Tuesday, May 26, 2020
Cast and Crew of 3 Idiots - 990 Words
Date: November 21, 2013 From: Anubha Bang To: Cast and Crew of 3 Idiots and Chetan Bhagat Re: Story Credit Row 3 Idiots is the highest grossing box office hit in Indiaââ¬â¢s movie history. To date, the film has collected USD 60M worldwide from theatrical ticket sales. But, 3 Idiots is better known for the story credit controversy that surrounded its release in December 2010 than the actual content of the movie. The author of the book Five Point Someone, from which the movie is allegedly adapted, has accused the makers of the film from denying him due credit. This is a classic problem in the Indian movie industry where unknown writers are pushed over by more financially secure directors and producers. However, in thisâ⬠¦show more contentâ⬠¦He was a fairly well known author, but having a Bollywood film under your belt is a whole different game and he may have been all too eager to get this achievement on his resume. His BATNA to the contract he entered in, was to not have the movie made at all and this was definitely such an undesirable outcome for him that his reservation/ind ifference point was way below that of the filmmakersââ¬â¢. The producer of the film was aware of Bhagatââ¬â¢s reservation point and was thus able to strike a deal without clearly specifying the credit clause. The producer created value for himself by withholding critical information and capitalizing on Bhagatââ¬â¢s overindulgence in trading information. Thus, Bhagat would have been better off by reserving some of his enthusiasm and maybe biding time and approaching other production houses to ensure a fairer negotiation. While writing this memo, I contacted both the parties involved and was fortunate enough to get a comment from the author, Chetan Bhagat. He confirmed the following, ââ¬Å"At the time of signing a contract my writing career had just started to take off and there were substantial bargaining asymmetries between an individual author and a production powerhouse with ample financial and political muscle. So much for the freedom of contract!â⬠Thus, if the m akers were not as involved in selfShow MoreRelatedO Brother Where Art Thou1597 Words à |à 7 Pagesgangs and old Ford model ââ¬Å"Tâ⬠roamed the long dirt roads. The film begins with the three main characters: Ulysses Everett McGill (George Clooney), Pete Hogwallop (John Turturro), and Delmar Oââ¬â¢Donnel (Tim Blake Nelson) escaping from their chain gang crew in the middle of nowhere. As these hardened idiotic criminals embark on their treasure seeking journey, they quickly find that their old foolish ways of lying, cheating, and stealing is no way to live if youââ¬â¢re trying to be a proper gentleman. WithRead MoreProblems and Aspirations of Youth as Highlighted in the Novels of Chetan Bhagat5079 Words à |à 21 Pagespeople on the streets. CHETAN BHAGAT:- A BIOGRAPHICAL SKETCH Chetan Bhagat (born on 22 April,1974) is a contemporary Indian author who has written four novels namely :- ââ¬Å" Five Point Someone- What not to do at IITâ⬠, ââ¬Å" One Night @ The Call Centerâ⬠, ââ¬Å"The 3 Mistakes of My Lifeâ⬠and ââ¬Å"2 States: The Story of My Marriageâ⬠, respectively. He grew up in Delhi in a Punjabi family in an uncertain home environment where his parents used to fight a lot. His father, an army officer, was very strict and he wasnââ¬â¢t allowedRead MoreHow Bollywood Uses New Media Tools For Marketing Its Film2012 Words à |à 9 Pageswas also realised and it led to wider box office successes. Major successes during this period were Hum Aapke Hain Kaun (1994), Dilwale Dulhaniya Le Jayenge (1995), Lagaan (2001), Kal Ho Na Ho (2003), Rang De Basanti (2006), Chak De India (2007),Dhoom 3(2013), Happy new year(2014) Lagaan was even nominated at the Academy Awards (Stadler, 2005 and Athique, 2008). 2.2 Marketing in Bollywood: Then and Now In the earlier days film posters were good enough for promotion of films and the films used toRead MoreMedia Consumption Habits7878 Words à |à 32 Pagesbehavior, flavor, environment, technology, and modernization economic growth. By comparing the result with current scenario we can find out some interesting conclusions, which will help us to understand the media business well. 1 INDEX S.No 1 2 3 4 5 6 7 8 Particulars Introduction Indian Entertainment Media Industry Literature review Methodology Research Instrument Data Analysis Conclusions Limitations Page No. 03 04 07 09 10 15 49 50 2 Introduction We all watch TV, read newspapersRead MoreAnalysis : Moonlight Essay2233 Words à |à 9 Pages1 Moonlight cast a shadow over the girl as she crept along the arid desert turf. Her body was thin and sun stained, as she looked like a woman cut from the stake. Un-kempt hair hung dry and damaged from beneath her hat. Itââ¬â¢s brim shaded a hollow gaze and eyes drained of lively color. They held far too much for a girl of twenty five. Within them were memories of the tree they would walk to, whoââ¬â¢s leaves basked in southern warmth, and who s limbs were lush and weighed down with the fruits of theRead More Euro Disney Essay6225 Words à |à 25 Pageswas also expected to stem the flow of bad publicity which EuroDisney had experienced from its inception. Phase Two development at EuroDisneyland was slated to start in September 1993, but in light of their drained cash reserves (FFr1.1bn in May 1993)3 and monstrous debts (estimated at FF421bn),4 it was unclear as to how the estimated FFr8-10bn Phase Two project would be financed. Despite this bleak picture, Michael Eisner, CEO of Walt Disney Co., remained optimistic about the venture: ââ¬Å"Instant hitsRead MoreMovie Analysis : The Movie The Film 2659 Words à |à 11 Pagesvideos produced a decade old. All the youngsters in these educational doldrums had fluffy feathered mullets and strong cockney accents, film locations were churlish high-rise council blocks that surmounted concrete doom in its infrastructure. And a cast of dreadful actors so utterly depressing to look at you had to wonder where their future in acting ended up. We had to view these insipid films on a geriatric Sony trinitron, snuggled in a cardigan of wood, volume exceedingly loud you could hear aRead MoreCulture Is Defined As The Shared Patterns Of Behaviors And Interactions Essay2880 Words à |à 12 Pagesculture and society, better to speak of its multiplicity of cultures and societies. In this novel we see that old practices and customs have not changed yet and our status of being modern has not removed the past ideologies. Although he system of cast practice has been abolished years ago but people I India still follow them blindly to find a ââ¬Ëperfect matchââ¬â¢ for their children. Of late, externally we are very modern but initially we still live in the past. 2 States: The Story of My Marriage is anRead More The Navigation of Christopher Columbus and the Age of Discovery4963 Words à |à 20 Pagesthat was to follow, he was not the high-stakes risk taker that some historians would have us believe. However, neither was he the bumbling quixotic figure presented by those who, for their own reasons, attempt to present him as some sort of insane idiot, or, at best, an extremely lucky savant. What is true about Christopher Columbus is that, for the times in which he lived, he was a well read and learned geographer. Columbus was a student of navigation and sailing, and as such, his understandingRead MoreProject Mgmt296381 Words à |à 1186 Pagesprojects 2.3 Stakeholders and review boards 12.1 RFPââ¬â¢s and vendor selection (.3.4.5) 11.2.2.6 SWAT analysis 6.5.2.7 Schedule compression 9.4.2.5 Leadership skills G.1 Project leadership 10.1 Stakeholder management Chapter 11 Teams Chapter 3 Organization: Structure and Culture 2.4.1 Organization cultures [G.7] 2.4.2 Organization structure [9.1.3] 9.1.1 Organization charts 1.4.4 Project offices Chapter 4 9.2 Building the team (.1.3) [3.5.3] [App G.2 Building teams] 9.4 Managing
Monday, May 18, 2020
The Extraordinary Man in Dostoevskys Crime and...
