Wednesday, July 31, 2019

Business Continuity Plan

Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221. Business Continuity Plan Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221.

Tuesday, July 30, 2019

COMPUTERIZED SYSTEM Essay

Systems techniques are tools used in the analysis, design, and documentation of system and subsystem relationships. They are largely graphical (pictorial) in nature.  Systems techniques are used by accountants who do systems work. Documentation includes the following types of tools: Narratives (written descriptions) Flowcharts Diagrams Other written material For this subject, we only need to discuss two (2) of the most common documentation tools: Data flow diagrams Graphical descriptions of the sources and destinations of data. They show: Where data comes from How it flows The processes performed on it Where it goes Include three types: Document flowcharts describe the flow of documents and information between departments or units. System flowcharts describe the relationship between inputs, processing, and outputs for a system. Program flowcharts describe the sequence of logical operations performed in a computer program DATA FLOW DIAGRAMS A data flow diagram (DFD) graphically describes the flow of data within an organization. It is used to: Document existing systems Plan and design new systems There is no black-and-white approach to developing a DFD. Data sources and destinations Appear as squares Represent organizations or individuals that send or receive data used or produced by the system An item can be both a source and a destination Data flows Appear as arrows Represent the flow of data between sources and destinations, processes, and data stores As you probably surmised(GUESS) from the previous slides, if a data flow is two-way, use a bi-directional arrow.If two data elements flow together, then the use of one data flow line is appropriate.

Monday, July 29, 2019

Bill Clinton Profile Research Paper Example | Topics and Well Written Essays - 1000 words

Bill Clinton Profile - Research Paper Example During his tenure, the unemployment rate reduced drastically, the country experienced the lowest inflation rate for over thirty years, the criminal rate dropped significantly in United States America, and the was also reduction on the welfare rolls(Michael and Hugh 26). For the period of his eight years presidency, the country experienced the highest ownership of homes in the country’s history. Bill Clinton also proposed the first ever balanced budget to get a budget superfluous. In celebrating the new millennium, Bill Clinton proposed a concrete national plan to cap racial discrimination in the United States. However, in his term in office, Clinton encountered some severe setbacks which affected his reputation. His superb reputation and outrageous economic prosperity was greatly tarnished by his personal characters in White house (Michael and Hugh 26). The impact of Bill Clinton presidency in the world peace making initiative as well as his effort of enhancing global economic progress has motivated me to go for Bill Clinton profile in this profile paper. The paper will unfold Bill Clinton profile from his young ages up to his highest leadership position in his life history Bill Clinton was born as William Jefferson Blythe on 19th august 1946 in Hope, Arkansas. His father died when he was at the age of three years in a severe road accident. At the age of four years, his mother married a second hand car dealer. At this early stage, Clinton portrayed his concern over religion and racial injustice in United States of America. Young Bill Clinton spent most of his times with his grandfather who taught him on the need for equality between the whites and blacks in USA. At his tender age, Bill Clinton also expressed extraordinary grave attitudes towards religion. In his homestead, Bill Clinton was the only person who was attending church services. His concern over racism and religion during his early ages represented Bill Clinton as a gifted person in the societ y. At his teenage age, Bill Clinton assumed the head of the family role. Bill’s step father was an alcoholic and in most cases he turned violent to his mother. Bill was furious of his father’s acts and in one situation he warned him against battering his mother. Clinton even went further in assisting his mother to divorce through requesting his mother’s attorney to report the abuse of his stepfather. In his high school education, Bill Clinton excelled as a saxophone player and as a student. At this time, he also considered to train as a professional musician. It is during his high school age that Bill Clinton met President John Kennedy in white house in 1960s. This encounter enabled Bill Clinton to enter into public service life. As a scholar, Bill portrayed astonishing performance in the course of his scholarly career. He attended Georgetown University and graduated in 1968. In his university life, Clinton attained the position as an assistant to Senator Fulbri ght William. Bill used this position to earn political experience from one of the most respected and senior politician in United States of America. Fulbright also encouraged Bill to apply for Rhodes scholarship. Bill complied with Fulbright advice and applied for the scholarship. As a result of his application, Clinton was elected as the 63 Rhodes scholars in the entire country. Being a Rhodes Scholar, Clinton studied for two years in Oxford University, England. After his study in Oxford Univers

Sunday, July 28, 2019

Strategic Management and the Health Care Facility Essay

Strategic Management and the Health Care Facility - Essay Example In order to build a template for interview, it was necessary to conduct preliminary research into certain strategic issues which might be present in a variety of health care settings. Two health care professionals identify that the hands of health care workers can spread â€Å"both normal and pathological microorganisms† and is the â€Å"main route of infection spread† (Green-McKenzie and Caruso, 2006, p.57). This led to the development of interview questions dealing with the potential risks of worker-to-patient infection spreads to induce discussion from the participant about this aspect of health care delivery and patient liability.  The Senior Risk Manager advised that these types of problems are present in most health care settings, with the hospital administration continuously having to work within guidelines from multiple regulatory forces (such as the Centers for Disease Control & Prevention). With there always being a risk of transmitting dangerous infections or diseases from worker to patient, part of the risk manager’s role is to procure literature on the subject, coordinate the distribution of alcohol-based hand rubs, and ensure compliance to certain individual staff guidelines on clean health care delivery. In this role, the risk manager also works on various informative programs for community citizens regarding better hygiene in the home and professional environment as part of the hospital’s growing focus on sending the public image of a socially-conscious organization. Thus, at the senior level, it would seem that in-house sanitation and community hygiene and the promotion of better health care are regular concerns and considerations.  It is not only disease transmission concerns at the strategic level which cause concern, it is also the safe and accurate administration of medication to patients. It was identified that there have been several instances of patients receiving incorrect dosages due to illegible documen ts which were translated incorrectly. This represents a problem with physician quality-of-service. As part of this risk assessment, it was decided at this facility that sloppy physician writing was a reality of patient care, thus instead of reprimanding physicians, the hospital installed a new, touch-screen system for patient care. This was designed to improve the communications between physicians and support staff and also ensure that the hospital was reducing its potential liability for accurate medication dosing. â€Å"For many years, medication errors have been a source of serious concern within the health care community† (Skiba, 2006, p.70).

