Wednesday, October 30, 2019

Discuss the Careers of Teaching and Car Salesman Research Paper

Discuss the Careers of Teaching and Car Salesman - Research Paper Example I do have the panache to learn about the unique features of each model and brand I come across (Witkin 152). Should I be a car salesman, I will definitely be one who is quiet well informed about cars. Every good vocation begins with a deep interest, isn’t it (Bloom 26)? Besides, I am a very authentic talker and I do believe that anybody who comes to me with the intention of buying a car will certainly end up buying one (Andrews 247). I believe that sincerity and frankness are the ultimate credentials that make a good salesman (Shetty & Buehler 63). The other thing is that I am really good with numbers; however I really don’t know whether I will be able to convert my deftness and finesse with numbers into actual sales. One enticing factor is that if I end up being a great car salesman, at a later stage I can start my own car dealership. Pecuniary benefits do constitute an integral component of a great career. Well, one cannot expect to be a premium salesman right from th e start. Or perhaps, considering my astute skills and communication expertise, I can later on move to a career in real estate. Actually, the thing is that the more I ponder about a career in auto sales, the less convinced I feel about joining this profession. I should listen to my heart also. I think a career as a teacher will be the one that will do ample justice to my academic achievements and personal temperament. I do have the dedication to pursue a discipline with sincerity and dedication. One cannot teach what one does not know. In teaching a person needs to be proficient in the subject one teaches (Stronge 66). Besides, I have an academic bent of mind which continually nudges me to build on the understanding of the subjects I like (Aylett 75). Teaching will be a really suitable outlet for such academic dedication and sincerity. The other great personal attribute that supports my choice of teaching as a

Monday, October 28, 2019

The study of history is the study of change over time Essay Example for Free

The study of history is the study of change over time Essay Soils of America and other places of the world speak volumes of the breath taking accords and blood streaming accounts of travelers, explorers, pilgrims, discoverers, traders etc. from several places across Europe cutting across the vagaries of oceans to pay their own way for new avenues and opportunities seemed to be waiting for them. Efforts to make their permanent settlements after their long and arduous journey into the lands of America and other places across oceans bore the testament to the beginning of new profound but â€Å"conflicting† relationships between them and non Europeans which time and again saw several changes. This essay will explore in depth the vicious account of 1620 when Pilgrims dropped their anchor at Plymouth, their efforts to settle in the land previously occupied by Native Indians and their relations with them from the vivid account of Nathaniel Philbrick in his â€Å"Mayflower.† And in comparison to it, the brutalities, atrocities and exploitation of King Leopold II of Belgium on the slaves and other natives of Central Africa in King Leopolds Ghost by Adam Hochschild. Exploitation of slaves in the name of development was the hallmark of the social and political construes of the colonies established by Europeans. Hothschild found that â€Å"The nineteenth century European drive for possessions in Africa, the moral rationalization of the â€Å"civilizing† mission was used to justify colonialism† (Nolan, online), and the biggest example of this moment was the formation of Leopol’s International African Association (IAA) in 1876. This association was the result of the conference held by famous explorers in Brussels. The conference was opened by King Leopold speech, â€Å"To open to civilization the only part of our globe which it has not yet penetrated, to pierce the darkness which hangs over entire peoples, is, I dare say, a crusade worthy of this century of progress.† (Hothschild, 44) The main aim of the conference was the abolishment of Arab slave trade, securing peace among the chiefs, and negotiations justly and impartially, but in contrast to it Leopold assigned Henry Morton Stanley to study and explore interiors of Congo.   He said, â€Å"Im sure if I quite openly charged Stanley with the task of taking possession in my name of some part of Africa, the English will stop me So I think Ill just give Stanley some job of exploration which would offend no one, and will give us the bases and headquarters which we can take over later on.† (Hothschild, 58) He studied in detail the types of colonialism of Dutch East Indies, British form of colonizing of India and Africa. He was greatly inspired by the book   â€Å"Java or How to Manage a Colony, by English lawyer JWB Money†, because it gave him techniques for various forms of exploitations in vast colonies. This made Leopold to establish his position on importance of forced labor, whereby he said, â€Å"Forced labor is the only way to civilize and uplift these indolent and corrupt peoples of the Far East.