Monday, September 30, 2019

Business Continuity Plan

Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221. Business Continuity Plan Data Sources in Digital Forensics March 17, 2013 Joana Achiampong CSEC 650 Introduction Four sources of data that stand out for forensic investigators in most criminal investigations are files, operating systems, routers and network traffic, and social network activity. Each data source presents a variety of opportunities and challenges for investigators, meaning that the more reliable data collection and analysis activity typically involves examination of a variety of sources.Digital forensics must cover the four basic phases of activity, which include: data collection, which describes the identification and acquisition of relevant data; data examination, which includes the processing of data through the use of automated and manual tools; analysis, which describes the evaluation and categorization of examined data into coherent groups, such as their usefulness in a court proceeding; and reporting, in which the results of analysis are described with careful attention paid to recommen dations (Marcella & Menendez, 2009).The viability of each data source to an investigation must be evaluated based on how they can contribute to each phase. For example, the ability of routers and switches as a data source to help investigators might be effective in one area, but not in the other three. An examination of router activity might yield a surfeit of observable data that fails to provide diverse analytical tools that cannot be relied upon in a forensic setting. Another example is network traffic, which may yield a large amount of data that is unreliable or has a high degree of volatility (Garfinkel, 2010).Time is often essential for forensic investigators, and it is often important to know in advance the dynamics of each data source. This helps investigators avoid wasted time, or spending time analyzing data that may of minimal help in a forensic setting. For these reasons, it is important to critically assess the pros and cons of each data source for their ability to prov ide contributions. A valid assessment of each data source should be made based on consistent factors such as costs, data sensitivity, and time investment.The overall costs of each data source depend on the equipment that will be required to collect and analyze data without corruption. Costs also refer to the training and labor required during the course of the collection and analysis, which may be higher for uncommon sources that require a unique process and chain of command pattern. Data sensitivity is critical is a forensic tool, but may be more questionable depending on the source. For example, network activity can provide a wealth of information depending on the device and setting upon which data is moved.However, a network environment with many devices and multiple configurations may provide unreliable data that cannot be recognized in court proceedings. In addition, chain-of-command issues regarding the contribution of outside network analysts could compromise a source that wo uld be otherwise valid. These issues have to be considered in any data source assessment. Data Files The most common data sources in a digital forensic examination are current and deleted files. Most forensic investigators in most data retrieval environments begin with an examination of the various media store on the hard drive of a computer, network, or mobile device.The variety of types of stored data in current and deleted files, in addition to partitioned packet files and the slack space of a device’s memory, can be massive and diverse. A typical first step in data retrieval is to shut down a system and create a data grab or forensic duplicate upon which collection and analysis can be made. This ensures the integrity of the original data, while allowing investigators the ability to manipulate data however they see fit. However, this process alone creates challenges for forensic investigators, including an inability to capture live system data.This might prevent investigat ors from catching a perpetrator in the act of altering or adding data to a device or system. One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators.The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006). File examination can yield a variety of type s of suspicious activity that tend to be helpful for investigators.One example is the presence of hidden evidence on file systems. This type of data can be hidden in deleted file spaces, slack spaces, and bad clusters. File space is marked as deleted when it is removed from an active directory. This data will continue to exist within a cluster of a hard disk can be identified and accessed by creating a file in Hex format and transferring the copied data. Data can also be hidden in many others ways, including by removing partitions that are created between data and by leveraging the slack space that exists between files.Attempts by users to hide data using these methods are quickly identifiable by investigators, who can then restore the data using a variety of inexpensive and efficient methods. For example, matching RAM slack to file slack identifies the size of a file and makes it easier to identify and retrieve (Sindhu & Meshram, 2012). This type of retrieval inherently emphasizes the importance of data integrity. This type of integrity is important in any forensic environment, and compromised data is usually rendered instantly unusable. The many opportunities for data retrieved from file space to be compromised are a drawback to this data source.For example, data retrieval using bit stream imaging provides a real-time copy onto a disk or similar medium. However, this can be compromised based on the fact that re-imagining of data is constantly changing during re-writing. Investigators will typically choose the type of data copy system based on what they are looking for. However, changes to data can occur if the appropriate safeguards are not taken. Write-blockers are often used to prevent an imaging process from providing data that has been compromised by writing to that media. Sindhu and Meshram 2012) stated that computing a message digest will create a verification of the copied data based on a comparison to the original. A message digest is an algorithm th at takes input data and produces an output digest. This comparison helps investigators ensure the integrity of data in many cases. There are additional pitfalls when it comes to using files as data sources. Users have different resources for eliminating or hindering data collection. One example is overwriting content by replacing it with constant values. This type of wiping function can be performed by a variety of utilities.Users can also demagnetize a hard drive to physically destroy the content stored there. Using files as a data source in this case will require a complex operation requiring different tools. Users can also purposefully misname files – for example, giving them . jpg extensions when they are not image content files – in order to confuse investigators. Investigators have to be familiar with strategies for circumventing these pitfalls, such as maintaining an up-to-date forensic toolkit and remaining committed to maintaining data integrity.In the end, fi les are very highly relied upon by investigators and are a strong source forensic data. However, investigators must be experienced and have the appropriate tools to ensure the viability of collected data. Operating Systems Generally speaking, the data that can be collected from Operating Systems (OS) is more diverse and rich than file systems data, and has greater potential to uncover application-specific events or vital volatile data specific to a network operation (Sindhu, Tribathi & Meshram, 2012).However, OS data mining can be more difficult and challenging, and often requires investigators to make quick decisions based on the type of data they are seeking. OS data mining is more case specific, in part because the retrieval of data is frequently connected to network configurations. Collecting volatile data can only occur from a live system that has not been shut down or rebooted (Marcella & Menendez, 2008). Additional activity that occurs over an individual network session is ve ry likely to compromise the OS data. For this reason, investigators have to be prepared and aware of what they are looking for.Time is of the essence in this case, and it is important to decide quickly whether or not the OS data should be preserved or if the system should be shut down. Keeping a system running during data extraction can also compromise data files. This also leaves data vulnerable to malware that has been installed by a user with bad intentions, determined to undermine the operations of investigators. The types of data that can be retrieved from the OS include network connections, network configurations, running processes, open files, and login sessions.In addition, the entire contents of the memory can be retrieved from the OS history, usually with little or no alteration of data when the footprint of retrieval activity is minimized. The order in which this data is collected typically runs in a standard succession, with network connections, login sessions, and memor y collection sitting at the top of the list or priorities. These sources are more important because they tend to change over time. For example, network connections tend to time out and login sessions can change as users log in or out.Network configurations and the files that are open in a system are less time-sensitive and fall further down the list of priorities for investigators. The forensic toolkit must be diverse to ensure that data retrieval is achieved with minimal alteration (Bui, Enyeart & Luong, 2003). In addition, the message digest of each tool should be documented, along with licensing and version information, and command logs. This careful documentation protects users from sudden loss of data or other disturbances during data retrieval.In addition, a number of accessibility issues can be implemented by