PR 10 Krikorian & Danticat Essay Example | Topics and Well Written Essays - 500 words

PR 10 Krikorian & Danticat - Essay Example An enemy of the state is any individual or party that feels like the United States has not respected their doctrines or principles through the implementation of any of its policies and thus acts negatively upon the citizens, or government officials. Safety through immigration control debates the United States of America is a country that should find it necessary to strengthen its border control patrols and policies in order to counter and decrease future terrorist assaults. According to Krikorian, America is a robust power that could not be defeated by conventional techniques (Davies 489). He also reasons that the state’s novel that is from individuals who realize this situation and immigrate in the county. Afterwards, they are commonly recognized as the â€Å"fourth-generation† rivalry in opposition to us. Personally, I believe that Krikorian has spent an immoderate amount of time on military strategies, enemy concerns and border patrols to the issue. As a result, he has distorted the problems. Krikorian fails to clearly realize who the â€Å"enemy† is and does not mention the faults made by the United States government. Already, a number of critics of his journal have reasoned that his points have backed and remain supporting the issue (Davies 490). In high school, I was a great friend to a classmate of mine who was one of the members of a six-member group and movement. This movement believed that school uniform was a policy that suppressed our rights. As a result, they decided to take action by demonstrating in a way that could greatly catch the attention of the school administration. The group planned to wear blue armbands, neatly a quarter-inch in breadth with no inscription on it on Friday, September 17, 2009. After reports of the plan reached the media, school administrators proclaimed that pupils’ with the armbands would be suspended from school for six

Saturday, July 27, 2019

Freedom of Religion Essay Example | Topics and Well Written Essays - 1250 words

Freedom of Religion - Essay Example Freedom of Religion changed drastic over the years in the Colonies. Before the European came to America they obtained their own religion, but with the coming of the new pioneers and pilgrims a lot changed. In the period of the Religious wars in Europe many went to the new land to seek their religious freedom in America. From 1607 till now many came to build new settlements. Not to build the new perfect church as had happened in the UK (Church of England) but to establish to worship freely. For the Native there was a lot to achieved from this. Since the Spanish and French they where confronted with the force upon them to be baptized as Catholic. Therefor many events happened over the centuries to regain the religious freedom as we know it today. We can find them in the following headings: 1. Native Americans and the European religions; 2. Pilgrims arrive in the Colonies of America; 3. Bill of Rights, the freedom of religion in the First Amendment; 4. Freedom of religion today; ... If you can reconsider the facts it is not short from Genocide. They suffered hard under the strict religious regimes. Tribes where separated, they had no skills to write down their own history and white men to advantage of it. The history written by the white men most of the times makes it difficult to obtain information the religions of the Native Americans. Many of the knowledge is lost. Ruvolo (2008) mentions in his article the Iroquois as one Nation that had A highly intelligent culture, well organized that where living as well in the South Colonies as the North Colonies. Ruvolo (2008) calls them as surpassed in greatness only by the advanced civilizations as the Mayas, Aztecs and the Incas. There religion was based on the High Spirit and evil was not denied. Their rituals contained worship services which occurred in according seasonal periods over the year. The religion saved them from being wiped out because of the similarities. It is a rare sample. 14089 4 Pilgrims arrive in the Colonies of America After the Spanish, the English and the French the first settlers arrived around 1620. A journey taken by the pilgrims in a search for the perfect religion that could indeed satisfy the need of the people. In Europe wars drove the believers other then Catholic to the New World. While Marten Luther had translated the Bible, the Catholic where totally against the knowledge obtained from the translation. Europe tore apart when people could read for themselves. The article of Students from the University of North Carolina (2001) takes us to the first settlers, the Quakers and the Puritans who started the first thirteen Colonies based on their religious beliefs. They wanted to escape persecution yet some of it already

Friday, July 26, 2019

Pablo Picasso as One of the Most Important Figures in Cubism Essay

Pablo Picasso as One of the Most Important Figures in Cubism - Essay Example The paper "Pablo Picasso as One of the Most Important Figures in Cubism" discover an important movement in art history and analyzes some examples of Picasso's painting. The main aim of Picasso was to depict an item as it is seen through several viewpoints independently. This made Picasso and Braque to become friends and later they developed the aspects of cubism together. Largely Picasso’s à ©poque negre, was largely inspired by the African art and this overlapped the first phase in cubism that is known as analytical cubism. It was through the Picasso’s artwork and styles that marked the beginning of abstract art. This made Picasso to reach a place of abstraction in painting that was radical break from the classical dominance of content over form. Therefore the most important aspect of cubism by place is the neglect of form in favor of content. Below is an analysis of one of Picasso’s paintings and comparison with other styles of artistic work during this period for understanding of the actual artistic work. Above is one of the most remarkable paintings of Picasso known as Les Demoiselles d’Avignon 1907. The painting represents a good sample of cubism that uses geometrical work to represent images that the painter wishes to express. The painting signaled a different direction and the painting clearly reflected the aspects of cubism of presenting contents in dimensional views as compared to form as had been the order of artistic work before. According to the VSAVCS the early cubism started from 1907 to 1909.... Largely cubism was based on intellectual experiment and structure as compared to the expression of emotions. This made it more practical to use geometrical shapes in this artistic work a high contrast to other artistic work in this period. In addition VSAVCS (2009) further elaborates that the later period of synthetic cubism lasted between 1912 and1914 and this represented colligated objects into their paintings. This represented the synthetic cubism that as described above portrayed colligated objects into their paintings. Picasso guitar sheet music glass of 1912 Incidentally, according to the 20th Century Art (n,d) the work of Picasso as portrayed above was not restricted to one of the artistic period. For example the above painting has aspects of both Renaissance and baroque properties, and yet does not fit to any of these artistic periods. Corot, Chemin de Sevres, 19th century is a good example of Renaissance artistic work. Bailey (4) argues that most of the artistic work that ar tists have been painting for several centuries either belonged to the renaissance or the Baroque period artistic work. Renaissance work was more elaborate in using light and depth and a well fitting frame that portrayed the aspect of form, where all the elements in the painting fit. Comparing the painting by Picasso with this typical Renaissance painting, the painting has light shades and fits to the frame correctly as required by the Renaissance artistic work. However, the painting has no depth and uses some forms of geometric shape that are not common with Renaissance artistic work. On the other hand, the baroque period was characterized by the use of flowing forms that use dark shapes and that are

