Tuesday, June 9, 2020

The Usage of Language in East of Eden - Literature Essay Samples

With its intricate, complex plot infused with an abundance of emotional turmoil, John Steinbeck’s East of Eden is indeed successful in fulfilling its authors intention to rip a reader’s â€Å"nerves to rags.† As one finally becomes satisfied with the novel’s progression, Steinbeck orders a dramatic turn of events which transforms the satisfied mindset of the reader into hair ripping frustration within a matter of seconds. Thus, with descriptive imagery, use of theme, and specific diction, Steinbeck without a doubt succeeds in failing to satisfy his reader and is able to elicit vivid reactions. Steinbeck opens East of Eden with detailed descriptions of setting. It is noticed that his description of Salinas Valley in the beginning of the novel parallels with the theme and future progression of the story. He introduces his theme of â€Å"balance† and the comparison of good and evil in an analogy to the setting; he describes his childhood in the Salinas and states, â€Å"I remember the Gabilan Mountains to the east of the valley were light gay mountains [†¦] The Santa Lucias stood up against the sky to the west [†¦] they were dark and brooding – unfriendly and dangerous. I always found in myself a dread of west and a love of east† (Steinbeck 1). Gabilan vs. Santa Lucias, loving vs. brooding, east vs. west, birth vs. death, good vs. evil; already the author alludes that there will always be a bad side to everything, which causes the readers’ angst. Situations where the reader temporarily becomes satisfied changes as the â€Å"bad† to the â€Å"good† steps in. In his description of the Valley, the author also mentions blue flowers, and how the white flowers tend to bring out the blue. By placing contrasting colors or events together, one would stand out more. Therefore, by placing the â€Å"bad† with the â€Å"good,† the â€Å"bad† seems worse. The ups and downs, the bad and good, the unsatisfied and satisfied, contribute to the emotional turmoil that the active reader experiences. Furthermore, the ambivalent nature of the story inhibits the reader from maintaining a single emotion and a single mindset, as Steinbeck is able to turn the story around instantaneously. When Adam meets Cathy, the readers know that Cathy is evil, though Adam is seemingly oblivious. After she recovers, he pops the question, â€Å"A surge of love filled him. ‘Will you marry me?’† (Steinbeck 120). Adam’s naà ¯ve and innocent words of love causes agitation within the reader. Nearly every single individual, both book character or reader, knows the true nature of Cathy. On the other hand, Adam’s common sense is clouded and disillusioned by his love for her. When he asks her to marry him, already the reader is able to anticipate an unfortunate future that has yet to come. These turn of events give the readers an uncontrollable urge to toss the book and shout at the characters – and perhaps the author – â€Å"WHY?† Adam’s proposa l to Cathy is one of many events that have caused an intense reaction in the reader. At times, the mood is absolutely ominous. Other times, the mood is playful. With his specific diction, Steinbeck is able to alter his tone and the readers’ emotion however he pleases. He thoroughly enjoys the use of figurative language, especially similes, metaphors, or any type of comparison. By utilizing comparison, Steinbeck is able to put any situation on an intensity scale and give either a negative or positive connotation. At one point in the story, Adam speaks to Eva, Kate’s assistant. Eva’s reply is noticeably cold and uninviting, as â€Å"the girl’s voice took on the edge of a blade sharpened on a stone† (Steinbeck 315). The specific word choice indicated in the metaphor is the very sharp edge of a blade. Steinbeck very well could have merely used â€Å"the girl’s sharp voice† but instead chooses to portray the girl’s voice as the sharpness of a blade. He specifically utilizes this phrase to insinuate that her voice, th ough sharp, is also murderous, dangerous, and able to kill like a blade. In this situation, the blade metaphor makes the uninviting mood even more uninviting. One of many of Steinbeck’s uses of extremely descriptive word choice and figurative language, this quote furthermore gets on the readers’ nerves and engraves into his or her head a lifelong impact. One final relation, which is extremely significant to the story, is the term â€Å"timshel,† or choice. Though of course there is a contrast between good and evil, Steinbeck weaves â€Å"timshel† into this plot. Each man is given a choice of which path to choose. The unpredictable nature of decisions; the unpredictable, and sometimes disappointing, result of â€Å"timshel,† leaves the reader in a state of angst and exasperation. Steinbeck is ultimately successful in causing emotional turmoil within a readers’ mindset with his descriptive imagery, unique twist to plotline, and specific word choice. â€Å"I’ve done my damndst to rip a reader’s nerves to rags, I don’t want him satisfied,† and indeed Steinbeck easily achieves this goal.

