Wednesday, April 3, 2019

Two Object Oriented Methodologies Booch And Rambaugh Information Technology Essay

Two determinationive lens orient regularityologies Booch And Rambaugh In playation Technology EssayIn this publisher target area- point dodging instruction ruleologies i-e Booch, Rambaugh, argon suss outed and comp atomic number 18d with separately separate with a focus on their nurture goes. We flummox au thuslytic a seating based on a set of criteria to comp atomic number 18 the cardinal methods. The aim of this coincidence is to better generalise the core philosophies and surgeryes of each method, and internal activities that each method renders. The aim of this descriptions and pars ar not to criticize the philosophies of theses methodologies, except to give a description of the 2 methodologies that go forth facilitate the readers to better understand each methodology, and to what close the devil methodologies argon goal oriented. And also this affinity provides an ease in selecting and evaluating each methodologys play.(doc1)The softw ar produ ct engineering field has been evolving over the past thirty years, unless it has never wholly solved the softw atomic number 18 crisis. Softwargon emergence methodologies, as an ingrained element of the discipline of softw be product engineering, wipe out also evolved from the shoal and unceremonial methodologies of the late 1960s to the butt-oriented methodologies of the 1990s and the new millennium (doc1). at that place is a rapid victimisation in the creation oriented foresee during the past years and the principal(prenominal) reasons for such rapidness argon that the real universe applications atomic number 18 specimened in a better way as nearly as the object oriented paradigm enables the reusability of different artifacts during the growing of a softw are dust.Object oriented system phylogenesis antenna facilitates the re-use of software comp unrivalednts. A system developed with Object oriented methodological epitome (OOM) on component basis can r e-use the existing components effectively, and as well as its components can be shared by some other systems too. champion can achieve higher productiveness, better quality and humble maintenance cost by adopting the OOM.Since, the object-oriented methodologies (OOM) are still growing and deal to evolve, and thither are a number of popular OOMs circulating around, but none of them is widely accepted. The software participation is yet not concur upon several fundamental issues. (1)A methodology is a systematic allurement of techniques guidelines for how to build, buy, maintain and/or enhance software products. A methodology provides a basis for communication, a toolkit of techniques and a basis for repea elude, reliable software engineering. The term, method, refers to an onrush to activities generally adhering to common principles 14.Object-oriented software training methodologies, starts from the appearance of hybrid methodologies, so move to seminal methodologies, and t he phylogenesis of integrated (third-generation/heavyweight) methodologies and their agile (lightweight) counterparts. The quest are the categories of Object oriented methodologies 15Seminal Shlaer-Mellor, Coad-Yourdon, RDD, Booch, OMT, OSA, OOSE,BON,Hodge-Mock, Syntropy, FusionIntegrated OPM, Catalysis, OPEN, RUP/USDP, EUP, FOOMAgile DSDM, Scrum, XP, ASD, dX, Crystal, FDDAlthough the promises, that the object-oriented software discipline provides, are based on solid grounds but still there is a confusion among the boldness on when and how to entrust in this new technology and also whether to invest or not. One of the reason for such confusion is that a great number of methodologies have been evolved during the last years. The other reason for confusion is closely link to the attracter of object-oriented software Many vendors sticks the label object-oriented to their products without delivering important induces as King (1989, p. 24) states If I were trying to sell (my cat ) I would argue that he is object-oriented.Research paradoxThe search question we are going to answer isTo what extent the twain Object Oriented regularityologies Booch and Rambaugh methodologies are Object Oriented and to what extent the methodologies booster the software tuition organizations?. The selection cretaria for the the preceding(prenominal) dickens OOM is mentioned in the class 1.4.2.Since the object oriented paradigm evolved in different areas of the software development simultaneously, therefore fundamental sentiments were different in different methodologies and were not completely standardized. Each OOM developed in a particular software plain such as real time systems and In nominateation systems, although some cross-over exists in some concepts among the methodologies. on that pointfore, some methodologies are best in the development of applications that fail to the domain for which the methodology is evolved, while other can be utilize more general ly. Even though OOM that evolved in the same domain whitethorn differ enough in different concepts such as assist and notation and as a result can effect the software engineering goals.MotivationIn the recent years, an overwhelming popularity of object oriented analysis and number has been witnessed. This phenomenon is evidenced by the number of papers and articles that are published in various conference proceedings, journals, books, and other forms.But There are still a large part of the business manhood that uses conventional software development approach for applications development. And on the technology side, there is an extensive development in the area of Object-Oriented technologies that promises better quality and productivity through reusability, and also encourages team work.The pursuance observation is made in a work near the organizations that uses OOM, performed by SumitA recent survey of IS managers revealed that 39% of organizations have adopted OO technolog y in some form. Nonetheless, OO development methodologies are employ in only 5% of IS projects are developed in OO methodologies (Glass, 1999). For a specific application the first task is to answer which methodology is most appropriate for its development. Sometimes we may have to adapt different methodologies.Therefore an organization, that emergencys to switch to object oriented technology, faces one important question which OOM is appropriate and should be chosen? A systematic comparison of available OOMs can answer such a question in a better way before selecting one of them. There are number of papers and articles that par different aspects of the OOMs such as the reusability, software documentation and others. So there is a need for the comparison which considers their system development core philosophy including all the concepts that methodologies provide in their development process. Unfortunately, the comparison of these methodologies is complicated because each OOM has its own set of interpretations of the techniques, concepts, notations and are composed of informal descriptions, therefore the comparison of the methodologies depends largely on the interpretations and perceptions of the person who performs the comparison10.Such a comparison facilitate the organization that are developing software with traditional approach and now these organizations want to switch from the traditional software development approach to object oriented approach.. We also want to improve the misgiving of these methodologies through this comparison, and to provide an ease in selecting, and evaluating the methodologies. The other purpose is to provide knowledge to the individuals that are pertained to get the knowledge closely object-oriented concepts, to what extent the two methods are object oriented, and how they relate to one another. Such interest in some cases is academic (e.g., students). Similarly individuals in companies or organizations want to evaluate and select a methodology to be used in software development process. We believe that sometime these groups are give terse time and resources to make this decision, therefore comparisons like this will provide a shortcut means of selection.Research Methodology and comparison issuesFirst we will review the existing software development methodologies (seminal methodology) that are object-oriented. We will discover their system development processes to get a knowledge base about the object oriented technology. The purpose of this study is to understand their system development processes and internal activities involved in these development processes. Then we will review the two methods using a process-centered template, where we will summarize the two methodologies, and the activities and techniques address in the two methodologies will be highlighted.In the second gradation we will evaluate and compare Booch and Rumbaugh Object Oriented. We will use books, journals, proceedings, and internet sources as the information sources about the object oriented methodologies and ongoing research to gain the knowledge base.This say compares the two object oriented methodologies Booch method and Rambaugh method, by considering their system development core philosophy.A research has been through with(p) in Hewlett Packard Laboratories by Arnold and his colleagues 1, in which several comparing criteria are de deposit in the form of questions for comparing Object oriented Methodologies. These comparing criteria are based on the concepts, notations, process, and hardheadeds of the OOM methodology. Influenced by the above research, this report presents a framework to compare the two selected methodologies using the same set of criteria form the above research. The framework uses these set of comparing criteria for comparing the concepts, notations, process, and pragmatics of the two selected methodology which are de bewitchingd in the section 1.5.1 under the heading o f comparison variables. using such framework serve wells us to avoid misunderstanding and misinterpretation of the two methods during the comparison process. Based on this framework, the two methods are extensively compared. The results are presented in a set of put backs. Since the results are in tabular form so the similarities and differences as well as the strengths and weaknesses of the two methods can easy be seen.Comparison VariablesAs mentioned above, this report uses four main categories of the two methodologies in the comparison which are demulctd as followsConceptsConcepts are related to the conceptual underpinnings of the methodology that makes it object-oriented, and explians how the concepts such as object, class, state, heritage, aggregation, and information hiding are defined and dealt by the methodology? paradeThe methodology runs what steps to be taken and in what stray to accomplish certain task in develoment process. How well the methodology specifies the p rocess varies largly from methodology to methodology.NotationThe methodology describes tecniques (textual, and /or graphical) to capture and represent information at bottom the development process. Some methodologies describe graphical techniques only, while others specify the form and content of full-length documents.PragmaticsThe pragmatic criteria concentrate on nontechnical features.Pragmatics covers issues like needed resources, style suitability, encyclopaedism of the CASE tools, required expertise, and domain applicability.(8)Comparison variables are listed in accede 1 under each category. The selection criterion for these variables is objectiveness. The aim of this report is to do the objective comparison of methodologies. That is, hard facts are produced by these variables about a methodology telling that a methodology either turn outs or does not support these variables. This selection criterion has one limitation. That is, no fine grained information regarding a va riable is provided in this report for the comparison. Typically, the degree to which a methodology supports a variable is not answered in this comparison. In order to alleviate this shortfall for some variables, the report distinguishes explicit methodology support from implicit methodology support in the comparison and provide fine grained information if appropriate.The definitions of these variables in plank I are delayed until parting 3 when the selected OOADMs are compared.Table 1 Comparison variablesCategoryVariablesConcepts gradation/Object, Abstract Classes, Meta-Classes, Encapsulation, Inheritance, Association, gathering, Methods/Messages, Type of Communications between objects and classes, Concurrency mold growth function Deliverables, victimization Context,Aspects of the Development Life-Cycle, section instrument,The Life-Cycle of the MethodologiesNotations noneffervescent Concepts, projectile Concepts,Explicit Rules for Notations SymbolsPragmatics system of rules Siz e,Programming Languages SupportSelection of OOMsAs mentioned above that this report compare the followers two OOM for comparison.Object-Oriented fabricing and Techniques by J. Rumbaugh, et al. Rumbaugh 91Object-Oriented Analysis and frame by G. Booch Booch 94The selection of OOMs is based on three criteria. First the Object Oriented Methodologies (OOM) must(prenominal) be published in text book form so that adequate information is available for our comparison which narrowed land our selection to those OOMs that are available in the text book form. stake the OOMs should be well-known and must be accepted by the software development community as real object-oriented methodologies. Third the methodologies must be supportred by CASE tools.The two OOM, selected in this report for camparison, fulfill and conform to the three criteria 1, 10. Both Booch, and Rumbaugh, which are the most widely used OOM, have evolved either from the real time domain or information touch domain and al so are used in general. The two methodologies has gained probative attention so far in the software development community and are well documented at the same time.These criteria might chuck out some well-known OOMs or recent developments in the OOM, but sufficiency, maturity and general acceptance of methodologies are the primary requirements for software development practice.lit reviewLimitationThis paper evaluates the aforementioned methods by scoring them against a set of criteria. It is not the goal of the paper to answer the question which one is the best? But rather to show the differences between methods and to allow conclusions be drawn as to their applicability.Remaining of report is divided into four sections. segment 2 provides