide Corporation in their statement regarding the Bhopal tragedy that: The Bhopal plant was owned and operated by Union Carbide India, Limited (UCIL), an Indian companyRead MoreBhopal Ethical Issues1350 Words   |  6 Pagestechnical, safety issues at the time, but also ethical issues on the responsibility of those who would have been able to prevent the tragedy from happening and those who denied or intentionally decreased the responsibility of causing it. 2. Background of the involved organization: It was declared by the Union Carbide Corporation in their statement regarding the Bhopal tragedy that: The Bhopal plant was owned and operated by Union Carbide India, Limited (UCIL), an Indian company in which Union CarbideRead MoreThe Soccer Club : A Professional Italian Association Football Club1608 Words   |  7 Pagesembedded values and ways of thinking of the world. These assumptions are not only difficult to understand by the outsiders, but also the insiders may not be aware of their existence. Organizational responses to organizational trauma might have an effect on various levels of organizational culture, depending on the context of the near death experience and its level. The case of Benfica, where death experience happened at the individual level, illustrates how symbols, such as the retired number andRead MoreHow Engineering Can Work Together With Anthropology1198 Words   |  5 PagesThis paper seeks to show how engineering can work together with anthropology to explore the effects of global climate change, due to increased carbon emissions. Political ecology, co-management, and tragedy of the commons are three concepts within anthropology which will be used to discuss this issue, and will be defined in detail further in this paper. Climate change can be defined as the change in global or regional climate patterns due to human activity. The World Wildlife Fund (2012) has foundRead More Violent Video Games did Not Cause the Columbine High School Shooting1634 Words à ‚  |  7 Pagesweb page (Anton 5). Harris, being one of the killers in the Columbine High School shooting, was called a â€Å"die-hard gamer who loved the interactive bloodbath called DOOM† (Anton 2). Doom was thought to be one of the factors in Eric Harris’ violent tragedy. The question is: did playing Doom lead to him being a violent child, or did being a violent child lead him to playing Doom? Proceeding my perusal of articles and research, written by authors with scientific credentials or otherwise, I have concluded

Phobias Phobia and College Student Fears free essay sample

We as humans are all afraid of something, but some of us â€Å"fears are exaggerated and reactions extreme: the heart race, sweat beads on the skin, the eyes narrow, and the throat tightens† (Gallo). These fears are then phobias, which can be divided into three categories. Phobia is known to many as just the fear of something but the true definition is a persistent irrational fear of an object, situation, or activity that the person feels compelled to avoid (Wood 689). It is characterized by an intense desire to avoid the feared situation, and evokes anxiety when one is exposed to that situation (Beck, Emery). The three types of phobias are: agoraphobia, social phobia, and specific phobia (Wood 521). Bill, a twenty year old college student fears public speaking. He has to take a history class requiring lots of verbal interaction. If Bill was unable to avoid the discussion class, he’d find a seat at the rear of the room and sit silently for an entire semester. We will write a custom essay sample on Phobias: Phobia and College Student Fears or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page His grades would naturally be suffered from this, but to him it was better than the searing anxiety he felt whenever he was called on to answer a question or share an opinion in front of twenty of thirty strangers. Bill was called on to take part in a class discussion, and froze. â€Å"Blood surged to his temples, his pulse pounded, and sweat beaded on his forehead. † The other students turned to look at him, waiting for his reply, but Bill couldn’t get anything out. His head swam; his thought scattered, and his throat clenched. Even if he could have thought of something to say, he wouldn’t have been able to get it out. Bill’s anxiety continued to mount until he could no longer stand it. He slipped from his seat and fled the classroom. A sense of humiliation dogged him for days. He never returned to the class (Gold). Bill’s situation is an example of social phobia, which is ear of speaking in formal or informal situations, or eating or drinking in front of others — or, in its most severe form, may be so broad that a person experiences symptoms almost anytime they are around other people (NIMH). And for people with social phobia, the fear is extremely intrusive and can disrupt normal life, interfering with work or social relationships in varying degrees of severity (NIMH). Agoraphobics, however, is an intense fear of being in a situation from which immediate escape is not possible or in which help would not be available if the person should become overwhelmed by anxiety or experience a panic attack or panic-like symptoms (Wood 521). Agoraphobia is the most disabling of all phobias, and treatment is difficult because there are so many associated fears (Hall). Agoraphobics feel the need to escape that location and find the safety of home when panic strikes. For example Laura decides to go shopping at the nearby mall, but as she starts driving closer and closer to the mall her heart starts pounding faster and faster. Once inside the mall she starts to sweating, shaking, have a panic attack and a strong urge to get out of the mall. As soon as Laura is safely home these feelings stop. Specific or simple phobia is the category for any phobias other than agoraphobia and social phobias (Wood 522). This is the most popular cases of phobias; and there are more than 350 different types of specific phobias. They range all the way from cathisophobia-fear of sitting to something as severe as arachnophobia-fear of spiders. In most cases of this type of phobia â€Å"the victim develops a fear of a specific object or situation: heights, closed spaces, or birds† (Gold, 36).