The extraordinary man in Dostoevskys Crime and Punishment is presented in three fashions: the first is Dostoevskys theory of the extraordinary man, the second is the main characters, Raskolnikovs notion of himself as an extraordinary man and the third is Dostoevskys view of the protagonists attachment to his self-identification with the extraordinary. Dostoevskys ideas about the extraordinary man are given in Raskolnikovs speech to Porfiry Petrovich on pages 242 and 243. Dostoevskys view is expressed as Raskolnikovs, and is concerned with defining what exactly an extraordinary man is. Lending the protagonist definition, however, does not signify the authors acceptance of Raskolnikovs supposed extraordinariness. Dostoevskyâ⬠¦show more contentâ⬠¦Raskolnikov is not the hero of the novel, but the fool. Raskolnikovs speech to Porfiry, in which he defines what it is to be extraordinary and where he justifies the actions of extraordinary men, is a definition and idea that can be attributed to Dostoevsky. Raskolnikov gives the speech as though he were detached from it; he doesnt realize the implications of what he is saying, he doesnt realize that what he is describing is not him. This speech should have made Raskolnikov reflect; it should have made him question his situation, especially after the murder he commits and his self-identity crisis (extraordinary or ordinary). But Raskolnikovs speech has no such effect; he speaks as though reading a transcript or reciting a memorized poem, as if somebody is talking through him and as if the words had no affect on his conscience. He looks at the ground while speaking, as if frightened of the implications of the theory for his own life, but he never voices this fear, he simply moves on. Why doesnt Raskolnikov ever stop to reflect on his own e ssay, when it holds the key to his self-identity crisis? Why does he never question the murder he committed, why doesnt he try and discern whether his crime is extraordinary or ordinary? He has not come to terms with his identity or the nature of the crime, yet he never tries to reconcile these identities with his own essay. Raskolnikov also ignores the fact that he is acting, outShow MoreRelatedCrime and Punishment by Fyodor Dostoevsky Essay1585 Words à |à 7 PagesBefore the interactive oral, I noticed the numerous dreams and hallucinations in the novel Crime and Punishment, but I was not quite able to grasp the deeper meaning of some of the dreams and hallucinations. After this interactive oral, I see how important dreams are in this novel. They serve to illuminate the state of a character in a way that would not otherwise be clear. During this interactive oral, it was pointed out that the dreams in this novel are very influential to a characterââ¬â¢s stateRead More The Subconscious Mind in Fyodor Dostoevskyââ¬â¢s Crime and Punishment1394 Words à |à 6 PagesThe Subconscious Mind in Fyodor Dostoevskyââ¬â¢s Crime and Punishment In Fyodor Dostoevskyââ¬â¢s psychological novel, Crime and Punishment, the suffering and isolation of the late nineteenth century Russia becomes reality. As a young man who has left his studies in the university, Raskolnikov finds himself wallowing in poverty and self-pity. With his dreams of becoming a prominent ââ¬Å"Napoleonâ⬠of Russia destroyed, he feels that he is one of the many worthless citizens that he has learned to detestRead MoreCrime and Punishment: Dostoevskys Portrayal of Anti-Nihilism 1443 Words à |à 6 PagesNihilism. According to Whitney Eggers on Philosophies in Crime and Punishment, Nihilists argued that there was a distinction between the weak and the strong, and that in fact the strong had a right to trample over the weak (Eggers). Nihilism is commonly linked to utilitarianism, or the idea that moral decisions should be based on the rule of the greatest happiness for the largest number of people. Raskolnikov, the protagonist in Crime and Punishment, is a Nihilist, which is his main reason for committingRead MoreFyodor Dostoevskys Crime And Punishment1378 Words à |à 6 Pagesand does not better society. In Dostoevskyââ¬â¢s book Crime and Punishment, this belief is developed through a criticism of the theories and acti ons of the main character Raskolnikov. Raskolnikov believes that he has the right to kill an old pawnbroker because he views himself as extraordinary and her as a negative member of society. Porfiry, an older, logical detective, invalidates Raskolnikovââ¬â¢s extraordinary man theory through his questions and his own theory about crime. In this way, Dostoevsky conveysRead MoreFyodor Dostoevsky Crime And Punishment Analysis1214 Words à |à 5 Pages Dostoevskyââ¬â¢s disapproval on the Superman theory In the novel ââ¬Å"Crime and Punishmentâ⬠, by Fyodor Dostoevsky, Dostoevsky expresses his disapproval of the Ubermensch theory by using his main character; Raskolnikov who tries to become an extraordinary person but fails to do so. Raskolnikov is put in a group where people maintain the idea that man is not actually equal but are divided into two separate groups which are; the ordinary people who are locked within the laws and tradition of society by onlyRead MoreCrime And Punishment And The Idiot Analysis900 Words à |à 4 Pagesin that sense, everyone is the same. Their differences come from their own unique dispositions and temperaments. Crime and Punishment and The Idiot, two of Dostoevskyââ¬â¢s novels, have two very seemingly similar protagonists, creating an illusion for the readers. When in reality, the characters can be labeled as being near opposites. Through the use of the novels of Crime and Punishment and The Idiot, Dostoevsky creates the protagonists of each n ovel similarly, but alters their destinies to differentiateRead MoreEssay on Salvation Through Human Suffering in Crime and Punishment1200 Words à |à 5 PagesSalvation Through Human Suffering in Crime and Punishment ââ¬Å"All men must suffer, and salvation can not be obtained unless this suffering is presentâ⬠(Boland, p.4). All of the characters in the novel experience some sort of internal or external suffering. The main character, Raskolnikov, must grow and realize this in order to overcome his conflicts and reach the salvation of peace within. Dostoevskyââ¬â¢s concentration and focus is on why suffering must exist and how this suffering can be conquered.Read More Life Defined by a Single Moment in Scarlet Letter, Red Badge of Courage, and Crime and Punishment733 Words à |à 3 PagesA Life Defined by a Single Moment in Hawthornes The Scarlet Letter, Stephen Cranes Red Badge of Courage, andà Dostoevskys Crime and Punishment à Life can be changed by a decision made during a single moment. Despite the natural gifts of courage or intelligence of a person, a single mistake can isolate him from the rest of society. In one case this can be cause by public conception. The public believes that this person is morally inferior and singles out that person for ridicule. However, itRead MorePhilosophies In Fyodor Dostoevskys Crime And Punishment1095 Words à |à 5 PagesFor a recent reading assignment our english class was introduced to the master-work that is Fyodor Dostoevskyââ¬â¢s Crime and Punishment. Set in 1860s Saint Petersburg Russia, Dostoevsky goes to great lengths to describe his dark and decrepit world in which his characters to inhabit. The events of an axe murder and eventual redemption could have taken place in any setting, but Dostoevsky on the contrary chose this specific time in which to make his commentary on society. Many of the characters of theRead More Nature and Nurture in Crime and Punishm ent Essay1362 Words à |à 6 PagesNature and Nurture in Crime and Punishment à à In the news today there is an article about a high-school boy who brought guns to school and shot several students. The parents of the victims are suing various computer game companies saying that the violent games present shooting and killing people as pleasurable and fail to portray realistic consequences. A representative of one of the companies released a statement saying that this is another example of individuals seeking to elude responsibility
Friday, May 15, 2020
James M. Mcpherson An American Civil War Essay - 1397 Words
James M. McPherson: James McPherson was born on October 11th 1936, he is an American Civil War historian. He received the 1989 Pulitzer Prize for Battle Cry of Freedom, his most famous book. McPherson was the president of the American Historical Association in 2003, and is a member of the editorial board of Encyclopedia Britannica. In his early career McPherson wanted to leave a legacy as being known for the historian who focusses on more than one point. Through skillful narrative in a broad-ranging oeuvre of essays and books, McPherson has succeeded in telling both stories, combining social, political, and military history to reach a broad scholarly and popular audience, emphasizing all the while that the Civil War constituted a ââ¬Å"second American Revolution.â⬠Examining thousands of letters and diaries written by soldiers to gather a better insight and understanding, McPherson argued that deep political and ideological convictions about liberty, slavery, religion, and nation were the fundamen tal reasons that men on both sides enlisted and fought. McPhersonââ¬â¢s views on the Civil War are broad in comparison to many other writers, he believes there are multiple causes to the war but that the underlying cause was slavery and that Southern states used the saying ââ¬Å"Statesââ¬â¢ Rightsâ⬠to justify their actions of slavery and secession. It became a psychological necessity for the South to deny that the war was about slavery that they were fighting for the preservation, defense andShow MoreRelatedThe American Civil War, By James M. Mcpherson1045 Words à |à 5 Pagesformer,â⬠wrote James M. McPherson in 1995.à ââ¬Å"Why couldnââ¬â¢t I be both?â⬠McPherson responded. ââ¬Å"Surely it is possible to say something of value to fellow professionals while at the same time engaging a wider audience.â⬠McPherson is indeed both.