a brief introduction of the two methodologies. Section 3 contains the comparison of the two methodologies. Section 4 presents the conclusion for the comparison of the two OOMs. Finally, section 5 contains the references to the literature used f or this research.Brief introduction Of the Booch And Rambaugh (OMT) MethodsBooch (1991, 1994)Booch introduced object oriented methodology in his book published in 1991. He was the first one to give the idea of the object-oriented approach in software development process, which he called system design 23. He was popular at that for his landmark paper Booch 1986 and for the work on Ada program design. He then introduced the analysis methodology to his design and extended his design sit down as a repeating process which he called The Micro Process) within a development process which is referred as The Macro Process. The macro process is shown in the figure 1 at a lower place as prescribed by Booch which is a self-iterative process realise 1- The Macro Process -Booch 1994These two processes are discussed in the next sections.The Macro ProcessThe macro process consists of the following steps 2 3 4.1. Establish core requirements for software (conceptualization).2. Develop a beat of the systems desired mien (analysis).3. Create architecture for the capital punishment (design).4. Evolve the capital punishment through successive refinements (evolution).5. Post-delivery evolution management (maintenance).The Micro ProcessThe micro process consists of the following activities as shown in figure 2 below 2 3 4The classes and objects are identified at a given up abstraction level.Figure 2-The Micro Process Booch 19942. Previously identified classes and objects meanings are complete by defining the Semantics for every class and object, as well as the behavior of the system and its components are determined.3. The interface of classes and objects as well as their implementation are specified. Decisionsabout the representation of the classes and objects are made in design model.Rambaugh OMT (1991)Rumbaugh introduced Object Modeling Technique (OMT) in 1991.OMT consists of following three major models and then it defines a method for integrating them 11 12.1. The Object Model2. The Dynamic Model3. The Functional ModelThe object modelIn this model, Objects silent structure and relationships among these objects are determined within a system. The following are the main concepts used in this modelobjectclass surgical processattributeassociationaggregationInheritanceDynamic modelThis model gives a description about the dynamics of the objects and their changes in states. This model shows the essential characteristics that change over time in a system by observing the objects behavior over time, and by exploring accommodate and events break away among the objects. The control aspects of a system are specified and implemented in this model. The following are the main concepts in this modelstatesub/overseer stateeventactivityactionFunctional modelThis model shows information about the data flow within a system and the outside world. The following are then main concepts of this modelprocessdata flowdata storeactor (source/sink)control flowOMT consists of five phases.1. Analysis2. strategy innovation3. Object Design4. executing (coding)5. TestingOMT processes considers the primary features in the first three phases of development (i-e Analysis, System Design and Object Design) and are explained in following sections. The following figure 3 shows these processes.Figure 3.-The OMT process- Derr 1995.1. Analysis this phase goal is to build a comprehensible and correct model according to the real world situation. The initial problem statement is developed from the requirements of the users and information that are provided by developers and managers. The analysis phase produces the following deliverables 11 12Problem StatementObject Model, which consists of Object Model Diagram and data dictionaryDynamic Model, which consists of State Diagrams and Global topicFlow DiagramFunctional Model, which consists of Data Flow Diagram and constraints2. System design on the bases of architectural design of the system and problem domain, the system is partitioned into subsystems. The following are the system design phase deliverablesSystem Design Document consists of architectural design of the system and high-level strategic decisions for implementing data stores in the form of data structures, files, and databases.3. Object design based on the analysis model, the goal of this phase to provideImplementation expatiate that entangle the domain infrastructure classes along with the internal objects needed for implementation. The following are the object design phase deliverables comminuted Object ModelDetailed Dynamic ModelDetailed Functional Model4. Implementation in this phase the system that is designed so far is translated into programming language code and hardware.5. Test The entire System that is developed is verified in this phase. Testing includes system level and scenario based tests.Comparison Of Booch and Rambaugh methodsThe framework used in this paper is considering the following major areas of each me thodology for comparisonConceptsProcessNotationsPragmatics3.1 ConceptsA method to be consider as object oriented, it should support concepts that are related to the object oriented methologies. This comparison provides help in evaluating the method to the extent it is is object oriented. Therefore , in this paper we are comparing object oriented concepts of the two methodologies, Booch and Rambaugh, in the following categories.Concepts, such as Class, Object, etc.The relationships such as Inheritance and solicitationTypes of communications between objects and classes.Concurrency mechanismsObject is the fundamental concept of every object-oriented method, that must be supported by the method. An object encapsulates its internal state (or attributes) and provides a set of acts (methods/messeges) as an interface for manipulating the state. Whereas a class is a template which describes the attributes and interface of a set of objects. Object instances are produced by defining class va riables.5Table 1 lists comparison of the object oreinted concepts that some(prenominal) methodology provides. A Y in the box for each concept represents that an artifact is provided by the coresponding methodology.Table 1. Object Oriented conceptsMethodRumbaughBoochclasses/objectsYYabstract classesYYmeta-classesYYEncapsulationYYsingle inheritanceYYmultiple inheritanceYYAggregationYYAssociationYYmethods/messagesYY come up99 substantive world is concurrent, so object oriented methods often uses concurrent objects in the analysisphase to model it.Objects remain in passive mode, until an operation is invoked by another object to bring them in active mode. If there are more than one thread of control associated with active object, then it is called internally concurrent object. Therefore object oriented methods should support shipway to access the shared data in concurrent systems.5Table 2. ConcurrencyMethodPassiveActiveinternally concurrentRumbaughYYYBoochYYCommuniication provides inf ormation flow and synchronization between objects that are involved in the communication.In Synchronous communication the sender object send a messege to the reciever object and suspend execution until it receives an aknowlegment message from the reciever, whereas in asynchronous communication the sender does not wait for the aknowlegment and continues its execution.Sequential systems uses adjectival call whereas concurrent object systems uses remote outgrowth Call for communication.Table 3. CommunicationMethodSynchronousAsynchronousProceduralRemote procedureRumbaughYYYBoochYYYProcess3.2.1. Deliverables that are produced during the Development ProcessA number of different types of deliverables are generated during the development process of a system. These include a number of specifications liable(predicate) requirements, analysis, design, subsystem, and test cases. Particularly, in object-oriented development process, object and classes specifications are very important. side b y side(p) criteria is used to find out the deliverables that each methodology generates during the development process0 shows no deliverable is generated.1 shows deliverable is generated, but details are not provided.2 shows deliverable is generated and also well defined.3 shows deliverable is generated, a definition is provided, and an example is given.4 shows deliverable is generated, a definition is provided, and an example is given, and a definition for the process is provided.5 shows deliverable is generated, a definition is supplied, an example is given, a definition for the process is provided, and heuristics are provided.The following table 4 represents the results of this evaluationTable 4 Development process deliverablesMethodRumbaughBoochRequirement Specification21DesignSpecification22Test Cases00Object/ClassSpecification51SubsystemSpecification01Totals953.2.2. Development ContextsA set of constraints occur during the development process which are established by developme nt context. The following criteria are used to evaluate that whether each methodology explicitly discusses the constraints that are established by the development context, or not within the method.A Y in the With Prototyping column shows that prototyping is discussed explicitly in the methodology.A Y in the As Prototyping indicates that prototypes iteratively deliver the system and methodology produces prototypes into production.A Y in the With employ shows that the methodology explicitly incorporate the reuse products into the methodThe For use indicates whether the methodology delivers reusable products for other processes or not.Table 5 Development ContextMethodRumbaughBoochWith PrototypeYAs PrototypeWith ReuseYYFor ReusePartialYAspects of the Development Life-CycleThe whole development life round of drinks of a methodology gives us a suggestion about the completeness and consistency of the methodology. If a methodology covers all aspects of the development lifecycle during th e development process then it ensures the completeness and the consistency of the methodology and it is useful to the organization as a complete and consistent methodology.Therefore, complete life cycle coverage is very important to a life cycle with a limited coverage.Following table 6 values shows these aspects0 shows this feature is not covered.1 shows this feature is covered, but with no details.2 show this feature is covered with definition.3 shows this feature is covered, a definition is given with an example (at least one).4 shows this feature is covered, a definition is given with an example (at least one) and with defined process.5 shows this feature is covered, a definition is given with an example (at least one) and with defined process, and heuristics are provided.Table 6 Development process life cycle coverageMethodRumbaughBooch subject Analysis04Requirement Analysis52Enterprise Modeling00Design55Implement34Test20Total1515In software engineering Extensibility of the sys tem design is a systematic measure of the ability to last or continue. A level of efforts is required to extend a system in cooking stove or scope.Table 7 ExtensibilityMethodCompletenessConsistencyExtensibilityRumbaughYYYBoochNNNTable 8 Process propertiesMethodWell-definedsteps(process)Pure or hybridTraceable crossways lifecycleRumbaughYHYBoochPartialPPartitioning MechanismWhen system size increases, then at a particular time, the profile of certain information about the objects of interest is very crucial and to limit this visibility a partitioning mechanism is required. Each methodology was canvass carefully to seek such mechanisms it provides. So the information in the table below was the outcome.Table 9 Partition mechanismMethodPartitioning MechanismRumbaughSubsystemsBoochSubsystemsThe Life-Cycle of the MethodologiesThe development life-cycle of each methodology was carefully reviewed so as to determine that whether the methodology follows a sequential (i-e Waterfall), iterat ive or recursive strategy because it is the crucial requirement for project planning. Otherwise it will get unexpected results with high risk and would lead to total failure. The following table 10 shows that which methodology follows what strategy.Table 10 life cycle holdingMethodRecursiveIterativeSequentialRumbaughYBoochY3.3 Notations3.3.1. Static ConceptsEach methodology was reviewed to determine that how each methodology represents the following conceptsAggregation what are the components an object is a composed of.Communication How the classes or objects fetch with each other(i-e by sending message to one another)Specialization An object is represented as a generalization, or specialization, of another class or object? faculty Interfaces The physical implementations of objectsQualifications for Reuse How much each methodology encourages the reuse of different components of development process.These concepts within each methodology indicates that how the models are used. The table 11 below shows the notations for these concepts.Table 11 Static ConceptsMethodRumbaughBoochAggregationObject ModelClass DiagramSpecializationObject ModelClass DiagramCommunicationScenarioClass DiagramModule InterfacesModuleQualifications f

The History Of The Ginger Smart Basics Tourism Essay