users, including the placement of screen saver passwords, key remapping and log disabling features, all of which can disrupt the work by investigators, either providing unworkable obstacles or time-consuming hurdles that make complete transfer impossible. Ultimately, the use of OS as a data source is a case-by-case tool dependent on the availability of other sources and the specific needs and tools of investigators. Routers and Network TrafficAmong network configuration data sources, router activity and network sourcing has the potential to provide the most specific amount of incriminating activity for forensic use. Forensic equipment should have time stamping capabilities activated to provide an accurate time signature of network interaction between an end-user and a router or switch (Schwartz, 2011). Importantly, firewalls and routers that are tied to a network often provide network address translation which can offer additional information by clarifying configuration or additional IP addresses on a network (Huston, 2004).There are a number of tools available to people seeking an analysis of network activity, including packet sniffers and intrusi on detection systems (Marcella & Menendez, 2008). These tools help investigators examine all packets for suspicious IP addresses and special events that have occurred across a network. This data is usually recorded and analyzed so that investigators can compare unusual events to evaluate network weaknesses and special interests of would-be attackers.This is of great interests to security agents determined to identify and stop potential network intrusions. A number of technical, procedural, legal and ethical issues exist when examining and analyzing network data. It is imperative that investigators be sure to avoid disconnected from a network or rebooting a system during data retrieval. They should also rely on live data and persistent information. Finally, it is important to avoid running configuration commands that could corrupt a network or its activity (Gast, 2010).Issues such as storage of large amounts of data over a highly trafficked network and proper placement of a decryptio n device along a network can impact how data is available and whether or not it maintains integrity. It is also important to consider the ethical and legal issues of data retrieval along a network when it involves sensitive data, such as financial records and personal information like passwords. In many cases, ethical issues can be circumvented with careful documentation and the publication of organizational policies and procedures that are strictly followed.However, these are all issues that must be considered in the analysis of network trafficking as a data source. Social Network Activity The sheer volume of social network activity – such as that on Facebook, Twitter, and Instragram – makes examining it as a data source great potential as a forensic tool. To this point, the little available research on social network data has failed to come up with a comprehensive framework or set of standards for investigators. Social network tools across mobile platforms invariably have geolocation services.However, the use of these as a data source has been questioned from ethical and legal perspectives (Humaid, Yousif, & Said, 2011). The communication layer of social media applications on mobile devices can yield rich data, such as a browser cache and packet activity. Packet sniffing can expose unencrypted wifi use and third party intrusion across a social network. However, these tools are highly limited when they are restricted to social network activity. The best tools may be the ability to create a social footprint, which includes all friend activity, posted pictures and videos, communication habits, and periods of activity.For most people, this information is only available on social network websites and is not stored on a user’s hard drive. A certain climate of permissibility tends to apply to social network use, in which users are prone to making data available online that they would not otherwise expose. All of this strengthens the use of soci al networks as a data source. The greatest pitfall to social network activity is the malleability of the material. Users frequently change their habits, including the times of the day and the users with whom they connect.Cumulative social network data can be used to create a graph of all activity across a variety of factors, including time, space, usage, and devices (Mulazzani, Huber, & Weippl). But this is a rapidly changing field. There is little doubt that the cloud computing data storage and continued growth of social networks will change this field quickly, which could quickly undermine past data that has been retrieved. Potential Usefulness in Specific Events The usefulness of a data source is strictly tied to the event it is intended to investigate.It is imperative that investigators are clear on their goals prior to selecting a source to retrieve and analyze data from. For example, a network intrusion would be best tackled with an examination of network traffic, followed by social network analysis, Operating Systems, and data file systems. Network analysis is less prone to attacking strategies that can compromise file and OS data. It can observe network traffic to find anomalous entities and their entry point within a network. It can also identify source and destination data by data recovery and access to routers r other network access points (Aquilina, Casey & Malin, 2008). This is critical information for network intrusion investigations. Operating Systems enable access to volatile data, but this is limited by single-time use and data integrity issues. Most OS examinations look at network connections first, which is often another way of accessing the same data. File storage and social network analysis tend to offer peripheral views of the same material. Operating systems are the most helpful data source in malware installation investigation, followed by network traffic, data files, and social network activity.Examination of volatile data offers a ran ge of data, including network connections and login sessions, which are primary tools for finding the source of malware installation (Aquilina, Casey & Malin, 2008). Maintaining the integrity of data through quick retrieval and minimal footprints helps ensure its usefulness. At the same time, monitoring network traffic in a pro-active manner is often the surest way of pinpointing time signatures and matching them with network activity (Marcella & Menendez, 2008). The best data sources for identifying insider file deletion are data files, network traffic, social network activity and OS.Each source offers benefits for this type of investigation, but data file collection and analysis yields bad clusters and slack space, both of which pinpoint the likelihood of deleted files. Recovery can begin from this point. Network activity and OS data retrieval can lead investigators to unusual login attempts and anomalous activity in order to pinpoint the location of deleted files along a network. At the same time, social network examination can help investigators understand reasons for deleted files and even learn more about the habits and lifestyle of a likely perpetrator.In the end, a collection of each of these sources provides a rich, revealing glimpse at deleted file activity. Conclusion Network traffic, data files, operating systems, and social network activity are four common data sources in digital forensic. Each provides a unique opportunity and set of risks for investigators, and the source should be chosen based on clear objectives and awareness of all circumstances. In many cases, the best choice is a combination of sources to provide multiple opportunities to arrive at the relevant evidence.Another factor is whether the data search is reactive or pro-active, with network traffic often providing the best source of evidence in a pro-active, forward-thinking environment. The variable of time must also be considered, specifically with respect to how investigators a pproach volatile data. Each of these issues must be considered when evaluating data sources. References Aquilina, J. , Casey, E. & Malin, C. (2008). Malware forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress Publishing. Bui, S. , Enyeart, M. & Luong, J. (2003, May). Issues in Computer Forensics. Retrieved ttp://www. cse. scu. edu/~jholliday/COEN150sp03/projects/Forensic%20Investiga tion. pdf Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7. 64-73. Gast, T. (2010). Forensic data handling. The Business Forum. Retrieved from http://www. bizforum. org/whitepapers/cybertrust-1. htm Humaid, H. , Yousif, A. & Said, H. (2011, December). Smart phones forensics and social networks. IEEE Multidisciplinary Engineering Education Magazine, 6(4). 7-14. Huston, G. (2004, September). Anatomy: A look inside network address translators. The Internet Protocol Journal, 7(3).Retrieved from http://www. cisco. com/web/about/ac123/ac1 47/archived_issues/ipj_7- 3/anatomy. html Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Data. Boca Raton, FL: Auerbach Publications. Mulazzani, M. , Huber, M. & Weippl, E. (n. d. ). Social network forensics: Tapping the data pool of social networks. SBA-Research. Retrieved from http://www. sba- research. org/wp-content/uploads/publications/socialForensics_preprint. pdf Purita, R. (2006). Computer Forensics: A valuable audit tool. Internal Auditor. Retrieved from http://www. theiia. rg/intAuditor/itaudit/archives/2006/september/computer- forensics-a-valuable-audit-tool-1/ Schwartz, M. (2011, December). How digital forensics detects insider theft. InformationWeek Security. Retrieved from http://www. informationweek. com/security/management/how-digital-forensics- detects-insider-t/232300409 Sindhu, K. & Meshram, B. (2012). A digital forensic tool for cyber crime data mining. Engineering Science and Technology: An Internati onal Journal, 2(1). 117-123. Sindhu, K. , Tripathi, S. & Meshram, B. (2012). Digital forensic investigation on file system and database tampering. IOSR Journal of Engineering, 2(2). 214-221.