à In a career that has spanned four decades and garnered many of the historical professionââ¬â¢s top accolades, i ncluding a Pulitzer Prize, two Lincoln Prizes, the NEHââ¬â¢s Jefferson Lectureship in the Humanities, and a term as the president of the American Historical AssociationRead MoreThe Civil War: The Second American Revolution? Essay examples1083 Words à |à 5 PagesThe Civil War has been described as one of the most important occurrences in the life of the United States. It was period in time when the United States was no longer united, but instead was split between the north and south due to the ongoing feud over of the legal standing of slavery nationwide. For four years, many people were subjected to horrific measures, especially the soldiers that participated in combat. Despite the brutality of battle, soldiers experienced a numerous amount of daily hardshipsRead MoreBattle Cry Of Freedom By James M. Mcpherson1244 Words à |à 5 Pageshis book Battle Cry of Freedom, James M. McPherson, is a great american civil war historian. Born in Valley City, North Dakota on October 1 1, 1936 McPherson attended St. Peter High School. After graduation he attended Gustavus Adolphus College and in 1958 earned his bachelorââ¬â¢s degree with Magnum Cum Laude. He later attended John Hopkins University and earned his Ph.D. in 1963 and is now currently working as Professor Emeritus at Princeton University. McPherson is most well known for his workRead MoreEssay on What They Fought for708 Words à |à 3 PagesWhat They Fought For 1861 - 1865 This book was a good analysis of Civil War soldiers diaries, and letters to their loved ones. Which explains what they were going through in their lives and what they fought for and risked their lives for in this conflict. In the book the author James M. McPherson uses information from l00s of diaries and letters from the soldiers to learn why they fought in this war. The Union soldiers fought to preserve the Nation that was created in 1776, to save itRead MoreHow A Soldier Can Fight And Kill People From His Own Country1562 Words à |à 7 PagesThe American Civil War was gruesome war that was fought between a country divided. Abraham Lincoln once said ââ¬Å"A house divided against itself cannot stand.â⬠Even though we were all brought together as one nation, these two sides were polarized by their environment and beliefs. This war that tore apart a country, costed more than six hundred thousand lives. The Civil War altered history and is still relevant in the present. A bi g question people have today is how a soldier can fight and kill peopleRead MoreAnalysis Of The Book Crossroads Of Freedom By James M. Mcpherson1167 Words à |à 5 PagesEssay Two The book Crossroads of Freedom: Antietam, was written by James M. McPherson to argue why the Battle of Antietam was the battle that changed the cause of the Civil War. While McPherson argued this he also argues that the Civil War had many other turning points and was not settled by just one battle. McPhersonââ¬â¢s targeted audience would have to be those interested in the Civil War and the events that led to it. McPherson wrote this great book which came to be an important contribution toRead MoreWhat They Fought For By James M. Mcpherson880 Words à |à 4 Pages150 years, the Civil War had been the bloodiest war in the American history, also known as ââ¬Å"The War Between the Statesâ⬠or ââ¬Å"Brother Against Brotherâ⬠, it was fought between the Union or the United States of America and the Confederate States of America. The war lasted four years from 1861 to 1865. What motivated these men to fight and what is the cause of the Civil War is a subject that many histor ians tried to find out. The book ââ¬Å"What They Fought Forâ⬠by the author James M. McPherson focuses moreRead MoreWho Freed the Slaves871 Words à |à 4 Pagesï » ¿Who Freed the Slaves The long standing question of ââ¬Å"who freed the slavesâ⬠has been under debate since the conclusion of the Civil War. One side of the argument takes the more obvious claim that emancipation came at the hand of the great Abraham Lincoln. The other side of the argument claims that the Slaves themselves attained their freedom. Both sides have been heavily researched and strongly supported with many facts. Do we give credit to one person for generating the political backing andRead MoreComparative Analysis of Research Articles on Slavery1451 Words à |à 6 Pagesthe freeing of slaves in the Civil War era. Two historians, James M. McPherson and Ira Berlin, respectfully express their contrasting views over these topics in this assignment. While I absolutely agree that the slaves in the Civil War era played a pivotal role in emancipating themselves and securing their civil liberties, it was unequivocally the actions of President Lincoln that led to their eventual freedom. McPherson, a professor at Princeton University and Civil War historian, describes in hisRead MoreAbraham Lincoln And The Second American Revolution957 Words à |à 4 PagesMacPherson, James, Abraham Lincoln and the Second American Revolution ââ¬Å"Abraham Lincoln and The Second American Revolutionâ⬠, written by James M. McPherson, one of Americaââ¬â¢s historians. McPherson has also written,â⬠Battle Cry of Freedom: The Civil War Eraâ⬠, ââ¬Å"Tried by War: Abraham Lincoln as Commander-in-Chiefâ⬠, ââ¬Å"Crossroads of Freedom: Antietamâ⬠and many other history related books. ââ¬Å"Abraham Lincoln and The Second American Revolutionâ⬠consists of seven essays throughout on important themes in American history
Wednesday, May 6, 2020
Essay about Interracial Marriage - 913 Words
Interracial marriage also known as mixed marriage, miscegenation, exogamy, and multiracial, is a marriage between members of different races. It was just 44 years ago that interracial marriage was made fully legal throughout the United States, and it is becoming more common for members to marry outside of onesââ¬â¢ own race. The growth of interracial marriages in the United States corresponds with changes in the legal status of interracial marriages and what some would consider, little, but some changing of arrogance among Americans towards persons in interracial relationships. ââ¬Å"Recent increases in interracial unions with Whites presumably reflect positive changes in American race relations as well as the blurring of racial boundaries andâ⬠¦show more contentâ⬠¦The causes of interracial couple conflicts are stemmed from many sources. One source in which conflicts arise comes from members of society. The views on non-Blacks and Blacks interracial marriage is frowned up on. Although interracial marriage is more common members of society are not fully in agreement with these mixed unions and there are opposing views on the idea of society acceptance of this union. For example, in the article by Batson et al. research findings examined explanations that social relationships and arrogance in American society intensely suggest a strong Black and non-Black racial gap. The implication for Blacks in American society is that interracial marriages with Whites will continue to be less common than they are for other non-Black racial minorities (2006). Discrimination against interracial couples doesnââ¬â¢t just end there, discrimination occurs at restaurants and other public areas, people stare as if they had just seen a ghost. Sixty-four percent of African American and Caucasian interracial couples experience undesirable public reaction. This negative response can be moderately minor, such as stares, but can also take the form of derogatory jokes and comm ents, and subpar services (Leslie Letiecq, 2004). Indeed, American society may contribute to the conflicts of interracial couplesââ¬â¢ relationship and or marriage, butShow MoreRelatedInterracial Marriage3821 Words à |à 16 PagesIntroduction An interracial marriage is a marriage between members of different races, known as as Mixed marriage: marriage of two people from different races or different religions or different cultures. Miscegenation: reproduction by parents of different races (especially by white and non-white persons). Exogamy: marriage to a person belonging to a tribe or group other than your own as required by custom or law. Multiracial: made up of or involving or acting on behalf of various races, and Biracial:Read MoreInterracial Marriage Should Be Legal1365 Words à |à 6 PagesInterracial marriages are still considered taboo in many countries in the world and even in the United States. While the opportunity to marry whoever one desires is a reality in America, it is not always common and sometime frowned upon in our communities. Much progress has been made as a country to allow interracial marriages to be successful, but the American population has had difficulty accepting the legal development that ha s taken place in our nation. Interracial Marriage has been fought throughoutRead MoreTraditional Belief Of Interracial Marriage1674 Words à |à 7 Pagescontrast, popular culture theorizes that interracial marriages are motivated not by a desire to leave behind oneââ¬â¢s heritage, but by love between two people who happen to be of different races. In this paper, I seek to analyze and compare these two perspectives, proposing a theory that combines the two by accounting for a personââ¬â¢s upbringing and beliefs when deciding what their motivation may be. I first analyze the traditional belief of interracial marriage in comparison to the popular culture beliefRead MoreInterracial Marriages And The United States1043 Words à |à 5 Pagesis the institution of marriage. This is especially true when it comes to the topic of interracial marriages. Which has been described as a marriage between members of two different races. Even though, it has not been that long ago since interrac ial marriage has been made legal throughout the entire United States. It continues to be one of the biggest conflicts in society today, considering everyone has their different viewpoints on the topic. Since these types of marriages are considered to be anRead MoreEssay about interracial marriages701 Words à |à 3 Pages The law forbidding interracial marriage was terminated in 1967, and in the midst of rapid racial change, one fact is unmistakable: A growing number