† (Hothschild, 37) Between the years 1885 to 1908, there were around five to eight million labors under the barbaric rule and terror of Leopold. When Hochschild himself read about these acts of barbarism, he was forced to rebuke at his ignorance of horrors of such a magnitude. From then on the account that Hochschild provided made King Leopold’s Ghost as an articulate historical version of the slavery that would always remain a brutal wound in the heart of history. In introduction only Hochschild said, â€Å"unlike other great predators of history, from Genghis Khan to the Spanish conquistadors, King Leopold II never saw a drop of blood spilt in anger. He never set foot in the Congo. There is something very modern about that, too, as there is about the bomber pilot in the stratosphere, above the clouds, who never hears screams or sees shattered homes or torn flesh.† (Hochschild, 4) As compared to it, â€Å"Mayflower† is a struggle of pilgrims to create place for themselves in Plymouth and maintain cordial relationship with native Americans. It is on one hand tragic and on the other hand heroic and profound. Nathaniel Philbrick gave a live account while on his research for Mayflower of 102 passengers who landed at Prince town harbor in 1620 only to be welcomed by the wilderness of the place and was greeted by future governor William Bradford.   There were very few trees and no man in site, as they were virtually wiped out by the series of plague and when Pilgrims reached there they only found whitened bones of the dead people lying scattered along the shoreline. From this place, Pilgrims decided to settle and began their new life but it was not easy for them. They not only had to face physical challenges but also attitude of contention and bitter animosity from the locals who considered them as strangers. Only Wampanoag chief Massasoit was the person to help them without whom their survival would not have been possible at all. More than half of English settlers died and few that survived observed their first anniversary with Thanksgiving feast. But as and as population of English increased, natives felt more threatened and there arose new kind of wars between the two. In 1675, Philip, son of Massasoit’s struck against the English settlers, which came to be known as King Philip’s war. The effect of war soon began to be felt by English settlers in other parts too and soon more than half of the towns were burned or vacated. The war lasted for fourteen months but was considered as bloodiest than civil war. More than 5000 out of total population of 70,000 were killed, but in the end there was victory of pilgrims. Though never a close bond existed between the English and natives yet they negotiated with each other to maintain peaceful coexistence, but greediness took over the next generation. The day Pilgrims landed at Plymouth to this day is celebrated as Thanksgiving Holy Day as gesture to Native Indians for their help and food that they shared with their ancestors. As soon as pilgrims established their settlements on Plymouth, immigration from other European states began at a much larger scale.   Between the years 1815-1860, 1865-1890 and between 1890-1914, more than five million immigrants especially from English, Irish, Germanic, Scandinavian, and from northwestern Europe had already made their bases in America. And between 1890-1914, 15 million Turkish, Lithuanian, Russian, Jewish, Greek, Italian and Romania came with the lure of the greener pastures. (Schultz, 1999) The direct effect of civilization was the supply cheap labor that gave boost to the economy. With the immigration economic and social conditions of America began to take a new shape and when Industrial revolution began to show signs of promises of better life for all, there was the growth of middle class.   By the end of civil war and 1910, more than 25 million people from as far as Italy, Greece, Poland, Hungary, Russia, Turkey, Lithuania, Romania were associating themselves with rural Americans for jobs and many new opportunities. They brought with them their own varied culture and religious practices and made their presence felt in every arena of social and economic activities and democracy was taken by immigrants in an enthusiastic spirit. K. Schultz said, â€Å"They would often fell into deep emotions and tears fell down their cheeks when they would set their eyes at her. European immigrants would cry with happiness at the thought of escaping autocratic regimes and entering into an egalitarian, democratic society; and those who were evading famines and poverty would weep at the thought of riches and an easy life that they were expecting in store for them. He further said, ‘To all of them, Lady Liberty symbolized a new beginning’†. (Schultz, 1999) By the end of 1990, the population of United States had already touched 75,994,575 mark and despite of restrictions by the Government on immigration processes, settlers had laid their basis in the American soils and intermingled with the contemporary social culture of America. As said by Evert Louhi in 1925, â€Å"American Civilization, and of all civilizations, in the past, today and forever.