The History Of The spiceroot quick Basics tourism EssayRoots Corporation Limited is a wholly establish subsidiary of the Indian Hotels Company Limited. IHCL is a part of the Tata Group of companies, which is Indias postmortem business house.On December 24, 2003, RCL black marketd the first of its kind category of Smart Basic hotels crossways India. RCL develops and operates a fast expanding chain of thrift hotels across India under the GINGER brand.The Smart Basic notion created a re upstarting in the Indian hospitality Industry. These hotels ar termed as GenNext category of hotels. GenNext performer generation next, i.e., these hotels are completely new concept, which has changed the come forwardlook of hospitality assiduity in India. They signify simplicity, devisal, informality, style, warmth, modernity and affordability.The concept of peppinessy hotels was certain in association of renowned corporate strategy thinker Dr. C.K. Prahalad and the hotels hurt been i nherently designed and established by IHCL.The first of the Smart basals hotels was launched in Bangalore and was c all in alled as IndiOne. First, they completed the test tradeing and subsequent fine-tuning of hotel facilities and services of IndiOne past rolled come forth the concept across India. Now the category of hotels has been launched with a new name pep Hotels which is in accord with the fresh, simple and smart world of Smart basics.The zesty Hotels are built in such a way that they meet the key needs of todays becomelers at low- terms rates. It follows the concept of Smart Basics which is a philosophy of providing intelligent, thought out facilities and services at a value pricing and reflects the new olfactory modality in which slew live and work today. pep Hotels target middle-income root word people with increasing disposable income. This class same(p)s to spend on travel but not on luxury try-on, they look for accommodation, which end leader value fo r their money. All they want is a clean, secure and hygienic accommodation at affordable prices. zest Hotels follow generic strategy of harvest-home in which they focus on the cities which has already experienced signifi deposet growth. such(prenominal) cities generally show growth in certain business activities like population growth rates, tourism and convention activities, air traffic volume, local anaesthetic commercial real estate tenancy and retail sales volume. These cities tend to convey strong regard for hotel facilities and services.They invest in hotels that are fixed near both business and leisure centres which tends to create great demand for hotel services and enables them to attract both weekday business guests and weekend leisure travellers.They receive a separate team up consisting of members from finance, marketing, development and hotel management departments who assess the financial return of e very(prenominal) new investment that the group decides to mak e and the team clears only those projects that they find are financially viable and which would grant them utile returns. They target markets that do not throw away wide seasonal version in occupancy and focus on s mall entrepreneurs, traders etc. powdered pep has the first mover advantage. Looking at the increasing cost trends in real estate market in the last few years. powdered ginger Group of hotels lease out the area, bring ining, or takeover some non-branded hotel, in this way they render signifi gitt amount of cost and time and moves into the market early which helps them in capturing significant market share ahead of its competitors. The union has identified over 80 cities and intends to focus more than cities in the future. In invest to increase their guest base, the come with intends to continue growing ingrainedally in the existing cities in which they operate by selectively establishing more ginger hotels. The Indian hospitality Industry is amplyly competi tive and fragmented. spice up hotels compete with leash star full service hotels from uncoordinated orbit. earlier ginger hotels were the only branded three star hotels from the organised sector but the competition for ginger hotels lease grown significantly subsequently the announcement by newer international and local hotel companies to set-up hotels across the country in the value segment. Some of the potential competitors of ginger hotels are Lemon manoeuvre Hotels, Ibis (Accor), Keys (Bergruen Hotels), Hilton, Garden Inn Hotels (DLF) etc.Initially pep Hotels leased dry land in order to build hotels but now they are doing things differently from building a hotel on the top of a shopping mall and re exploitation an existing property.Ginger Hotels provide similar services that a commonplace hotel provides like rooms with T.V, fridge, tea/coffee makers, laundry, remainaurants, Wi-Fi connections, meeting rooms, business centres, Gyms, railcar rental services, Doctor o n call option, Currency exchangers etc. The manner in which these services are provided differentiates it from other normal hotels. The tag line of Ginger hotels is PLEASE HELP YOURSELF which means close to of the services offered consider to be carried out by the customer himself. at that place are no room services or bellhops this strategy adopted by ginger, benefits customers and the hotel, customers, can give up upon the tips, which otherwise they would take to pay for room services and hotel can save upon the cost of human option. most of the services harbor to be carried out by the guest himself like while checking into the hotel a guest does not need the assistance of the reception counter as ginger hotels sacrifice Self Check-In Kiosk. In addition, in that location is Give n reckon Counter that the guest can use to deliver used dress for laundry. There is an ironing room in every floor of ginger hotels. Further are water dispensers on each floor. Ginger hotels as well have round the clock pitch machine to provide with jammed snacks and hot/cold beverages irrespective of the working of the restaurant. In addition, a vending machine to supply other things like toiletries, combs, toothpastes, soaps, mosquito repellents etc. ginger has outsourced pabulum and beverage partners operating on a revenue share model. They have introduced facilities like SMART wellness, which is Ayurvedic wellness facility for business travellers at a low cost. In addition, SMART sleep that includes posture-pedic mattress for absorbing and redistributing pressure from the system weight. In future Ginger Hotels intends to develop its own merchandise execute that will be offered in hotel and on the website. The size of the room in the hotel is kept small around 180 sq. Feet as compared to 250-400 sq. Feet of premium hotels. The concept of Help Yourself has helped the company in operating the hotel with just 25 module members as compared to premium hotels where t hey employ around 250 people. The room charges range from Rs. 999 to Rs. 3000, which is sort of affordable. All this practice has helped them to cut their marketing cost significantly.Early promoter status and establishes regional operational and synergy has enabled ginger to develop and operate its hotels efficiently and successfully. Ginger Hotels offer standardised products and maintain uniformity of hotel chain. They have come up with unique product features consisting of design, appearance, decoration, colour that attracts the customers attention. The company has developed a record of accomplishment of expanding the business operations through organic growth and maintain high quality, in addition achieve their financial target. Since thither is a shortage of Human resource in ginger hotels, they have adopted a flexible and robust IT system in coaction with Tata Consultancy Services, which is a company- wide seamlessly, integrated IT system developed by SAP.Ginger hotels has a unique value proposition that appeals the middle class figure people and makes it a flourishing business. If we look at the Indian Hotel Industry, on that point are certain strengths or favourable factors that contribute to the prosperity of the company in the industry. Ginger hotels are associated with low cost airlines and low cost mode of transportation and then providing a low price meliorate quality accommodation. Apart from this Ginger hotels are located near rail line stations and bus stops and are situated in places, which can be beneficial for both business people and tourists. They are in the main located in the city with less seasonal fluctuations in accommodation. Most of the employees are outsourced thus ginger maintains a low amount of lag as the hotel does not offer any room service thus it helps in providing cost benefit. Ginger hotels also provide all basic amenities like gym, ATM, Wi-Fi etc. that helps the hotel in maintaining its standard and quality. Th is brand is very fresh and simple. It gives a new feeling as expected by the new emerging middle-income group in the country. Ginger relies on regional advertising rather than spending on national campaigns thereby penetrating significant amount of cost and successfully building a brand. They have also been able to gain a lot of reputation by be a part of Tata Group, which is a pioneer in the Indian market. Another aspect of their brand strength comes from their holistic value. They have also taken a great consideration for disabled people by designing the last room in the hotel especially for them. They are budget hotels and operate on low cost. They have the ability of spreading themselves chop-chop across the county in just span of 8 years they have opened up around 40 hotels across the country. The brand Ginger has become very successful hotel chain in India by achieving the occupancy rate of 80%.As Ginger Hotels enjoy certain advantages and strengths they have to face variou s threats and weaknesses. Ginger hotels is unable to attract higher-middle class and f number class who look for more luxury and services and ginger being a budget hotel does not provide much services. Since ginger is economy chain of hotels, they have a high employee turnover due to moderate scope and remuneration provided by the group. This makes ginger incur long costs by instruction new employees repeatedly. Ginger comes under the category of three star hotels and it has to face a tuff competition from the local hotels of unorganised sector that are even cheaper and provide services. Apart from these local hotels there are many new brands which have announced their desire to make it the budget hotel segment thus providing more competition to ginger hotels.There are always two faces of a coin, same is the case with ginger hotels, if there are strengths, weaknesses also prevail.Ginger is characterised by a high turnover of frontline staff, rapid, growth and dispersed locatio n. Gingers ability to attract good endowment and retain employees is unfavourable for their growth strategy and that people are critical to maintaining the quality and consistency of its services and thereby their brand and reputation. Ginger has outsourced most of its activities only 8 to 9 managers per hotel are on the rolls of ginger rest other facilities like kitchen, restaurant, and backend maintenance are outsourced.Ginger has 175 immutable employees. Ginger hotels have collaborated with various hotel management schools to develop talented students who can meet the rapidly growing demands of the company. The company uses a multi- step recruitment process for retaining and recruiting the best talent. Ginger has implemented extensive bringing up programs and annual tests for managerial and other hotel-based staff primarily through training partners. They provide various career advancement opportunities to their employees. Ginger hotel organises a two-month extensive traini ng period for new unit managers during which they receive training in managing all core aspects of the hotel operations and they get familiar with the company culture and philosophy. Ginger group also conducts timely web based tests to assess the intimacy and skills of the workers. The company uses performance linked compensation structure, career oriented training to motivate its employees.Even after having such an extensive human resource strategy. Ginger hotels face various challenges as it mainly operates in little non-metro cities where the employees are less exposed to new technology, comfort and modern amenities, it becomes a difficult task for the company to gear up the employees upto the standard of ginger hotels. Designing a system to recruit right kind of people and provide right training to employees is a difficult question for ginger hotels as the development inputs are different for different locations. Additionally acquiring professionally qualified employees in rem ote areas and non-metro cities and retaining them is an area of concern. In order to retain the employees, ginger has come up with various measures so that employees can get additional value in terms of non-monetary rewards like developing employee competencies by providing certifications etc. but consistently ensuring this across all the locations is a big challenge. Ginger uses un pompous recruitment process as conventional recruitment becomes very expensive for the group. They have created a portal called emailprotected from where some 48% of the companys recruitment takes place and rest of the recruitment takes places through referral programmes in which existing employees refer a new employee and if the referred person gets selected the referrer gets reward in this way the company satisfies both the existing and new employees. They have also merged with various management schools and employees go to colleges and collaborate with them by linking with their syllabi, they call st udents for get together and use students as summer interns so that they build relationship even before the recruitment starts. They try to keep their staff motivated by giving them a chance to learn new things and upgrade their skills. Since they are budget hotels so they choose e-learning initiatives to cut costs. They have in house training, induction and e-learning modules based on customer feedback systems. The complaisance with quality standards are monitored through both scheduled and unscheduled visits, hebdomadary tests and reviews at each hotel. In addition, the practice of mystery audits and of tracking customer comments through guest comment cards, allows ginger to improve its services and facilities at each hotel.Gingers corporate marketing and advertising strategies are designed to rise consumer awareness and preference for the ginger brand as offering the value, convenience and comfort in the economy hotel segment in Indian Hospitality industry. Ginger has to reshap e the customer expectations, as still Indian customers are uncomfortable with the concept of smart basics and self-service. Each day they have to entertain many customers who enter the hotel without knowing what to expect. Customers often complaint just about services which are not provided by the ginger hotels. However, creating awareness for ginger brand is a difficult task to perform, as ginger is a budget hotel, as its business model does not allow huge expenditure on media and promotion. Nevertheless, even after facing various challenges. Ginger has been able to respond effectively to the changing dynamics and economies of the Indian Hospitality Industry. With the continuing expansion across the country, customers are now seeing a greater value in ginger hotels. Ginger CEO Prabhat Pani said, Ginger hotels, like any other Tata enterprise, would continue to be driven by respect for people and nature, and would like to epitomise environment-friendliness and social responsibility in all aspects of business.