of Americans are showing that we all can get along by forming relationships and families that cross all color lines. In the past couple decades, the number of interracial marriages has increased dramatically. Interracial dating and marrying is described as the dating or marrying of two people of different races, and it is becoming much more common toRead MoreInterracial Marriages And Its Effect On Society877 Words à |à 4 PagesInterracial Marriages (relationships) have existed for years, though society traditionall y has had difficulty accepting these unions. Over the years, attitudes toward interracial relationships have changed dramatically and will likely continue to change as our society becomes increasingly diverse. An interracial marriage is generally defined as the union between two individuals who come from different racial/ethnic backgrounds, such as and African American women and a white American male. InterracialRead MoreInterracial Relationships Sex and Marriage Essay976 Words à |à 4 Pages In the modern world today, there are still people that are bigots who view interracial relationships and marriage as undesirable. However, the view is contentious given that the law that allows interracial relationships and marriages was enacted in 1960. Before then, it was prohibited and against the law to have a relationship with someone from a different race let alone getting married to them. Basing this context from the film Jungle Fever that tries to describe a non-healthy relationship betweenRead MoreCauses of Friction in Interracial Marriages Essay1425 Words à |à 6 PagesCauses of Friction in Interracial Marriages The United States has witnessed a considerable amount of social and cultural desegregation between African-Americans and Caucasians. However, despite years of desegregation, social and cultural differences still exist. One of these differences that still exists is in the institution of marriage. Americans have been and are continually moving slowly away from segregation. In the past forty years, a multitude of changes have transformed schools, jobs,Read More The Melting Pot: Interracial Marriages Essay1270 Words à |à 6 Pages Interracial Marriages 2 The Melting Pot: Interracial Marriages To be or not to be? Once again this is the question. In the past, social scientist and society in general, categorized people involved in interracial romances as disturbed, or they labeled these relationships as acts of rebellion, or attempts to move up on the social ladder (Majete 2000, 1). Today this no longer seems to be the case. However, this can still be quite controversial. Part of the reason for this controversy begins withRead MoreInterracial Marriage Should Be Permitted Or Rejected1300 Words à |à 6 PagesInterracial relationships rates have dramatically increased in the United States of America (Kalmijn 1993; Qian 1997). The mixing of cultures between whites and African Americans has considerably overcome its old barriers and is currently being witnessed throughout the country. According to Joyner and Kao 2005, dating outside oneââ¬â¢s race has grown to be very common nowadays. In 1967, the case of Richard Loving and Mildred Jeter in the State of Virginia rose up cont roversies on whether interracial
The Effects Of The Tragedy Of 2001 - 939 Words
The Effects of the Tragedy of 2001 When the Twin Towers fell on September 11, 2001 it affected thousands of people all over America. Death, screams, and smoke filled the air leaving people heartbroken, injured, and forever changed. The public health of people around the world was challenged by this traumatic event. All of the death tolls, injuries, and respiratory problems flooded screens everywhere. This tragedy occurred on the brink of the technology advance and will be forever ingrained into the minds of the viewers. This horrible attack killed 2,973 innocent people and injured thousands more (Sisk). In addition to all of these physical effects from the attack people were affected mentally as well. Stress, fear, and animosity infiltrated the minds of thousands of Americans and has changed them ever since. People who go to war for the first time usually come back changed. If the change is on the higher end of the spectrum then it is called Post Traumatic Stress Disorder. Surprising ly, this disorder is not exclusive to people in the military. Directly after the attacks on the Twin Towers a study showed that forty-four percent of the people in the U.S. experienced substantial stress (Perlman). The media caused this statistic because without them nobody would have known how severe the attack was. Schools and jobs were interrupted all over the nation to watch the towers fall on live television. It was so surreal that people did not want to believe it. New York City was inShow MoreRelatedThe Tragedy Of Hurricane Katrina Essay1599 Words à |à 7 PagesMass tragedies occur on a daily basis in almost every nook and cranny of the world. No matter the severity, they all appear to have a similar effect: deterioration of mental health stability among those involved. Children and adults alike possess the risk of suffering from mental disorders, such as depression and PTSD, following exposure to a traumatic event. However, the circumstances of these events differ, simp ly because not all mass tragedies are the same. No matter what type of event occursRead MoreThe Effects Of Hysteria On The World Trade Center Essay1148 Words à |à 5 PagesOn September 11th, 2001 tragedy struck, when two planes flew into the World Trade Center, a plane crashed into the Pentagon, and a plane that crashed down in Pennsylvania. These horrific acts of terrorism changed America into what it is today. It changed the way people thought about others and how equal the American people really are. The United States was in a panic and was ready to accuse others immediately. The Crucible showed us that a shocking, confusing event can make people almost go insaneRead MoreWhat Happened in September 11th, 2001 Essay889 Words à |à 4 Pages September 11th, 2001 What happened on September 11th, 2001? A day that will be remembered and never forgotten, a day that many innocent people died because of a terrible tragedy that happened on September 11th, 2001 at the World Trade Center in New York City. To many people it probably just looked like another regular work day, but didnââ¬â¢t expect the worst that day. On September 11, 2001, nearly 3,000 people were killed in the terrorist attacks at the World Trade Center in New York City (â⬠11Read MoreTphady Of The Commons : The Tragedy Of The Commons1043 Words à |à 5 PagesIt is easy to imagine when Hardin (1968) wrote the Tragedy of the Commons; he anticipated things would get progressively worse over time, particularly if people did not respect the earth (Hardin, 1968). Although he did not mention any particular common, Hardin (1968) envisioned the worldââ¬â¢s resources dwindling, as a result of peoples mishandling of them. Hardin (1968) explained that ââ¬Å"tragedyâ⬠in â⠬Å"The Tragedy of the Commons,â⬠is the cruel way things work. It may have seemed as though things inRead MoreAnalyzing the Significance of the Evolution of Aeronautics in World War One and Beyond811 Words à |à 4 Pagesbrought about by the initiation of World War One, has posed significant questions about the role and value of aeronautics in major world tragedies, such as the September 11 Attacks in New York City and Washington D.C., and the 1991 Air Campaign of the Gulf War: Does the continuous advancement of aeronautics serve as the true mastermind of such acts of savagery and tragedy? Is the advancement of aeronautics the culprit responsible for the deaths of the elderly, women, infants, and children? AeronauticsRead MoreEssay about Bhopal Ethical Issues1307 Words à |à 6 Pagestime, but also ethical issues on the responsibility of those who would have been able to prevent the tragedy from happening and those who denied or intentionally decreased the responsibility of causing it. 2. Background of the involved organization: It was declared by the Union Carbide Corporation in their statement regarding the Bhopal tragedy that: The Bhopal plant was owned and operated by Union Carbide India, Limited (UCIL), an Indian companyRead MoreBhopal Ethical Issues1350 Words à |à 6 Pagestechnical, safety issues at the time, but also ethical issues on the responsibility of those who would have been able to prevent the tragedy from happening and those who denied or intentionally decreased the responsibility of causing it. 2. Background of the involved organization: It was declared by the Union Carbide Corporation in their statement regarding the Bhopal tragedy that: The Bhopal plant was owned and operated by Union Carbide India, Limited (UCIL), an Indian company in which Union CarbideRead MoreThe Soccer Club : A Professional Italian Association Football Club1608 Words à |à 7 Pagesembedded values and ways of thinking of the world. These assumptions are not only difficult to understand by the outsiders, but also the insiders may not be aware of their existence. Organizational responses to organizational trauma might have an effect on various levels of organizational culture, depending on the context of the near death experience and its level. The case of Benfica, where death experience happened at the individual level, illustrates how symbols, such as the retired number andRead MoreHow Engineering Can Work Together With Anthropology1198 Words à |à 5 PagesThis paper seeks to show how engineering can work together with anthropology to explore the effects of global climate change, due to increased carbon emissions. Political ecology, co-management, and tragedy of the commons are three concepts within anthropology which will be used to discuss this issue, and will be defined in detail further in this paper. Climate change can be defined as the change in global or regional climate patterns due to human activity. The World Wildlife Fund (2012) has foundRead More Violent Video Games did Not Cause the Columbine High School Shooting1634 Words à |à 7 Pagesweb page (Anton 5). Harris, being one of the killers in the Columbine High School shooting, was called a ââ¬Å"die-hard gamer who loved the interactive bloodbath called DOOMâ⬠(Anton 2). Doom was thought to be one of the factors in Eric Harrisââ¬â¢ violent tragedy. The question is: did playing Doom lead to him being a violent child, or did being a violent child lead him to playing Doom? Proceeding my perusal of articles and research, written by authors with scientific credentials or otherwise, I have concluded