† (Hoglund, 146) He further stated that, â€Å"Their descendents were the first real Americans.† (Hoglund, 146) On the other side is the grim picture of Africa shown by Adam Hochschild. When America was on a development stage, Africa was being more colonized. When in 1890 there was a rubber boon- result of John Dunlop’s invention of bicycle tyre, Leopard took advantage of the situation and soon occupied vast stretches of rubber lands of Africa and initiated a brutal system of forced labor. Troops would make their entry into the villages, hold children and women hostages to the point of time till men would bring their share of rubber. The extent of the brutality can be clearly reflected in these lines. â€Å"A whip of raw, sun-dried hippopotamus hide, cut into a long sharp-edged cork-screw strip.† (Hochschild, 120) Rape, murder, death and exploitations reduced the population of Congo to half and brought Leopold a fortune of more than $1 billion. Black American evangelist George Shappard, Edward Dene Morel and Roger Casement showed their grave resentment and strived to bring the atrocites of Leopald in front of the world. He got the Congo Protest Resolution passed in the British Parliament in May 1903, still atrocities continued and when Leopold died, he left behind totally devastated Congo. The European and American history is a history of colonizers over colonized and a legacy of temperaments and attitude of Europeans towards their Native neighbors. Both American and Africa culminated into the colonies of the Europeans powers though with slight deviations. In America, Europeans occupied the Native lands and Pilgrims who were the early settlers tried to maintain their relationship with natives though not cordial, but in Africa it was total subjugation of the European powers. Blacks were turned to slaves, caught and brought to America to work on the plantations in America. The legacy of the relationship between Europeans and non-Europeans brought before us one crucial aspect – exploitation in the name of progress and development. Europeans who were considered to be the most civilized societies went on development spree at the cost of other ethnic races belonging to different origins and races. The Oxford English dictionary defined â€Å"Civilization as advanced state of human society† (History Guide, online edition) but when we look at the history of the man as shown by Nathaniel Philbrick, we are raised with the questions, Civilization as in comparison to what? Is it to sow the seeds of barbarism to cultivate civilization? If we look at our history, we will see that the history of world is also the history of immigration-immigration for the lure of greener pastures. The discoveries by anthropologists on the remains of the human beings in the past few decades also revealed the fact that immigration had been a continuous process since centuries –and the basis of the whole relationship between the Europeans and Non Europeans is based on immigration. The immigrants began to feel the alien lands as their own and from there began their scourge journey of life towards exploitation to get richer resources the lands provided. But with the promises of democracy and easy life with dreams of riches, immigrants themselves began to witness numerous hardships in the name of caste, religion, sex and their ethnic origin. The pilgrims who had rooted the deeper roots in America with their toil and blood soon became the land of several races and religions but the Native Americans who were original residents of America were disgruntled lot. They too had to bear the burnt of slavery, subjugation and racism in the name of development. Africa’s picture was different. This place was never able to see the development and economic progress. Its economy was devastated. America was flourishing and Africa was languishing with poor fatigued people and so as other colonies of the world occupied by Europeans. REFERNCE LIST Hochschild, Adam. â€Å"King Leopolds Ghost—A story of greed, terror and heroism in colonial Africa.† Mariner Books, 1998. Hoglund, Arthur William. â€Å"Finnish Immigrants in America, 1880-1920† New Hampshire: Ayer Company, 1979. Nolan, Stuart. Belgiums imperialist rape of Africa. Internet (6 September1999) http://www.wsws.org/articles/1999/sep1999/king-s06_prn.shtml, April 11, 2008. Povell, M. The History of Vietnamese Immigration. American Immigration Law Foundation Internet (Last updated June 2, 2005) Available: http://www.ailf.org/awards/benefit2005/vietnamese_essay.shtml, April 11, 2008. Schultz, S. K. 1999. Foreign Immigrants in Industrial America. Internet. Available: March 30,: http://us.history.wisc.edu/hist102/lectures/lecture08.html, April 11, 2008.