Tuesday, May 5, 2020

Digital Evidence Gathering Relationship to Chain of Custody

Question: Discuss about theDigital Evidence Gathering for Relationship to Chain of Custody. Answer: Introduction With the introduction of modern technologies and advanced processes of communication through electronic medium, huge volumes of data are being generated at a high velocity each day. Various law enforcement officers face challenges with the extraction of the digital evidences from different types of data storage devices. The data gathered from any laptops, digital cameras, cellular phones, hard drives, computers and even game that are related to any offence are defined as Digital Evidence (Abalenkovs et al., 2012, p-2136). The digital evidences found in the electronic devices triggers investigation in any criminal case. During an investigation, both the physical and digital evidence plays important role in decision making procedure in courtroom. With the advancement of technology, digital forensics utilizes several tools for the collection, security, analyzing, interpretation and presenting the digital evidence for the reconstruction of the series of events in a judicial process. On the other hand, the Chain of Custody is defined as the legal procedure for documentation of the digital evidence in chronological manner. Moreover, Ariffin et al., (2013, p-481) defined CoC (Chain of Custody) as in significant process for handing the evidences for investigation. The application of the CoC in the digital evidence allows in correlating the documents to the time, persons, place involved in each stage of the investigation. Therefore, the need of forensic tool for gathering and evaluating the digital evidence has increased simultaneously. In any forensic cases, the digital evidence assists in demonstrating the truth and simultaneously its consequences. Damshenas et al., (2012, p-192) cited that the admissibility of the evidence is dependent upon the qualities as observed by the judge. Therefore, the validity of the evidences is directly connected to the chain of custody. The validity of the evidences in turn increases the reliability and efficiency of the procedure. Since, the digital evidences are away from the sensory perception; it cannot be submitted without a chain of custody. This particular essay aims at evaluating the procedure of gathering digital evidence with the application of the Chain of Custody. Furthermore, the various components of the CoC are considered for evaluation and its importance while collecting crucial data related to investigation (Dezfoli et al., 2013, p-61). The essay assists in understanding the relationship between the Chain of custody and procedure for collecting digital evidence for investigation. Digital Evidence Gathering and its Relationship to Chain of Custody (CoC) Main Components of CoC: To make a proper a prominent process of COC or chain of custody investigator need to follow-up with some basic components of COC. The components of COC are the some sort of standardized elements which are used to identify or measure the value of digital evidence in the circumstances of digitized investigation process (Ibrahim et al., 2012, p-254). Some of the necessary components or tenants are described below Evidence Collection time: Each and every evidence is comes with a time period and time span during the collection of evidence from the place of investigation which also include the evidence collection date (Lalla et al., 2012, p-248). The Collection date and time refer the time span of collected evidence so it can be relate to the crime incident. Date and time of digital evidence validate their circumstances with real world scenario. Evidence Collection Spot: Investigation place may be differing by their location of crime spot because the evidence may found in some remote location which may not directly connected to the crime spot (Mishra at al., 2012, p-166). The document which are collected from the exact location of crime scene is can be classified as direct evidence and the evidence which are came from different area of investigation place can be classified as indirect source location of a digital evidence. Investigation person or the Investigating authority: In the process of digital evidence collection and procurement service the main key role is played by its investigating officer. Each and every perspective of storing and preservation of data are run through a proper channel of authorization (Nasreldin et al., 2015, p-153). The main reason of this fragment is to secure the evidence collection base so, that one unknown entity (suspect) may not harm or contaminate the evidences which are acquired from the crime spot or investigation. Type of Digital Media: The frame of the digital evidence procurement services also differs. The information which kept on digital media unit for the analysis collected evidence is needed to be ciphered by a strong cryptographic algorithm so that it cannot be accessible by the conventional media player (Shrivastava et al., 2013, p-532). This processes of conversion of format not only abstract the information it also maintained the privileged of information from the