Sunday, May 17, 2020

Sexual Relationship Among Romantic Partners - 1473 Words

A recent study of sexual relationship among Romantic Partners, Friends, Friends with Benefits, and Casual Acquaintances as Sexual Partners was conducted by two researchers Wyndol Furman from the Department of Psychology, University of Denver and Laura Shaffer from the Department of Psychology, University of Louisville Schools of Medicine. Authors, through their intensive research and sample studies, interviews and questionnaires, have examined and concluded their findings on sexual behaviors with different partners. Their research was mainly focused on sexual relationships in romantic married and cohabitating couples versus nonromantic young adults and adolescent partners. They believe sexual behavior mostly occurred among nonromantic†¦show more content†¦2011). And, the purpose of conducting the research study was to examine sexual behavior among different types of partners. They explained three levels of sexual behavior with partners by explaining â€Å"Light†, â€Å"Heavy†, and Genital acts to measure the affection status with partners. Based on the existing literature (e.g. Grello et al., 2006; Manning et al., 2006), Authors believe that young adults would be more likely to engage in light nongenital, heavy nongenital, and genital sexual behaviors with romantic partners than with nonromantic partners of any type (Furman, W., Shaffer, L. 2011). Method and Measures Participants of the research were part of a longitudinal study which investigated the relationship in peers, romantic partner, parents, adolescence and young adulthood. For the research, 200 high schools students mostly of whom 10th grade boys and girls were recruited from ages 14-16 from various ethnicity and diverse neighborhoods, schools and metropolitan areas to conduct the research study. The sample included 11.5% African American, 12.5% Hispanic, 1.5% Native American, 1% Asian American, 4% biracial, and 69.5% White (non-Hispanic) (Furman, W., Shaffer, L. 2011). The sample was of average intelligence and did not differ from national norms on 11 of 12 measures of adjustment (see Furman, Low, Ho, 2009).

Wednesday, May 6, 2020

A Review of Leadership in Nursing related to Clinical...