Phobias Phobia and College Student Fears free essay sample
We as humans are all afraid of something, but some of us ââ¬Å"fears are exaggerated and reactions extreme: the heart race, sweat beads on the skin, the eyes narrow, and the throat tightensâ⬠(Gallo). These fears are then phobias, which can be divided into three categories. Phobia is known to many as just the fear of something but the true definition is a persistent irrational fear of an object, situation, or activity that the person feels compelled to avoid (Wood 689). It is characterized by an intense desire to avoid the feared situation, and evokes anxiety when one is exposed to that situation (Beck, Emery). The three types of phobias are: agoraphobia, social phobia, and specific phobia (Wood 521). Bill, a twenty year old college student fears public speaking. He has to take a history class requiring lots of verbal interaction. If Bill was unable to avoid the discussion class, heââ¬â¢d find a seat at the rear of the room and sit silently for an entire semester. We will write a custom essay sample on Phobias: Phobia and College Student Fears or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page His grades would naturally be suffered from this, but to him it was better than the searing anxiety he felt whenever he was called on to answer a question or share an opinion in front of twenty of thirty strangers. Bill was called on to take part in a class discussion, and froze. ââ¬Å"Blood surged to his temples, his pulse pounded, and sweat beaded on his forehead. â⬠The other students turned to look at him, waiting for his reply, but Bill couldnââ¬â¢t get anything out. His head swam; his thought scattered, and his throat clenched. Even if he could have thought of something to say, he wouldnââ¬â¢t have been able to get it out. Billââ¬â¢s anxiety continued to mount until he could no longer stand it. He slipped from his seat and fled the classroom. A sense of humiliation dogged him for days. He never returned to the class (Gold). Billââ¬â¢s situation is an example of social phobia, which is ear of speaking in formal or informal situations, or eating or drinking in front of others ââ¬â or, in its most severe form, may be so broad that a person experiences symptoms almost anytime they are around other people (NIMH). And for people with social phobia, the fear is extremely intrusive and can disrupt normal life, interfering with work or social relationships in varying degrees of severity (NIMH). Agoraphobics, however, is an intense fear of being in a situation from which immediate escape is not possible or in which help would not be available if the person should become overwhelmed by anxiety or experience a panic attack or panic-like symptoms (Wood 521). Agoraphobia is the most disabling of all phobias, and treatment is difficult because there are so many associated fears (Hall). Agoraphobics feel the need to escape that location and find the safety of home when panic strikes. For example Laura decides to go shopping at the nearby mall, but as she starts driving closer and closer to the mall her heart starts pounding faster and faster. Once inside the mall she starts to sweating, shaking, have a panic attack and a strong urge to get out of the mall. As soon as Laura is safely home these feelings stop. Specific or simple phobia is the category for any phobias other than agoraphobia and social phobias (Wood 522). This is the most popular cases of phobias; and there are more than 350 different types of specific phobias. They range all the way from cathisophobia-fear of sitting to something as severe as arachnophobia-fear of spiders. In most cases of this type of phobia ââ¬Å"the victim develops a fear of a specific object or situation: heights, closed spaces, or birdsâ⬠(Gold, 36).
Tuesday, May 5, 2020
Digital Evidence Gathering Relationship to Chain of Custody
Question: Discuss about theDigital Evidence Gathering for Relationship to Chain of Custody. Answer: Introduction With the introduction of modern technologies and advanced processes of communication through electronic medium, huge volumes of data are being generated at a high velocity each day. Various law enforcement officers face challenges with the extraction of the digital evidences from different types of data storage devices. The data gathered from any laptops, digital cameras, cellular phones, hard drives, computers and even game that are related to any offence are defined as Digital Evidence (Abalenkovs et al., 2012, p-2136). The digital evidences found in the electronic devices triggers investigation in any criminal case. During an investigation, both the physical and digital evidence plays important role in decision making procedure in courtroom. With the advancement of technology, digital forensics utilizes several tools for the collection, security, analyzing, interpretation and presenting the digital evidence for the reconstruction of the series of events in a judicial process. On the other hand, the Chain of Custody is defined as the legal procedure for documentation of the digital evidence in chronological manner. Moreover, Ariffin et al., (2013, p-481) defined CoC (Chain of Custody) as in significant process for handing the evidences for investigation. The application of the CoC in the digital evidence allows in correlating the documents to the time, persons, place involved in each stage of the investigation. Therefore, the need of forensic tool for gathering and evaluating the digital evidence has increased simultaneously. In any forensic cases, the digital evidence assists in demonstrating the truth and simultaneously its consequences. Damshenas et al., (2012, p-192) cited that the admissibility of the evidence is dependent upon the qualities as observed by the judge. Therefore, the validity of the evidences is directly connected to the chain of custody. The validity of the evidences in turn increases the reliability and efficiency of the procedure. Since, the digital evidences are away from the sensory perception; it cannot be submitted without a chain of custody. This particular essay aims at evaluating the procedure of gathering digital evidence with the application of the Chain of Custody. Furthermore, the various components of the CoC are considered for evaluation and its importance while collecting crucial data related to investigation (Dezfoli et al., 2013, p-61). The essay assists in understanding the relationship between the Chain of custody and procedure for collecting digital evidence for investigation. Digital Evidence Gathering and its Relationship to Chain of Custody (CoC) Main Components of CoC: To make a proper a prominent process of COC or chain of custody investigator need to follow-up with some basic components of COC. The components of COC are the some sort of standardized elements which are used to identify or measure the value of digital evidence in the circumstances of digitized investigation process (Ibrahim et al., 2012, p-254). Some of the necessary components or tenants are described below Evidence Collection time: Each and every evidence is comes with a time period and time span during the collection of evidence from the place of investigation which also include the evidence collection date (Lalla et al., 2012, p-248). The Collection date and time refer the time span of collected evidence so it can be relate to the crime incident. Date and time of digital evidence validate their circumstances with real world scenario. Evidence Collection Spot: Investigation place may be differing by their location of crime spot because the evidence may found in some remote location which may not directly connected to the crime spot (Mishra at al., 2012, p-166). The document which are collected from the exact location of crime scene is can be classified as direct evidence and the evidence which are came from different area of investigation place can be classified as indirect source location of a digital evidence. Investigation person or the Investigating authority: In the process of digital evidence collection and procurement service the main key role is played by its investigating officer. Each and every perspective of storing and preservation of data are run through a proper channel of authorization (Nasreldin et al., 2015, p-153). The main reason of this fragment is to secure the evidence collection base so, that one unknown entity (suspect) may not harm or contaminate the evidences which are acquired from the crime spot or investigation. Type of Digital Media: The frame of the digital evidence procurement services also differs. The information which kept on digital media unit for the analysis collected evidence is needed to be ciphered by a strong cryptographic algorithm so that it cannot be accessible by the conventional media player (Shrivastava et al., 2013, p-532). This processes of conversion of format not only abstract the information it also maintained the privileged of information from the outsiders. Media Owner Identification: If digital document or media is ceased from the investigation scene then it is necessary to identify or locate the person who owned the digital content. In a short way of description, it can say that the Identification process must conclude some investigation about the owner of the media (Simou et al., 2014, p-303). Indexing of Collected Evidence: Investigators are work on a very big geographic domain or area, so it is not possible to memories all the evidence which are collected from different sources. So For the purpose of proper storage utilization, indexing technique needs to collaborate with the evidence collection unit. Device Description: For getting a flexible accessibility