Saturday, October 26, 2019

Earnest J. Gaines A Lesson Before Dying Essay -- Gaines Lesson Before

Earnest J. Gaines' A Lesson Before Dying A Lesson Before Dying, by Ernest J. Gaines is set in a plantation community in rural Louisiana. The two main characters in the novel, Grant and Jefferson, are engaged in a struggle to achieve self-respect in society, which allots them none. The story takes place at the end of the 1940s, a time when Louisiana and many other southern states were practicing segregation. The second college edition of the American Heritage Dictionary defines segregation as, â€Å"†¦The policy and practice of imposing the social separation of races, as in schools, housing, and industry†¦Ã¢â‚¬  (1111). Mr. Gaines employs a variety of settings to illustrate how this cruel practice invades every aspect of Grant and Jefferson’s lives; from religion and legal process to love. In the courtroom, the defense lawyer insinuates that Jefferson is less than a man because of his physical characteristics and apparent lack of intelligence. He asks the jury, â€Å"†¦do you see a man sitting here? Look at the shape of this skull, this face as flat as the palm of my hand†¦do you see a modicum of intelligence?† (7). He further degrades Jefferson by referring to him as a thing, â€Å"What you see here is a thing that acts on command†, and finally as an animal, â€Å"†¦I would just as soon put a hog in the electric chair as this.† (7-8). Evidently, discrimination and stereotyping based on the degree of skin pigmentation exhibited existed as a hierarchy with the lightest skin pigmentation on top and the darkest on the bottom, with the each individual cluster discriminating against the one beneath them. Grant’s former schoolmaster, Mathew Antoine, may have been a male role model for him. However, professor Antoine was bitter, he loathed himself ... ...grained the principles of slavery and its progeny (segregation) were in Louisiana society. It is unfathomable that people (i.e., the Creole) exposed to unjust discrimination based simply on their pigmentation, would in turn discriminate against others for similarly unfounded and irrational reasons. From the courtroom to the jailhouse, Grant and Jefferson faced discrimination. However, when they finally realized that the stereotypes being forced upon them were only physical confinements, not mental or spiritual confinements, they were able to identify their own self-worth and achieve self-respect. â€Å"Only when the mind is free has the body a chance to be free.† (251). Works Cited American Heritage Dictionary. Second College Edition. Boston, MA: Houghton Mifflin Company.1982. Gaines, Ernest J. A Lesson Before Dying. New York, NY: Alfred A. Knopf, Inc.1993.

Thursday, October 24, 2019

Cyber Laws and Cyber Crime

Presented by: Kale Sandeep N. Gaikwad Avinash R. S. E. (Comp) S. E. (I T) E-mail: [email  protected] com E-mail: avi. [email  protected] com Mob: 919970061442 Mob: 919960308551 G H Raisoni Institute of Engineering and Management, Jalgaon (M. S) Index Topics Page No. 1 Abstract 1 2 Introduction 2 3 Cyber crime 2 4 Classification of Cyber crime 2 5 Status of Cyber Crime 6 6 Cyber law 7 7 Cyber Law in India 8 8 Advantages of Cyber Law 9 9 General Suggestions and information 10 0 Suggestions for better security 10 11 Conclusion 11 12 Reference 12 Abstract: Cyber law and cyber crime is becoming an important issue for social and economical concerned. The use of computer, electronic devices and software is increased; the need to protect these devices and software properly is inherently appeared with this. To protect these, it becomes necessary to know about cyber crime and cyber law. Cyber crime is unlawful act in which computer is either tool or target. After development of internet ev ery computer is able access data and information from all over the world. This also lead to the misuse of computer and internet for Crime such as Financial crimes, Cyber pornography, Online gambling, Intellectual Property crimes, Forgery, Cyber Defamation, Cyber stalking, Email spoofing, Email bombing, Denial of Service attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling etc. Now days most of financial and non-financial activities are done with computer and computer related services such as Internet. Also the concept of e-Governance coming in picture, where the confidential document of an organization is process and stored. The need of protection Cyber security resulted into development of cyber law in India and all around the world. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. The paper throw light on the brief types of cyber crime, status of cyber crime and cyber awareness in India, Cyber law in India , Advantages of it in brief. Also this paper suggests the precaution measures and tips for cyber security for the users of computer and internet. 1. Introduction The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B. C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. Today, computers have come a long way, what with neural networks and nano-computing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. 2. Cyber crime At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, cyber crime was broken into two categories and defined thus: 2. 1. Cyber crime in a narrow sense: Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. 2. 