A Review of Leadership in Nursing related to Clinical Nursing Practice Abstract: Leadership in Nursing has become a major issue in health care settings and in management. Leadership in nursing is a wide in nursing field which includes different aspects. The aim of the review if the literature is to analyse the why nurses enter in the leadership in nursing and leadership in clinical nursing area to enhance the patient outcomes and to improve the quality of the service provided to the patients. This review includes studies from National Health Services in United Kingdom, University Hospitals of Leuven, Belgian Ministry of Social Affairs and Health Sciences of Sweden†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..? Introduction: Nursing is a profession which has wide range of†¦show more content†¦The issue leadership in nursing is central to National Health Service modernisation strategy and policy in United Kingdom. The Department of Health has launched a number of major leadership initiatives in recent years in 1999, 2000 2001. These initiatives in practice includes clinical audit, risk management, user involvement, evidence based practice, continue professional development, management of inadequate performance team building and team review (Hillward Bryan, 2005). Studies and researches show that leadership is a major issue in the nursing profession and it is important to improve nursing practice for better patient outcomes and quality of care given. It was in this context I thought of reviewing the available literature regarding leadership in nursing. This review includes nurses enter in leadership in nursing and leadership in clinical nursing area. Path to nursing leadership- In this school of Health Sciences, Sweden study the Bondas, (2006) analysed data collected from semi structured self reported questionaries that were focused on becoming a nurse leader and content relevant to nursing leadership. The study concluded that there were variations in the way the nurse leaders had entered leadership and considered applying for a management position. The findings show that there was rarely a conscious choice to apply forShow MoreRelatedEvaluation And Evaluation Of The Cns Responsibilities And Competencies For St. Francis Hospital1172 Words   |  5 Pagesthe job of a CNS, so I embarked to the nursing office, where I asked the Vice President of nursing if there was a more in depth job description of a CNS. Vice President of the facility was able to attain the job description for me and also stipulated that it is used to evaluate the CNS. The CNS responsibilities and competencies for St. Francis Hospital are as follows: †¢ Directs clinical practice to include expertise in advanced assessment, implementing nursing care, and evaluation outcomes. ProvidesRead MoreInterview With A Certified Nurse Practitioner1446 Words   |  6 Pagesis ever evolving, remarkably changing the sphere of nursing practice. The roles of Advanced Nurse Practice practitioners are expanding, taking up a multitude of roles across a diversified healthcare specialties. Advance Nurse Practice practitioner stands as leader in this comprehensive profession bridging the gap in management and clinical aspect of care (McDermott Morant, 2010), reflecting the complexity of culture, organization and practice setting (Hyrkas Dende,2008) to improve the qualityRead MoreThe Foundation Of The Jjc Nursing Program Essay1105 Words   |  5 PagesMy practicum setting will be an associate degree nursing program, Joliet Junior College (JJC), one of the oldest community colleges in Illinois. The mission of the school is focused on offering s tudents an affordable, accessible valued education for a lifelong profession in nursing, and to serve the community (Joliet Junior College [JJC], n. d.). Accordingly, the school’s philosophy is based on preparing students to be exceptional providers in the growing healthcare system, providing safe and highRead MoreEvidence Based Practice For Palliative Care1157 Words   |  5 PagesEvidence-based practice (EBP) in hospice care indicates use of palliative care in collaboration with hospice care. Palliative care goes hand in hand with hospice care, because palliative care is concentrated on providing relief from the pain and symptoms of serious illnesses. The goals of palliative care are to improve quality of life for both the patient and the family. Therefore, principals that are used in the palliative care can be directly related to the hospice care. The 76th World HealthRead MoreThe Studies Done By Tucker Et Al1030 Words   |  5 PagesThis could explain why some of the nursing staff felt that the study was introduced as a punitive measure. Tucker et al. also identified that providing a clear purpose for the research study may have led to a successful implementation since that staff questioned the process. Harrington, et al. (2013) identified that staff ownership of research makes practice change more effective, but their study was limited by the staffing mix. Prior to the study they did team nursing where a senior nurse was pairedRead MoreNursing As A Organizational Profile1221 Words   |  5 Pagesfrom American studies to Theology. The nursing degree program is the largest program currently offering two levels of nursing degrees the bachelor’s degree and the Doctorate of Nursing Practice. The Masters level is currently on hold due to lack of applicants and a Registered nurse to a bachelor’s program is in development (College Atlas, 2014). Mission, Vision, and Values The vision of the school of nursing is to provide high-quality, innovative nursing education and serve as a change agent inRead MoreThe Impact Of Innovation On Nursing Education Essay1413 Words   |  6 PagesThe impact of innovation in nursing education is essential in order to provide competent nurses during the nursing shortage. Upon review of Craven Community College’s curriculum (CCC), it was noted that peer mentoring could be utilized in order to decrease anxiety and increase confidence in nursing students. Peer mentoring has been defined as a planned relationship between a more experienced person and a less experienced person with the purpose of achieving identified outcomes. In a peer-mentoringRead MoreThe Scope And Standards For Informatics1739 Words   |  7 PagesIn order to practice as a nurse informatics or NI specialist, one must know and understand the standard to which he or she is held. The purpose and function of scopes and standards of practice for nursi ng informatics is to provide an overview of the specialty, assist future specialists understand their scope of practice, and practice at a competent level to guide and support nursing care. The scopes and standards of practice further provides an insight into the foundation of clinical decision makingRead MoreGracy Final Application Of Concept Analysis To Clinical Practice1264 Words   |  6 Pages Application of Concept Analysis to Clinical Practice Gracy Zachariah Grand Canyon University: NUR-502 May 27, 2015 Application of Concept Analysis to Clinical Practice Concepts are terms for phenomena that can happen in nature or in thought. Concept analysis should have a purpose. A concept may be comparatively a summary and created with an aim. Walker and Avant’s (2011) concept analysis outline is used to measure the job satisfaction of nursing in a hospital based setting. Job satisfactionRead MoreMentorship Relationships in Nursing907 Words   |  4 Pagesinnovative approaches to practice. The implications not only apply to quality of care of patients, but also to the development of future leaders. We will need to rely on the resources and talents we have within our organization in order to foster quality care and employee engagement. Mentoring in nursing can help support these objectives. This paper will review my contribution and advocacy related to taking a stand to promote our nursing future. Advocacy The development of nursing skills is dependant