Sunday, September 29, 2019

Maulana Abul Kalam Azad

Maulana Abul Kalam Muhiyuddin Ahmed better known as Maulana Azad was born on 11th November, 1888, was a senior Political Leader and Indian Muslim Scholar, freedom fighter, and poetry. He was the first Minister of Education. Maulana Azad was one of the prominent Muslim leaders to support Hindu –Muslim unity and He opposing the partition of India on communal lines. Maulana Azad still remains one of the most important people of communal harmony in modern India. He worked for education and social improvement in India made him and most important impact in guiding India's social and economic development.Maulana Azad can speak Urdu, English, Hindi, Arabic, Bengali and Persian. As indicated by his name, Abul Kalam, which literally means â€Å"lord of dialogue†. He adopted the pen name ‘Azad' as a mark of his mental deliverance from a narrow view of religion and life. For his helpful contribution to the nation, Maulana Abul Kalam Azad was posthumously awarded India's highe st civilian honour, Bharat Ratna in 1992. Azad Started the revolutionary activities restricted to Bihar and Bengal. Within short period, he helped setup secret revolutionary centers in all over north India and mumbai.Most of his revolutionaries were anti-Muslim for the reason people felt that the British Government was using the Muslim community against India's freedom struggle. Azad tried to assure his colleagues that animus and indifference toward the Muslims would only make the way to freedom more difficult. In June 1912, Azad started publication of a journal called Al Hilal (means the Crescent) to increase revolutionary recruits amongst the Muslims. He also participated in Non-Cooperation Movement, Quit India Movement, and Partition of IndiaHe said in his words about citizen â€Å"We must not for a moment forget, it is a birth right of every individual to receive at least the basic education without which he cannot fully discharge his duties as a citizen. † Jawaharlal Neh ru referred to Azad as Mir-i- Karawan(means the caravan leader), â€Å"a very brave and gallant gentleman, a finished product of the culture that, in these days, pertains to few† â€Å"The Emperor of learning† Mahatma Gandhi remarked about Azad counting him as â€Å"a person of the calibre of Plato, Aristotle and Pythagorus. † He died of heart stroke on 22 December 1958

Saturday, September 28, 2019

Childhood obesity Essay Example | Topics and Well Written Essays - 3000 words

Childhood obesity - Essay Example Obesity as a consequence of reduced physical activities is becoming more and more frequent in the modern world and is increasing at an especially alarming rate in children. Globally 155 million children with ages ranging from 5-17 years are overweight. Lobstein et al. (2004) claimed that of these 155 million children approximately 30-45 million are obese (cited in World Heart Federation 2007). According to our own National Health Service (NHS, England , January 2008) statistics on obesity, physical activity and diet, 16% of children aged from 2-15 are classified as obese. In the under five year old group the figures for 2007 show that there were approximately 22 million overweight children and that roughly 75% of those live in the low-middle income bracket (WHO, 2008). We are creating an increasingly obesogenic environment where this rising trend in obesity may be associated with the increase in: Technologies and affordability of televisions, computers, etc. Fox (2004) suggested that the time spent being physically inactive by playing video-games, watching television and using computers has increased. Transportation has increased allowing little expenditure of calorie intake due to fewer or reduced physical activities (St-Onge et al., 2003). Children are driven to school or use public transport rather than walk as parents are worried by the apparent lack of safety in the communities in which they live (Fox, 2004). In a cross sectional study by Voss et al. (2005), within a cohort of 277 families in Britain 75% of parents with overweight children did not realise that their children were overweight; 33% of mothers and 57% of fathers thought that their children were at the correct weight when they were, in fact, obese. The current school curriculum allows for a minimum of two hours of physical activity per week. 86% of schools in Britain

Friday, September 27, 2019

Critically discuss why the teachings of the Quality Gurus are Essay

Critically discuss why the teachings of the Quality Gurus are important - Essay Example Quality gurus have played a considerable role in setting the dimensions of success for all companies and organizations. It is due to the teachings of quality gurus that the companies pay special attention towards improving and maintaining quality of the products and services. The mutual belief of all quality gurus was that quality management is a continuous process, which helps the companies build and maintain profitable relationships with the customers. Some of most famous quality gurus include Armand Feigenbaum, Edwards Deming, Philip Crosby, Kaoru Ishikawa, Genichi Taguchi, and Masaaki Imai. All of these gurus brought different concepts of quality which not only helped the companies achieve competitive advantage in the past but also provide appropriate directions towards success to the companies belonging to the present world. We can take example of Masaaki Imai who came up with the concept of Kaizen in 1986, which led Japan’s way to huge success in the field of technologic al development. Kaizen is an umbrella, which includes all Japanese practices related to quality management. Imai focused on continuous improvement in all departments of a company. One of the main teachings of all quality gurus was quality control, which means to ensure quality in all stages of a product development.

Thursday, September 26, 2019

Ethical Issues of Abortion Essay Example | Topics and Well Written Essays - 250 words

Ethical Issues of Abortion - Essay Example In Junes case, it is warranted to argue that she is selfish and minds herself than her baby. She does not consider the fact that the baby boy may be an exceptional case, and not succumb to the disease. Her egoist behaviors take the better part of her choices to abort the fetus and not letting nature take its course. Ann’s case is simply wrong, since all babies are equal despite the gender. In each case, the consequences of the abortion determine the fate of the women (Mackinnon, 2011). In both cases, the baby may be hurt or the mother may die. However, in the case June, she may end up bringing a child in very tough conditions of sickness, whilst Ann may bring up the child failure to abortion. This is a negative impact on the mother. Despite the conflict in opinions, the act is simply wrong according to utilitarianism (Mackinnon, 2011). The Kantian reasoning might differ in evaluating each woman’s decision since the fetus is considered one with the inability to make decisions. In this case, June’s baby may be at risk; thus, abortion may be justified on the health of the baby, whilst in Ann’s case, abortion may be justified on the grounds of the mother’s security and ability to bring up the child single

Wednesday, September 25, 2019

Formal Organizations and Bureaucracy Essay Example | Topics and Well Written Essays - 500 words

Formal Organizations and Bureaucracy - Essay Example Though some of the managers there were recruited from other firms, the majority of them started out as representatives or sales persons in a lower ranking position. The philosophy of the firm was that it would always seek persons from within the organization to fill the empty slots at higher ranks before looking outside for possible employees. This offered motivation to many of the workers in the organization, and therefore, many CSR's worked very hard at their positions and went the extra mile of attempting to become excellent sales representatives as well, in order that the promised rewards would follow. One drawback of this bureaucratic institution that had a particular effect on me was the alienation that inevitably attended an organization of such immense size and structure. Every single minute of the day was planned out for me as an employee. Breaks were scheduled, as were lunch times; and electronic systems and constant overhead monitoring made sure that no deviations from the stringent patterns were possible. Although rewards were merely possible, punishment was a certainty.