outsiders. Media Owner Identification: If digital document or media is ceased from the investigation scene then it is necessary to identify or locate the person who owned the digital content. In a short way of description, it can say that the Identification process must conclude some investigation about the owner of the media (Simou et al., 2014, p-303). Indexing of Collected Evidence: Investigators are work on a very big geographic domain or area, so it is not possible to memories all the evidence which are collected from different sources. So For the purpose of proper storage utilization, indexing technique needs to collaborate with the evidence collection unit. Device Description: For getting a flexible accessibility investigation process needs to accumulate a distinguish technology or method which can store information about device type, capacity, serial no, etc. (Wu et al., 2013, p-18). Hash verification: All the information or the files are secured and processed by hash verification process for future reusability and data integrity. Hash value processing method creates a unique serial number which contain data file's cyclic redundancy information. And in any case of using the documents on an investigation purpose it is necessary to recalculate the hash value with the notation of previously captured hash value and if the new calculation process produce the same value the information is allowed for further verification (Hitchcock, Le-Khac, Scanlon, 2016, p-81). Analytical Tools: The primary backbone of the entire digital forensic investigation system is the analytical tools which are used to determine the objective or the purpose of the evidence and its validity. The analytic or forensic tolls come in two type's format one is propriety, and another one is open source utility (Rani, Sultana, Sravani, 2016, p-98). All the tools are differed by their functionality and area of action. The above mentioned components and function are here to declare the process of forensic investigation over digital media. CoCs Importance for Gathering Digital Evidence: Establishment of the Chain of Custody for authentication of the digital evidence is crucial need before presenting the evidence in the courtroom. The transfer, storage and seizure of the evidence are accounted through the CoC. Pichan, Lazarescu, and Soh, (2015, p-43) cited that it is essential for the application CoC procedure for the admissible of digital evidence for investigation in court. Importance to the Investigators: The forensic data gathered from the digital devices allowed the investigators to view the metadata of the digital file but restricts the identification of the procedures the file was created. Since, some information about the gathered data are missing does not imply that the data have been compromised. Siegel, and Mirakovits, (2015, p-55) showed that the chain of custody allows the investigators to discover the location, process and creator of the acquired evidence. Importance to the Courtroom: The presentation of the Chain of Custody allows the prosecutor or the attorney to dismiss or challenge the series of digital evidences produced in the courtroom. With the proper utilization of the Chain of Custody along with digital evidence like video and audio evidences provides admissibility and authenticity of the presented evidences in the court. De Marco, Ferrucci, and Kechadi, (2014, p-251) showed that the various new procedures for establishing the Chain of Custody are becoming popular in the legal procedures. Moreover, the online services available for recording the CoC of the digital evidence Nelson, Phillips, and Steuart, (2014, p-187). Further, the introduction f he cloud storage has significantly eliminated the need of the file transfer and presentation of the physical copies of the digital evidence. Elyas et al., (2014, p-101) cited, that the standard procedure for backup, security measures and surveillance cameras are followed in the CoC th at has impress the reliability of the digital evidences. Apart from that, the Chain of Custody allows the investigator to track his steps whenever any wrong or improper evidence is found during the authentication procedure. During the case of doubt of the reliability of the evidences, the process of CoC allows to find the person responsible for the flaws with the backtracking process. Importance to the Investigation: The applicator of the Chain of Custody is the first crucial process for authenticating the video and audio evidences presented in courtroom. Identification of the Chain of Custody allows in determining whether the digital evidence has been coned or copied. With the advancement of technology, the digital media has become more easily accessible for modification, alteration and editing. Most of the time, the physical evidences are directly not available during the time of seizure or acquisition. Prayudi, Ashari, and Priyambodo, (2014, p-61) cited, that in many cases, the digital media are obtained from the police or clients that are accompanied by series of other legal documents. The paper trial is the significant part of the timeline as it authenticated the source and destination of the file