Thursday, July 25, 2019

The U.S. National Debt and GDP Growth Rate Assignment

The U.S. National Debt and GDP Growth Rate - Assignment Example Since the recession has hit the economy, around 7.2 million jobs have been lost. In 2008, 3.2 million jobs were lost and the year 2010 has beaten this record. Unemployment has now risen to 10 percent. This is making the economy worse and putting more of deflationary pressure. The additional stimulus that the government is planning to make consists of $200 billion of which only $50 billion will be spent towards job initiatives. (Whitney, M)Â  The inflation rate at the beginning of 2010 stood at 2.6 percent and has gone down to 1.2 percent by October. (Inflation Calculator) In 2009, the GDP growth rate for the economy was negative, 4.9 percent but improved and went up to positive 5 percent by the end of the year. In 2010, the rates fluctuated around 2.5 percent. (Trading Economies)Â  Fiscal and monetary policies are used to serve the economy and help it function in a better manner. These tools have always been used by the US government, but to better help the economy, they need to be adjusted. The government needs to keep a check on the interest rates and the flow of money within the economy. The monetary policy mainly controls the money supply and consists of three tools; discount rates, required reserve ratio, and government securities. The fiscal policy revolves around the interest rates and comprises of; government spending and taxes. (Willingham, P)Â  In my opinion, the government needs to reduce taxes, this will stimulate spending in the economy, which will boost production, which will create jobs and provide people with a higher disposable income. On the other hand, the government can also reduce interest rates which will increase investment, more jobs will be created, people, in general, will have higher spending money, which will further boost the economy and increase production.

Wednesday, July 24, 2019

Statistical Applications in Criminal Justice Course Project Essay

Statistical Applications in Criminal Justice Course Project - Essay Example On the other hand, the standard deviations shows that the scoring on robbery is more dispersed than rape/sexual assault (Howell, 2008). In order to test the relationship between rape and violence, linear regression analysis will be used. This test will be used to establish if there exists any statistical relationship between the two variables, and if it exists, the strength of the model (Lee, 2006). This test is chosen because it is suitable in testing linear relationship between two or more variables. Regression models are also suitable in predicting the value of the dependent valuable using the predictor valuable; therefore, the scoring of robbery can be established in different scoring of rape. The results of the tests are as shown in the spss output below: Based on the results above, it is evident that there is a strong and positive relationship between rape and robbery. The R squired of 0.89 shows that the model rape/sexual assault is a very good predictor of robbery. In other words, the regression model is very good. The p-value is less than 0.05, which means that there is enough evidence to allege that rape/sexual is a predictor of robbery. Since the coefficients are positive, we conclude that the two variables have a positive relationship, which also means that an increase in rape/sex would lead to an increase in robbery (Heiman, 2010). The results from this analysis show that the rate at which rape happens has some implication on the rate at which robbery happens. Therefore, the incidence of rape can be used to predict the incidence of robbery at any given

Tuesday, July 23, 2019

HR Coursework Example | Topics and Well Written Essays - 250 words

HR - Coursework Example Despite the interpersonal relationship associated with face-to-face teams, there is no much difference between virtual teams as long as the essential elements of an effective team are considered and integrated into the team (HCI, 2014). The information gained from the article is of great importance when discussing the effectiveness of teams in the project team. First, the fact that sharing the same physical space does not guarantee the effectiveness of the team is very helpful. Also, comprehending that brainstorming should be done after each has worked on his or her own before sharing their ideas. This situation will help in avoiding wastage of time when burdened with a problem to solve because team members come while prepared. In addition, by learning that teams need to have effective communication and clearly defined roles and responsibilities will help in discussing the saliency of having direction and being objective as a team. Finally, the insight gained on the effectiveness of virtual teams will help in integrating the interests of those who are not able to share the same physical space during group meetings. While some firms are reaping big from the benefits of teams, others are not living up to their potential. For instance, IBM has experienced international success due to the adoption of effective team techniques. Nevertheless, organizations, such as Wal-Mart, can greatly benefit from the information presented in this article, especially the significance of virtual teams and diversity in