Tuesday, September 24, 2019

Gregory of Nyssa Research Paper Example | Topics and Well Written Essays - 750 words

Gregory of Nyssa - Research Paper Example Gregory was born in a saintly family, during A.D. 335, being the third son, with two brothers and three sisters. He was the younger brother of the great St. Basil. As he got his education at home, he did not have much interaction with the outside world, during his early years. While he visited the Chapel for the Mother’s Convent, to attend to the services conducted in honor of ‘Forty Martyrs of Sebaste’, he got a dream where the martyrs ridiculed him for not getting baptized. Accordingly, he agreed for the baptization, at his adult age, and determined to become a reader also. Gregory followed the profession of teaching, before finally joining the monastery in Pontus, as his brother and friend Gregory of Nazianzus pursued him to do so. While reading the Holy Scriptures, he also wrote many descriptions about the natural beauty. Bishop of Nyssa Gregory was appointed Bishop of Nyssa in A.D. 370. However, he faced difficulties, as he believed in Orthodox faith. In addi tion, due to his defense of ‘The Holy Trinity and the Incarnation’, Arian and Sabellian authorities targeted him. The prosecution sent him summons to appear before the Synod of Ancyra, for misuse of church funds and being improperly ordained. He got very upset with such allegations and fell ill. His brother Basil made efforts to clean his tarnished image and was successful in getting the Synod of Bishops declare him innocent, as he was not fit to travel to Ancyra for attending the trial. However, his opponent arranged for trial at Nyssa, while Gregory refused to attend it. Finally, he was banished and deposed in the year 376. He had to change his residency many times, as he was subjected to harassment and cruelty at many places, which resulted in his despondency. However, the death of Emperor Valens in 378 changed his fortunes as the succeeding Emperor declared that all orthodox bishops must be allowed to return to their positions. Gregory went back to Nyssa and was wel comed there. Gregory succeeds Basil After the death of his brother Basil, whose funeral was preached by Gregory, he succeeding Basil and followed the Nicene Faith vigorously. Later he went on pilgrimage to Arabia, Babylon and Jerusalem, as the Emperor provided him the required carriages. Gregory’s death He died in the year A.D. 395. However, his legacy as the aggressive defender of Orthodox Faith and great teacher earned him acclaim as ‘Father of Fathers’ and ‘Star of Nyssa’. His faith in all religions and unknown destiny is expressed in his words,†all religious truth consists in mystery†.(Heroes of Fourth Century) Life of Moses The book is a treasure for Christians, as it deals with the virtue and perfection detailed in Christianity. This fourth century scripture by Gregory of Nyssa was originally written in Greek. English and French translations of this book are available today. As the book has two parts, first part details the ‘h istory of Moses’ in 77 paragraphs and the second part deals with the ‘contemplation on life of Moses’, in 321 paragraphs. Explaining a few excerpts The book has referred to verbal roots, as showing affection or having a friend. This has been mentioned in the book as a meditating tool to overcome physical and mental struggle. Another excerpt is regarding ‘Horses are eager to run’. This refers to the human nature of being over-zealous and always busy like winning in a racecourse. (The life of Moses) Referring to a child being given an ark, it details that the ‘ark’ is for crossing the stream safely. The ‘ark’ is the education that the child must have to fight the challenges of life, as it holds the child above the waves of the stream. Virtue is the ‘ark’ shaped carriage for human beings to fight the struggles and it can be acquired through education and patience. (The life of Moses) Contributions in spirituality G regory of Nyssa has contributed to the Christianity in giving us the holy script called, ‘

Monday, September 23, 2019

Major Motivational Theories Research Paper Example | Topics and Well Written Essays - 1000 words

Major Motivational Theories - Research Paper Example This is because one needs highly motivated employees to get the work done. Well motivated employees are those who are keen to do excellent jobs because they feel that they have to. Their goal is to do their job, and that’s what managers need. Intrinsic motivation is the type of motivation that is driven by interest. The interest of the person itself is the drive to make the work his goal. The people who are intrinsically motivated jump on the task to improve their skills. The other type of motivation is the extrinsic kind. The interest of the person to complete the goal if he is extrinsically motivated is usually the things he might get after the goal is achieved, like rewards or punishment. For example, grades and winning are extrinsic motivational factors while studying something because one is indeed interested in that particular area is intrinsic There are many motivation theories that are practiced to have motivated employees. Three of them are discussed in this paper. Th ese theories are: Maslow’s Hierarchy of Needs, Herzberg’s Two Factor Theory, and McGregor’s X/Y theory. Maslow’s Hierarchy of Needs is perhaps the most popular and the most basic motivational theory. It was first discussed in Maslow’s 1943 study called A Theory of Human Motivation. It discusses the levels of human needs and how it is important in understanding these needs in order to manipulate the conditions of one’s employees for them to be good employees. It is often represented by a pyramid, with the needs starting from the bottom and ending at the tip with self actualization. The primary needs of a person are at the bottom of the pyramid, and that’s the physiological need. Then it progresses to safety, love, esteem and self-actualization. According to the hierarchy, one cannot achieve self-actualization if he did not fulfill the previous rung of the pyramid. This means that one should fulfill the physiological need, then the safe ty need, then the love need and then the esteem need in order to achieve self-actualization. Criticism of the theory is largely based on the postulate that the ranking of the â€Å"needs† aren’t really that accurate. Critics argue that food, shelter and other â€Å"physiological† needs are naturally instinctual and should not be included in the pyramid theory. They also say that the needs of a person referred to in this pyramid are largely for the American man. However, this information on motivation is quite important to managers as they would know what their people need, especially in an intercultural atmosphere. Since values and traditions differ, their needs as humans would definitely put a common thread on them, making them easier to motivate based on those commonalities. And even if the criticisms say something common on them, they are not as powerful. The second theory is the Herzberg’s two factor theory. According to this theory, there are two kin ds of motivations: the one that causes satisfaction and the one the causes dissatisfaction. It is also called-hygiene motivation. It is also called content theory motivation. He interviewed 200 accountants and engineers for this who were then asked to recall when they felt good or bad at their offices. From this, he concluded that the motivation of the employees lies on the hygiene factors and motivation factors. Hygiene factors are those things which are needed by

Sunday, September 22, 2019

College Life Essay Example for Free

College Life Essay College life is stress free; whoever said anything about it being difficult is ludacris. Being in college is so nice. There is work but there isn’t as much work as in high school. The assignments aren’t due for credit or points in our final grade. We do assignments for fun. It’s no big deal if we don’t do our homework, cramming the material the night before always works, that’s how high school was. The rest of the time we don’t have class we hang out with friends and talk until the day ends. There are so many things to do on campus such as joining clubs, going downtown, going shopping, or walking around campus with friends; there is no time for homework. There is only time for exploring and having fun in college. That’s what the college life is all about having fun and socializing to our hearts content at parties, during class, after classes and on the weekends. All of the socializing outside of school leads you to do well in college. Testing your boundaries and finding out what you truly love to do. Classes are there to keep you on track and help you appreciate what you’re doing outside of school. School is there to help you realize what you want to do in the future, whether it is your new hobby or your career. College is all about finding yourself. You can always make up the schoolwork anytime, but the main focus that schools want you to do is to have fun while being able to balance assignments and school. They are preparing you for your exciting future in the real world. The real world and the world of college are different but pretty much the same, there are the same workloads and most definitely the same enjoyment in the things you do at work and in college. College work is harder since you have to worry about making connections in college and keeping them strong because those relationships are those that you’re going to treasure most. No one talks about high school memories, everyone talks about college memories. That’s why having the most fun those college years and caring less about school is the way to go for the best college memories and experiences you may ever have, in your entire life. Life is going to be boring without those college years of fun, going in to the working world with more experiences  from college gives you a head up in the game, called the real world. Although you think its bad for you now, but wait until you get to tell everyone about your experiences in college during those job interviews. They will be excited to hire you right off the bat knowing that you are ready for the real world. Ready to work now that you have experience in experiencing the world to its fullest, and being able to share those experiences and relating them to people and their situations. My modest proposal is to enjoy yourself in college, don’t worry too much about the grades. Be in college for the education but don’t forget to go wild when having fun during those college years. You never know when you’re going to be able to experience them again in the real world.