2. Cyber crime in a broader sense: Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession offering or distributing information by means of a computer system or network. As per Indian law, Crime has to be voluntary and willful, an act or omission that adversely affects a person or property. A simple definition of cyber crime would be â€Å"unlawful acts wherein the computer is either a tool or a target or both†. 3. Classification of Cyber crime Cyber Crime is classified into 4 major categories as (A) Cyber crime against Individual B) Cyber crime Against Property (C) Cyber crime Against Organization (D) Cyber crime Against Society 3. 1. Against Individuals 3. 1. 1. Email spoofing : A spoofed email is one that appears to originate from one source but actually has been sent from another source. E. g Avinash has an e-mail address [email  protected] com His enemy, Rohan spoofs his e-mail and sends obscene messages to all his acquainta nces. Since the e-mails appear to have originated from Avinash, his friends could take offence and relationships could be spoiled for life. 3. 1. 2. Spamming: Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. 3. 1. 3. Cyber Defamation This occurs when defamation takes place with the help of computers and / or the Internet. E. g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person’s friends. 3. 1. 4. Harassment and Cyber stalking: Cyber Stalking Means following the moves of an individual's activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms, user net groups. The Oxford dictionary defines talking as â€Å"pursuing stealthily†. Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. 3. 2. Against Property: 3. 2. 1. Credit Card Fraud :You simply have to type credit card number into www page of vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. . 2. 2. Intellectual Property crimes: These include Software piracy i. e. illegal copying of programs, distribution of copies of software ,Copyright infringement Trademarks violations ,Theft of computer source code 3. 2. 3. Internettimetheft: The usage of the Internet hours by an unauthorized person which is actually paid by another person. 3. 3. Against Organization 3. 3. 1. UnauthorizedAccessingofComputer: Accessing the computer/network without permission from the owner. This activity is commonly referred to as hacking. The Indian law has, however, given a different connotation to the term hacking, so we will not use the term â€Å"unauthorized access† interchangeably with the term â€Å"hacking†. It can be of 2 forms one is Changing/deleting data i. e. unauthorized change in data and other is Computer voyeur where the criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. 3. 3. 2. Denial Of Service When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. Denial of service attack involves flooding a computer resource with more requests than it can handle. This causes the resource (e. g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. Denial-of-service attacks have had an impressive history having, in the past, brought down website like Amazon CNN, Yahoo and eBay 3. 3. 3 Virusattack A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a possibly evolved copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to. 3. 3. 4. Email Bombing: Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. 3. 3. 5. Salami Attack: When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. 3. 3. 6. Logic Bomb : Its an event dependent program , as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E. g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. . 3. 7. Trojan Horse A Trojan is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. There are many simple ways of installing a Trojan in someone’s computer. The Common Types of Trojan horse are †¢ Remote Administration Trojans (RATs) †¢ Password Trojans †¢ Privileges-Elevating Tr ojans †¢ Destructive Trojans †¢ Joke Programs 3. 3. 8. Data diddling This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. 3. 4. Against Society 3. 4. 1. Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. 3. 4. 2. Cyber Terrorism: It is use of computer resources to intimidate or coerce others. Computer crime has hit mankind with unbelievable severity. Computer viruses, worms, Trojans, denial of service attacks, spoofing attacks and e-frauds have taken the real and virtual worlds by storm. The term â€Å"cyber terrorism† can be defined as â€Å"Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. 3. 4. 3 Web Jacking Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. 4. Status of Cyber Crime Ba ck in 1990, less than 100,000 people were able to log on to the Internet worldwide. Now around 500 million people are using the net around the globe. UK has the largest number of infected computers in the world followed by the US and China. The US is the leading source country for attacks. China is second and Germany is third. 4. 1. In India: i) During 2003, a total of 411 cases were registered under IPC Sections as compared to 738 such cases during 2002 thereby reporting a significant decline of 44 percent in 2003 over 2002. ii) A total of 475 persons were arrested in the country for Cyber Crimes under IPC during 2003. iii) The age-wise profile of the arrested persons showed that 45 percent were in the age-group of 30-45 years, 28. percent of the offenders were in the age-group of 45-60 years and 11 offenders were aged 60 years and above. Above figures doesn't mean that cyber crime is declining in India, the fact is that people in our country do not report cyber crimes for the following reasons: a) They don't want to face harassment by police. b) The fear of bad publicity which could hurt their reputation in society. Also, c) It becomes extremely difficult to convince the police to register any cyber crime, because of lack of awareness about cyber crime and cyber law and also about their registration and handling by the police. A recent survey indicates that for every 500 cyber crime incidents that took place, only 50 are reported to the police and out of that only one is actually registered. These figures indicate how difficult it is to convince the police to register a cyber crime. The establishment of cyber crime cells in different parts of the country was expected to boost cyber crime reporting and prosecution. However, these cells haven't quite kept up with expectations. 