Blake Essay Example For Students

Blake Essay PoetryVerily I say unto you, Whoseover shall not receive the kingdom of God as alittle child shall in no wise enter therein. The words arethose of Jesus, who was neither unaware of reality, nor indifferent tosuffering. The childlike innocence referred to above is a state of purity andnot of ignorance. Such is the vision of Blake in his childlike Songs ofInnocence. It would be foolish to suppose that the author of ^ÑHolyThursday^Ã’ and ^ÑThe Chimney Sweeper^Ã’ in Songs of Innocencewas insensible to the contemporary social conditions of orphans or young sweeps,and that therefore the poems of the same names in Songs of Experience aresomehow apologies or retractions of an earlier misapprehension. For the languageand style of Songs of Innocence are so consistently naà ¯ve compared toSongs of Experience, that it is clear that the earlier poems are a deliberateattempt to capture the state of grace described in the Biblical quotation above a celebration of the triumph of innocence in a world of experience. Often thewords of the poem are spoken by a child. It would be impossible to imagine amodern child using language such as: Gave thee such a tender voice, Making allthe vales rejoice. and it is most unlikely that children spoke thus even inBlake^Ã’s day. Yet this is the language of children^Ã’s hymns. I waspersonally acquainted with all the words in ^ÑThe Lamb^Ã’, throughSunday School hymns, long before reaching school age. By using the vocabulary ofthe hymnals, Blake emphasises for us the connection of which the child isinstinctively aware: I, a child, and thou a lamb, We are called by his name. Thesyntax and tone, however, have the authentic simplicity of children^Ã’sspeech. The first verse is a series of questions addressed to the lamb. Thesecond stanza begins with the child^Ã’s triumph at being able to answerthose questions: Little Lamb, I^Ã’ll tell thee. Typically the questions areasked purely for the satisfaction it gives the child in answering. There is agreat deal of repetition in all the songs: in ^ÑThe Lamb^Ã’ thistakes the form of a refrain repeated at the beginning and the end of eachstanza, once more reminiscent of children^Ã’s hymns. In contrast, ^ÑTheTyger^Ã’ has an incantatory rhythm, far more like a pagan chant than achildish hymn. And the vocabulary is no longer within the understanding of achild: What immortal hand or eye Could frame thy fearful symmetry? This songalso asks questions. But in the world of experience, unlike the world ofinnocence, there are no longer any reassuring answers. The world of Innocence isa world of confident answers; in Experience the answers remain. Indeed, thequestions themselves become more threatening. The slightly incredulous questionabove alters subtly during the progress of the poem until the word ^ÑCould^Ã’is finally replaced by the far more menacing ^ÑDare^Ã’. There is nosuch progression in Songs of Innocence. Each song captures the ^Ñmoment ineach day that Satan cannot find^Ã’ [Milton, II, Pl. 35, 1.42]. Blake^Ã’sinnocence does not develop: it exists. If we compare Songs of Innocence withSongs of Experience we see that this pattern is constantly repeated. The momentthat the concept of Experience is introduced the simplicity of the languagedisappears. As affirmation gives way to doubt, the unquestioning faith ofinnocence becomes the intellectual argument of experience. In ^ÑInfantJoy^Ã’ the baby is free even of the bonds of a name. In ^ÑCradleSong^Ã’ it is the mother who speaks, not with the simplicity of ^ÑInfantJoy^Ã’ yet with a naivete emphasised by the repetition of key alliterativewords sweet/sleep/smile with their connotations of joy. .uba7914bb5a0fa59a766ed8cbbe0542d2 , .uba7914bb5a0fa59a766ed8cbbe0542d2 .postImageUrl , .uba7914bb5a0fa59a766ed8cbbe0542d2 .centered-text-area { min-height: 80px; position: relative; } .uba7914bb5a0fa59a766ed8cbbe0542d2 , .uba7914bb5a0fa59a766ed8cbbe0542d2:hover , .uba7914bb5a0fa59a766ed8cbbe0542d2:visited , .uba7914bb5a0fa59a766ed8cbbe0542d2:active { border:0!important; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .clearfix:after { content: ""; display: table; clear: both; } .uba7914bb5a0fa59a766ed8cbbe0542d2 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uba7914bb5a0fa59a766ed8cbbe0542d2:active , .uba7914bb5a0fa59a766ed8cbbe0542d2:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .centered-text-area { width: 100%; position: relative ; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uba7914bb5a0fa59a766ed8cbbe0542d2:hover .ctaButton { background-color: #34495E!important; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uba7914bb5a0fa59a766ed8cbbe0542d2 .uba7914bb5a0fa59a766ed8cbbe0542d2-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uba7914bb5a0fa59a766ed8cbbe0542d2:after { content: ""; display: block; clear: both; } READ: Anorexia Essay Introduction In Songs ofInnocence moans are ^Ñsweet^Ã’ and ^Ñdovelike^Ã’ whereas in Songs of Experience the babies cry in ^Ñfear^Ã’[London}. In Songs of Innocence the narrative is as simple as the direct speech.The verbs are straightforward and unambiguous; God ^Ñappeared^Ã’ , He^Ñkissed^Ã’ the child, ^Ñled^Ã’ him to his mother. Andalthough the bleaker side of life is portrayed poverty and discrimination forexample the overall vision is positive. 1. Blake believed that withoutcontraries there could be no progression. In Songs of Experience we see Blake ^Ñwalkingnaked^Ã’, to use Yeats^Ã’ phrase, as he shouts angrily against socialevils and religious manacles and hypocrisy. Songs of Innocence are far morecarefully controlled, for all their apparent artlessness. In Songs of InnocenceBlake^Ã’s voice never falters: the language is consistently naà ¯ve,and when images of a less childlike nature do intrude they are always absorbedinto the security that is innocence. Innocence is a state of faith that mustpreclude doubt. Blake^Ã’s language is naà ¯ve and unambiguous. It isdeliberately adopted to suit the subject and discarded later in the propheticbooks. He may have considered experience as a necessary part of life, but Blakeremained, supremely, a poet of Innocence.