Saturday, September 21, 2019

John Locke on Tacit and Unintended Consent Essay Example for Free

John Locke on Tacit and Unintended Consent Essay In his Second Treatise on Law and Government, John Locke outlines clear and coherent standards for what constitutes a legitimate government and what persons one such government would have authority over. Both are determined by citizens acts of consenting to relinquish to the government part of their natural authority over their own conduct. Unfortunately, the situation becomes much less clear once we consider how his standards would apply to the political situation existing in the real world today. If we continue to subscribe to Lockes account without altering its standards, we would see a precipitous drop in the number of people whose interests existing governments are responsible for serving. In this paper I will show that with certain changes and clarifications to Lockes standards, the responsibilities of existing governments need not be allowed to shrink so drastically. This creates a tradeoff, however. Changing the standards to apply more closely to actual functioning governments has the consequence of making it more difficult to determine the legitimacy of those governments. Some of the clarity of Lockes theoretical model is lost in translating it to apply to actual instances of government. A cornerstone of Lockes political philosophy is the idea that a government holds power legitimately only through the consent of the governed. A civil society consents to grant a particular government rule over it, and each person chooses on an individual basis to become a member of a particular civil society (II, 117). As giving such consent has far-reaching consequences over a persons life, Locke provides further explanation of what consent entails in this context. Only one way exists to become a member of a civil society: express consent. From Lockes account this would have to be a fairly formal business, which the individual enters by positive Engagement, and express Promise and Compact (II, 122). Lockes original wording is important because it seems to imply that unless a person actually makes a public agreement to submit to government law in return for protection of person, liberty, and property, she has not expressly consented. He makes it clear that there are no alternatives to this official process if one is to become part of a civil society, (II, 122). Even if one is not considered part of a particular civil society, she must submit to its authority to the extent of her involvement in that society. Someone who owns land within the territory occupied by a civil society is obligated to obey the law of whatever body has ruling authority in that territory as it applies to ownership and use of property. Someone merely travelling on a public road through a country will have less contact with the civil society of that area and so fewer laws of that society will have application to her behavior. Still, those laws that do cover what activities she carries out have binding force on her (II, 120-121). These people incur the obligation to submit to local authority because that authority is protecting them, perhaps by preventing the citizens of the area from acting in ways that would harm other people including the outsider. For the outsider to be free of those restraints and take advantage of the areas citizens would be unjust; therefore she is obligated to comply with the legal restraints observed by citizens the area. In neither of these cases would the person in question be considered a member of the civil society whose laws she is obeying unless she expressly consented to join that society in addition to her tacit consent to follow its laws. An immediate criticism of Lockes account thus far is that in practice, hardly anyone expressly gives consent to join any civil society. Even in most real-world cases where a person does announce submission to a particular government, the declaration would not meet Lockes conditions of consent that would give legitimacy to the rule of government over that person. Oaths such as the U. S. Pledge of Allegiance are usually only indications that the speaker is prepared to obey directives from the government of a particular state. Consent in the strict sense would have to make explicit what the person is consenting to. Someone joining a civil society under Lockes conception would need to spell out that she is giving up the right to make and enforce her own judgments to the government of that society, in return for that governments protection of her interests. Even promises of blind obedience are far from universally practiced, and in most countries are the practice of reciting such pledges is confined to schools and youth groups as a form of education rather than contractual agreement. (The idea that most civil societies do not consider young people mature enough to consent to become members is discussed later in this paper). Explicit contractual consent is far rarer than these questionably binding declarations. If most people fail to give explicit consent to trade away some of their natural rights, under Lockes terms they have not joined any civil society, and so should not be counted as the citizens of any state or the subjects of any government. This has profound significance because of the relation between civil society and government. The agreement of a civil society is the force and justification behind its governments authority (II, 149); in return for the mandate that grants it power, the government exists to protect the interests of that particular group of people. Anyone not the member of a particular civil society has no legitimate voice in the form or operation of the government that society creates, and she has no right to expect that government to protect her interests. This does not mean that the government will not take any actions that are to her benefit; the laws of that nation which prevent its citizens from killing and robbing may also prevent them from killing or robbing her. When the government enacts laws, however, it need only do so with the interests of its constituency in mind, and has no obligation to create laws conducive to the interests of an outsider. Any benefits the outsider enjoys as a result of the laws of a particular country are purely coincidental to those laws intent. Someone who is not a member of any civil society at all will accordingly have no power over any government, and her interests will deserve the consideration of no government. Since the vast majority of people have not given express consent to join a particular society, the majority of humanity has no right to expect its interests to be served or protected by any of the governments existing on earth. Everyone, however, is required to submit to the control of one government or another depending of where they live, since basically every part of the earth inhabited by humans is under the dominion of one state or another. Rule is solely in the hands of those few people who have actually signed some kind of formal social contract, and needs only to consider their interests. Any government with which no living person has made a formal consent agreement rules illegitimately. The fact that Lockes model leads to an implication that most of humanity is neither the legitimate authors nor the deserving beneficiaries of government does not prove the model is logically flawed. However, the very great majority of people consider themselves members of a civil society, and are considered as such by other people and, most importantly, by governments. However real governments define their constituency, few if any set express consent as the standard. Enslavement of the tacitly consenting masses by the expressly contracted few thus fails to provide an accurate theoretical model of governmental institutions in the real world. Locke himself describes of the formation of government as an action taken by and for the community (II, 149); this wording suggests that he would have disagreed with the idea that citizenship by express consent leading to dictatorship by a de facto minority is, in practice, the most typical form of legitimate government. It is possible that those without citizenship (the majority of people under our present definition) actually benefit by not being contractually bound to any particular civil society. As long as someone who is not an official citizen resides within the territory of an existing government which fulfills the duties expected of government (II, 131), its laws discourage both citizens of the civil society and other outsiders from threatening her life, liberty, and property. Thus someone could enjoy much of the security that membership in a civil society would provide simply by living in a well-governed area without joining in civil society. In PHI 309 lecture, Prof. Sreenivasan pointed out a possible advantage that such a living arrangement could provide for the unaffiliated: in cases where it was in ones best interests to abandon a country beset by war, pestilence, or economic or other disaster, noncitizens could jump ship without that act being considered an injustice. Those who had by express consent tied themselves to the civil society might well be obligated to remain with the community, and would not have the option of fleeing the war or hardship. Yet in most of the world, nomadic living is considered the exception, not the rule. Citizens of the worlds various nations must be considering factors not included in Lockes account. One of the most significant of these is a convention that has introduced a new kind of consent enabling people to become citizens of particular states. Most civil societies have found it desirable to designate officially who is a member of that society, i. e. a member of that state. As a governments power depends on its constituency, government function is expedited by the governments having accurate knowledge of the extent of its power base, that is to say the extent of its citizenry. At the same time, concern for its own integrity and distrust of outsiders drives a civil society to delineate who is and is not a member. These and perhaps other factors have led to the creation of conventions (usually expressed as laws passed by governments) by which a person is declared to be a member of a particular civil society (i. e. citizen of a country) regardless of whether or not that person has actually expressed consent to what such membership entails. The most typical example is a law declaring that anyone born in the territory of a particular nation is a citizen of that nation. When still a juvenile, that person of course has not actively consented to anything, and so is usually considered not complete member of civil society; although part of a community, the juvenile generally lacks certain rights and powers given to full members of the society. Upon reaching the age when she can make her own decisions, laws indicate what society the person is considered a member of in the absence of active consent by that person. The person continues to hold that default membership until she makes an active decision to join another civil society. The conventional reflection of this active decision is generally a naturalization process by which someone can become a citizen of a country she did not belong to by default. By going through the naturalization process, a person is understood to consent to the tradeoff which would make her a member of that civil society. It could be objected that being considered the member of a civil society by default is another matter entirely from consenting to join that society and willingly relinquish ones rights. Where is the consent in this instance? This question is less troubling before the person has come of age, because most would agree that a juvenile generally lacks the judgment to be signing any kind of binding social contract. But can a government legitimately assert that a person has consented to cede her rights to it simply because she has not actively protested? This question could be answered affirmatively. A person can choose not to consent to membership in her default civil society, or give up her membership in a civil society she already belongs to, by joining another civil society through a more active process such as naturalization. This means that if she does not take such an action, she is accepting the convention that interprets her inaction as an expression of consent to join the civil society she was assigned to by default. By systematizing and codifying standards for consent, then, states in actual practice ensure that the great majority of people are not lone agents. One might still question how conscious most people are that they are held to be making this sort of contract, even in the most open societies. A case can be made that essentially, they are aware. No one is unaware of what society she belongs to. Each person is effectively the member of whatever civil society exerts control over her, usually through its government. As soon as that person is conscious of the control being exerted over her, she is made unmistakably aware of what her citizenship is. With the realization of what government she is under comes the option to change her membership. The final and most damaging criticism of the consent model is the question of what happens when a person does not have the option to move to a new territory and join a new civil society. This may occur because of a persons own lack of means to carry out or simple ignorance of the options ostensibly available to her. It may also be the result of oppression by the government, preventing citizens of the country from leaving. Any of these conditions can force a person to remain an official member of a particular civil society. However, the standard of conventionalized explicit consent introduced above is only able to maintain that most people consent to join a civil society because it assumes those people have options besides their initial citizenship. If people are not being given other options, the model is still not logically flawed. Rather, it suggests a situation similar to that originally introduced as the consequence of applying Lockes model to the real world: the people in such situations are not really part of the civil society that created the government to whose control they are forced to submit. As such, they retain undiminished the right to join another civil society through a new social contract. If they do so, they may create a new government to follow instead of the one they currently submit to by tacit consent. Of course, there is no guarantee that the government ruling them in the status quo will allow them to replace its control. If it retains control over them by force, Lockes model would still hold them to be tacitly consenting to its authority by enjoyment of its dominion. This counterintuitive conclusion is avoided by the model requiring choice for real consent. If we follow that paradigm, we come to the conclusion that the government is ruling without any consent from the governed in those cases. According to Locke, such government is mere enslavement and so is illegitimate. To say that a government is wholly illegitimate if it hold power over even one person without her consent is clearly excessive; probably no government could ever achieve legitimacy under that criterion. However, we can say that a government is legitimate to the extent that its citizens are aware of other options and consider membership in their current civil society with its ruling government preferable to those options. The problem with such a standard is that it depends on what is thought by the citizens of a country, and to ascertain a persons mentality is difficult. The most reliable test is to provide citizens with realistic options and observe whether they remain with the status quo or seek a change in their situation. That change may involve leaving their current civil society, or it may mean seeking to change the structure or behavior of that societys government. The countrys citizens can be said to consent to the government ruling them to the extent that they posses the power to change their situation, but still maintain the status quo. Thus, the legitimacy of a government can be measured by the effective options available to its citizens. If we had held to Lockes standards for consent to membership in a civil society and submission to government rule, we would have concluded that most people in the world are tacitly consenting to the rule of governments created by very small groups of explicit signers of social contracts. This would lead to a bizarre picture of the political landscape very much at odds with intuition and with modern reality. By changing standards for consent to mean compliance with official requirements for citizenship when other options are available, we are able to account for those who consider themselves and are considered members of a civil society without having given explicit consent, while at the same time freeing those not given a choice from the appearance of having given consent. A government is then legitimate to the extent that its citizens have given consent according to these standards. It is one of those rare examples where laws have made the situation clearer. Sources: Locke, John. Second Treatise. From Two Treatises of Government, Laslett, Peter, ed. New York: Cambridge University Press, 1988.