Monday, July 22, 2019

Prejudice Intertextuality Essay Example for Free

Prejudice Intertextuality Essay â€Å"Why does he hate me so much? Is it me personally or just what I am? † I have chosen to explore the idea of prejudice (judgments of a person based on race, gender, social class, and religion or group associations. ) These themes are evident in the short film ‘Chinese Whispers’ directed by Neil Paddington and Stuart McKenzie, and in three written texts ‘Noughts and Crosses’ by Malorie Blackman, ‘Patches Hide No Scars’ by Haree Williams and ‘On the Sidewalk Bleeding’ by Evan Hunter. â€Å"I used to comfort myself with the belief that it was only certain individuals and their peculiar notions that spoilt things for the rest of us.  But how many individuals does it take before its not the individuals who are prejudiced but society itself? † ‘Noughts and Crosses’ is a powerfully written, fictional novel about two teenagers Callum (a nought) and Sephy (a cross), who are stuck in a racist dystopia separated only by skin colour. In Malorie Blackman’s imaginative novel the characters are either a â€Å"black dagger bitch† or a â€Å"white blanker bastard. † Callum and Sephy are surrounded by a hierarchy, in which Noughts are considered second-class citizens and forbidden to be together. This disturbed society shows a racial prejudice in which interracial relationships are not allowed and there is favoritism towards the Crosses. â€Å"Youre a Nought and Im a Cross and theres nowhere for us to be, nowhere for us to go where wed be left in peace Thats why I started crying. Thats why I couldnt stop. For all the things we mightve had and all the things were never going to have. † This example shows the desperation of Sephy as she realizes that because of the prejudices of her society she will never be allowed to be with Callum. This film relates back to events in the past in ‘our’ world with issues such as discrimination and the mistreatment of people of a particular race or religion. An example of this is the class-system in America. For many years African-Americans, (like Noughts), were judged by their skin colour and treated as inferior beings. Author Malorie Blackman used specific examples from events in the Black Civil Rights movement in the novel to add impact to her novel. An example used is the pioneering achievements of Robert Peary. Examples like these show that Noughts’ achievements are undervalued or ignored because they have white skin. I strongly believe it is important for children of today to be educated on issues like these to remove all racisim. ‘The Universal Declaration of Human Rights’ states â€Å"all human beings are born free and equal in dignity and rights†¦. Everyone is entitled to all the rights and freedoms set forth in this Declaration, without distinction of any kind, such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. This novel has made me believe in the importance of educating young people on events and issues, like genocide (eg the Rwandan Genocide of 1994, only 18 years ago, where an estimated 7 Tutsi citizens were brutally murdered every minute for 100 days! ) and racism, in order to prevent the future from becoming a place like in ‘Noughts and Crosses’. How are we to learn from the mistakes of mankind if we are never educated on them? â€Å"Dreams of living in a world with no more discrimination, no more prejudice, a fair police force, an equal justice system, equality of education, equality of life, a level playing field † His name is Andy. † This gang related short story â€Å"On the Sidewalk Bleeding† relates to the theme of prejudice by exploring the idea of lost identity through group association. At the exposition of this story, Andy (a member of the ‘Royal’ gang) is stabbed by a rival gang (‘The Guardians’) during a ‘rumble’. The plot then follows Andy’s thought path as he slowly bleeds to death. â€Å"The knife had not been plunged in hatred of Andy. The knife hated only the purple jacket. The jacket was as stupid meaningless thing that was robbing him of his life. † Andy wears a purple silk shirt, a symbol of his membership with the ‘Royals’. In his dying moments Andy comes to the realization that people don’t see him as Andy, a human being, but a member of the ‘Royals’. At the climax of the short story Andy uses his last strength to take off the jacket so that he can be Andy again. â€Å"I want to Andy. † Sadly, just after his death, Andys girlfriend Laura, finds Andy’s dead body and races off to find a police officer. The police officer sees the purple ‘Royal’ jacket next to Andy’s body, the officer then proceeds to say â€Å"A Royal, huh. † This shows that Andy’s efforts to remove himself from the gang have failed as the police officer judges him by the sight of the jacket. The police officer associates Andy as a part of the gang the ‘Royals’ and doesn’t see him as Andy, a sixteen year old boy. This short story by Evan Hunter has shown me how easily a person’s identity can be lost through association and how people can perceive you as a member of a group not an individual because of an item of clothing. â€Å"The world didn’t know he was Andy. † ‘Chinese Whispers’ directed by Stuart McKenzie and Neil Paddington also relates to racial prejudice or judgments based on race before actually meeting a person. The short film â€Å"Chinese Whispers† is based around Wellington teenager Vincent Chan’s struggle to fit in. Vincent confused by the two diverse aspects of his culture. At the beginning of the film Vincent lives in fear of encounters with xenophobic bogans who dislike and harass Vincent because he is Chinese. â€Å"Vincent is ashamed to be Chinese. † Vincent feels pressure to conform to the ‘social norm’ of his age group. He turns his back on his father’s cultural ways and instead joins Swan’s triad gang. Swan offers Vincent an illicit world of reward. Vincent sees this as an opportunity to stand up to xenophobic bogans but by joining the gang Vincent isolates himself from his family. Directors Neil Paddington and Stuart McKenzie use dark, blue lightening in many of the scenes in ‘Chinese Whispers’ to portray the sad, sinister world Vincent is being lured into. This is an effective visual feature because it stresses the consequences of Vincent’s decisions. An example of this is Vincent’s decision to conform to the Triad ways by taking illegal narcotics. Blue lighting is also used when Vincent’s father is sitting in a room lonely and longing for his distant son. This New Zealand film has made me more aware of the Chinese struggles in New Zealand. ‘Chinese Whispers’ has given me deep insight into the Chinese point of view and the pressures they withstand. It has shown me the importance of being accepting of minorities and their differences. Stuart McKenzie’s and Neil Paddington’s film has also shown me how important it is to end xenophobia and prejudices in order to help people like Vincent Chan to make better decisions to keep a balance between their culture and fitting in to society. All men are dangerous brutes, intruders, vagrants. † Haree William’s poem ‘Patches Hide No Scars’ refers to young Maoris, turning their back on the way of their ancestors preferring the â€Å"direction, discipline and orders† of gang life. This New Zealand poem has captured the sad truth about the loss of the Maori culture as the lost youths turn to gang membership in a search to add meaning to their lives. ‘Patches Hide No Scars’ relates to the idea of prejudice by describing the members of Maori gangs as one group, a whole, not a group of individuals. How do we prosecute those already punished? How do we fine those lost in the street of no direction? † Throughout this short text author Haree Williams continually uses words like ‘we’ and ‘those/them’, by doing this the gangs (‘those’) are separated from the rest of society (‘we’). By doing this Maori gangs distance from the rest of New Zealand is emphasized. This poem has raised questions to me: why do these youths find security in the rules and orders of gangs but not the rules and orders of regular jobs or life in the ‘normal’ society? And what is society doing to make the youngsters of the Maori race feel like they do not belong in society? By reading and viewing these texts, ‘Noughts and Crosses’, ‘Chinese Whispers’, â€Å"Patches Hide No Scars’ and ‘On the Sidewalk Bleeding’, I have learnt of the struggles and pressures many people, fictional or not, suffer through due to the prejudices of modern society. â€Å"And just like that, Id been assessed and judged. Nurse Fashoda didnt know the first thing about me but shed taken one look at my face and now she reckoned she knew my whole life story. †