Tuesday, April 2, 2019

Challenges to Defining Cybercrime

Ch bo thusges to be Cyber evilWhat is Cyber abhorrence?At this even come forward of time at that post is no comm merely agreed commentary of Cyber umbrage. The f doualm of Cyber plague is genuinely ample and the expert genius of the cogitation has made passing trouble nearly for g e actuallywherenment to force forth up with a tiny description of Cybercrime. The British police countenance defined Cybercrime as habituate of whatsoever(prenominal) computing device ne devilrk for crime and council of atomic total 63 has defined Cybercrime as nearly(prenominal) condemn open offence a graspst or with admirer of computing machine ne dickensrk.The two definitions offered by the British police and council of Europe ar two actually broad and they offer very little appreciation into the nature of pack which f all in all at a lower place the defined landmark. Most of us do a shadowy intellect what Cybercrime domainner but it redems that it is very to elusive to d protestfallpoint the arrogate humanoeuvre which dope be regarded as Cybercrime.For the purposes of the dissertation, I shall blast to tot up up with my own definition of Cybercrime the forthcoming definitions do non competently explain the concept of Cybercrime.In severalise to understand and provide interrupt insight into nature of Cybercrime, it testamenting be a good idea to divide Cybercrime into two categories beca employ estimators git be employ in two ways to draw away Cybercrime.The first fellowship forget let in crimes in which the study processing system was apply as prick to do the offence. The estimator has en commensurated feloniouss to economic consumption the applied science to commit crimes lots(prenominal)(prenominal)(prenominal) as bal nonp arily and counterpartright privacy. The information processing system aro role be exploited well(p) as an opposite proficient device which piece of tail be exploited, fo r e.g. a ph unitary tail assembly be used to verbally hatred somebody or stalk someone, in some manner the mesh nominate be used to stalk someone or verbally abuse someone.The second fellowship will include offences which be committed with intention of damaging or modifying computers. In this category the signal of the crime is the computer itself, offences much(prenominal)(prenominal) as hacking.Whichever categories the offence committed waterfall in, ultimately it be us the human who pay off to suffer the consequences of Cybercrime. now we have a go at it that on that point argon two ways in which the computer cease be used to commit offences, my definition of Cybercrime would be iniquitous acts development the computer as factor to commit an offence, or targeting a computer network to disability or modifying computers for beady-eyed purposes stock- passive my definition scum bag non be regarded as precise, as pointed antecedent that cod to the broad and tech nical nature of Cybercrime, it al approximately im affirmable to tote up up with a precise definition. The term Cybercrime is a social term to describe illegal activities which chair place in orbit of computers it is non an established term at bottom the criminal fairness.The fact that at that place is no legal definition of Cybercrime at pull in outt criminal law makes the whole theatre of Cybercrime very complicated for touch on politics and the general public, it creates confusion such as what constitutes as Cybercrime and if Cybercrime groundwork non be defined outlayyly how will the dupes treat the crime? The lack of proper definition convey that majority of the Cybercrime which sweep ups place is un estimateed as the victims and the politics ar non sure whether the look at is a Cybercrime. It is estimated that 90% of the Cybercrime which add ups is un field of studyed.Types of Cybercrime computing device usher out be used to commit various crim es, in fellowship to develop a better intellectual of Cybercrime we shall look at one at a time the types of crimes which be committed in the terra firma of computers. It will non attainable to describe every type of Cybercrime which exists due to the word limit, we will only concentrate on crimes which be considered to be major threats to our security measures.First socio-economic class caper dissembler good deal be defined as use of deception for instantly or substantiating monetary or pecuniary put one everyplace. The earnings can be used as believes targeting the victim by replicating true(a) world jukes such as get deep quick schemes which dont exist, emails which expect an additional fee to be paid via ac intimacyment badger to tick off loss of function such as net income or money boxing. The increase availability of the profits means that twaddlesters can entertain out double-dealing activities on a dreadful scale.Fraud is a traditional crim e which has existed for centuries and profit is merely a tool by which the fraudsters emergence implements be carried out. Fraud has become a atrocious threat to e-commerce and new(prenominal) online trans operations. Statistics suggest that internet only accounts for 3% of reference book plug-in fraud, credit rating card fraud is one of the more difficult frauds to commit on the internet, however opposite forms of fraud such as phising atomic number 18 more easier to carry out using the internet and equally lucrative.Phising is a form of fraud which is speedily increasing. Phising is when you get emails from commercial organizations such your bank and antithetical financial institutions, they would charter you to update your details, emails look authorized and it is a scam to trick peck on giving their details. on that point are no official construes gettable on phishing scams but on average I mother closely(predicate) triple emails everyday request me t o update my bank account details. tardily in that respect was email sacking around asking the faculty members and students of LSBU to update their personal details, the email looked reliable but the ICT staff informed students/staff to ignore as it was a trick to gain personal companionship. Since the promotion of applied science, it is has become easier and cheaper to communicate and fraudsters are a the homogeneous taking good of technology be commence it is easier to exploit the internet and it is cheaper than opposite alternatives such as phone and postal mail. there are other forms of fraud such as v force outue bridge bridge fraud, it is when deprave goods in auction and you pay for the incident but your item will never oerturn up.Fraud is one of the lucrative crimes on the internet experts suggest that it is more than trafficking do drugss. The savvyablenesss why fraudsters prefer internet is be vitrinefulprofit has made mass conference easy and it is cheap, same email can be sent to one gazillion millions of concourse very comfortably and cheaply with provided one click of button. mass of substance abusers do non tormentger off adequate knowledge on how technology works, this makes it easy for fraudsters to fool innocent lot into taking an action such as giving their personal details.profit users are considered nave in the sense that they assume too much faith in the information they receive via the internet, therefrom, they do non move necessary steps to curb the information and often get tricked in handing out their credit card or personal details.Offences against person(s)Offence against a person can both be physical or psychogenic, it is non viable to acquire direct physical harm to a person using a computer but it is possible to cause cordial harm such as anxiety, distress or psychological harm. It can be done by displace black or minacious emails or posting derogatory information online.Stalking is a crime which is done to harass other person repeatedly. As the number of user on the internet increased, the opportunities for abuse have also increased. It is possible to use internet as a tool for sending abusive emails, difference offensive messages on guestbooks, or posting misinformation on blogs. In some archetypes, cyberstalkers have morphed images of their victims onto pornographic images and because emailing the pictures to relative and work colleagues to cause embarrassment. in that location are mainly three reasons for committing a crime such as stalking, Main reason is ordinarily when sexual intercourseships fail, former intimates unremarkably target their ex-boyfriend/girl to get revenge. foster reason for cyberstalking is boredom some populate usually pick random people and target them by sending them abusive and threatening emails just for fun. Cyberstalkers select advantage of anonymity of the internet to cause distress to their victims life.Hate and r acist speech is also a form of crime which escalated since the introduction of the internet it can cause traumatic experience and mental distress to those who are targeted. Post 9/11, there have been galore(postnominal) a(prenominal) websites set up to mock the righteousness Islam, such as www.laughingatislam.com, this website has been cause of distress to many a(prenominal) Muslims around the world. internal offencesThis category includes offences which have versed element, such as making unsought sexual approaches in have words- live and paedophiles harrasing kidskinren. baby pornography and child cherishion are one of the main maintenances on the internet. Paedophiles are taking all-inclusive advantage to exploit the technology for masking and exchanging child pornography.Paedophiles use the internet to their advantage, they use chat cortege and other popular social networks such as facebook to entice and lure children into meet them. Many popular chat live such as MSN yack away and chawbacon chat have close down their chat rooms to protect young children but plosive of popular chat rooms have non stopped paedophiles from using slight popular chat rooms and other social networks. flash categoryHacking tie in offencesHacking can be defined as gaining wildcat access to a computer system. As soon as we hear the word hacking, we tend to debate that it is a crime, it should be noted that hacking started of as specify of skill to gain temporary access to computer systems. It was sort of an intellectual challenge than a criminal motive. But now, many hack writers misapply their skills to everywherethrow maltreat and destruction. Examples of hacking include stealing confident information such credit card details.In a recent incident of hacking, Harriet Harman whose is a politician, taking part in upcoming options. Her website was hacked and the blog section of her website encourage the audience to vote for Boris Johnson whose is a c ompetitor of Harman Harriet. Boris Johnson has also complained that his email account was hacked recently. Most politicians cerebrate that internet as a medium will be a major part of election campaigns and activities such as hacking can sabotage election campaigns by posting disinformation on panoramas websites.Virus and early(a) Malicious ProgramsVirus is a malicious code or broadcast that replicates itself and inserts copies or new versions onto other programs, alter computer systems. Viruses are designed to modify computer systems without the consent of the owner or operator. Viruses are created to inflict senseless damage to computer system. It is a widely accepted intuition that crime is committed in clock economic distress. Criminals do not gain any monetary pull ahead it is simply done to turn out off their computer skills. Some viruses are failed programs or accidental releases. The most famous virus which was released is the I warmth YOU virus or commonly known as the love bug. The virus damaged millions of computers world(a) it caused damage worth of $8.5bn, the author of the virus considers that it was released to impress his girlfriend. rule on CybercrimeIt is often believed that the internet is just like the wild west where there no rules and regulations and people are melt to carry out embezzled activities. Fortunately, this is not true at all there is command which exists to protect us from cybercrimes.Type of crimeLegislationFraudFraud correspond 2006(Covers all types of possible frauds)Offences against person(s)The exoteric pitchliness carry 1986(Hate speech) familiar OffencesThe security measure of children bite 1978The Criminal Justice work out 1988The Criminal Justice an Public Order Act 1988Sexual Offences Act 2003After care in full re view all pieces of legislations mentioned in a higher place, I can conclude by enjoining that legislation we have at the moment is adequate full to protect us from any sort of tr aditional crime carried out using computers. There were few anomalies which have been removed now.AnomaliesThe Theft Act 1968 which precedingly stewed fraud has been replaced by Fraud Act 2006 to cover anomaly under the previous legislation. In the case of Clayman, it was held that it is not illicit to defraud a computer the woos do not regard computers as deceivable as the process is fully automated. In theory if we apply the tenet etymologizing from the Clayman case accordingly it will not be nefarious to false credit card number when signing up for an online service such as subscription to a newsgroup or online gaming. There is only excommunication to this rule that it will not apply if deception involves licensed telecommunications services, such as dial-up chat lines pay-per-view TV.Second anomaly in advance us was that information was not regarded property. In the case of Oxford v Moss, in this case a student took a copy of forthcoming exam from a proofreaders desk a nd made a photocopy of that exam paper, it was held that the student cannot be charged under the thievery act as he did not denudate the owner of the asset, a copy had simply been taken. Computers only tick information, by applying the convention deriving from this case, it means that it is acceptable to print other peoples files as long they do not deprive the owner of the file by deleting it, one would only be affianced if he/she steals trade secret or confidential information.Decisions in both cases mentioned above are absurd, both of them were decided in 1970s, the only possible reason for r separatelying absurd closing could only be lack of knowledge on technology. Previous legislation took into account the consequences of the fraudsters activities when deciding whether the hire in question is an offence. The Fraud Act 2006 aims to prosecute the fraudsters on the posterior of their actual manage rather than the consequences of their activities.How thoughtful is the t hreat?In erect to determine the seriousness of the