investigation process needs to accumulate a distinguish technology or method which can store information about device type, capacity, serial no, etc. (Wu et al., 2013, p-18). Hash verification: All the information or the files are secured and processed by hash verification process for future reusability and data integrity. Hash value processing method creates a unique serial number which contain data file's cyclic redundancy information. And in any case of using the documents on an investigation purpose it is necessary to recalculate the hash value with the notation of previously captured hash value and if the new calculation process produce the same value the information is allowed for further verification (Hitchcock, Le-Khac, Scanlon, 2016, p-81). Analytical Tools: The primary backbone of the entire digital forensic investigation system is the analytical tools which are used to determine the objective or the purpose of the evidence and its validity. The analytic or forensic tolls come in two type's format one is propriety, and another one is open source utility (Rani, Sultana, Sravani, 2016, p-98). All the tools are differed by their functionality and area of action. The above mentioned components and function are here to declare the process of forensic investigation over digital media. CoCs Importance for Gathering Digital Evidence: Establishment of the Chain of Custody for authentication of the digital evidence is crucial need before presenting the evidence in the courtroom. The transfer, storage and seizure of the evidence are accounted through the CoC. Pichan, Lazarescu, and Soh, (2015, p-43) cited that it is essential for the application CoC procedure for the admissible of digital evidence for investigation in court. Importance to the Investigators: The forensic data gathered from the digital devices allowed the investigators to view the metadata of the digital file but restricts the identification of the procedures the file was created. Since, some information about the gathered data are missing does not imply that the data have been compromised. Siegel, and Mirakovits, (2015, p-55) showed that the chain of custody allows the investigators to discover the location, process and creator of the acquired evidence. Importance to the Courtroom: The presentation of the Chain of Custody allows the prosecutor or the attorney to dismiss or challenge the series of digital evidences produced in the courtroom. With the proper utilization of the Chain of Custody along with digital evidence like video and audio evidences provides admissibility and authenticity of the presented evidences in the court. De Marco, Ferrucci, and Kechadi, (2014, p-251) showed that the various new procedures for establishing the Chain of Custody are becoming popular in the legal procedures. Moreover, the online services available for recording the CoC of the digital evidence Nelson, Phillips, and Steuart, (2014, p-187). Further, the introduction f he cloud storage has significantly eliminated the need of the file transfer and presentation of the physical copies of the digital evidence. Elyas et al., (2014, p-101) cited, that the standard procedure for backup, security measures and surveillance cameras are followed in the CoC th at has impress the reliability of the digital evidences. Apart from that, the Chain of Custody allows the investigator to track his steps whenever any wrong or improper evidence is found during the authentication procedure. During the case of doubt of the reliability of the evidences, the process of CoC allows to find the person responsible for the flaws with the backtracking process. Importance to the Investigation: The applicator of the Chain of Custody is the first crucial process for authenticating the video and audio evidences presented in courtroom. Identification of the Chain of Custody allows in determining whether the digital evidence has been coned or copied. With the advancement of technology, the digital media has become more easily accessible for modification, alteration and editing. Most of the time, the physical evidences are directly not available during the time of seizure or acquisition. Prayudi, Ashari, and Priyambodo, (2014, p-61) cited, that in many cases, the digital media are obtained from the police or clients that are accompanied by series of other legal documents. The paper trial is the significant part of the timeline as it authenticated the source and destination of the file transfer. With the application of the CoC, the prosecutor can raise questions about the authenticity of the digital evidence in case of missing timeline in the inve stigation. Creating a Chain of Evidence with all the digital evidences in the investigation eliminated all the suspicious against the reliability and authenticity of evidences provided in the courtroom (Shridhar, Chandrakant, Baburao, 2014, p-52). Furthermore, the Chain of Custody provides access to the administrative of retrieval, modification and date of access to the evidence. The procedure of the chain of the custody the application of the forensic process is applied on the copy of the digital evidence while the original copy is kept intact. Therefore, the CoC also allows comparison of the examined file with the original one (Stirland et al., 2014, p-99). Therefore, maintaining a Chain of Custody is one of the crucial processes for proving proof for the authenticity of the evidence provided. Various Ways CoC Can be Compromised: The Chain of Custody provides the detailed record of items or digital evidence possessed by each individual in a particular instance of timeline for investigation. The Chain of custody of the digital data has the risks of alteration and comprised (Taylor, Fritsch, Liederbach, 2014, p-252). The Chain of Custody for digital evidence begins from the collection phase, to evaluation phase till the presentation to the court for justice. The data stored in the database has the potential for getting altered, misplaced and compromised. The Chain of Custody can be compromised n various ways including the failure to indentify the digital data as evidence from the crime cite. Moreover, the failure to collect raw data from the investigation site before it has been manipulated with. The digital data need to be stored in safe and secure places for maintaining and securing the log of the people accessing the files. The storage capacity and technological devices has evolved exponentially with time ( Bulbul, Yavuzcan, Ozel, 2013, p-247). Moreover, the inefficiency in understanding the how the digital data can be authenticated fails to provide justification to the Chain of Custody. The information stored and gathered during the Chain of Custody is essential for the verification and authentication of the digital information while presenting them to the courtroom. Since, the digital evidences are easy to manipulated, significant measures needs to be taken for preventing the data from being compromised. Arora, Bhatt, and Pant, (2012, p-52) cited that for preventing data manipulation, it is essential to identify the cause of the data manipulation in protecting the Chain of Custody. Many times, the investigators examine the digital information on the file collected from the crime scenes. The changes made in the original files permanently change the digital evidences and cannot be recovered back (Goel, Tyagi, Agarwal, 2012, p-340). Collecting the digital files on an unsecure device has severe risk of manipulation from external entity. The digital data gets word out with time. The optical disks that are used for storing data are subjected to fungi and the electromagnetic disks get worn out with time. The lack of maintenance of the IT infrastructure and system result in the loss of the digital data and evidences (Saxena, Shrivastava, Sharma, 2012, p-68). Most of the cases, the digital data and the digital evidences are subjected to manipulation from the internal procedure of the organization. The lack of ethical considerations and procedure followed in the CoC results in the flaws in the digital evidences. Therefore, the officials in charge of the CoC authority often lead to the errors in the Chain of Custody (Hasan, Mahmood, Raghav, 2012, p-402). The lack of following the procedure for marinating the log list every time any officials changes of access the digital evidences creates wrong timeline in analyzing the evidences in the Chain of Custody. Moreover, the digital evidences are stored in the CDs hard drives, pen drives and database. The failure in the storage devices has can cause to the loss of the crucial data and information collected from the investigation site. Moreover, with the advancement of the technology, the hackers have also found various innovative ways to hack in to the account and manipulate the data (Marangos, Rizomiliotis, Mitrou, 2012, p-777). The hackers found various ways of breaking the security measures and entering the database where the digital data are stored. The insecure computers, laptops used for the storage and analysis of the digital information can be easily manipulated. The hackers hack in to the information system, and changes the log details and audit in the Chain of Custody (Ariffin, Choo, Slay, 2013, p-41). Moreover, the lack of security in the IT infrastructure in organization usually leads to the loss and manipulation of the digital data collected from the crime sites. Various Ways CoC can be Protected: In case of Chain of Custody, the digital evidences are gathered, analysis and investigation, the evidences are stored in electronics devices. For maintain and preserving the Chain of Custody, the investigator needs to protect the digital evidence from the time of collection to the time of presentation in the courtroom for judgment (Homem, Dosis, Popov, 2013, p-160). For ensuring the Chain of Custody, and to provide evidence that the digital evidences are kept intact, and unaltered, the investigator needs to guarantee that the evidences presented n the courtroom are same as the evidence recovered from the site of crime. Furthermore, the investigator needs to provide the exact date and time