Sunday, January 26, 2020

Computer Crimes And Hacking

Computer Crimes And Hacking As the Internet growth, it creates convenience for human and benefit for the market. However, there are some hidden negative effects behind, the computer crime. The following table showing numbers of computer crimes in Hong Kong. The computer crimes are in a increasing shape. In this study, we will look into different kinds of computer crimes. And provide some prevention for different crimes. Description E-auction fraud The E-auction fraud is a kind of crime that happened in E-auction. There are different kinds of E-auction fraud. The most common type is stealing fake products. There is news about the e-auction fraud in Hong Kong in January, 2010. A 19-year-old youth was arrested in suspected of e-auction fraud of HK$100,000, and it involved more than 20 cases of e-auction fraud. In the case, the youth post some information of foreign fashion clothing and accessories on the e-auction site, and asked the buyer to deposit the money to the designated bank account first, and claimed that the goods will be sent after payment. But the delivery didnt happen, and the buyer had lost his money. (Sing Tao Ltd., 2010) 2.1.1 Prevention and Solution Check the e-auction websites about the protection policies. Learn the selling history of the seller before placing a bid. If cant find anything out about the seller, than avoid doing business with them. Never ever give out the personal information to others, like the credit card number, or bank account information until have thoroughly checked out the seller and the escrow service. Always save the history of the transaction information. 2.1.2 Legal and Ethical issues As for the e-auction fraud, there is not a specific law for every kinds of e-auction fraud. But selling fake products, cheating money and stealing buyer personal for criminal use, then it will be against the laws in Hong Kong. In the case sample, the teenager opposes the morality. He tried to make money in an illegal way. Its immoral, because the youth is too greedy. He tried to earn fast money without paying effort on it. And he lost integrity to the one who trust him and buy his products. 2.2 Spamming According to the Yip, Tse Tang (2010), spamming is the act of sending unsolicited electronic messages in bulk, whether for commercial or non-commercial purpose. Sending unsolicited messages does not confine to emails. It happens with postal junk mails and junk fax. Spam by emails is the most often seen form of spamming on the Internet. Emails are delivered with contents or messages for commercial advertising. Because of the little cost on sending email emails in massive scale, Non-commercial junk emails are also found. There is news about spamming, this time not on E-mail; its on the cell phone. IT companies has set up websites and send SMS to the cell phone users. Its selling point is free registration, but there is a hidden charge for each SMS. When the users register the account, it means the company can send the SMS to the registered users and receive charges. And the company sends 80 messages to a user within 1 hour; each message cost HK$5, the user being charged more than ten thousand dollars a month. (à ¦Ã‚ Ã‚ ±Ãƒ ¦- ¹Ãƒ ¦- ¥Ãƒ ¥Ã‚  Ã‚ ±, 2010) 2.2.1 Prevention and Solution The following solution and prevention are based on the E-mail spamming: Check the privacy policy of websites or companies before providing any personal information when filling in some web registration forms, online surveys, etc. Check the terms and conditions of the email service more carefully, especially their privacy policy when subscribing to free email account services, when filling in the account profile. Open different email accounts for different purposes, like Gmail for school work, Hotmail for office work, etc. Simply delete emails from unknown senders because reply or click on the link in the email means the sender is confirming that the email address is a valid one. Ask the ISPs for any anti-spam solution or install email filters to make a black list for reducing the amount of spam emails. 2.2.2 Legal and Ethical issue In Hong Kong, there doesnt does have any specific anti-spam legislation. But there are detailed guidelines on spam prevention found in a Code of Practice issued by the Hong Kong ISP Association (HKISPA) in 2000. The HKISPA asks its ISP members, to include terms in their Internet access agreement that require the subscriber to not engage in sending spam messages. But it isnt a law. For the company, they send out junk mail is because they want to promote their companys products or services. Bu they dont understand that this will cause problem to the one who received the junk mail. For who receive the mails need to waste time on deleting the mails. Digital Forgery Digital signatures help organizations sustain signer authenticity, accountability, data integrity and non-repudiation of electronic documents and forms. According to Will (2002), Counterfeit website security certificates can be generated and used make sites appear secure when they are not, says a US computer programmer. The trick could tempt surfers into handing over personal information, such as credit card details. The forgery technique relies on the way Microsofts Internet Explorer handles the security certificates that verify the identity of a web site, says Mike Benham. These certificates are used to establish an encrypted connection to a web site so that private information can then be safely handed over. 2.3.1Prevention and Solution Provide different kinds of security certificates, like the digital signature and digital watermark. Also, all data for issuance encrypted into a metafile. Moreover, prevent entering any personal information on the Internet. And try not to download any unknown certificates and access to any unknown websites. 2.3.2 Legal and Ethical issues Counterfeit a website security certificate is not illegal, but using the fake certificate and try to collect others personal data may against the laws in Hong Kong. And there is no laws for just counterfeit the website security certificates. Its immoral for collect the personal data from others without their permission. And propose to counterfeit the website security certificates and replace the original one is also immoral. The malicious intent of doing is not acceptable. Identity theft The identity theft usually cause by hackers. The hackers stole others personal information, like the credit card numbers, and for criminal uses. Manhattan prosecutors announced that they uncovered a large multinational group of credit card and identity theft. The defendants were charged with enterprise corruption, theft, money laundering, fraud, and other offenses. The crime syndicates used a multinational Internet company to carry out criminal activities from 2001 to 2007. They smuggling credit card numbers and others identity information for selling and earning profit. (à ©Ã‚  Ã‚ ­Ãƒ ¦Ã‚ ¢Ã‚ Ãƒ ¦- ¥Ãƒ ¥Ã‚  Ã‚ ±, 2009) The identity theft is usually caused by hacker. 2.4.1 Prevention and Solution First of all, handle the account and password carefully. Then encrypt data when transmitting personal information on the Internet. Moreover, dont reply or click any links embedded in unexpected e-mails. Last but not least, dont submit personal data on the Internet that may be irrelevant to the purposes of collection, such as credit card number. 2.4.2 Legal and Ethical issues In Hong Kong, there is Personal Data (Privacy) Ordinance to protect the use of personal information. But posting others basic information on the Internet, like name, age, e-mail address or personal website is not a crime. Only stealing without permission for criminal use is illegal. The one who steal other personal information and use others information is immoral. They should respect others privacy. But they dont respect it or may be lack of this kind of knowledge. So they may violate others privacy. They are malicious intent. Hactivism Hactivism is a conference that holds by hackers. And they shared the latest hack technologies on the conference. In 2002, there were about 2000 hackers from different countries gathered in New York. They held a big hactivism. At the conference, hackers want to hold information guerilla warfare due to the dissatisfaction of network security for more than 20 countries. And develop out a new software tool as a declaration of war. Then, the U.S. network security institutions and other large companies worried about the software. Because the new software is likely to become the tool for criminals or even terrorists for stealing trading secrets, and transferring terror information. (à ¥Ã…’-à ¤Ã‚ ºÃ‚ ¬Ãƒ ©Ã‚ Ã¢â‚¬â„¢Ãƒ ¥Ã‚ ¹Ã‚ ´Ãƒ ¥Ã‚  Ã‚ ±, 2002) 2.5.1 Prevention and Solution The large companies should be aware of the latest information about the hactivism, because they will announce any latest bug that they find. And the companies should try to keep update their software to fix the bug of their software. For the normal computer users, they should keep updating their software and system to protect from being hacked. 2.5.2 Legal and Ethical issues Holding the conference actually is not illegal. And hacking the software is not illegal too. But publish those hacked software and cause any criminals to other then will be illegal. And hacking to other system is also illegal. The reasons why they hold the conference is due to challenge. They want to compete with other hackers and try to become the first to find out the bugs or problem of the software. Discussion on Hacking According to George (2008), Apple wanted to hire a iPhone hacker to the company. The company wants to improve the security of the OS system. People may argue that why they hire a hacker to hack their system. But in my view, I think hacking is beneficial to the companys products or services. The reason why Im saying this because hacking can draw the companys attention to their released products or services. Hacker will try to find out the bug from the system security and then attack the system. For the Apple case, people may jail break the iPhone and get the root management of the iPhone. Apple then want to hire the hacker to hack their system for improvement. So when the company found that their systems are being hacked. Then they will notice that their products are not perfect. So, they will try to keep update the system to avoid being hacked again. The company profit may be affected if their products can be easily hacked due to the comparison of the similar products from other comp anies. So the companies may keep improving their products and provide the best services to their customers. Thats why Im saying hacking is beneficial. 3.1 Action to reduce hacking activities There are some suggestions from the H.K. Government to reduce hacking activities. The suggestions are as follow: Install the anti-virus software and personal firewall software on the computer devices. Keep updating the anti-virus software, because the outdated software can be easily hacked or affected by the new virus. Try not to install any unauthorized software on the computer. Turn off all JavaScript or ActiveX support in the web browser before visiting a un familiar websites. Apply the latest security updates and patches to the software. Disconnect from the Internet when not in use. Because connected to the Internet all the time has a high risk of infection, and has a greater probability of being hacked. Conclusion Computer and Internet have brought us convenience to our daily. People should get well use of them. And try to avoid commit any computer crime. The computer users should aware of the latest news of computer crimes and protect their personal information. The Social and Schools should pay more attention on the computer crimes. And promote the proper way to use network resources.