5. Cyber law The cyber world has no physical boundaries, no single authority who governs the internet. The Internet is the medium for freely sharing information and opinions; It provides everyone with round the clock access to information, credit and financial services, and shopping. Even network information systems are being adopted by the government worldwide, that's why the governments across the world are recognizing the need to securing & regulating the cyber world. 5. 1. Why Cyber law? When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence there is need for Cyber laws in India. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives. . 2 Who should concern about Cyberlaw? Everyone, Cyber law is of everyone’s concern. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in Cyberspace can and will have a Cyber legal perspective. From the time one register Domain Name, to the time one set up a web site, to the time one promote a website, to the time when one send and receive email, to the time one conduct electronic commerce transactions on the said site, at every point of time, there are various Cyber law issues involved. One may not be bothered about these issues today because one may feel that they are very distant from him/her and that they do not have an impact on Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyber law for your own benefit. 6. Cyber Law In India: Cyber Crimes are a new class of crimes to India. It is rapidly expanding due to extensive use of internet. India is among few countries in the world that have a separate law for cyber crimes. Recently Nepal has passed Bill against Cyber crime. Indian parliament has passed the legislation known as Information Technology Act 2000 drafted by the Ministry of Communication and Information. The Information Technology Act came into force on 17th October, 2000. IT Act amends some of the existing legislation, such as Indian Penal Code,1860 Indian Evidence Act, 1872 Bankers Book Evidence Act. 1891, Reserve Bank of India Act, 1934 6. 1. Features of The IT Act 2000: i)Legal recognition of electronic contracts, digital signature, digital certificates. ii) Various types of cyber crime committed in India and outside India is covered alongwithpenalties. ii) Appointment of Certifying Authorities(CA) to issue digital signature, digital certificates. iv)Controller of Certifying Authorities to act as depository for all Certifying Authorities. v) Appointment of Adjudicating Officer for holding enquiries under this Act. vi) EstablishmentofCyberAppellateTribunal. vii) Cyber Regulations Advisory Committee who will advice the Central Government an d CA. Technology. The act is based on the â€Å"United Nations Commission on International Trade Law†(UNCITRAL) model on electronic commerce. 6. 2. IT Act 2000 does not include: ) Specific Definition of cyber crime is not given.. ii) Intellectual Property Rights such as trade Marks, Patents, Digital Copyright Issues. iii) Domain name disputes and their resolution, Data protection issues are not covered. iv)No provision is made for the Taxation issues arising due to e-commerce 7. Advantages of Cyber Laws The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records. The IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Digital signatures have been given legal validity and sanction in the Act. The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. The Act now allows Government to issue notification on the web thus heralding e-governance. It shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. 8. General Suggestions against cyber crime †¢ Don't delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these. †¢ Try not to panic. †¢ If you feel any immediate physical danger of bodily harm, call your local police. †¢ Avoid getting into huge arguments online during chat or discussions with other users. †¢ Be extremely careful about how you share personal information about yourself online. †¢ Make sure that your ISP and Internet Relay Chart (IRC) network have an acceptable use policy that prohibits cyber-stalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints. If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. †¢ Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet System Administrators or Law Enforcement Officials. 9. Suggestion s for better security †¢ Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. †¢ Make regular back-up of critical data. Back-up must be made atleast once in each day. †¢ Use virus protection software. Checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Use a firewall as a gatekeeper between your computer and the Internet. †¢ Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. †¢ Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. †¢ Regularly download security patches from your software vendors. 