Investigation of Failed States & Democratic Intervention Essay Example for Free

Investigation of Failed States Democratic Intervention Essay Failed states have been an issue in human society for many years. Today there are a total of 177 failed states, which is an all-time high. (Haken) Failed states are not only a terrible situation for the country itself, but for its neighboring countries as well. Some situations are worse than others, but for the most part they all share several factors that classify them as failed states. These factors include a severe economic decline, lack of formal government, deterioration of public services, social disorder, and more. (Haken) Once a country becomes classified as a failed state it is quite difficult for them to fully recover. For this to happen, assistance from allies and neighboring countries is usually necessary. Obviously nobody wants to see a country’s government overrun and its citizens forced into turmoil, but that is unfortunately the way our society operates with radical militant groups such as Al-Qaeda in existence. It has become a global problem and the day may never come when there are no failed states. However, if groups such as Al-Qaeda and the Lord’s Resistance Army (LRA) can be eliminated then these failed states can begin to rebuild themselves and give their citizens the chance to live free, happy lives. An example of a failed state that is making headlines these days is the country of Mali, which is located in Northern Africa. The situation in Mali began over a year ago and has developed into a very serious matter. Much like Libya in 2011, Mali’s government has been overthrown by Islamic militant groups that will do whatever it takes to spread their influence and power. (Larison) The major group behind this invasion is known as Al-Qaeda. As Al-Qaeda forces moved in on Bamako, Mali’s capital, a French military invasion halted them in their tracks. French and Malian forces have now teamed up against â€Å"Al-Qaeda in Islamic Maghreb† (AQIM), which is Al-Qaeda’s militant organization based in Mali. (Larison) The two sides are both ready to battle one another and the situation looks to be headed towards a full-on war. AQIM forces are invading towns and villages while torturing and killing citizens in their path. They are a strong force to be reckoned with and outside help will be needed if Mali is to rid itself of these radicals. This is where neighboring countries become involved. Countries close to Mali, such as Niger, Mauritania, and Algeria, are all looked upon to intervene and to offer aid and/or assistance to the Malians. On top of that, they are forced to live under constant fear and uncertainty of AQIM’s next move(s). Although the United States has no vital economic ties to Mali, some Americans feel obligated to intervene and offer assistance to the French, much like we did in Libya. (Larison) However, the majority of American politicians are against issuing an invasion because all signs point towards an ongoing war similar to those in Iraq and Afghanistan. These two countries experienced this type of situation during the 2000s and Libya did as well in 2011. Libya’s situation was very similar to that of Mali’s current one. Islamic forces invaded and took control and outside help was needed from either neighboring countries or Western forces. Whatever the case may be, many parties were/are involved and too many unnecessary deaths have been recorded already. Going forward we can only hope that the situation in Mali ends up like the ones in Iraq and Libya. The only way this can happen is if the Islamic militant forces are driven out and the country has the opportunity to once again govern itself and eventually prosper. Western intervention has been a major component of global warfare for the last 100 years. From World War I all the way through the Cold War, the United States has always been looked upon to give military assistance to its allies and anyone who holds great importance to our economy. Most recently we’ve gone to war to protect Israel in the Middle East and to aid France in Libya. (Traub) The United States has been involved economically in the Middle East since the late 1980s but became active militarily in 2001 after the 9/11 attacks. We were involved in warfare with Iraq for over a decade and are still at war with Afghanistan. (Traub) Other notable instances of Western military intervention include our involvement in World Wars I and II, the Korean War, the Vietnam War, the Cold War, and many other smaller wars. The United States has clearly played a crucial role in global warfare for a very long time. One major reason for this amount of military activity is the fact that the U.S. is a democracy. Non-democracy governments typically have less involvement in warfare than democratic governments do. This is because autocracies operate under the discretion of less than 20 people and often times only 1 person. Also, under a democracy a presidential order can be overturned by either the citizens or another branch of the government. A democratic leader would most likely order a military invasion if there is an immediate threat to his/her country’s national security or if there is a very significant amount of economic importance involved in the situation. Giving assistance to allies is also a common reason for entering into a war. These have been the main reasons for American involvement in global warfare over the years. America is undoubtedly a military superpower in the eyes of the world and will most likely remain that way for many more years to come. Works Cited Haken, Nate. Interpreting the Arab Spring and Its Effects. Fundforpeace.org. The Fund for Peace, 28 June 2012. Web. 22 Jan. 2013. http://www.fundforpeace.org/global/?q=node/235. Larison, Daniel. In Mali the Domino Theory Is Real. Theamericanconservative.com. The American Conservative, 23 Jan. 2013. Web. 24 Jan. 2013. http://www.theamericanconservative.com/articles/in-mali-the-domino-theory-is-real/. Traub, James. Think Again: Failed States. Foreign Policy Magazine, Aug. 2011. Web. 22 Jan. 2013. http://www.foreignpolicy.com/articles/2011/06/20/think_again_failed_states?page=0,0.