Tuesday, April 21, 2020

To Build A Fire Essays (683 words) - To Build A Fire, He-Man

To Build A Fire Affects of a naturalistic world ?To Build a Fire? Everyone at some point in time, tries to accomplish feats that are almost near impossible. Warnings from others, more experienced with some of life's pitfalls, go unheeded to those subject to grandiosity. London's ?To Build a Fire? illustrates that man is insignificant in the face of nature, and that if man sets himself up against nature he will ultimately be defeated. London's ?To Build a Fire? is a story of a man whose life comes to an end when he ventures into the Yukon trail with only a dog for his companion. Ignoring the warnings of the day along with the warnings of the old timer, the man proceeds on the journey of making camp by six o'clock. It is the setting of the story that reveals how week man is against nature. The man's pride as well as his attitude toward nature will be affected and influenced eventually by forces of nature. As the reader is first introduced to the man, he has the attitude that he knows everything he needs to know about nature and how to survive the weather. ?The tremendous cold and the absence of the sun had no effect on the man?(910). ?He was alert in the things of life, but only in the things, and not the significance?(910). These two quotes suggest that the man was aware of the day but due to his ignorance he did not realize the mistake of making that journey. The man's ego makes him take the journey alone without notice of external things of nature that would influence him later. The affects of naturalism are exhibited when he stops for lunch and forgets to start a fire as soon as he sits down. This is the first sign that the cold is beginning to affect him. Instead of being cautious or frightened, the narrator explains that, ?He chuckled at his foolishness?(913). At this point he still does not realize the significance of being properly prepared both physically and mentally. However the surrounding setting is starting to influence his reaction to how cold it really is. He starts realizing that his hands were going numb, and that he felt a stinging sensation when his feet made contact with the ground. This influence is not strong enough to make the man change his attitude that he is stronger than nature. The man's ignorance leads to his fall in the next part of the story when he lights the fire and becomes overconfident in himself. This becomes obvious to the reader when the man thought to himself, ?here he was; he had a accident; he was alone; and he had saved himself?(915). This new found confidence is soon extinguished when the fire goes out. ?It was his own fault or, rather, his mistake?(916). At this point it is very clear that nature is getting the best of him. The reader is told that, ?The man was shocked. It was as though he had just heard his own sentence of death?(916). ?If he only had a trail mate he would have been in no danger now?(916). After realizing the danger of his surroundings his thought process changed drastically, and no he was not influencing nature but was influenced by nature itself. From the evidence of what the man sees as a mild day, he jumps to the conclusion that the day won't bring any harm to him. He believes that he is significant in this huge world, but in reality he finds out that he was like a grain of sand along the beaches of the West Coast. No matter how hard he tried, nature always had the upper hand. The story shows that is one thing to know about the power of natural world, but another to understand the significance of its power. It exemplifies that no one man can overcome the overwhelming power of nature and shows that their will always be conflicts of man vs. nature and ignorance vs. intelligence. . English Essays