transfer. With the application of the CoC, the prosecutor can raise questions about the authenticity of the digital evidence in case of missing timeline in the inve stigation. Creating a Chain of Evidence with all the digital evidences in the investigation eliminated all the suspicious against the reliability and authenticity of evidences provided in the courtroom (Shridhar, Chandrakant, Baburao, 2014, p-52). Furthermore, the Chain of Custody provides access to the administrative of retrieval, modification and date of access to the evidence. The procedure of the chain of the custody the application of the forensic process is applied on the copy of the digital evidence while the original copy is kept intact. Therefore, the CoC also allows comparison of the examined file with the original one (Stirland et al., 2014, p-99). Therefore, maintaining a Chain of Custody is one of the crucial processes for proving proof for the authenticity of the evidence provided. Various Ways CoC Can be Compromised: The Chain of Custody provides the detailed record of items or digital evidence possessed by each individual in a particular instance of timeline for investigation. The Chain of custody of the digital data has the risks of alteration and comprised (Taylor, Fritsch, Liederbach, 2014, p-252). The Chain of Custody for digital evidence begins from the collection phase, to evaluation phase till the presentation to the court for justice. The data stored in the database has the potential for getting altered, misplaced and compromised. The Chain of Custody can be compromised n various ways including the failure to indentify the digital data as evidence from the crime cite. Moreover, the failure to collect raw data from the investigation site before it has been manipulated with. The digital data need to be stored in safe and secure places for maintaining and securing the log of the people accessing the files. The storage capacity and technological devices has evolved exponentially with time ( Bulbul, Yavuzcan, Ozel, 2013, p-247). Moreover, the inefficiency in understanding the how the digital data can be authenticated fails to provide justification to the Chain of Custody. The information stored and gathered during the Chain of Custody is essential for the verification and authentication of the digital information while presenting them to the courtroom. Since, the digital evidences are easy to manipulated, significant measures needs to be taken for preventing the data from being compromised. Arora, Bhatt, and Pant, (2012, p-52) cited that for preventing data manipulation, it is essential to identify the cause of the data manipulation in protecting the Chain of Custody. Many times, the investigators examine the digital information on the file collected from the crime scenes. The changes made in the original files permanently change the digital evidences and cannot be recovered back (Goel, Tyagi, Agarwal, 2012, p-340). Collecting the digital files on an unsecure device has severe risk of manipulation from external entity. The digital data gets word out with time. The optical disks that are used for storing data are subjected to fungi and the electromagnetic disks get worn out with time. The lack of maintenance of the IT infrastructure and system result in the loss of the digital data and evidences (Saxena, Shrivastava, Sharma, 2012, p-68). Most of the cases, the digital data and the digital evidences are subjected to manipulation from the internal procedure of the organization. The lack of ethical considerations and procedure followed in the CoC results in the flaws in the digital evidences. Therefore, the officials in charge of the CoC authority often lead to the errors in the Chain of Custody (Hasan, Mahmood, Raghav, 2012, p-402). The lack of following the procedure for marinating the log list every time any officials changes of access the digital evidences creates wrong timeline in analyzing the evidences in the Chain of Custody. Moreover, the digital evidences are stored in the CDs hard drives, pen drives and database. The failure in the storage devices has can cause to the loss of the crucial data and information collected from the investigation site. Moreover, with the advancement of the technology, the hackers have also found various innovative ways to hack in to the account and manipulate the data (Marangos, Rizomiliotis, Mitrou, 2012, p-777). The hackers found various ways of breaking the security measures and entering the database where the digital data are stored. The insecure computers, laptops used for the storage and analysis of the digital information can be easily manipulated. The hackers hack in to the information system, and changes the log details and audit in the Chain of Custody (Ariffin, Choo, Slay, 2013, p-41). Moreover, the lack of security in the IT infrastructure in organization usually leads to the loss and manipulation of the digital data collected from the crime sites. Various Ways CoC can be Protected: In case of Chain of Custody, the digital evidences are gathered, analysis and investigation, the evidences are stored in electronics devices. For maintain and preserving the Chain of Custody, the