Friday, September 20, 2019

China and the Central African Republic

China and the Central African Republic I-Introduction Central African Republic is a landlocked country bordered in the south by the Democratic Republic of the Congo and the Republic of the Congo, in the north by Chad, Sudan in the east and Cameroon in the west. It gained its independence in August 13th 1960 and Bangui is the capital. The two official languages are French and Sango. Francois is Yangonvouda-Bozize current the President took the power during a coup in March 2003 [The Economist US (2005)]. Since its independence, the Central African Republic has been destabilized and further impoverished due to a cycle of political-military uprisings and violence [HAC, (2011); UNICEF, (2008); The Economist, (2008)]. Constitutional order was restored in 2005[UNICEF, (2008)]; however, the overall situation until now in the country remains volatile, marked by tensions among and within political parties, a precarious socio-economic situation, deteriorating humanitarian conditions and insecurity in the north of the country due to activities of rebel and criminal groups [UNICEF, (2008)]. The United Nations implemented a Peace-building Office in the Central African Republic (BINUCA), in an attempt to promote peace and stability in the country and reduce cross-border insecurity [UNICEF, (2008)]; This was carried out to encourage national dialogue and reconciliation and furthermore to help the Central African Republic enact military reforms, implement human rights policies, train civilian police, and disarm, demobilize and reintegrate former fighters. Besides that, the CAR is surrounded by countries like Chad, Sudan and DRC, which have been destabilized for a long time by civil wars. These lead many refugees to seek for shelter in CAR [The Economist, (2005)].All those characteristics create a volatile political situation and an uncertain climate for foreign investment. The CAR is blessed with many natural resources such as diamonds, timber, uranium, oil, iron, gold and hydropower [Africa.com, (2008)].However, it is still rated among the poorest countries in the world. Its economy is disadvantaged due to its landlocked position, which isolates it from foreign suppliers and markets and contributes to high import prices. It has the potential to become a major agricultural product exporter. It also has hydroelectric potential that could be developed for export to neighboring countries that have power shortages. The relations between China and the CAR have evolved saw tooth since the early 60s. On several occasions, the CAR broke and re-established its ties with the People Republic of China. Since the arrival in power of President Bozize, it seems that the CAR and China are enjoying steady and smooth relations. Yet the country is still facing to challenges regarding to its socio-economic situation. Nothing is so much said nor written about China and the Central African Republic. What is really going on between the two countries? China has invested in it, especially in terms of infrastructure. Does the government gain from it? What about the population? Is CAR really benefited from that relation? In what extent China can help the CAR to come out from the cycle of poverty? II-Central African Republic (C.A.R): 2.1Facts and figures According to the United Nations Human Development Index, the CAR now ranks 172 out of 177 least developed countries in the world [UNDP,(2006)]. Two-thirds of the population live under the line of poverty, less than half are literate, and the average life expectancy hovers around 40 years, resulting in a very young population with almost fifty percent under the age of 18, and only four percent aged 60 and over[UNDP, (2006)]. The CAR is really affected by AIDS that is why the life expectancy is constantly falling and dropped below 40 according to the UNDP Report on Human Development 2006. Per capita income is USD 456. POPULATION 4,422,000 SIZE 622,984 km ² CAPITAL CITY Bangui LANGUAGES French and Sango (officials languages);TRIBAL LANGUAGES LARGEST CITIES Bangui and Bimbo RELIGION 35% Tribal beliefs, 25% Protestant, 25% Catholic, 15% Muslim MONETARY UNIT Franc NATURAL RESOURCES Diamonds, uranium, timber, gold, hydropower AGRICULTURE Cotton, coffee, tobacco, cassava, yams, millet, corn, banana; timber EXPORT COMMODITIES diamonds, timber, cotton, coffee, tobacco IMPORT COMMODITIES food, textiles, petroleum products, machinery, electrical equipment, motor vehicles, chemicals, pharmaceuticals INDUSTRY Gold and diamond mining, logging, brewing, textiles, footwear, assembly of bicycles and motorcycles 2.2 Political and economic situations The CAR is blessed with natural resources to use and develop in order to come out of its cycle of poverty. However, three decades of mismanagement, from the 60s when it gained its independence until 1993 which seen the organization democratic elections for the first time, most of the time under military rule and one decade of chronic unrest and political fights (1993- 2003) led the country to bankruptcy [International Crisis Group, (2007)]. Francois Bozize gained the power in March 2003 by a coup and overthrown Ange-Felix Patasse [International Crisis Group, (2007)]. Due to the chronic instability since 10 years this makes very difficult for CARs governments to follow-up a long term economic development strategy that is why the country is currently facing a lack of modern transportation network which represents the chokepoint for the development of its economy. For instance, the length to reach Bangui the capital city is about 12 to 14 days of river transportation [CAR, (2009)]. Why is CARs economy always under threat of strangulation? Geographically, the CAR is trapped in an unstable triangle and surrounded by the Democratic Republic of the Congo, Sudan and Chad that which are destroyed by many years of civil wars [IMF, (2010); The Economist, (2008); UNHCR, (2000)]. Furthermore, shipment arrivals are often delayed or canceled because of rebels attacks [HAC, (2011)] that are causing so much trouble in the region. The nation of CAR is principally agrarian [International Crisis Group, (2007)]. In 2003, agriculture accounted for 60.8% of the countrys GDP [UNCTAD, (2005)]; crops primarily including cotton, food crops such as cassava, yams, bananas, maize; coffee and tobacco. In 2004, the agricultural labour force accounted for 69% [UNCTAD, (2005)]. The population of CAR is engaged in subsistence farming with 56% attributed to the agricultural sector in 2006. In 2002, timber accounted for about 30% of export earnings. The CAR is blessed with a huge unexploited natural resources in the form of uranium, gold, diamonds and others minerals [Investment Climate Report, (1995)]. In 2010, its main exports were diamonds, cotton, timber, coffee and tobacco. Diamonds are the main natural resources being currently developed [Investment Climate Report, (1995)]: in 2002, the CAR was able to export 50% of its diamonds earnings [Crisis Group Africa, (2010)]. In 2003 and 2006, industry contributed for respectively 24.9% and 15% for the latter of the countrys GDP; breweries, diamond mining and sawmill represent the bulk of the sector. Due to the oversized government bureaucracy and its landlocked position, services accounted only for 29% of GDP in 2006. The same year, its main importer of goods was France and represented for 17.6% and they mainly exports goods toward Belgium (40.4%) [Investment Climate Report, (1995); UNCTD. (2005)]. In 2000, the percentage of population with access to electricity accounted for 5% only [UNCTAD, (2005)]. The CAR really lack of electricity supply. The main and only hydroelectric plants are based in Boali. Mostly, fuel supplies are transported in via the Ubangui River or trucked through Cameroon, resulting in frequent shortages of gasoline, jet fuel and diesel. The countrys transportation and communication network is limited; it does not possess a railroad, however it has only 650 kilometers of paved road. It does not possess any domestic air service, except charters, so very limited internationally. Furthermore, commercial traffic on the Ubangui River is very rough even impossible from December to May or June, due to ongoing conflicts in the region that sometimes prevented shipments from moving between Kinshasa (capital of DRC) and Bangui. The telephone system functions, albeit imperfectly. The CAR possesses only one television station that has been built since the independence, an d four radio stationsare currently operating in the country. Numerous newspapers and pamphlets are published on a regular basis, and at least one company has begun providing Internet service. In terms of economic, the C.A.R. has made slow progress; its budget and external trade are deficiency due to many constraints like the poor infrastructure that it is facing, economic mismanagement and scarce private investment, as well as a limited tax