threat, it is beta to look at the statistics available on cybercrime.Type of crime figure of cases reportedFraud299,000Offences against the person1,944000Sexual offences850,238Computer Misuse(Hacking)144,500Virus related incidents6,000000Total number of cases reported9,237738 line of statistics Garlik check to the figures, they were approximately 9.23 million incidents of cybercrime reported in the year 2006. Statistics supply that 15% of the population of the UK was stirred by cybercrime in someway, afterward feeling at these figures one can easily conclude that we are having an pestilent of cybercrime. These statistics could only the tip of the berg of the totality of cybercrime experts believe that real figure could be 10 clock higher as cybercrime is massively under-reported.Reasons for under- inform reporting any crime involves a three stage processThe pay assumes to be observed.The contract needs to categorised as c riminal.The relevant authorities need to be informed of the criminal direct.A especial(a) crime will not be reported if there is misfortune in any of the stages, accordingly the relevant authorities will not take action against the criminal. There are certain factors which affect reporting of cybercrime, factors includeSometimes the criminal conduct is not noticed, internet fraud usually comprises of low-value transactions scrapeways a bulk body of victims, and victims are not always able to spot discrepancy in their bank accounts. overlook of awareness means that the victims may not know whether the conduct in question is a crime. Victims of viruses dont light upon them as victims of crime, people tend to see viruses as technical issue, and therefore, the victim would believe that no one has low-spirited the law.Most victims dont know which authorities they should contact to report cybercrime. Police officers have inadequate meter of resources and dont have the expertise to deal with cybercrime at the moment, therefore, prosecute a formal heraldic bearing can be a difficult process. Once I essay reporting a cybercrime, a laptop computer was purchased on EBay but the trafficker took my money and never sent the laptop, this is a common case of auction fraud.I did try to make a complain, the whole process was super slow, the officer traffic with me had no trace what EBay is, I was able to study a complaint but it has been two years and my complain is all the sameness unresolved.Under-reporting is factor which contributes towards increase in cybercrime, under-reporting mean that criminals will have less fear of getting caught and therefore, they are more likely to commit nefarious acts online.Peoples attitude towards cybercrime tralatitious crimes such as murder, fuck up and robbery can have serious effects on the victims life in some cases the victim may not be able to lead a normal life after being a victim of crime. In contrast to cybercr ime, the impact is not that serious, majority of users have insurance against financial frauds, and frauds are usually of low-value.Viruses can easily be filtered using antivirus software. other offences such as cyberstalking usually cause some anxiety and distress. exactly crimes such as child pornography have a greater impact, it is the only the crime which can have a serious consequences on the victims life. A recent come suggest that only 37% are afraid to use the internet after being a victim of crime, majority of the users do maintain to use the internet after being a victim.Cybercrime and e-commerceCybercrime is a growing concern for all of us, however, the effects of cybercrime are not hindering the process of the internet, and the effects of cybercrime on the e-commerce have not been drastic. Financial transactions over the internet are on the rise, number of people using internet for shopping is increase day by day and over one third of population is using internet b anking.One of the reasons why cybercrime whorled out of control is the fact that it is very easy to commit if have the technical knowledge, all you need is a computer connected to the internet, the crimes on the internet are hard to detect. It can be committed from anyplace in the world, the criminal could sitting in Africa and targeting his victim in Australia. In the next chapter, we shall examine the fusss faced by authorities when investigating cybercrime.legal powerlegal poweral issues and the meshCyberspace is a world without defined jump offaries anyone can access any website using his computer. It can very difficult to go down the source of crime in cyberspace because relative anonymity and as easy way to shield identity. Even if the relevant authorities are able to identify the source of crime, it is not always easy to prosecute the criminal.Double criminalityWhen dealing cross border crime, it is imperative that both countries should recognise the conduct as smuggled in both legal powers. The principle of double criminality prohibits the extradition of a person, if the conduct in question is not recognized as a criminal offence by the plain receiving the request for legal power. create by mental act a agency where a computer software engineer from Zimbabwe sends Barclays bank a virus which causes the computers in Barclays bank to malfunction, the bank cannot carry out their business for 1 mo and as a conclusion they lose about $1 million worth of revenue. English authorities would privation to extradite the outrageer to England so they could prosecute the offender. In an action for extradition, the applicant is required to show that actions of the charge constitute a criminal offence exceeding a token(prenominal) level of seriousness in both legal powers.Imagine now that they are no laws on counterpane viruses in Zimbabwe, therefore it will not possible to show offenders action constitute as criminal behavior. If they are no laws reg arding on cybercrime in Zimbabwe hence he cannot be extradited and he will walk free after on purpose causing damage to Barclays bank. Cybercrime has an planetary dimension, it is imperative that legal protection is consonant inter contently. There are even-tempered about 33 countries such as Albania, Yugoslavia and Malta they have no laws on cybercrimes.If there are no laws whence those countries are considered as computer crime havens. The culprit of I venerate YOU virus which caused $8.5 billion worth damage was caught in Philippines but he could not be prosecuted as Philippines had no laws on cybercrime. Cybercrime is global issue and the world will need to work together in order to tackle cybercrime.How real world crime dealt across borders?In relation to real world crime which transcended national borders, an idiosyncratic network of vernacular Legal Assistance Treaties(MLATs) bound various countries to assist apiece other in investigating real world crime, such as d rug trafficking. If there was no pact agreement amongst two countries then they would contact the relevant authorities to ask for assistance and obtain evidence, this mechanism was sufficient in dealing with real world crime. This mechanism can only work if both countries have similar cybercrime laws if any plain lacks cybercrime laws then the process would fail.How should jurisdiction be approached in Cybercrime?In a case of cyberstalking, An Australian man was stalking a Canadian Actress. The man harassed the actress by sending unsolicited emails. Australian Supreme court of law of Victoria held that crimes committed over the internet knows no borders and stir and national boundaries do not concern them, therefore, legal power should not be the issue. He was convicted. This case was straightforward as both nations recognise stalking as a criminal offence, however, there can be conflicts if both nations do not recognize the act as criminal.In Licra v chawbacon, cut courts t ried to apply legal power over an American company. bumpkin was accuse of Nazi memorabilia contrary to term R645-1 of the french Criminal Code. Yahoo argued that there are not in breach of Article R645-1 as they were conducting the auction under the jurisdiction of the States and it is not illegal to sell Nazi memorabilia under the American law. In order to prove that Yahoo is subject American jurisdiction, they argued the following pointsYahoo servers are located in US territory.Services of Yahoo are primarily aimed at US citizens.According to the First Amendment to the United States Constitution, exemption of speech and expression is guaranteed and any attempt to enforce appreciation which restricts freedom of speech and expression would fail for unconstitutionality.The court ruled that they have full jurisdiction over Yahoo becauseThe auction was open to worldwide bidders, including France.It is possible to view the auction in France, viewing and displaying Nazi memorabili a causes public pain in the ass and it is offence to public nuisance under the french law.Yahoo had a customer base in France, the advertisements were in French. Yahoo did have knowledge that French citizens use their site therefore they should not do anything to offend French citizens.Yahoo ignored the French court ruling and unplowed saying that they French court does not have the right to run jurisdiction over an American company. Yahoo was warned that they would have to pay enceinte fines if they dont comply. In the end Yahoo owners did comply with the judgement they had substantial assets in France which were at risk of exposure of being confiscated if they dont claim. The sole reason why French courts were able to work on jurisdiction over Yahoo because it is a multinational company with large front in France.Imagine instead of France, if the action would have been taken by courts of Saudi Arabia on auctioning playboy magazines, under the Saudi Arabian sharia law law, it is illegal to view or buy pornography. Saudi Arabia court would have failed to exercise jurisdiction over Yahoo as they dont have any presence in Saudi Arabia but it was possible to view Yahoo auctions from Saudi Arabia.The case of Yahoo is a rare example where a court was able to exercise jurisdiction over a foreign company. In majority of the cases concerning individuals, courts trying to exercise jurisdiction over foreign elements are usually ignored. In the case of Nottinghamshire County Council v. Gwatkin (UK), injunctions were issued against many journalists to prevent them from publishing disseminating a leaked report that strongly criticises the Councils handling of allegations of blessed abuse of children in the 1980s. Despite the injunctions, a report appeared on an American website. The website refused to respect the English jurisdiction as they argued that the report was a public document. The Nottinghamshire had no option then to flip the case.Cybercrime has an in ternational dimension. International law is complicated area, it can be very difficult to co-operate with authorities if there is no or weak diplomaticalal ties, for e.g. Pakistan and Israel have no diplomatic ties, if a situation arises where Israeli citizen hacks into State bank of Pakistan steals millions of dollars from the bank, in a situation like this, one easily assume that both countries would not co-operate with each other even though both countries recognise hacking as a offence but they do not have diplomatic ties with each other, most probably the hacker would get away with the crime.A case involving Russian hackers, they hacked into Paypal and stole 53,000 credit card details. Paypal is an American company. The Russian hackers blackmailed Paypal and asked for a substantial amount of money, they peril they would publish the details of 53,000 credit cards if they do not receive the money.Russia and American both have signed extradition treaty but still Russian authorit ies failed to take action, it is still not clear why they did not take inhibit action against the Russian hackers. Both nations struggled to gain jurisdiction over each other. FBI decided to take things into their own hold by setting up a secret operation, undercover agents comprise as reprenstatives of a phony security firm Invita. The faux security firm invited the Russian hackers to USwith prospects of employment. When the interview for employment by the bogus firm Invita was being carried out, the Russian hackers were asked to display there hacking skills, one of the hackers accessed his own system in Russia to show off his skills, the FBI recorded every keystroke and subsequently arrested the Russian hackers for multiple offences such as hacking, fraud and extortion. The keystrokes recorded were posterior used to hack into one of the hackers computer in Russia to access incriminating evidence. totally this took place without the knowledge of Russian authorities.When Rus sian authorities came to know about whole incident, they were furious and argued that US apply their authority and infringing on some other sovereign nations jurisdiction. Lack of co-operation in relation to jurisdiction can lead to serious problems between nations, in order to reduce such conflicts, there is need to extend the jurisdiction issue and come up with a mechanism which ensures that countries co-operate with each other.Where is the Jurisdiction?In the real world crime, the conduct and the effect of the conduct are easy to pin down because we can visibly see the human carrying out the conduct and the effect of the conduct is also visible. The location of the offence and the location of the culprit can easily be identified. Imagine a situation in which a shooter in Canada shots an American across Niagara Falls, it is clear from the example that the conduct took place in Canada and the effect of the conduct took place in Canada.Cyberspace is not real, people say that ev ents on cyberspace occur everywhere and nowhere, a man disseminating a virus could release a virus which travel through servers of many different estate before reaching the victim, for e.g. a person makes a racist website targeting Jews in Malta, uploads the website on American servers and the website is available for everyone to see, a Jewish living in Israel comes across the website and gets offended.In a situation like this where would you bring an action, should you bring an action in Malta because the perpetrator is based over there, would bring an action in America where the server is hosted or would bring the action in Israel where the victim is? There are specific laws regarding jurisdiction issues on the internet, the world is still struggling to come up with a solution which would solve the problem of jurisdiction. incontrovertible or Negative Jurisdiction?The principle of negative