investigator needs to protect the digital evidence from the time of collection to the time of presentation in the courtroom for judgment (Homem, Dosis, Popov, 2013, p-160). For ensuring the Chain of Custody, and to provide evidence that the digital evidences are kept intact, and unaltered, the investigator needs to guarantee that the evidences presented n the courtroom are same as the evidence recovered from the site of crime. Furthermore, the investigator needs to provide the exact date and time of the transfer of the digital evidences needs to be submitted (McMillan, Glisson, Bromby, 2013, p-4901). In addition to that, the investigators will ensure that the digital evidences have not been tampered with while in the custody. Maintaining the Chain of Custody for the digital evidences is more crucial than the physical evidences. Rajamaki, and Knuuttila, (2013, p-199) stated that the hackers are present everywhere for altering the digital evidence. The investigators and analyst needs to protect the evidence from login spoofing in the real time. Tampering with the initial phase of the evidence during investigation is only the beginning of the tampering. Therefore, digital evidences need to be protected from the time of collection from the crime site. Therefore, all the digital evidences needs to be collected using safe and secure devices and required to be stored in the hack proof devices and network (Yadav, Mishra, Prakash, 2013, p-168). Since all the networks are ultimately connected to the Internet, securing the Chain of Custody has become more difficult with days. Therefore, the investigator needs to follow and maintain various processes for securing the collected evidences and data. The data collection procedure in forensic evidence is gathered through manual procedure and some through the electronic devices (Ajijola, Zavarsky, Ruhl, 2014, p-71). The investigators need to audit files and used centralized logging techniques for storing the digital files. In case f both the manual and digital data collection, centralized login will provide static data that are kept out of reach of the hackers. In many cases, the hackers used compromised login times and plants information misleading the investigation procedure. The manipulation of the log list will result in the violation and hampering of the chain of custody in maintaining the digital evidence. Therefore, the investigator needs to create a digital chain of custody for maintain the log list (Reichert, Richards, Yoshigoe, 2014, p-726). This can be achieved with securing at least one computer used for storing the evidences. Furthermore, the investigator needs to use safe and secure laptop and devices for extracting the digital evidences from the crime site. Therefore, for collecting the evidences in the unsecured environment, secure electronic devices needs to be used. It is difficult to re-establish security if the digital data are being modified or tampered with within the organization. For preventing these issues, the investigator needs to secure and address the vulnerabilities present with the forensic organization. Therefore, the organization needs to analyze the security vulnerabilities before investigating the digital evidences. Therefore, the most essential procedure of securing the digital data is to secure the IT infrastructure where the digital data are being stored and analyzed (Valjarevic, Venter, Ingles, 2014, p-7). For protecting the Chain of Custody the digital evidences needs to be protected from the hackers, manipulation and alteration. Apart from that, a log is maintained every time the evidence is transferred or taken out from the organization. Therefore, the digital logs keep a record of the persons and time whenever the digital evidences are transferred and are given access to any persons. Furthermore, the digital evidence is deposited by handing over the devices to the owner. Impact of the Integrity of Evidence on Investigation Process: Integrity of the digital evidence refers to the consistency and accuracy of the digital evidence collected for analysis form the crime scene. The data integrity in the forensic investigation procedure plays a significant role in the processing and analysis if the digital evidence. With the application of the Chain of Custody, the digital forensic investigators required to know the person, time and process of handling the digital information during an investigation process. If the Chain of Custody is compromised or altered the timeline of the evidence processing goes missing that affects the result of the investigation. The digital data are usually stored in hard drives, in the secure computers. The investigators must ensure that the digital evidences remains bit to bit as it was during the collection of the data evidences at the crime site (Bulbul, Yavuzcan, Ozel, 2013, p-251). Therefore, the forensic data analyst ensures that digital evidences when presented at the court remains sa me after bypassing all the examination and procedures, after handing by all the staffs during the evidence processing. The disadvantage of evaluating and working with the digital evidences is that they can be easily accessed and modified