base and adverse external conditions have led the country to a desperate situation. Its debt burden is considerable, as well as its per capita gross national product (GNP). The World Bank and the International Monetary Fund (IMF) have implemented some structural and interest-free credits as well to support investments in the agriculture, livestock, and transportation sectors, unfortunately these have had limited impact. The World Bank and IMF are now encouraging the government to concentrate exclusively on implementing much-needed economic reforms to jumpstart the economy and defining its fundamental priorities with the aim of alleviating poverty. As a result, many of the state-owned business entities have been privatized and limited e fforts have been made to standardize and simplify labor and investment codes and to address problems of corruption. The C.A.R. Government has adopted the Central African Economic and Monetary Community (CEMAC) Charter of Investment, and is in the process of adopting a new labor code. Furthermore the CAR received debt relief in June 2009 by the World Bank and the IMF [IMF, (2010)].It reached the final completion-point stage of the Heavily Indebted Poor Countries Initiative [IMF, (2010)]. Since its independence, the CAR has been unstable and endured several coups; David Dacko ended the Bokassa era in a coup in 1979 [International Crisis Group, (2007)]. David Dacko was overthrown by a coup led by the General Andre Kolingba two years later. For the first time, he allowed multi-party presidential elections in 1993 and was defeated in the first round by his successor Ange-Felix Patasse. However, 1997 the discontent of unpaid soldiers resulted in a successive wave of strikes and uprisings from the latter [International Crisis Group, (2007)]. . The same year the French troop pulled out and Paris financed a group of French-speaking African countries to create a peacekeeping force. This leads to the creation of the UN Mission to the Central African Republic, or Minurca [International Crisis Group, (2008)]. In 1999 Ange-Felix Patasse won the elections a second time however there were allegations of electoral fraud. He went into exile in Togo after being overthrown in a coup in 2003 by General Bozize the current president of the CAR. The legacy of years of unrest has generated an illegal weapons proliferation across the CAR. Rebels armed groups are active in the volatile north. The unrest has displaced tens of thousands of Central Africans; many of them have crossed the border into Chad. Under Bozize era, some progress towards ending the conflict was made in 2008, when peace talks led to an agreement committing two of the main rebel groups to disarm [IMF,(2010)]. The process culminated with the creation of a national unity government incorporating two rebel leaders in early 2009. 2.3 A Modest recovery Since 2004 the Central African Republic has been able to achieve a modest economic growth [IMF, (2010)]; firstly, it gained full debt relief from the IMF and the World Bank in June 2009. Secondly it concluded a current Poverty Reduction and Growth Facility programme in June 2010. This successfully led to the achievement of a three-year programme with the IMF especially after the success of the Emergency Post-Conflict Assistance Programs. Furthermore, the CARs government implemented a macroeconomic management policies and necessary structural reforms that led to a modest recovery from the economic shock in 2009. The government worked hard to further strengthen the credibility of public financial management, enhance public infrastructure, and intensify foreign donors and the private sector investment climate [US department, (2010)] as well. Since President Bozize leads the CAR some encouraging result has been noticed by the Internationals institutions like IMF or World Bank. The CARs government understood that it was its priority to restore security and peace in the country. The government established what it called the â€Å"inclusive political dialogue† that gathered the political opposition and the government together to seek for security and peace for the country. That initiative was successful in the extent that it was part of the demobilization, the disarmament and reintegration program which led to the smooth conduct of the elections in 2010 [IMF, (2010)]. In terms of building infrastructure and climate investment the CARs government has a lot to do in order to unlock the countrys economic situation. The government has no other choice than on the one hand relying on foreign partners and on the other hand must engage coherent and filmy policies over the long term to come out of its cycle of poverty [IMF, (2010)]. III- Chinese engagement with the CAR 3.1- The political relations AT many occasions the CAR cut off and resumed its diplomatic relations with the PRC and Taiwan. The diplomatic ties between China and the Central African Republic experienced ups and downs: In 1962, the CAR recognized Taiwan as part of Chinas territory and established for the first time diplomatic ties with the island. Two years later, it broke off its diplomatic link with Taiwan and established diplomatic relations with China. The CAR resumed diplomatic ties Taiwan third times. Leaders of both side exchanged high levelcontacts. These underline the importance a state attaches to its relations with another. 3.2 Trade and Economic Relations In November 2000, China and Central Africa Republic signed an agreement on trade, economic and technical cooperation [Chinese Foreign Ministry, (2006)]. In August 2004, both countries signed a bilateral cooperation agreement in fields such as energy, infrastructure and agriculture[Holslag, (2006)]. Today, China is an important commercial partner for the CAR.In 2002, trade volume between both nations accounted for US$ 1.944 million with US$ 0.687 stemming from Chinas export and US$ 1.257 million from the Chinas import. The CAR mainly exports timber and cotton to China and imports principally footwear, textiles and electrical and mechanical products from China [Chinese Foreign Ministry, (2006)]. China has been an active investor in the Central African Republic, especially in construction, and has been involved in a number of joint cooperative ventures with the government, covering health, agriculture, stock-breeding, communications and trade .It undertook numerous projects in CAR and built for instance the Boali agricultural technological station, a training center for straw-bamboo weaving handcrafts, the new stadium, a clinic in the presidential house, the Bangui hospital and agricultural project, the extension work of the Pingpo Radio Transmitting Station, etc[Chinese Foreign Ministry, (2006)]. During his visit in China in 2009, President Francois Bozize called on China to invest in its country 3.3 Exchanges in other fields After signing a joint communiquà © in August 20th, China and the CAR signed in November 1976 an agreement on sending Chinese medical teams to Central Africa Republic. In June 1980 both countries signed an agreement on cultural cooperation and renewed it in June 1998 look for the number of students in China. Since 1997, China has begun to accept Central African students for study and on the job training. Today both parties acknowledge the necessity for the CAR to enhance its self-development ability as well as its local Human Resources training IV- China- CAR: Why the slow progress? One wonders what is happening in Central African Republic as the country is blessed with natural resources but still ranking as one the poorest in the world. International news portrays it as a â€Å"phantom state† [African report, (2007)]. Since the resuming of bilateral cooperation with China in 1998, the relation is experiencing smoothly and slowly evolution. In 2009, during a high level visit to China President Francois Bozize spoke to his Chinese counterpart Hu Jintao and expressly called for Chinese investment in its country [BBC, (2009); AFP, (2009); China consulate, (2011)]. China is now an important economic partner for the CAR [BBC, (2009)]. However in an article published in 2009, the BBC wrote that the â€Å"CAR is a much less valuable economic partner to China†. Considering that statement one wonders whether China really considers the CAR as a less valuable partner. How the Chinese governments perceive the CAR? How does the CAR perceive the Chinese involvement in the country? The CARs government welcomes the Chinese aid in spite the political instability in the country, especially in the north [African Report, (2007)].However, China doesnt deter to invest in it by building the new 20.000 seats-stadium, schools, hospitals, etc. Regarding to that assistance, can it be stated that the CAR is â€Å"a much less valuable† for China? The CARs situation is peculiar and really needs from the scholars, journalist, central African leaders, the civil society, all the stakeholders as well, further attention.