jurisdiction occurs when no country is willing to exercise jurisdiction for a cybercrime. C ybercrime can have multiple victims in different countries the love bug caused damage in many different countries including USA, UK, France and Germany. If the damage is caused to multiple countries then who should claim jurisdiction over the cybercrime, should it by prioritised by the amount of damage suffered by each country. If the effected countries decide not to take action against the perpetrator because it is not in their best interest, the country may be diligent by other internal problems. If no country is willing to exercise jurisdiction over a cybercrime then the perpetrator would walk free.Positive jurisdiction is opposite of negative jurisdiction, how will the issue of jurisdiction be decided if more than two countries want to exercise tChallenges to Defining CybercrimeChallenges to Defining CybercrimeWhat is Cybercrime?At this point of time there is no commonly agreed definition of Cybercrime. The area of Cybercrime is very broad and the technical nature of the subjec t has made extremely difficult for authorities to come up with a precise definition of Cybercrime. The British police have defined Cybercrime as use of any computer network for crime and council of Europe has defined Cybercrime as any criminal offence against or with help of computer network.The two definitions offered by the British police and council of Europe are both very broad and they offer very little insight into the nature of conduct which falls under the defined term. Most of us do a vague idea what Cybercrime means but it seems that it is very to difficult to pinpoint the exact conduct which can be regarded as Cybercrime.For the purposes of the dissertation, I shall attempt to come up with my own definition of Cybercrime the available definitions do not adequately explain the concept of Cybercrime.In order to understand and provide better insight into nature of Cybercrime, it will be a good idea to divide Cybercrime into two categories because computers can be used in two ways to commit Cybercrime.The first category will include crimes in which the computer was used as tool to commit the offence. The computer has enabled criminals to use the technology to commit crimes such as fraud and copyright privacy. The computer can be exploited just as another technical device which can be exploited, for e.g. a phone can be used to verbally abuse someone or stalk someone, someway the internet can be used to stalk someone or verbally abuse someone.The second category will include offences which are committed with intention of damaging or modifying computers. In this category the target of the crime is the computer itself, offences such as hacking.Whichever categories the offence committed falls in, ultimately it are us the humans who have to suffer the consequences of Cybercrime.Now we know that there are two ways in which the computer can be used to commit offences, my definition of Cybercrime would beIllegal acts using the computer as instrument to commit an offence, or targeting a computer network to damage or modifying computers for malicious purposesEven my definition cannot be regarded as precise, as pointed earlier that due to the broad and technical nature of Cybercrime, it almost impossible to come up with a precise definition. The term Cybercrime is a social term to describe criminal activities which take place in world of computers it is not an established term within the criminal law.The fact that there is no legal definition of Cybercrime within criminal law makes the whole area of Cybercrime very complicated for concerned authorities and the general public, it creates confusion such as what constitutes as Cybercrime and if Cybercrime cannot be defined properly how will the victims report the crime? The lack of proper definition means that majority of the Cybercrime which takes place is unreported as the victims and the authorities are not sure whether the conduct is a Cybercrime. It is estimated that 90% of the Cybercrime w hich occurs is unreported.Types of CybercrimeComputer can be used to commit various crimes, in order to have a better understanding of Cybercrime we shall look at individually the types of crimes which are committed in the world of computers. It will not possible to describe every type of Cybercrime which exists due to the word limit, we will only concentrate on crimes which are considered to be major threats to our security.First CategoryFraudFraud can be defined as use of deception for direct or indirect financial or monetary gain. The internet can be used as means targeting the victim by replicating real world frauds such as get rich quick schemes which dont exist, emails which demand an additional fee to be paid via credit card to stop loss of service such as internet or banking. The increasing availability of the internet means that fraudsters can carry out fraudulent activities on a grand scale.Fraud is a traditional crime which has existed for centuries and internet is merely a tool by which the fraudsters actions are carried out. Fraud has become a serious threat to e-commerce and other online transactions. Statistics suggest that internet only accounts for 3% of credit card fraud, credit card fraud is one of the more difficult frauds to commit on the internet, however other forms of fraud such as phising are more easier to carry out using the internet and equally lucrative.Phising is a form of fraud which is rapidly increasing. Phising is when you get emails from commercial organizations such your bank and other financial institutions, they would ask you to update your details, emails look genuine and it is a scam to trick people on giving their details. There are no official figures available on phishing scams but on average I receive about three emails everyday asking me to update my bank account details.Recently there was email going around asking the staff members and students of LSBU to update their personal details, the email looked genuine but the ICT staff informed students/staff to ignore as it was a trick to gain personal information. Since the advancement of technology, it is has become easier and cheaper to communicate and fraudsters are also taking advantage of technology because it is easier to exploit the internet and it is cheaper than other alternatives such as phone and postal mail.There are other forms of fraud such as auction fraud, it is when buy goods in auction and you pay for the item but your item will never turn up.Fraud is one of the lucrative crimes on the internet experts suggest that it is more than trafficking drugs. The reasons why fraudsters prefer internet is becauseInternet has made mass communication easy and it is cheap, same email can be sent to millions of people very easily and cheaply with just one click of button.Majority of users do not have adequate knowledge on how technology works, this makes it easy for fraudsters to fool innocent people into taking an action such as giving their pe rsonal details.Internet users are considered nave in the sense that they have too much faith in the information they receive via the internet, therefore, they do not take necessary steps to verify the information and often get tricked in handing out their credit card or personal details.Offences against person(s)Offence against a person can either be physical or mental, it is not possible to cause direct physical harm to a person using a computer but it is possible to cause mental harm such as anxiety, distress or psychological harm. It can be done by sending abusive or threatening emails or posting derogatory information online.Stalking is a crime which is done to harass another person repeatedly. As the number of user on the internet increased, the opportunities for abuse have also increased. It is possible to use internet as a tool for sending abusive emails, leaving offensive messages on guestbooks, or posting misinformation on blogs. In some cases, cyberstalkers have morphed im ages of their victims onto pornographic images and then emailing the pictures to relative and work colleagues to cause embarrassment.There are mainly three reasons for committing a crime such as stalking, Main reason is usually when relationships fail, former intimates usually target their ex-boyfriend/girlfriend to get revenge. Second reason for cyberstalking is boredom some people usually pick random people and target them by sending them abusive and threatening emails just for fun. Cyberstalkers take advantage of anonymity of the internet to cause distress to their victims life.Hate and racist speech is also a form of crime which escalated since the introduction of the internet it can cause traumatic experience and mental distress to those who are targeted. Post 9/11, there have been many websites set up to mock the religion Islam, such as www.laughingatislam.com, this website has been cause of distress to many Muslims around the world.Sexual offencesThis category includes offenc es which have sexual element, such as making undesired sexual approaches in chat-rooms and paedophiles harrasing children. Child pornography and child protection are one of the main concerns on the internet. Paedophiles are taking full advantage to exploit the technology for viewing and exchanging child pornography.Paedophiles use the internet to their advantage, they use chat rooms and other popular social networks such as facebook to entice and lure children into meeting them. Many popular chat rooms such as MSN Chat and Yahoo chat have closed down their chat rooms to protect young children but closure of popular chat rooms have not stopped paedophiles from using less popular chat rooms and other social networks.Second categoryHacking related offencesHacking can be defined as gaining unauthorised access to a computer system. As soon as we hear the word hacking, we tend to think that it is a crime, it should be noted that hacking started of as show of skill to gain temporary access to computer systems. It was rather an intellectual challenge than a criminal motive. But now, many hackers misuse their skills to inflict damage and destruction. Examples of hacking include stealing confident information such credit card details.In a recent incident of hacking, Harriet Harman whose is a politician, taking part in upcoming elections. Her website was hacked and the blog section of her website encouraged the audience to vote for Boris Johnson whose is a competitor of Harman Harriet. Boris Johnson has also complained that his email account was hacked recently. Most politicians believe that internet as a medium will be a major part of election campaigns and activities such as hacking can sabotage election campaigns by posting disinformation on candidates websites.Virus and Other Malicious ProgramsVirus is a malicious code or program that replicates itself and inserts copies or new versions onto other programs, affecting computer systems. Viruses are designed to modify c omputer systems without the consent of the owner or operator. Viruses are created to inflict senseless damage to computer system. It is a widely accepted perception that crime is committed in times economic distress. Criminals do not gain any monetary benefit it is simply done to show off their computer skills. Some viruses are failed programs or accidental releases. The most famous virus which was released is the I LOVE YOU virus or commonly known as the love bug. The virus damaged millions of computers worldwide it caused damage worth of $8.5bn, the author of the virus claims that it was released to impress his girlfriend.Legislation on CybercrimeIt is often believed that the internet is just like the wild west where there no rules and regulations and people are free to carry out illegal activities. Fortunately, this is not true at all there is legislation which exists to protect us from cybercrimes.Type of crimeLegislationFraudFraud Act 2006(Covers all types of possible frauds)Of fences against person(s)The Public Order Act 1986(Hate speech)Sexual OffencesThe Protection of children Act 1978The Criminal Justice Act 1988The Criminal Justice an Public Order Act 1988Sexual Offences Act 2003After carefully reviewing all pieces of legislations mentioned above, I can conclude by saying that legislation we have at the moment is adequate enough to protect us from any sort of traditional crime carried out using computers. There were few anomalies which have been removed now.AnomaliesThe Theft Act 1968 which previously covered fraud has been replaced by Fraud Act 2006 to cover anomaly under the previous legislation. In the case of Clayman, it was held that it is not unlawful to defraud a computer the courts do not regard computers as deceivable as the process is fully automated. In theory if we apply the principle deriving from the Clayman case then it will not be unlawful to false credit card number when signing up for an online service such as subscription to a newsg roup or online gaming. There is only exception to this rule that it will not apply if deception involves licensed telecommunications services, such as dial-up chat lines pay-per-view TV.Second anomaly before us was that information was not regarded property. In the case of Oxford v Moss, in this case a student took a copy of forthcoming exam from a lecturers desk and made a photocopy of that exam paper, it was held that the student cannot be charged under the theft act as he did not deprive the owner of the asset, a copy had simply been taken. Computers only contain information, by applying the principle deriving from this case, it means that it is acceptable to print other peoples files as long they do not deprive the owner of the file by deleting it, one would only be prosecuted if he/she steals trade secret or confidential information.Decisions in both cases mentioned above are absurd, both of them were decided in 1970s, the only possible reason for reaching absurd decision could only be lack of knowledge on technology. Previous legislation took into account the consequences of the fraudsters activities when deciding whether the conduct in question is an offence. The Fraud Act 2006 aims to prosecute the fraudsters on the basis of their actual conduct rather than the consequences of their activities.How serious is the threat?In order to determine the seriousness of the threat, it is important to look at the statistics available on cybercrime.Type of crimeNumber of cases reportedFraud299,000Offences against the person1,944000Sexual offences850,238Computer Misuse(Hacking)144,500Virus related incidents6,000000Total number of cases