without noticing. The integrity of the digital evidence needs to be maintained for protecting the data confidentiality and security of the data (Reichert, Richards, Yoshigoe, 2014, p-728). The methods and procedure for maintaining the integrity of the digital information is costly and requires much modification in the system for CoC. The investigation process deals with the both the systematic tools and techniques and systematic collection of the digital data. The significant objective of the forensic investigation process is to create a focal point among the investigation area such that the investigators could identify the relevant information that are directly or indirectly connected the crime with the evidences acquired. All the forensic evidences rely upon the proper investigation and analysis of the collected digital data (McMillan, Glisson, Bromby, 2013, p-4902). All the collected information required to be checked for cyclic redundancy error and hash code validation so that it cannot be changed or altered by an eternal entity during transmission. Another approach for better transportation of the digital evidences form one place to another in the process of CoC needs to be encrypted with the cryptographic processes (Ariffin, Choo, Slay, 2013, p-45). The digital evidences stored in the database, digital signature needs to be employed for maintaining the integrity of the information in the system. The digital data and evidences have the potential for changing the result of the investigation. The judgment of any case mostly depends on the validity of the evidences presented to support any theory in the courtroom. The presence of digital evidences like video recording, or CCTV footage of the occurrence of the crime has the potential for changing the verdict of the judgment. If the digital evidence is tampered with during the storage, analyzing or presentation of the digital evidence on court, it can change the judgment of the investigation (McMillan, Glisson, Bromby, 2013, p-4907). Therefore, the integrity of the digital evidence means preserving the authenticity and proof of the document and evidence provided in the courtroom. The integrity of the data means, during the investigation, the data is been preserves as it during the collection of the information from the investigation site. Therefore, the integrity of the digital information provides authentication and reliability of the evidences provided in the courtroom and ensures that the evidences presented are in true form and authentic as gathered. Problems and Limitations of CoC: There are several types of issues are related to the digital investigation process which can create a catastrophic impact over COC (Chain of Custody). The different types of circumstances which can affect the entire operation during the process of COC are also described in the context of this analysis. The digital forensic process of COC based investigation is diming with the vulnerability from the both side of investigation process where one side is infected by the victims another threat is come from the investigators side. Maybe this instinct is not the only thing which can harm a COC process. The contradiction between the investigator and the victim is happened in many ways some of them are like as follows - The trust factor among the evidence supplier and the investigator, if the evidence supplier or the victim's loss their faith over the investigator then they might eliminate all evidence which may relate some confidential about himself or herself (Abalenkovs et al., 2012). The victims may accidently erase all the information about the confidential data. This situation is also caused by the investigator by using of improper guidelines during the evidence storage process. Apart from this issue of fault measurement, the information leakage issue is a bigger strike of evidence hampering the process (Reichert, Richards, Yoshigoe, 2014, p-729). The leakage of information can be drawn from an internal factor of whistle blowing or an external entity. The problems do not only lie between the information leakage it will more hamper the entire process if they are broadcast over digital media. The technical factors are more severe than the threat which comes from the operational approach of COC base evidence collection. Technical obstacles are broadly classified into two categories which can be noted as user-defined complexity and other one is system defined complexity. The user-defined complexity can give more hurdles towards the investigator because of its non-structured format of information protection (Ariffin, Choo, Slay, 2013, p-44). The Suspect or victims may be loaded with the highly classified security measurement where the security provider does not exist in real world or identity of security provider is highly classified. In that case the chances of getting information from the digital source are become very low. Whereas the systematic complexity is less tough than the user-defined complexity but the chance of information extraction is also low and it varied from the different deviation of technology integration over the computing devices (Hasan, Mahmood, Ragh av, 