Monday, March 16, 2020

Annotated Bibliography on Technology

Annotated Bibliography on Technology Annotated Bibliography on Database Forensics: Data base forensic has various aspects including its process, weaknesses and disadvantages. This research paper aims at explaining the process of data base forensic, its related weaknesses and disadvantages. This is to certify whether the use of database forensics tools will keep the confidentially of the data or not. In the first instance, data base forensic has a unique process in which it is carried out. This shows that data base process has to be enacted so that facts are investigated and established. Rogers, M. (2003). The role of criminal profiling in the computer forensics process. New York. The author of this source document tries to disclose to people that there is a significant role in criminal profiling in computer forensic process. This role is most useful in computer forensic process where information of criminals is stored. He clearly and precisely impacts that knowledge into every reader of his work to make the role understood by many individuals. From the source document, we get to know that criminal profiling involves getting all the required data from criminals for proper investigations and establishment of factual information in criminal and civil courts. Criminal profiling serves a critical purpose since it keeps all information of criminals making it easy to track them even if they escape. Criminal profiling also serves to indicate that certain individuals are criminals. It includes the crime and felony committed by the criminal at hand. This source is useful in to those individuals entrusted with criminology duties. It makes them aware that criminal profiling is necessary for proper management of criminals. It also serves to show that full data and information of criminals should be taken for effective investigation and establishment of factual information concerning criminals. Werrett, J, D. (2000). The National DNA Database. Birmingham: UK. Database forensic puts into action many ways to get criminals. The data base forensic process used may involve many ways of getting the criminals. One of the methods enacted is the DNA testing operation. For the last two years, the Forensic Science Service has established and put into operation a National DNA Database. This operation is meant get criminals who escape after committing their felonies. The data base forensic process involved testing DNA samples of suspected individuals of various crimes. Also, samples were analyzed from stains from gotten from scenes of crime. This shows that the stains were to be analyzed to get the criminal who committed the offense. DNA samples of suspected individuals were tested to prove whether or not they committed the crime they are being suspected of committing. This source will be useful to those individuals who may be suspecting criminals for committing certain crimes. This is because their DNA samples can be analyzed to prove guilty or innocent of the suspected felonies. Gill, P, Curran, J, Elliot, K. (2005). A graphical simulation model of the entire DNA process associated with the analysis of short tandem repeat loci. USA. Database forensic process that deals with DNA analysis provides complete information to DNA and its related tests to arrest criminals. The author of this journal article shows us that there is a prevalent increase in the use of expert system in interpretation of short tandem DNA profiles. It has been proved that this way of getting data from criminal is cumbersome and time-consuming hence invention of the graphical model. This is reference to the Low Copy Number (LCN) applications. The graphical model is used to simulate stochastic variations related to DNA process. From the model, DNA process starts with extraction of sample followed by the preparation of a PCR reaction mixture. This shows that database forensic is becoming complex but faster in DNA process to get information regarding to criminals. This source will, therefore, be useful to those intellectual individuals dealing with criminal investigations. This source document clearly provides a complex but faster way of DNA process to get information from criminals. Willuweit, S. (2007). Y chromosome haplotype reference database (YHRD): Update. Berlin: Germany. This source document shows that Y chromosome haplotype reference database (YHRD): Update is an application of database forensic process. The update is designed for forensic analysts in their work since it is meant to store the Y chromosome haplotypes from global population. This update is mainly useful to those individuals who are interested in family and historic genetics. Since genetics is the scientific study of passage of genetic materials form parents to their offsprings, forensic analysts get to know genetic characteristics of various families. This knowledge can be used to trap criminals since their family genetic characteristics are known. Forensic analysts understand families with law breakers hence they fall suspects of crimes which happen within their reach. This source document will be useful since it gives people a clear knowledge about the Y chromosome haplotype reference database (YHRD) update. It also makes people know that family genetics can be useful in tracking criminals. Rowlingson, R. A Ten Step Process for Forensic