of the transfer of the digital evidences needs to be submitted (McMillan, Glisson, Bromby, 2013, p-4901). In addition to that, the investigators will ensure that the digital evidences have not been tampered with while in the custody. Maintaining the Chain of Custody for the digital evidences is more crucial than the physical evidences. Rajamaki, and Knuuttila, (2013, p-199) stated that the hackers are present everywhere for altering the digital evidence. The investigators and analyst needs to protect the evidence from login spoofing in the real time. Tampering with the initial phase of the evidence during investigation is only the beginning of the tampering. Therefore, digital evidences need to be protected from the time of collection from the crime site. Therefore, all the digital evidences needs to be collected using safe and secure devices and required to be stored in the hack proof devices and network (Yadav, Mishra, Prakash, 2013, p-168). Since all the networks are ultimately connected to the Internet, securing the Chain of Custody has become more difficult with days. Therefore, the investigator needs to follow and maintain various processes for securing the collected evidences and data. The data collection procedure in forensic evidence is gathered through manual procedure and some through the electronic devices (Ajijola, Zavarsky, Ruhl, 2014, p-71). The investigators need to audit files and used centralized logging techniques for storing the digital files. In case f both the manual and digital data collection, centralized login will provide static data that are kept out of reach of the hackers. In many cases, the hackers used compromised login times and plants information misleading the investigation procedure. The manipulation of the log list will result in the violation and hampering of the chain of custody in maintaining the digital evidence. Therefore, the investigator needs to create a digital chain of custody for maintain the log list (Reichert, Richards, Yoshigoe, 2014, p-726). This can be achieved with securing at least one computer used for storing the evidences. Furthermore, the investigator needs to use safe and secure laptop and devices for extracting the digital evidences from the crime site. Therefore, for collecting the evidences in the unsecured environment, secure electronic devices needs to be used. It is difficult to re-establish security if the digital data are being modified or tampered with within the organization. For preventing these issues, the investigator needs to secure and address the vulnerabilities present with the forensic organization. Therefore, the organization needs to analyze the security vulnerabilities before investigating the digital evidences. Therefore, the most essential procedure of securing the digital data is to secure the IT infrastructure where the digital data are being stored and analyzed (Valjarevic, Venter, Ingles, 2014, p-7). For protecting the Chain of Custody the digital evidences needs to be protected from the hackers, manipulation and alteration. Apart from that, a log is maintained every time the evidence is transferred or taken out from the organization. Therefore, the digital logs keep a record of the persons and time whenever the digital evidences are transferred and are given access to any persons. Furthermore, the digital evidence is deposited by handing over the devices to the owner. Impact of the Integrity of Evidence on Investigation Process: Integrity of the digital evidence refers to the consistency and accuracy of the digital evidence collected for analysis form the crime scene. The data integrity in the forensic investigation procedure plays a significant role in the processing and analysis if the digital evidence. With the application of the Chain of Custody, the digital forensic investigators required to know the person, time and process of handling the digital information during an investigation process. If the Chain of Custody is compromised or altered the timeline of the evidence processing goes missing that affects the result of the investigation. The digital data are usually stored in hard drives, in the secure computers. The investigators must ensure that the digital evidences remains bit to bit as it was during the collection of the data evidences at the crime site (Bulbul, Yavuzcan, Ozel, 2013, p-251). Therefore, the forensic data analyst ensures that digital evidences when presented at the court remains sa me after bypassing all the examination and procedures, after handing by all the staffs during the evidence processing. The disadvantage of evaluating and working with the digital evidences is that they can be easily accessed and modified without noticing. The integrity of the digital evidence needs to be maintained for protecting the data confidentiality and security of the data (Reichert, Richards, Yoshigoe, 2014, p-728). The methods and procedure for maintaining the integrity of the digital information is costly and requires much modification in the system for CoC. The investigation process deals with the both the systematic tools and techniques and systematic collection of the digital data. The significant objective of the forensic investigation process is to create a focal point among the investigation area such that the investigators could identify the relevant information that are directly or indirectly connected the crime with the evidences acquired. All the forensic evidences rely upon the proper investigation and analysis of the collected digital data (McMillan, Glisson, Bromby, 2013, p-4902). All the collected information required to be checked for cyclic redundancy error and hash code validation so that it cannot be changed or altered by an eternal entity during transmission. Another approach for better transportation of the digital evidences form one place to another in the process of CoC needs to be encrypted with the cryptographic processes (Ariffin, Choo, Slay, 2013, p-45). The digital evidences stored in the database, digital signature needs to be employed for maintaining the integrity of the information in the system. The digital data and evidences have the potential for changing the result of the investigation. The judgment of any case mostly depends on the validity of the evidences presented to support any theory in the courtroom. The presence of digital evidences like video recording, or CCTV footage of the occurrence of the crime has the potential for changing the verdict of the judgment. If the digital evidence is tampered with during the storage, analyzing or presentation of the digital evidence on court, it can change the judgment of the investigation (McMillan, Glisson, Bromby, 2013, p-4907). Therefore, the integrity of the digital evidence means preserving the authenticity and proof of the document and evidence provided in the courtroom. The integrity of the data means, during the investigation, the data is been preserves as it during the collection of the information from the investigation site. Therefore, the integrity of the digital information provides authentication and reliability of the evidences provided in the courtroom and ensures that the evidences presented are in true form and authentic as gathered. Problems and Limitations of CoC: There are several types of issues are related to the digital investigation process which can create a catastrophic impact over COC (Chain of Custody). The different types of circumstances which can affect the entire operation during the process of COC are also described in the context of this analysis. The digital forensic process of COC based investigation is diming with the vulnerability from the both side of investigation process where one side is infected by the victims another threat is come from the investigators side. Maybe this instinct is not the only thing which can harm a COC process. The contradiction between the investigator and the victim is happened in many ways some of them are like as follows - The trust factor among the evidence supplier and the investigator, if the evidence supplier or the victim's loss their faith over the investigator then they might eliminate all evidence which may relate some confidential about himself or herself (Abalenkovs et al., 2012). The victims may accidently erase all the information about the confidential data. This situation is also caused by the investigator by using of improper guidelines during the evidence storage process. Apart from this issue of fault measurement, the information leakage issue is a bigger strike of evidence hampering the process (Reichert, Richards, Yoshigoe, 2014, p-729). The leakage of information can be drawn from an internal factor of whistle blowing or an external entity. The problems do not only lie between the information leakage it will more hamper the entire process if they are broadcast over digital media. The technical factors are more severe than the threat which comes from the operational approach of COC base evidence collection. Technical obstacles are broadly classified into two categories which can be noted as user-defined complexity and other one is system defined complexity. The user-defined complexity can give more hurdles towards the investigator because of its non-structured format of information protection (Ariffin, Choo, Slay, 2013, p-44). The Suspect or victims may be loaded with the highly classified security measurement where the security provider does not exist in real world or identity of security provider is highly classified. In that case the chances of getting information from the digital source are become very low. Whereas the systematic complexity is less tough than the user-defined complexity but the chance of information extraction is also low and it varied from the different deviation of technology integration over the computing devices (Hasan, Mahmood, Ragh av, 2012, p-401). The process of systematic complexity is also divided into third party security module and default system module. In the history of forensic analysis it is been observed that the default security mechanism is easy to analyses because it have low level consent