Thursday, September 19, 2019

The Effect of Age on Taste Essay -- Senses Aging Essays

The Effect of Age on Taste The sense of taste has to be one of the most important human senses. It gives an individual the ability to recognize consumables that are encountered on a regular basis such as a favorite steak platter or a favorite wine. However, when that individual reaches a particular age the sense of taste deteriorates, which can result in potentially dangerous conditions such as malnourishment or susceptibility to diseases. This problem of taste loss due to aging needs to be studied more because it can effect both the physical and mental health of many elderly people. When elderly individuals try to live life with a weakened ability to recognize certain food flavors or any other consumable item, their dietary needs can be greatly affected. A certain number of foods are not going to taste good enough to satisfy the appetites of the elderly, so they might resort to using unhealthy eating habits. For example, they could lose the motivation to eat certain foods such as vegetables or meats and increase the consumption of foods that are low in nutritional value such as candies or pastries. This shift can result in health problems such as a loss in bone mass, a weakened immune system, weak muscles, and high blood pressure. Elderly citizens need to acquire a specific amount of nutrients in order to maintain a healthy life style. Spence (1989) mentioned that diets which maintain adequate levels of vitamins and minerals and also consist of 50 to 55% carbohydrates, 12 to 15% proteins, and 25 to 35% fats are recommended for persons over the age of 50. In order for the elderly to live up to a healthy diet, they need to consume nutritious foods that will taste good to them. The problem with this situation is how to h... ...ews, 50 (12), 72-75. Miller, J. (1988). Human taste bud density across adult age groups. Journal of Gerontology, 43 (1), 26-30. Schieber, F. (1992). Aging and the senses. In J. E. Birren, R. B. Sloane, & G. D. Cohen (Eds.), Handbook of mental health and aging. San Diego: Academic Press Inc. Schiffman, S. (1977). Food recognition by the elderly. Journal of Gerontology, 32 (5), 586-592. Schiffman, S. (1994). Changes in taste and smell: Drug interactions and food preferences. Nutrition Reviews, 52 (8), 11-14. Schiffman, S. (1997). Taste and smell loss in normal aging and disease. Journal of the American Medical Association, 278 (16), 1357-1362. Spence, A. P. (1989). Biology of human aging. New Jersey: Prentice Hall. Spitzer, M. E. (1986). Taste acuity in institutionalized and non institutionalized elderly men. Psychological Sciences, 43 (3), 71-74.

Wednesday, September 18, 2019

Aimee Mann Lyrics and Gendered Language Patterns :: Free Essays Online

Aimee Mann Lyrics and Gendered Language Patterns Paul Thomas Anderson claims that many of the characters for his film Magnolia[1] were inspired by Aimee Mann lyrics and from knowing Aimee as a personal friend. As the film unfolds, the main theme of connectivity between the characters becomes apparent. If they are not connected in a physical way, they each are in a symbolic way linked as they deal with the necessity of love. Several times it is spoken in the film how someone has love to give, but does not know how to show it. The character Claudia, which Anderson said was played â€Å"with a true sense of Aimee Mann insanity†[2], is so desperate for love and to be needed; yet when Jim offers his love to her, she is so terrified that she runs from it. Here Anderson decides to not only refer to Aimee Mann, but actually has Claudia state to Jim a lyric from Aimee’s song â€Å"Deathly†: â€Å"Now that I’ve met you would you object to never seeing me again?†[3] As Claudia runs from the rest aurant it is clear that being needed in a relationship distresses her, the same emotion Aimee[4] reveals in her song lyric. As Anderson uses a song lyric as text in the film’s dialogue, the question of how lyrics can be looked at in terms of conversational content is raised. In showing how men and women speak differently Tannen cites many kinds of examples in You Just Don’t Understand. Not only does she look at experimental and observational studies, she also includes excerpts from plays and short stories to show that speech patterns carry over into artistic expression[5]. Lyrics then can be examined in this same manner though they are a different type of conversation. If a play is two or more characters conversing with one another on stage, a song lyric can be viewed as one side of a story of dialogue. It does not become any less conversational because of this, but is a different way to interpret a relationship. Deborah Tannen has achieved scholarly and public praise for her conclusions about how women and men differ in conversational styles. You Just Don’t Understand[6] clarifies stylistic differences in how the two sexes communicate with each other.