10. Conclusion Thus, the awareness of cyber crime and cyber law has become a necessity for persons in cyberspace. The study of cyber crime and its different aspects will be helping to individual in cyberspace to avoid and restrict the cyber crime around them and related to them. Also the study of cyber crime will keep them alert against cyber crime. Absence of Cyber security policy in organization may lead to critical problem for Management to maintain the data security of organization. Recent incidents relating to cyber crime have not just increased the vulnerability of various socio-economic constituents, but also brought forth the need for better managerial and operating capabilities of our legal framework in stopping this growing menace. Cyber law in India is nothing but the outcome of this need. Cyber law will be helpful to control the cases of cyber crime. IT act 2000 has given constitutional support to fight against cyber criminals. This act has also given legal status to e-business, digital signature cause to increase faith in online trading. The number of cases reported is much less than what it is in reality. This is because of unawareness of law. Awareness program on Cyber law and Cyber Crime should undertaken by Social Organisation. The program may include basic information of cyber law, internet security, and minimum hardware and software security measures required for an individual or organisation. Reference: (1) Cyber and Information Technology –Article By Talwant Singh (Judge) (2) Perspective of Cyber crime in India – Kernila Seth (3) Cyber law ,Data Protection in India – Article by Gurpreet Singh (4) www. cuil. com (5) www. cyberlawsindia. net (6) www. cybersmart. in (7) www. indlii. org (8) www. asianlaws. org (9) www. report cyber crime. com (10) www. scribd. com

Wednesday, October 23, 2019

Nature and Importance of the Study Essay

Trisales Business Systems Corporation, built for almost 30 years already, is a company engaged in the business of retailing office equipment. Such equipment range from Photocopying machine, Fax machines, down to smaller ones such as calculators and electronic typewriters. Their main suppliers include big names in the appliance industry including Sharp Philippines, Copier Online, Epyon Corporation, Panasonic and Sanyo. TBSC is a small to medium in size. All in all, the company consist of no more than 50 employees, including the staff and the people in the managerial levels. They cater to a number of clients around the Cebu province. TBSC is located in Ramos St., Cebu City. The main aim of sales and stock inventory system is to hold the inventory records accurately and a healthier sales transactions with their costumers and suppliers. Manual recording is really giving them hard time in going thru further for their business. And because they include big names in the appliance industry with a number of clients around the Cebu province, they need to provide an accurate records of their transactions including their inventory as much as well. They also want to have a more secure business flow, and for a well-organized inventory and transaction records. To necessary avoid chaos when it comes to storing information. They believe that having a healthy system for their company is another way of showing their professionalism in the business industry. Statement of the Problem Below specified are the current problems faced by the Trisales Business System Corporation: i) Time consuming transactions and inventory process Without a system, recording transactions and conducting inventory is one of the most difficult and time-consuming job for their company. Their employees are spending most of his/her time jotting down all transactions for the day. By the end of the month, or whenever the company conducts the inventory of stocks, they have to dig through a whole pile of files to determine the number of sales from the previous workdays, to match it with the results of the inventory. ii) Inaccurate inventory of stocks and sales TBSC nowadays is still using the manual recording of informations and data for their business. This causes their records in transactions and stocks to be misguided, filed inappropriately and cluttered. As result, there is difficulty in retrieving data, making analysis and making adjustments to the records. iii) Unsecured records of data and informations The manual system of recording data in TBSC, to be direct to the point, unsecured. Anytime, it may get lost, edited or faded which is more prone to miscalculations and causing incorrect changes to the records. iv) Stocks outs and excesses of stocks in inventory Shortages in the stock inventory can result in product delays to customers which will reduce their expectations to the company. A poor forecasting in the inventory is also leading them in excesses of stocks that results in additional costs to the organization in storage costs and funds tied up in unused stocks. If the company do not use inventory quickly after purchasing, the business will begin to lose money on the materials just because of their slow and unorganized scheme. Objective of the System The main objective of this study is to obtain answers to the questions stated above. We want to know the problems encountered by TBSC employees with regards to their information storing and accessing. Furthermore, we want to demonstrate how the system focuses on those information can be a determinant