reported9,237738Source of statistics GarlikAccording to the figures, they were approximately 9.23 million incidents of cybercrime reported in the year 2006. Statistics show that 15% of the population of the UK was affected by cybercrime in someway, after looking at these figures one can easily conclude that we are having an epidemic o f cybercrime. These statistics could only the tip of the iceberg of the totality of cybercrime experts believe that real figure could be 10 times higher as cybercrime is massively under-reported.Reasons for under-reportingReporting any crime involves a three stage processThe conduct needs to be observed.The conduct needs to categorised as criminal.The relevant authorities need to be informed of the criminal conduct.A particular crime will not be reported if there is failure in any of the stages, therefore the relevant authorities will not take action against the criminal. There are certain factors which affect reporting of cybercrime, factors includeSometimes the criminal conduct is not noticed, internet fraud usually comprises of low-value transactions across a bulk body of victims, and victims are not always able to spot discrepancy in their bank accounts.Lack of awareness means that the victims may not know whether the conduct in question is a crime. Victims of viruses dont see t hem as victims of crime, people tend to see viruses as technical issue, and therefore, the victim would believe that no one has broken the law.Most victims dont know which authorities they should contact to report cybercrime. Police officers have inadequate amount of resources and dont have the expertise to deal with cybercrime at the moment, therefore, pursuing a formal complaint can be a difficult process. Once I tried reporting a cybercrime, a laptop was purchased on EBay but the seller took my money and never sent the laptop, this is a common case of auction fraud.I did try to make a complain, the whole process was extremely slow, the officer dealing with me had no clue what EBay is, I was able to register a complaint but it has been two years and my complain is still unresolved.Under-reporting is factor which contributes towards increase in cybercrime, under-reporting mean that criminals will have less fear of getting caught and therefore, they are more likely to commit illegal acts online.Peoples attitude towards cybercrimeTraditional crimes such as murder, rape and robbery can have serious effects on the victims life in some cases the victim may not be able to lead a normal life after being a victim of crime. In contrast to cybercrime, the impact is not that serious, majority of users have insurance against financial frauds, and frauds are usually of low-value.Viruses can easily be filtered using antivirus software. Other offences such as cyberstalking usually cause some anxiety and distress. Only crimes such as child pornography have a greater impact, it is the only the crime which can have a serious consequences on the victims life. A recent survey suggest that only 37% are afraid to use the internet after being a victim of crime, majority of the users do continue to use the internet after being a victim.Cybercrime and e-commerceCybercrime is a growing concern for all of us, however, the effects of cybercrime are not hindering the growth of the intern et, and the effects of cybercrime on the e-commerce have not been drastic. Financial transactions over the internet are on the rise, number of people using internet for shopping is increase day by day and over one third of population is using internet banking.One of the reasons why cybercrime spiraling out of control is the fact that it is very easy to commit if have the technical knowledge, all you need is a computer connected to the internet, the crimes on the internet are hard to detect. It can be committed from anywhere in the world, the criminal could sitting in Africa and targeting his victim in Australia. In the next chapter, we shall examine the problems faced by authorities when investigating cybercrime.JurisdictionJurisdictional issues and the cyberspaceCyberspace is a world without defined boundaries anyone can access any website using his computer. It can very difficult to locate the source of crime in cyberspace because relative anonymity and as easy way to shield ident ity. Even if the relevant authorities are able to identify the source of crime, it is not always easy to prosecute the criminal.Double criminalityWhen dealing cross border crime, it is imperative that both countries should recognise the conduct as illegal in both jurisdictions. The principle of double criminality prohibits the extradition of a person, if the conduct in question is not recognized as a criminal offence by the country receiving the request for jurisdiction.Imagine a situation where a computer programmer from Zimbabwe sends Barclays bank a virus which causes the computers in Barclays bank to malfunction, the bank cannot carry out their business for 1 hour and as a result they lose about $1 million worth of revenue. English authorities would want to extradite the offender to England so they could prosecute the offender. In an action for extradition, the applicant is required to show that actions of the accused constitute a criminal offence exceeding a minimum level of se riousness in both jurisdictions.Imagine now that they are no laws on spreading viruses in Zimbabwe, therefore it will not possible to show offenders action constitute as criminal behavior. If they are no laws regarding on cybercrime in Zimbabwe then he cannot be extradited and he will walk free after deliberately causing damage to Barclays bank. Cybercrime has an international dimension, it is imperative that legal protection is harmonised internationally. There are still about 33 countries such as Albania, Yugoslavia and Malta they have no laws on cybercrimes.If there are no laws then those countries are considered as computer crime havens. The perpetrator of I LOVE YOU virus which caused $8.5 billion worth damage was caught in Philippines but he could not be prosecuted as Philippines had no laws on cybercrime. Cybercrime is global issue and the world will need to work together in order to tackle cybercrime.How real world crime dealt across borders?In relation to real world crime w hich transcended national borders, an idiosyncratic network of Mutual Legal Assistance Treaties(MLATs) bound various countries to assist each other in investigating real world crime, such as drug trafficking. If there was no treaty agreement between two countries then they would contact the relevant authorities to ask for assistance and obtain evidence, this mechanism was sufficient in dealing with real world crime. This mechanism can only work if both countries have similar cybercrime laws if any country lacks cybercrime laws then the process would fail.How should Jurisdiction be approached in Cybercrime?In a case of cyberstalking, An Australian man was stalking a Canadian Actress. The man harassed the actress by sending unsolicited emails. Australian Supreme Court of Victoria held that crimes committed over the internet knows no borders and State and national boundaries do not concern them, therefore, jurisdiction should not be the issue. He was convicted. This case was straightfo rward as both nations recognise stalking as a criminal offence, however, there can be conflicts if both nations do not recognize the act as criminal.In Licra v Yahoo, French courts tried to exercise jurisdiction over an American company. Yahoo was accused of Nazi memorabilia contrary to Article R645-1 of the French Criminal Code. Yahoo argued that there are not in breach of Article R645-1 as they were conducting the auction under the jurisdiction of USA and it is not illegal to sell Nazi memorabilia under the American law. In order to prove that Yahoo is subject American jurisdiction, they argued the following pointsYahoo servers are located in US territory.Services of Yahoo are primarily aimed at US citizens.According to the First Amendment to the United States Constitution, freedom of speech and expression is guaranteed and any attempt to enforce judgement which restricts freedom of speech and expression would fail for unconstitutionality.The court ruled that they have full jurisd iction over Yahoo becauseThe auction was open to worldwide bidders, including France.It is possible to view the auction in France, viewing and displaying Nazi memorabilia causes public nuisance and it is offence to public nuisance under the French law.Yahoo had a customer base in France, the advertisements were in French. Yahoo did have knowledge that French citizens use their site therefore they should not do anything to offend French citizens.Yahoo ignored the French court ruling and kept saying that they French court does not have the right to exercise jurisdiction over an American company. Yahoo was warned that they would have to pay heavy fines if they dont comply. In the end Yahoo owners did comply with the judgement they had substantial assets in France which were at risk of being confiscated if they dont claim. The sole reason why French courts were able to exercise jurisdiction over Yahoo because it is a multinational company with large presence in France.Imagine instead of France, if the action would have been taken by courts of Saudi Arabia on auctioning playboy magazines, under the Saudi Arabian Sharia law, it is illegal to view or buy pornography. Saudi Arabia court would have failed to exercise jurisdiction over Yahoo as they dont have any presence in Saudi Arabia but it was possible to view Yahoo auctions from Saudi Arabia.The case of Yahoo is a rare example where a court was able to exercise jurisdiction over a foreign company. In majority of the cases concerning individuals, courts trying to exercise jurisdiction over foreign elements are usually ignored. In the case of Nottinghamshire County Council v. Gwatkin (UK), injunctions were issued against many journalists to prevent them from publishing disseminating a leaked report that strongly criticises the Councils handling of allegations of satanic abuse of children in the 1980s. Despite the injunctions, a report appeared on an American website. The website refused to respect the English jurisd iction as they argued that the report was a public document. The Nottinghamshire had no option then to drop the case.Cybercrime has an international dimension. International law is complicated area, it can be very difficult to co-operate with authorities if there is no or weak diplomatic ties, for e.g. Pakistan and Israel have no diplomatic ties, if a situation arises where Israeli citizen hacks into State bank of Pakistan steals millions of dollars from the bank, in a situation like this, one easily assume that both countries would not co-operate with each other even though both countries recognise hacking as a offence but they do not have diplomatic ties with each other, most probably the hacker would get away with the crime.A case involving Russian hackers, they hacked into Paypal and stole 53,000 credit card details. Paypal is an American company. The Russian hackers blackmailed Paypal and asked for a substantial amount of money, they threatened they would publish the details of 53,000 credit cards if they do not receive the money.Russia and American both have signed extradition treaty but still Russian authorities failed to take action, it is still not clear why they did not take appropriate action against the Russian hackers. Both nations struggled to gain jurisdiction over each other. FBI decided to take things into their own hands by setting up a secret operation, undercover agents posed as reprenstatives of a bogus security firm Invita. The bogus security firm invited the Russian hackers to USwith prospects of employment. When the interview for employment by the bogus firm Invita was being carried out, the Russian hackers were asked to display there hacking skills, one of the hackers accessed his own system in Russia to show off his skills, the FBI recorded every keystroke and later arrested the Russian hackers for multiple offences such as hacking, fraud and extortion. The keystrokes recorded were later used to hack into one of the hackers computer i n Russia to access incriminating evidence. All this took place without the knowledge of Russian authorities.When Russian authorities came to know about whole incident, they were furious and argued that US misused their authority and infringing on another sovereign nations jurisdiction. Lack of co-operation in relation to jurisdiction can lead to serious problems between nations, in order to avoid such conflicts, there is need to address the jurisdiction issue and come up with a mechanism which ensures that countries co-operate with each other.Where is the Jurisdiction?In the real world crime, the conduct and the effect of the conduct are easy to pin down because we can visibly see the human carrying out the conduct and the effect of the conduct is also visible. The location of the offence and the location of the perpetrator can easily be identified. Imagine a situation in which a shooter in Canada shots an American across Niagara Falls, it is clear from the example that the conduct took place in Canada and the effect of the conduct took place in Canada.Cyberspace is not real, people say that events on cyberspace occur everywhere and nowhere, a man disseminating a virus could release a virus which travel through servers of many different country before reaching the victim, for e.g. a person makes a racist website targeting Jews in Malta, uploads the website on American servers and the website is available for everyone to see, a Jewish living in Israel comes across the website and gets offended.In a situation like this where would you bring an action, should you bring an action in Malta because the perpetrator is based over there, would bring an action in America where the server is hosted or would bring the action in Israel where the victim is? There are specific laws regarding jurisdiction issues on the internet, the world is still struggling to come up with a solution which would solve the problem of jurisdiction.Positive or Negative Jurisdiction?The principl e of negative jurisdiction occurs when no country is willing to exercise jurisdiction for a cybercrime. Cybercrime can have multiple victims in different countries the love bug caused damage in many different countries including USA, UK, France and Germany. If the damage is caused to multiple countries then who should claim jurisdiction over the cybercrime, should it by prioritised by the amount of damage suffered by each country. If the effected countries decide not to take action against the perpetrator because it is not in their best interest, the country may be occupied by other internal problems. If no country is willing to exercise jurisdiction over a cybercrime then the perpetrator would walk free.Positive jurisdiction is opposite of negative jurisdiction, how will the issue of jurisdiction be decided if more than two countries want to exercise t