Sunday, July 21, 2019

Theory Of Work Adjustment Management Essay

Theory Of Work Adjustment Management Essay This theory implies that people and their environments interact. This interaction happens because both have needs that have to be satisfied and this often through each other. For people to satisfy the needs of their environments, they will need the right behaviors, flexibility, skills, attitudes, experiences, knowledge and other tools. Satisfaction levels may fluctuate and for environments to satisfy people, they need to provide the right rewards, autonomy, job content, ethics, tools, equipment, etc. For both environment and people to satisfy the other, they need to fulfill each others requirements as much as possible though it is said that the perfect match does not exist and that people and environments evolve and change due to evolving skills, knowledge and factors affecting the environment. For the employer to perceive the employee as satisfactory, there needs to be a skill set match with the job and the organization. The more the employees requirements are met, the more the sati sfaction he will perceive and therefore feel competent and committed. Renà © Dawis, George England and Lloyd Lofquist (1964) propose that in their career, individuals seek to satisfy: Achievement To progress and find maturity in their career. Comfort To work in a safe environment. Status To be recognized for work done and effort provided. Altruism To earn and provide for honestly. Safety To find stability and be able to stay that way for as long as possible. Autonomy To be able to be self sufficient when making decisions and taking actions. Hollands Theory of Vocational Personalities in Work Environment John Holland points out that the probability of career choices determining job satisfaction is high. This theory suggests that people find satisfaction in being with others having the same personality type and it applies to people in job environments. People also seek for careers that fit their personality, morale, beliefs, attitude and skills and where they can make the most out of them. Hollands work implies that there are six personality types and same number and type of environments; Realistic, investigative, artistic, social, enterprising and conventional. Each personality type has particular areas of interest, specifications and requirements. Table 2. Interests by personality type Personality Type Interest Realistic Using hands, tools or machinery. Make, fix, assemble, build thing, etc. Investigative Question, research, investigate, observe, experiment, discover and solve problems, etc Artistic Express themselves using communication; art, words, music, video, drama, etc Social Work with people, inform, educate, coach, treat, help, serve, etc Enterprising Business type, leading, supervising, meeting people, talking, leading, etc Conventional Planning, follow procedures, organizing and accuracy, etc. Linking personality type to the similar environment will produce congruence. It is therefore more likely that success will follow people matching their environment type as they will be more satisfied being compatible and in harmony with their work. Incongruence may bring people to look for more appropriate environments to evolve and find stability Graphic of personality types matched to careers Figure 1. Matching persons with compatible career Source: http://www.careerkey.org/asp/your_personality/hollands-theory-of-career-choice.html Self-concept Theory of Career Development Donald Super (1990) found the link between age, career choices, career decisions and productivity. According to this concept, a persons productivity at work changes continuously during his career. These changes may be attributed to experience, changing work environment, changing personal needs (promotion, better job, recognition, retirement, etc). The self-concept theory is an evolution of Eli Ginzbergs work which has time as a core element that affects a persons perception and thereafter decisions. As time goes a persons needs, experience, perception and maturity change so decisions are calibrated and made accordingly. The life stage developmental framework has been put forward having the following stages: Growth (birth -14yrs) Development of self-concept, attitude, needs and general world of work. Exploration (15 24yrs) Trying out through classes, work, hobbies, uncertain choices and skills development. Establishment (24 44yrs) Entry level skill building and stabilization through work experience. Maintenance (or management) (45-64yrs) Constant tuning process to progress in position. Disengagement (65+yrs) Reduce output, prepare for retirement. Gottfredsons Theory of Circumscription and Compromise Both Gottfredsons (1981, 1996, 2002, 2005) and Donald Supers (1990) theories believe in the importance of self-concept. Self-concept is an individuals perception of the environment in relation to his/her personality. Career satisfaction is believed to arise from the alignment of career with self-concept. Career aspirations start in childhood where one tries to understand who does what in terms of social identity. Stereotypes are formed (gender, social status, prestige, intelligence) and maintained in part due to society and family. By removing barriers that they imposed upon themselves or the society imposed to restrict certain types of jobs which narrowed their career interests, people may find that they have more choices and more room to improve. Original choices were probably biased and some careers were possibly ignored due to lack of information or pervious lack of interest translating into missed opportunities. This study suggests that satisfaction may come with experience, giving a broader view of the career world and by changing jobs. Social Cognitive Career Theory We learn in different ways such as through observation, experience, feedback, etc. Reward and punishment are also inhibitors for learning and moulds for behavior. Learning is a continuous process as the world around us keeps changing. It is important to learn as it provides new data or modifies/updates existing ones that help shape our knowledge, values, behavior, preferences and skills that guide us in our actions. The social cognitive career theory (SCCT) is built and expanded on core constructs from a learning theory; the social cognitive theory (SCT) of Albert Bandura. The central idea is that there is interaction between environmental and individual variables as well as self-efficacy, outcome expectations, and selection objective to predict academic and career choice performance. The SCT recognizes the importance of a persons cognitive processes and mechanisms in channeling incentive and actions. Lent et al. (1994, 1996), explain that performance is affected by and results from the input of self-efficiency, past performance and outcome expectations. Banduras triadic reciprocality concept suggests that a person, the behavior, and the environment are all looped together to create learning in the person. Consequently the social cognitive career theorys triadic reciprocality, is a feedback loop between performance, achievements and behavior. The SCCT acknowledges that components of self-efficacy and outcome expectations predict vocational choice and seek to explain three main questions related to future performance; How do interests in academic and vocational areas develop? How are educational and career related choices made? How are educational and career performance outcomes achieved? Three concepts that affect career decision making process have been identified as self-efficacy, outcome expectations and personal goals (represented in the Social cognitive career theory performance model) ; Self-efficacy is belief in ones own judgment and abilities to thrive in particular situations which result in the way people behave and feel. Outcome