of privacy mechanism. But when it comes to third party security module integration then it is difficult to analyze (Abalenkovs et al., 2012, p-2271). Third party applications are used to provide the better security solution. So it is inconceivable to break the security measurement for a better forensic analysis. The other issue which can restrain the limit of COC based digital forensic application is belongs to the ethical responsibility. The ethical responsibility issue can also create problems due the different types of privacy act, legal settlement and data collection procedure (McMillan, Glisson, Bromby, 2013, p-4908). The ethical responsibility is standing to moralized the human concerns of privacy which also reduce the performance of digital investigation and its standard. Conclusion The development of technology has tremendous effect on our society. Its drive our human race into the new phase of evolution. But the problem comes when the complexity arises. The digital forensic investigation by using of COC creates a new horizon towards the investigation of different type crime scene. The process of COC based investigation is spread out over the different layer of data storage unit, computing unit, mobile device etc. and there are several law and regulations are passed to establish the investigation framework. The collection of the digital evidences and presenting them in after verification of the authenticity and reliability of the evidences has the significant potential to change the verdict of the judgment. With the advancement of technology, the world is supporting more digital evidences in a legal investigation. For providing the digital evidences for investigation and supporting the fact, the digital evidences required to be authenticated on the reliability. One of the best practices followed for the collection, storage and analysis of the digital evidence is Chain of Custody. In change of custody, a series are standardized procedure is followed for the authentication and maintenance of the integrity of the data. The use of the Chain of Custody provides in providing evidential support and proves to the digital data provided as evidences for an investigation. The use of the computer forensic allows gathering, safeguarding and maintenance of the digital information gathered from the investigation sites. Although, the Chain of Custody follows an series of log in and metadata about who, when and where accessed the data, it can be easily be tampered and altered, therefore altering the CoC and timeline of investigation. Most of the cases, the alteration of the CoC has been found as the result of the lack of security in the devices and IT infrastructure of the organization that deals with the storage and analysis of the digital information. Therefore for maintaining the authenticity reliability and integrity of the data and digital information in forensic investigation, the forensic investigators and analyst required to introduces security measures like digital signature, cryptography and secure IT architecture so that the digital evidences cannot be easily modified and tampered. References Abalenkovs, D., Bondarenko, P., Pathapati, V. K., Nordb, A., Piatkivskyi, D., Rekdal, J. E., Ruthven, P. B. (2012).Mobile forensics: Comparison of extraction and analyzing methods of ios and android(pp. 1422-2377), (Doctoral dissertation, Master Thesis, GjAyvik University College). Ajijola, A., Zavarsky, P., Ruhl, R. (2014, December). A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev. 1: 2014 and ISO/IEC 27037: 2012. InInternet Security (WorldCIS), 2014 World Congress on(pp. 66-73). IEEE. Ariffin, A., Choo, K. K. R., Slay, J. (2013, January). Digital camcorder forensics. InProceedings of the Eleventh Australasian Information Security Conference-Volume 138(pp. 39-47). Australian Computer Society, Inc.. Ariffin, A., DOorazio, C., Choo, K. K. R., Slay, J. (2013, September). iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner?. InAvailability, Reliability and Security (ARES), 2013 Eighth International Conference on(pp. 375-382). IEEE. Arora, A. S., Bhatt, S. C., Pant, A. (2012). Forensics computing-technology to combat cybercrime.International journal of advanced research in Computer Science and software Engineering,2(7), 42-64. Bulbul, H. I., Yavuzcan, H. G., Ozel, M. (2013). Digital forensics: an analytical crime scene procedure model (ACSPM).Forensic science international,233(1), 244-256. Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S. (2012, June). Forensics investigation challenges in cloud computing environments. InCyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 190-194). IEEE. De Marco, L., Ferrucci, F., Kechadi, T. (2014). Reference Architecture for a Cloud Forensic Readiness System, 256-646. Dezfoli, F. N., Dehghantanha, A., Mahmoud, R., Sani, N. F. B. M., Daryabar, F. (2013). Digital forensic trends and future.International Journal of Cyber-Security and Digital Forensics (IJCSDF),2(2), 48-76. Elyas, M., Maynard, S. B., Ahmad, A., Lonie, A. (2014). Towards a systemic framework for digital forensic readiness.Journal of Computer Information Systems,54(3), 97-105. Goel, A., Tyagi, A., Agarwal, A. (2012). Smartphone forensic investigation process model.International Journal of Computer Science Security (IJCSS),6(5), 322-341. Hasan, R., Mahmood, S., Raghav, A. (2012, September). Overview on Computer Forensics tools. InControl (CONTROL), 2012 UKACC International Conference on(pp. 400-403). IEEE. Hitchcock, B., Le-Khac, N. A., Scanlon, M. (2016). Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.Digital Investigation,16, S75-S85. Homem, I., Dosis, S., Popov, O. (2013, December). LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. InInternet Security (WorldCIS), 2013 World Congress on(pp. 156-161). IEEE. Ibrahim, N. M., Al-Nemrat, A., Jahankhani, H., Bashroush, R. (2012). Sufficiency of windows event log as evidence in digital forensics. InGlobal Security, Safety and Sustainability e-Democracy(pp. 253-262). Springer Berlin Heidelberg. Lalla, H., Flowerday, S., Sanyamahwe, T., Tarwireyi, P. (2012, January). A log file digital forensic model. InIFIP International Conference on Digital Forensics(pp. 247-259). Springer Berlin Heidelberg. Marangos, N., Rizomiliotis, P., Mitrou, L. (2012, December). Digital forensics in the cloud computing era. In2012 IEEE Globecom Workshops (pp. 775-780). IEEE. McMillan, J. E. R., Glisson, W. B., Bromby, M. (2013, January). Investigating the increase in mobile phone evidence in criminal activities. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 4900-4909). IEEE. Mishra, A. K., Matta, P., Pilli, E. S., Joshi, R. C. (2012, December). Cloud forensics: State-of-the-art and research challenges. InCloud and Services Computing (ISCOS), 2012 International Symposium on(pp. 164-170). IEEE. Nasreldin, M. M., El-Hennawy, M., Aslan, H. K., El-Hennawy, A. (2015). Digital Forensics Evidence Acquisition and Chain of Custody in Cloud Computing.International Journal of Computer Science Issues (IJCSI),12(1), 153. Nelson, B., Phillips, A., Steuart, C. (2014).Guide to computer forensics and investigations. Cengage Learning, 120-286. Pichan, A., Lazarescu, M., Soh, S. T. (2015). Cloud forensics: technical challenges, solutions and comparative analysis.Digital Investigation,13, 38-57. Prayudi, Y., Ashari, A., Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Framework for Handling Digital Chain of Custody.International Journal of Computer Applications,107(9), 56-72. Rajamaki, J., Knuuttila, J. (2013, August). Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement. InIntelligence and Security Informatics Conference (EISIC), 2013 European(pp. 198-203). IEEE. Rani, D.R., Sultana, S.N. Sravani, P.L. (2016). Challenges of Digital Forensics in Cloud Computing Environment.Indian Journal of Science and Technology,9(17), 90-100. Reichert, Z., Richards, K., Yoshigoe, K. (2014, October). Automated forensic data acquisition in the cloud. In2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems(pp. 725-730). IEEE. Saxena, A., Shrivastava, G., Sharma, K. (2012). Forensic investigation in cloud computing environment.The International Journal of forensic computer science,2, 64-74. Shridhar, G. A., Chandrakant, P. R., Baburao, J. (2014). Network/Cyber forensics.International Journal of Computer Science and Management Research (pp. 24-74). https://www. ijcsmr. org/eetecme2013/paper9. pdf 18th November. Shrivastava, A. K., Payal, N., Rastogi, A., Tiwari, A. (2013, September). Digital Forensic Investigation Development Model. InComputational Intelligence and Communication Networks (CICN), 2013 5th International Conference on(pp. 532-535). IEEE. Siegel, J. A., Mirakovits, K. (2015).Forensic science: the basics. (pp. 50-60). CRC Press. Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014, June). Cloud forensics solutions: a review. InInternational Conference on Advanced Information Systems Engineering(pp. 299-309). Springer International Publishing. Stirland, J., Jones, K., Janicke, H., Wu, T. (2014). Developing cyber forensics for SCADA industrial control systems. InThe International Conference on Information Security and Cyber Forensics (InfoSec2014)(pp. 98-111). The Society of Digital Information and Wireless Communication. Taylor, R.W., Fritsch, E.J. Liederbach, J. (2014).Digital crime and digital terrorism. (pp. 245-268), Prentice Hall Press. Valjarevic, A., Venter, H. S., Ingles, M. (2014, August). Towards a prototype for guidance and implementation of a standardized digital forensic investigation process. In2014 Information Security for South Africa(pp. 1-8). IEEE. Wu, T., Disso, J. F. P., Jones, K., Campos, A. (2013, September). Towards a SCADA forensics architecture. InProceedings of the 1st International Symposium on ICS SCADA Cyber Security Research 2013(pp. 12-21). BCS. Yadav, D., Mishra, M., Prakash, S. (2013, September). Mobile Forensics Challenges and Admissibility of Electronic Evidences in India. InComputational Intelligence and Communication Networks (CICN), 2013 5th International Conference on(pp. 237-242). IEEE.
Subscribe to:
Comments (Atom)