Monday, April 1, 2019

The Selfish Giant By Oscar Wilde

The Selfish Giant By Oscar WildeThe novel, The Selfish Giant by Oscar Wilde, was introduced in the taught module, demonstrated the kind of art and gaming activities that a stringy report do-nothing stimulate and engage the audience meaning richly. The scheme of bunk accent on the clawrens creativity, imagination and involvement in bidtising. The plot of the written report was introduced by imagining a big tend, free for all children to play and call for fun in. Participants were then engaged in creating play space and activities in the garden. Ample time was given to explore the garden. The trading floor continued with the lusus naturae coming impale from a long vacation and did something drastic- the sign No Children Allowed was placed egressside the garden. This was followed by a series of brainstorming on the reason for the whale to reject the children. To appease the giant, ideas of gifts and presents were suggested. sort of of receiving these gifts with gladnes s, the giant reacted strongly. The adjacent will indicate two art disciplines as well as the responses of children as they disjointicipate in this playtization and art.Principles and ApproachesInstead of the usual come near of storytelling, a key principle of drama is to allow children to perform (Winston and Tandy, 2009) and be part of it. Children coffin nail be engaged in different characters, in different scenarios, performing individually or collectively, in a less(prenominal) rigidly defined (Winston and Tandy, 2009, p. 5) space and character. Through the drama conducted in a class range, children can explore the different parts of the garden just or with their friends, staying in their play space or exploring others, accompanied with rise and positive comments from the teacher.Dramas argon platforms for children to adapt and perform existent life scenarios and behaviours of characters. They assimilated the children in the story to be themselves in real life, doing t he things they often do and behaving as they would. Transferring fiction to real life, it reflects more securely upon issues which dupe significant make upon our daily lives. (Winston and Tandy, 2009, p.3). The selfish giant depicted the adults in real life, and the children having the lookout that they are being controlled by them. The childrens nigh intention of bringing gifts to the giant was unappreciated. The issues raised up and behaviours observed are hardly mentioned or lucubrate through and through storytelling. Dramatisation brings or so a different dynamics for issues to show and discussed upon.The play space for children to dramatise is the classroom. Instead of the everyday function of the classroom, it change into a dramatic space, representing the garden, the house, the place to prepare gifts. As Winston and Tandy, 2009, p. 4 states, through play, children learn to manipulate the core elements of drama. The rules of time, space and identity was suspended (Wins ton and Tandy, 2009), and drama time became elastic. The ticking of a few minutes was equivalent to a span of a few years with the mention that the giant came back after a long vacation.The other key principle is consideration a coarse stage for all children to understand and abide by the rules. The rules can be informed explicitly or agreed upon implicitly. For the drama to succeed and driven towards achieving common purposes, both teachers and children must be set free and agree in following the rules, which are not binding nor restrictive (Winston and Tandy, 2009). The indication to end the time playing in the garden was understandably brought across when the teacher sits on the chair. This is a new approach isolated from the usual clapping of hands, gathering or attention through profession out. As Winston, 2009, p. 5 clearly puts it,its success will depend upon the children penetrative what is expected of them and appreciating the rewards that come from doing it well, the rewards inherent to the experience of genuine engagement in a dramatic event(Winston and Tandy, 2009, p. 5)M whatsoever children enjoy drama because it has a playful element in it. When people die, nobody very dies when person feels hurt, nobody is actually hurt. Children are able to distinguish the difference among the scenes that happen in a daily routine and the conventions of play, misgiving and pass judgment the boundaries (Winston and Tandy, 2009). For example, in a real life setting, it is rather un kindredly for individual to throw or destroy gifts. However, in the dramatisation, when the giant received presents, sort of of being thankful, he tore and smashed them. The children found it all divert and know that it was not for real. Thus, drama and play comes hand in hand, it is their internal capacity for play.., the understandings they gain from participating., that dramatic activity can be constructed. (Winston and Tandy, 2009,p. 3). Also echoed by Swanwick, 1988 ,p 41, play soon becomes imaginative and subjects things to the childs activity.military rating of resultsIn a usual classroom setting, children are kept position on the floor for a period of time, with little movement emphasised and usually, driving towards an academic approach. Children were all getting ready and one child was wondering aloud why the teacher was without a story book.The story began with a big garden that all children can play in. This garden belongs to the giant and it was empty. Children were encouraged to imagine one thing they would like to have in this garden and imitate the movement of it. If a child would like to have a swimming pool in the garden, he can reach forward with his arms and swim. With this, children are transferring the things they are experiencing in real life into play and drama. Many children were able to make correct guesses of their friends actions. With rules of to-do level and space, children were clear of the boundaries and limitations in order to achieve a common goal. Exploration in the garden ended when the teacher sat on the chair. Every child was given the opportunity to share about their deary activity.As the story proceeded, the children were puzzled to know that the garden was out of bounds. They were praised for their good behaviour and maintenance of the garden and equipment and none of them broke any rules. They were impetuous to find out what made the giant angry and the preparations of gifts were suggested. Many of them had suggestions and they were dissever into groups to prepare it. They were given scrap materials to create the present they had in mind. Without any direction from the teacher, they put their ideas at work and each produced their gifts. With all passion that the giant would be pleased upon receiving, they were wrong. Such twist in the story thrilled the children as it differs from the structured and kept them in suspense about the end of the story.During the interview with the gi ant, the children shifted from one dimension that the teacher is the narrator to the teacher as the giant. In the interview, the giant voiced his unhappiness that children are noisy, they forever cry, they do not wash their hands after using the toilet, they are liars etc.. The childrens strong objection caused a child to come forward and cause the giant. Such behaviour is inappropriate in a classroom setting and children will get disciplined for it. For the child to do that, he was fully engrossed into the story and responded appropriately.The story ended and it was toileting time. One child came out of the toilet showing the teacher that he washed his hands. This child actually remembered the reason the giant gave for not allowing any children in. He identified himself as the children in the story and the teacher as the giant. This response from the child shows that dramatisation is a form of education and should be included in the curriculum. Instead of having to remind them ab out the washing of their hands, a play through this story works it all well.ConclusionAs much as acknowledging and understanding the benefits of having drama in the curriculum, there post a great constraint- time. For drama to take place and for it to deepen and develop further, time is usually the hinder factor. Thus, it takes pedagogist of each act. In conclusion, as Winston and Tandy, 2009, p.58 states, drama gives these stories a form and execute which can make them engaging, thought provoking and exciting for the children who are part of it.

The Chimney Sweeper | Analysis

The Chimney Sweeper AnalysisWilliam Blake was a famous generator of the Romantic Age which took place in 1832. William Blake wrote two metrical compositions called The Chimney Sweeper. The start-off poem had to do with innocence. The second Chimney Sweeper poem by William Blake had to do with experience. Even though twain poems postulate the same deed of conveyance doesnt necessarily mean that theyre the same. They have a few things in common, scarce also have a plethora of items that atomic number 18 different. In both poems called The Chimney Sweeper, they sh ar similarities and differences between narration, verse line scheme, tone, and theme. Blake also shows how both poems are influenced Romantically, he gives the reader a visual and represents many symbols that are apply in to twenty-four hour periods society.As far as rhyme scheme, they both have words that rhyme at the end of each line and stanza. The son says When my pay back dies I was very young, and my father sold me musical composition until now my tongue. (lines 1-2 p. 85) In songs of experience, Blake writes A little colored thing among the snow clamant weep, weep, in notes of woe (lines 1-2 p90)Both poems are also expressed romantically in a few ways. In the Romantic days, writers felt thither was a new literature being birthed. The poetry had to do a lot with humanity and nature. Poets tended toward emotion and child standardized perspective. Poets also showed such(prenominal) regard for the innate scenes and employ words like child, imagination, and nature because they melodic theme they were popular. (Mellown p. 1)In Songs of Innocence the young son tells his story. The boy is about six-spot or seven years old. Much of the imaginative power of the poem comes from the tension between the childs naivet and the subtlety of Blakes own vision. (Mellown p.1)In the first stanza, he talks about his way of conduct. He talks about how his mother dies. He was sold as an apprentice by his father. His present life revolves around working, calling through the streets for more work, and at the end of the day sleeping on soot, a realistic detail since the boys did indeed achieve their beds on bags of soot they had swept from the chimneys. (Mellown p.1)The second stanza introduces a young boy named tom Dacre, who comes to join the workers and is initiated into his new life by a haircut. Tom cries as he gets his hair cut off, but the speaker makes him look better by saying Hush, Tom Never mind it, for when your heads bare, you go to sleep that the soot cannot spoil your white hair (lines 6-7 p. 85). What that means is all of the red cent from sweeping chimneys wont get in his hair. Tom takes the advice and goes to sleep happily. (Mellown p. 2)The abutting three stanzas give the substance of the ideate. Tom dreams that thousands of sweepers locked in coffins are released by an angel. Suddenly, they find themselves in a pastoral landscape where, freed from the ir burdens, they bathe in a river and then rise up to the clouds. There, the angel tells Tom, if hed be a good boy, / Hed have God for his father never want joy. The dream is an obvious instance of wish fulfillment, and its pathos rest periods on the fat that while it reveals the childs hugeing to escape, the opening and closing of the poem make it clear that his scarce ways of escape are dreams and death. (Mellown p. 2) What this means for Tom is that maybe when he is dreaming he can escape what he goes thorough in life and just be happy.The last quatrain opens with a brutal contrast. Having daydream of playing in the sun, Tom awakes, and the sweepers begin their days work, a day to be spent in the total darkness of the cramped chimneys. Yet, restored by his dream, Tom is happy, and the poem ends with the pious moral, akin to the angels speech, So if all do their duty, they need not fear harm. (Mellown p. 2) So he goes through the rest of his life knowing that heaven was in hi s future as long as he was good.In The Chimney Sweeper, songs of experience, Blake talks about most(prenominal) of the things a little black boy goes through. Using the same rhyme scheme as songs of innocence he says A little black thing among the snow crying weep, weep in notes of woe Where are thy father and mother? Say? They are both gone up to the church to pray. (lines 1-4 p. 90)In the next stanza Blake describes how his parents are at church praying for him because he is so happy on the outside but not video display his true pain. He sings and dances because he is happy and his parents think that everything is ok and no damage has been done. He says And are gone to praise God and his non-Christian priest and King, who make up a heaven of our misery. (lines 11-12 p.90) Blake could have possibly used a bit of sarcasm in songs of experience.In songs of innocence some themes and symbols were the bags, abandoned in the dream and picked up again with the brushes the next morning. This says that the wonderful burden of the childs life, which is the good indicates the corruption of a society that uses and abuses him. The coffins are like a symbol of death. They represent the chimneys that he sweeps and the actual death to which he will soon come. In contrast, the sun, river, and plain express the joys that should be natural to childhood, which is also a symbol of the way nature is appreciated in the romantic age. Yet, even symbols associated with happiness intensify the harsh facts of existence. The bright fundamental recalls imprisonment the harmony of the leaping boys emphasizes their isolation in the chimneys and the lamb, whose curling hit it up Toms hair resembles, is often, as is the sweeper, a helpless victim. (Mellown p. 2)