Readiness. University of Aston: Birmingham. This research paper gives a ten step process which an individual should undergo to be for database forensic process. The ten processes outlined in the source document are as follows; define business scenario that require digital evidence, identify available resources and different types of evidence, determine the evidence collection requirement, and establish a capability for securely gathering legally admissible evidence to meet the requirement and establish a policy for secure storage and handling of potential evidence. Other steps include ensuring that monitoring and auditing is targeted to detect and deter major incidents, specifying circumstances when escalation to a full formal investigation is required, training staff, presenting an evidence-based case describing the incident and its impact, and ensuring legal review to facilitate action in response to the incident. The source document is useful since it gives researchers the ten step process for data base forensic readiness. This serves to prepare and make it known to individuals joining CID that they have to be prepared to be ready for data base forensic process. Bandelt, H, J, Lahermo, P, Richards, M V. Macaulay, V. (2001). Detecting errors in mtDNA data by phylogenetic analysis. UK. The author of this source document claims that some errors may occur on a forensic mtDNA data base. This error may result in wrong establishment of facts concerning criminals. This error may also lead to passing out wrong judgment to suspected criminals. This implies that innocent suspected criminals may be declared guilty while guilty suspected criminals may be declared innocent. This shows that the error has great effect on the judgment passed on criminals. This source document comes up with a way in which the error on a forensic mtDNA data base can be detected to avoid confusion. This source document will be useful since it gives a way in which the mtDNA error can be detected to avoid confusion and wrong judgment in criminal and civil courts. Researchers and readers can clearly understand the error and the way of detecting it. There are some weaknesses related to database forensic and its related tools. These weaknesses serve to draw back the efforts put in place, by the use of data base forensic, to investigate or establish facts in courts. The weaknesses bring about limitations to the use of forensic data base in investigating and establishing facts in courts. Lee, S, Kim, H, Lee, Lim, J. (2005). Digital evidence collection process in integrity and memory information gathering. Korea University Seoul. South Korea. The author of this source document brings out a weakness that is linked to data base forensic. The weakness is related to the EnCase that was used globally. Its weakness is that modifications can be made on MDC value of digital evidence. This shows that the MDC value is not standard hence can be adjusted resulting to resulting to errors. This led to the proposal of another counter measure. The counter measure proposed was the MDC public system, public authentication system with PKI and MAC system. This source document is useful since it brings out the weakness of the MDC value and its counter measure proposal. Leigland, R W. Krings, W. (2004). A Formalization of Digital Forensics. France. This source document brings out one of the weakness in data base forensic. The weakness limits investigation and some other ways of finding evidence against criminals. The weakness stated in this source document is the unclear use and bounds of digital evidence in legal proceedings. This means that the current techniques, of digital cameras, may not rigorous enough to be used in the courtroom. This limits evidence that is presented against criminals if recorded by digital devices such as digital cameras. This source is helpful since it makes clear the weaknesses of data base forensic. Digital evidence may not be allowed during legal proceedings in courtrooms. Harris, R. (2006). Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Purdue University: USA. According to this source document, there are some anti-forensics problems that act as draw backs to data base forensic. Such problems are some of the weaknesses of data base forensic in investigating and establishing facts concerning criminals. This source is helpful since it shows that anti-forensic problems act as weaknesses of data base forensic. Newsham, T, Palmer, C, Stamos, A Burns, J. (2007). Breaking Forensics Software: Weaknesses in Critical Evidence Collection. San Francisco: USA. According to this source, forensic software break down is a common problem. Such breakdown brings about problems in collection of information to be used as evidence. This results in weakness in critical evidence collection. Casey, E. (2003). Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Knowledge Solutions LLC: USA. The author of this source document mainly focuses on weakness brought about in data base forensic by tools of data base forensic. Since the tools used are not100% effective, they are prone to errors. These errors make data base forensic a defective way of investigating and establishing facts about criminals in criminal and civil courts. This source is, therefore, useful as it informs researchers of the weakness brought in data base forensic b y defective tools used. Thompson, E. (2005). MD5 collisions and the impact on computer forensics. West Lindon: United States of America. Thompson concentrates his writing on the weakness of data base forensic caused by MD5 collisions. These MD5 collisions have an impact on data base forensic since it brings about weaknesses in the MD5 hash algorithm. This leads to the general weakness of data base forensic as a process of investigating and establishing facts on criminals in courts. This source document is useful as it grants researchers and readers the chance to discover that MD5 collisions results in weakness of the data base forensic. Inclusively, there are some disadvantages that come about due to the use of database forensic tools. Nagesh, A. (2006). Distributed Network Forensics using JADE Mobile Agent Framework. Arizona State University: USA. Nagesh says that some disadvantages of data base forensic are brought about by architectures in data base forensic. This is because the architectures create network congestion near the forensics. This leads to unavailability of network in such places. Data base forensic tools and devices which use network cannot operate properly in such places due to lack of network. This interferes with collection of data and information to be used as evidence. This source is helpful since it makes researchers and readers be aware of the disadvantage caused by data base forensic architectures. Haggerty, J, Jones, D, L Taylor, M. (2008). Forweb: file fingerprinting for automated network forensics investigations. Liverpool John Moores University: UK. This source admits that there are many disadvantages connected to data base forensic. This is because some ways of data base forensic make use of approaches that use computationally exhaustive statistical measures. Some of these measures are complex in nature posing a problem in proper establishment and investigation of information to be used as evidence. The source is useful since it clearly shows that file printing for automated network forensic investigations may be intensive hence a predicament in data and information collection. Navarro, P, J, Nickless, B Winkle, L. (1995). Combining Cisco Net Flow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. The author of this source document suggests that some of the disadvantages of data base forensic are caused by the tools used. This means that any defective tool used in data base forensic process results in one or more problems. According to her, data can be lost if the back-end SQL data base is unavailable. This implies that the lack of the back-end SQL data base results to data loss. This source is useful since it equips it readers that data will be lost if the back-end SQL data base is unavailable. Singhal, A Jajodia, S. (2006). Data warehousing and data mining techniques for intrusion detection systems. Gaithersburg: USA. The disadvantage of data base forensic explained in this source document bases on data mining and data warehousing techniques. These techniques improve performance of Usability of Intrusion Detection System (IDS). The problem comes with the current IDS since they do not provide support for historical data summarization and analysis. This means that data collected is not supported hence does not have assurance of being true or false. This source document is useful in its full content of the problem caused by the current Usability of Intrusion Detection Systems. Garfinkel, S, L. (2010). Digital forensics research: The next 10 years. Monterey: USA. The golden age of computer forensic is quickly coming to an end. This calls for careful handling of data base forensic tools. SQL, for example, requires a standardized careful planning for its handling. This means that some of data base tools are delicate and vulnerable hence requires careful handling. Careless handling of such tools may result in their damage hence loss. This source document is useful since it precisely explains the idea careful planning for data base forensic tools such as the SQL data base.

Friday, February 28, 2020

STRATEGIC ANALYSIS case assignment Example | Topics and Well Written Essays - 250 words

STRATEGIC ANALYSIS case - Assignment Example Convenient locations are likely to be visited by clients, which means an increase in earned revenue. The first alternative for Colin is the inclusion of cut polishing service. The competing companies have the cut polishing services, which is an additional service to make it convenient for affluent consumers. The alternative would cost a 25% percent increase in pricing, $1,500 insurance coverage and $250 for a rotary buffer (Finnbogason 7). It might lead to the loss of consumers who value pricing and increase in affluent car owners who value the look of the car. The cost of the risk might emanate from destroying the finish of a car and training all workers to perform the same task with precision. Mobile detailing services would mean a 30% increase in pricing and increase convenience. Additional costs are $10,000 for the truck and other equipment. It would also mean additional logistical challenges. Golf Course partnership option would cost $150 for the sign only. It would also mean 10% increase in price. An increase in convenience would attract more consumers and the people who visit the golf course might not mind the increase in pricing. They are likely affluent car owners. Logistical challenges and system set up are manageable