to improve customer service in Trisales Business Systems Corporation. A proposed solution to the problem: i) To achieve a hassle-free, time bounded transactions and inventory process for the employees in-charge. That would lessen their time in spending on the process of doing transactions and inventory records. Equals more time for doing other productive tasks and to help create a healthier and more productive environment for TBSC. ii) To determine and to minimize the errors in recording transaction and informations. Since TBSC is a growing company, the system will not only stores data, but also does analysis on day to day company transactions. iii) To secured the company important files and records by having a log-in and password boxes as a gatekeeper. Also to prevent from editing forms and important data such as dates and amounts. iv) To control excesses of stock and to prevent stock outs. The system will function to update and arrange the stocks inventory in the appropriate order to give the precise count of their products to prevent excessing and stock outs in further. Significance of the study To the TBSC and Company The planned system significance is to minimize errors and confusion of the employees in recording. Importantly to organize and to give accurate records of the inventory and transactions, for the company to built-up in the industry. Mostly to give stand and to serve the customer’s wants on further. To the fellow researcher The significance of this system is to give a vivid inner view on how the nature of technology will help our career along the way. To embolden researchers who has the same field as mine. There’s no easy way of having this study but it would be the best ever pleasure when that almost everyone in a company is using your programmed system. To the proponents The significance of this study is to support everyone in the field of technology, and to stretch a bit of my knowledge in this field. This will serves as the proponents guide as they embrace the same field as mine. Importantly to give a healthier deal in the business industry. Scope and Limitations Scope of the project The proposed system generally on the sales and stock inventory of the Trisales Business System Corporation. The system purpose is for the regular transactions and operation of their sales and inventory. The proposed system could minimize the problems stumble upon the company records of important data. These are the scope for the proposed system: i) Can build account Employees could have their accounts, especially the person who’s in charge with the sales transactions and stocks inventory. ii) Accumulating Products Through the system, adding new products for the business is more appropriate. The person in charge would just simply input the asked information to the system example: product id, product description, date delivered, pieces ect. The inputted information for the new product will be stored in the database, and could also easily access by the system. iii) Can manage sales transactions The proposed system can manage sales. For example the client requested for a new office supply/product from TBSC. The system will simply ask the user to input some important data from the client and the system will automatically store it. The stored data and information can be used for further transactions with the client. Limitations Below are the possible limits of the proposed program for Trisales Business System and Corporation: Registration in the system is done only by the administrator or the person in charge. Does not support network and internet topology, or online transactions. Storing of informations is limited, only important and the specified information in the system are allowed Multi-tasking could possibly done, but only for the given system for example; Entering data for the new arrived supplies while having the purchasing transaction. Could go through compatibility issues while installing the system. Because of the programmed used in creating the system. Review of Related Literature Chapter II This chapter will be discussing the findings of related research to this study. It will provide a discussion on the significance of this study to the existing literature. Moreover, this chapter will discuss several issues regarding sales and stock inventory system development and based on the existing literatures. The following discussion chronicles the subject of inventory systems. Theoretical Background The theoretical background is the structure that can hold or support a theory of a research study. The knowledge organization by way of theoretical background has two disciplinary root Related Literature This chapter represents the review on related literature regarding topic about the Sales and Stock Inventory System. Review of Related Literature In exploration, we find new techniques, new knowledge, even develop new substances, gadgets, equipment, processes or procedures, imagination and skill is employed by the researcher. The commodities, new devices, services, in technology are needs of man for a better fuller life which is the concern of the research. These useful arts are the products of the technological environment and the end-user is society in general. The fast growing trend and innovation in technologies today prompts researchers to conduct studies about the efficiency of system program. This Chapter presents a brief review of literature and studies, both local and foreign that is related to these studies.