2012, p-401). The process of systematic complexity is also divided into third party security module and default system module. In the history of forensic analysis it is been observed that the default security mechanism is easy to analyses because it have low level consent of privacy mechanism. But when it comes to third party security module integration then it is difficult to analyze (Abalenkovs et al., 2012, p-2271). Third party applications are used to provide the better security solution. So it is inconceivable to break the security measurement for a better forensic analysis. The other issue which can restrain the limit of COC based digital forensic application is belongs to the ethical responsibility. The ethical responsibility issue can also create problems due the different types of privacy act, legal settlement and data collection procedure (McMillan, Glisson, Bromby, 2013, p-4908). The ethical responsibility is standing to moralized the human concerns of privacy which also reduce the performance of digital investigation and its standard. Conclusion The development of technology has tremendous effect on our society. Its drive our human race into the new phase of evolution. But the problem comes when the complexity arises. The digital forensic investigation by using of COC creates a new horizon towards the investigation of different type crime scene. The process of COC based investigation is spread out over the different layer of data storage unit, computing unit, mobile device etc. and there are several law and regulations are passed to establish the investigation framework. The collection of the digital evidences and presenting them in after verification of the authenticity and reliability of the evidences has the significant potential to change the verdict of the judgment. With the advancement of technology, the world is supporting more digital evidences in a legal investigation. For providing the digital evidences for investigation and supporting the fact, the digital evidences required to be authenticated on the reliability. One of the best practices followed for the collection, storage and analysis of the digital evidence is Chain of Custody. In change of custody, a series are standardized procedure is followed for the authentication and maintenance of the integrity of the data. The use of the Chain of Custody provides in providing evidential support and proves to the digital data provided as evidences for an investigation. The use of the computer forensic allows gathering, safeguarding and maintenance of the digital information gathered from the investigation sites. Although, the Chain of Custody follows an series of log in and metadata about who, when and where accessed the data, it can be easily be tampered and altered, therefore altering the CoC and timeline of investigation. Most of the cases, the alteration of the CoC has been found as the result of the lack of security in the devices and IT infrastructure of the organization that deals with the storage and analysis of the digital information. Therefore for maintaining the authenticity reliability and integrity of the data and digital information in forensic investigation, the forensic investigators and analyst required to introduces security measures like digital signature, cryptography and secure IT architecture so that the digital evidences cannot be easily modified and tampered. References Abalenkovs, D., Bondarenko, P., Pathapati, V. K., Nordb, A., Piatkivskyi, D., Rekdal, J. E., Ruthven, P. B. (2012).Mobile forensics: Comparison of extraction and analyzing methods of ios and android(pp. 1422-2377), (Doctoral dissertation, Master Thesis, GjAyvik University College). Ajijola, A., Zavarsky, P., Ruhl, R. (2014, December). A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev. 1: 2014 and ISO/IEC 27037: 2012. InInternet Security (WorldCIS), 2014 World Congress on(pp. 66-73). IEEE. Ariffin, A., Choo, K. K. R., Slay, J. (2013, January). Digital camcorder forensics. InProceedings of the Eleventh Australasian Information Security Conference-Volume 138(pp. 39-47). Australian Computer Society, Inc.. Ariffin, A., DOorazio, C., Choo, K. K. R., Slay, J. (2013, September). iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner?. InAvailability, Reliability and Security (ARES), 2013 Eighth International Conference on(pp. 375-382). IEEE. Arora, A. S., Bhatt, S. C., Pant, A. (2012). Forensics computing-technology to combat cybercrime.International journal of advanced research in Computer Science and software Engineering,2(7), 42-64. Bulbul, H. I., Yavuzcan, H. G., Ozel, M. (2013). Digital forensics: an analytical crime scene procedure model (ACSPM).Forensic science international,233(1), 244-256. Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S. (2012, June). Forensics investigation challenges in cloud computing environments. InCyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 190-194). IEEE. De Marco, L., Ferrucci, F., Kechadi, T. (2014). Reference Architecture for a Cloud Forensic Readiness System, 256-646. Dezfoli, F. N., Dehghantanha, A., Mahmoud, R., Sani, N. F. B. M., Daryabar, F. (2013). Digital forensic trends and future.International Journal of Cyber-Security and Digital Forensics (IJCSDF),2(2), 48-76. Elyas, M., Maynard, S. B., Ahmad, A., Lonie, A. (2014). Towards a systemic framework for digital forensic readiness.Journal of Computer Information Systems,54(3), 97-105. Goel, A., Tyagi, A., Agarwal, A. (2012). Smartphone forensic investigation process model.International Journal of Computer Science Security (IJCSS),6(5), 322-341. Hasan, R., Mahmood, S., Raghav, A. (2012, September). Overview on Computer Forensics tools. InControl (CONTROL), 2012 UKACC International Conference on(pp. 400-403). IEEE. Hitchcock, B., Le-Khac, N. A., Scanlon, M. (2016). Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.Digital Investigation,16, S75-S85. Homem, I., Dosis, S., Popov, O. (2013, December). LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. InInternet Security (WorldCIS), 2013 World Congress on(pp. 156-161). IEEE. Ibrahim, N. M., Al-Nemrat, A., Jahankhani, H., Bashroush, R. (2012). Sufficiency of windows event log as evidence in digital forensics. InGlobal Security, Safety and Sustainability e-Democracy(pp. 253-262). Springer Berlin Heidelberg. Lalla, H., Flowerday, S., Sanyamahwe, T., Tarwireyi, P. (2012, January). A log file digital forensic model. InIFIP International Conference on Digital Forensics(pp. 247-259). Springer Berlin Heidelberg. Marangos, N., Rizomiliotis, P., Mitrou, L. (2012, December). Digital forensics in the cloud computing era. In2012 IEEE Globecom Workshops (pp. 775-780). IEEE. McMillan, J. E. R., Glisson, W. B., Bromby, M. (2013, January). Investigating the increase in mobile phone evidence in criminal activities. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 4900-4909). IEEE. Mishra, A. K., Matta, P., Pilli, E. S., Joshi, R. C. (2012, December). Cloud forensics: State-of-the-art and research challenges. InCloud and Services Computing (ISCOS), 2012 International Symposium on(pp. 164-170). IEEE. Nasreldin, M. M., El-Hennawy, M., Aslan, H. K., El-Hennawy, A. (2015). Digital Forensics Evidence Acquisition and Chain of Custody in Cloud Computing.International Journal of Computer Science Issues (IJCSI),12(1), 153. Nelson, B., Phillips, A., Steuart, C. (2014).Guide to computer forensics and investigations. Cengage Learning, 120-286. Pichan, A., Lazarescu, M., Soh, S. T. (2015). Cloud forensics: technical challenges, solutions and comparative analysis.Digital Investigation,13, 38-57. Prayudi, Y., Ashari, A., Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Framework for Handling Digital Chain of Custody.International Journal of Computer Applications,107(9), 56-72. Rajamaki, J., Knuuttila, J. (2013, August). Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement. InIntelligence and Security Informatics Conference (EISIC), 2013 European(pp. 198-203). IEEE. Rani, D.R., Sultana, S.N. Sravani, P.L. (2016). Challenges of Digital Forensics in Cloud Computing Environment.Indian Journal of Science and Technology,9(17), 90-100. Reichert, Z., Richards, K., Yoshigoe, K. (2014, October). Automated forensic data acquisition in the cloud. In2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems(pp. 725-730). IEEE. Saxena, A., Shrivastava, G., Sharma, K. (2012). Forensic investigation in cloud computing environment.The International Journal of forensic computer science,2, 64-74. Shridhar, G. A., Chandrakant, P. R., Baburao, J. (2014). Network/Cyber forensics.International Journal of Computer Science and Management Research (pp. 24-74). https://www. ijcsmr. org/eetecme2013/paper9. pdf 18th November. Shrivastava, A. K., Payal, N., Rastogi, A., Tiwari, A. (2013, September). Digital Forensic Investigation Development Model. InComputational Intelligence and Communication Networks (CICN), 2013 5th International Conference on(pp. 532-535). IEEE. Siegel, J. A., Mirakovits, K. (2015).Forensic science: the basics. (pp. 50-60). CRC Press. Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014, June). Cloud forensics solutions: a review. InInternational Conference on Advanced Information Systems Engineering(pp. 299-309). Springer International Publishing. Stirland, J., Jones, K., Janicke, H., Wu, T. (2014). Developing cyber forensics for SCADA industrial control systems. InThe International Conference on Information Security and Cyber Forensics (InfoSec2014)(pp. 98-111). The Society of Digital Information and Wireless Communication. Taylor, R.W., Fritsch, E.J. Liederbach, J. (2014).Digital crime and digital terrorism. (pp. 245-268), Prentice Hall Press. Valjarevic, A., Venter, H. S., Ingles, M. (2014, August). Towards a prototype for guidance and implementation of a standardized digital forensic investigation process. In2014 Information Security for South Africa(pp. 1-8). IEEE. Wu, T., Disso, J. F. P., Jones, K., Campos, A. (2013, September). Towards a SCADA forensics architecture. InProceedings of the 1st International Symposium on ICS SCADA Cyber Security Research 2013(pp. 12-21). BCS. Yadav, D., Mishra, M., Prakash, S. (2013, September). Mobile Forensics Challenges and Admissibility of Electronic Evidences in India. InComputational Intelligence and Communication Networks (CICN), 2013 5th International Conference on(pp. 237-242). IEEE.