expectation is what is generally expected from certain scenarios. Three expected outcomes have been identified as social (support/lack thereof), physical (compensation, rewards, status, recognition, etc) and self (satisfaction and self-fulfillment) (Bandura, 1986). Personal goals are used as guides. The goals which one wishes to achieve within educational/career interests are the goals represented in the performance model. Full-size image (7 K) Figure 2: Social cognitive career theory performance model Career choice tools There exist many tools to help future employees make the appropriate career choice and predict career success and satisfaction: Hollands Strong Interest Inventory The MBTI indicator Online career compatibility tests These tools must only be used to get an overview and those concerned not completely rely on the results because one may get another perspective while in the job. There are also other dimensions that may affect ones experience in a job as is discussed in the form of components leading to job satisfaction/dissatisfaction. High performance work systems Image can carry the horns  and  halo effect of a certain organization. No one wants to be associated to a bad image or reputation therefore organizations must perform whether in the private or public sector. High performance management systems are human resource practices planned to make the most effective use of human assets by aligning best practices (recruitment, selection, performance appraisal, training and development, reward, etc) to achieve maximum output (better skills, knowledge, confidence, maturity, satisfaction, etc). HPWS started in the manufacturing sector and are spreading to other sectors to close gaps between human resources, technologies, and the mission and vision of organizations. This system is supposed to make rigorous use of the elements of employment cycle plan from the very beginning by attracting the finest, hiring the best qualified persons fit for the job, providing appropriate training to gain skills required and enhance motivation by rewarding fitti ngly. HPWS are a combination of steady, consecutive and overlapping best practices, investing in human resources for the organizations own benefits. Table 3. Human Resources Practices Definition Practice Self-directed Work Team Self-sufficient, semi-autonomous work groups, self-regulating work teams or simply teams. The work group (in some cases operating without a supervisor) is responsible for a whole product or service and makes decisions about task assignments and work methods. The team may be responsible for services such as maintenance, purchasing, quality control, and hiring. Employee Problem Solving Groups (Including Quality Circles) Structured employee participation groups in which individuals from a particular work area meet regularly to identify and suggest improvements to work-related problems. The goals of these groups are improved quality and productivity; there are no direct rewards for group activity; group problem solving training is provided; and the groups only power is to suggest changes to management. Job Rotation A planned rotation of workers among different jobs. Total Quality Management Programs Programs that focus on providing customers with error-free products or services through a process of continuous improvement. Gain Sharing Gain sharing plans are based on a formula that shares some portion of gains in productivity, quality, cost-effectiveness, or other performance indicators. The gains are shared in the form of bonuses with all employees in an organization (such as a mill). They typically use employee suggestion committees and they differ from profit sharing and ESOPs in the basis of the formula is some set of local performance measures, not company profits. Examples include Scanlon plan, the Impro share Plan, the Rucker Plan, and various custom-designed plans Employment Security Policy Corporate or Mill Policy designed to prevent layoffs of permanent employees. Pay for Skill Program An alternative to traditional job-based pay that sets pay levels based on how many skills employees have or how many jobs they potentially can do, not on the job they are currently holding. Also called pay for skills, pay for knowledge, and competency-based pay. Profit-Sharing/Bonus Program A bonus plan that shares some portion of mill or corporation profits with employees. It does not include dividend sharing. Removal of Shift Supervisors/Delayering Elimination of a level of management (including shift supervisor) Source: http://www.paperage.com/issues/july_aug2007/07_2007work_systems.pd Psychological contract The public sector has many levels of hierarchy and this may be contributing to psychological contracts being unclear or lost. Contrary to legal contracts, psychological contracts are not written down; they are mutual, unspoken agreements or acknowledgement between the employee and the employer/management (Rousseau and Tijoriwala, 1998). Psychological contracts being un-discussed are sometimes hard to understand; Where to draw the line and what are included in the contract may stretch in complexity and be problematic as those concerned may be after their own interests which is described by Rousseau (1995) as the agreement is in the eye of the beholder. Psychological contracts are important to study as they deal with elements such as remuneration, work conditions, rights and have the potential to motivate, balance commitment and the contrary as well (Schein, 1978). Being higher in the hierarchy, employers have the upper hand and they can use this to promote a climate of people-building instead of people-using for the organizations benefit (Guest and Conway, 2002). Chapter 4: Literature review To err is human but to err within the work place, what are/can be the repercussions? Theories of job satisfaction may have inspired HRM which believes in managing work and people towards desired ends (Boxall et al, 2007). Many researchers have over decades carried out studies on job satisfaction and its components and have noticed the importance of job satisfaction on a variety of organizational variables (Chu et al., 2003). Organizations can achieve efficiency through properly managed assets. Along with capital, work methods, capabilities, knowledge, organizational processes, information, firm attributes and knowledge, human resource is an important contributor to the smooth running of an organization (Daft, 1983). Without motivated human resource, organizations will be unproductive even if they have all necessary production materials. This proves how important human resources are. Human resource management has humanized the work place providing workers better treatment and acknowledging that people must be treated decently so that they give their maximum to their organization. The Harvard model of HRM devised by Beer et al sees workers as resources that cannot be managed in the same manner as other resources of the organization. Morale is often defined as being equivalent to job satisfaction (Guion, 1958). Locke (1976) defined job satisfaction as the positive emotional state resulting from appraisal of ones job. Job satisfaction describes the feelings, outlooks or preferences of employees towards their work (Chen, 2011). Job satisfaction is expressed by positive/favorable attitudes consequently dissatisfaction by negative/unfavorable attitudes with which employees view their occupation and both the internal and external environment of the organization can be the cause. Sousa-Poza and Sousa-Poza imply that job satisfaction is determined by the balance between inputs (education, working, time, and effort) and out puts (wages, recognition, importance, fringe benefits, status, task importance and intrinsic aspects of the job). Cognitive Component An individuals perceptions, opinion, beliefs and expectations regarding the organization are the focus of his or her cognitions. Reward. Individuals develop expectations regarding their pay through negotiations, comparison to others, and promises made. Satisfaction is increased when these salary expectations are met. Likewise individuals develop an expected timetable for advancement. The extent to which these timetables are met also influences the individuals cognitive evaluation. Managerial. Satisfaction with ones boss is a function of how he or she meets your mental model (expectations) of how a leader should behave. (See Leadership Behavior) Task. The extent to which ones assigned task and responsibilities meet role expectations is the major determinant of an individuals cognitive assessment of his or her job. Work designs that include variables such as autonomy, responsibility and tak identity tend to lead to high levels of satisfaction with work because they allow for challenge which when met, lead to validation of important skills and competencies. Social Inducement System. How coworkers behave relative to your expectations of them and how they help or hinder your job performance is the basis of the cognitive appraisal of this inducement system. The corrections service has an undeniably important place in the criminal justice system and society (Goodstein MacKenzie, 1989). The MPS has over 900 officers working to provide services under the care of the Prime ministers office and a terrible service would negatively impact the PMO. As hypothesized, by concepts of job satisfaction, unhappy workers would mean less commitment to the job, downplaying the abilities of the decision makers. Ineffective public organizations have very often paid high prices for their negligence in the form of compensation which is an unfortunate loss for the tax payers. It goes without saying that public organizations have to assume the responsibilities vested in them. As far as the wellbeing of prisoners are concerned, there are countless human rights organizations in existence, enough to make the MPS toe the line but is it at the cost of good job content for prisons officers and senior prisons officers? Previous Research; Job satisfaction Economists, psychologists and career counselors all have an increasing interest in job satisfaction which is a vast and engaging subject. Many theories have tried to explain the when, how and why of job satisfaction. There are many factors that can influence job satisfaction and previous research can be used as guidelines but must not be an excuse to stereotype similar organizations, variables and results. Job satisfaction measures a number of factors some of which are subjective and psychological. Others are objective such as work conditions, the management, the organizations rules and regulations and the like. Figure : Determinants of job satisfaction Source: http://www.uri.edu/research/lrc/scholl/webnotes/Satisfaction.htm S.P. Robbins (1997) refers to job satisfaction as the difference between the amount of rewards employees receive and the amount they believe they should receive which can be in monetary or non-monetary terms. The notion of job satisfaction has emerged with contributing factors namely nature of the work, relation with coworkers, promotion opportunities, present pay and supervision (Stephen P Robbins, 1997) and immediate working conditions (John W. Newstrom and Keith Davis, 1996). Porter and Lawler (1972) through their research, identify job satisfaction as one-dimensional where, someone is usually either satisfied or dissatisfied with his/her job. Many other researchers disagree with this ideology, for instance Smith, Kendall and Hulin argue the contrary where job satisfaction is multidimensional as each employee may perceive different levels of satisfaction and dissatisfaction which can arise from each facet of ones job for example the pay, job content, supervisor, work environment, relations with co-workers, training, autonomy, management style, health facilities, relations with supervisor, procedural justice, tangible aids, office tools, participation in decisions, support of management, fringe benefits, promotion, etc. Reward does not need to be in monetary terms as explained by Ackerlof Kranton (2003) where psychic reward can be generated from the employees self-esteem and this confirms the theory that job satisfaction is multi-dimensional. Through their findings, Gagnà © Deci (2005) argue that employees autonomy, backed by managerial support, positively affect both job satisfaction and job performance. Pathik and Pestonjee (1997) found that work environment has influence on job satisfaction of employees and that politics-free work environment is significantly correlated to job satisfaction. Holmes (1997) contributes to the job satisfaction theories; finding that decentralization of authority affects job satisfaction levels. He also found employees  with  stock  ownerships and as such shared incentives including profit sharing, provided job satisfaction. Chapman (1998) states that a worker working as a team, experiences better job satisfaction compared to those working solo. It is apparent that there is a positive link between employees job satisfaction and welfare programs including maternity leave, benefits, transport allowance, bonus, medical allowance, etc (Bonner, 1997). Applebums (1997) study links job con tent in terms of variety, complexity and independence to job satisfaction. Clark (1999) found that current salary does not positively impact job satisfaction but increments over a period of time do. Opportunity for promotion and career advancement provide employees with a positive view of their work and organization (Schneider, Gunnarson, Wheeler, 1992). Clark (1997) and Golden Wiens-Tuers (2006) found that workload had a strong relationship with job satisfaction where excessive work load led to job dissatisfaction. Education level has been found to affect job satisfaction in many different ways depending on the other factors it is measured against such as age, job and pay (Sousa-Poza Sousa-Poza, 2000, Skalli et al. 2007). In Kalleberg and Loscocco (1983) findings, older workers in the USA feel higher satisfaction than younger ones. Shapiro and Sterns (1975) USA study shows a difference in the perception of job satisfaction between professional males and females with male employe es having higher job satisfaction. Organizational commitment results in better performance, less absenteeism and turnover claim Mowday, Porter and Steers (1982). Spector (1985) found motivation and quality performance emanating from satisfied employees resulting in less quits behavior and absenteeism. Theories of job satisfaction 2.2.1 Maslows Hierarchy of needs People behave in certain ways because they are motivated by certain factors (Arnold et al, 1991). People have needs and Maslows hierarchy of needs suggests that people will feel unfulfilled until those needs are met. Unsatisfied needs motivate people and the motivating factor is gone when the needs are mostly satisfied consequently the person automatically moves on to fulfill the next need and so on. Maslows hierarchy of needs developed by Abraham Maslow is a model consisting of five levels of needs to be satisfied, starting from the lower level where the most basic needs are to be met to the upper level where one finds self-actualisation. According to Maslows theory, in the management context, employee motivation can be addressed through an understanding of the physiological needs, safety needs, social needs, esteem needs and self-actualization needs in the employment context by addressing issues such as: minimum wages, number and length lunch breaks, rest time, health and safety, pension schemes, job security, social events, team building, work recognition and appreciation, training and development and promotion schemes.