Saturday, January 18, 2020

Business Report Essay

Business opportunities in NSW are impacted by internal and external factors. Internal and external factors influence the business opportunities as they determine the success and failure of opportunities in the business environment. External influences are factors which mainly influence the environment outside the business and therefore they determine what the management staff inside the business must do to adjust with the changes in the external environment. External influences include factors such as; economic, financial, geographic, social, legal, political, institutional, technological, competitive situation and markets. Internal influences are factors affecting the business from within i. e. internally. Internal influences include factors such as; product, location, management, resource management and business culture. The following business report is commissioned to examine the influence of external and internal factors of business opportunities in NSW. The economic influence includes factors which relate to changes in the wider economy i. e. booms and recessions in the economy. The benefit of a growing economy allows opportunities for a business to increase profit, so businesses are able to experience rising living standards. ‘Booms’ and ‘upswings’ benefit business opportunities as they are periods where the economy is going through a positive phase where businesses have the opportunity to increase their positive total revenue. Consequently, this will lead to a rise in employment, consumer spending and wages. On the other hand, â€Å"Busts’ and ‘downswings’ are periods where businesses are impacted negatively. An example of a business which suffered from the negative factors of the economic cycle was Harvey Norman. Sydney Morning Herald (SMH) reported Harvey Norman experienced a ‘downswing’ period as profits decreased from $128. 95 million to $81. 9 million and total sales had a decline of 7. 3% due to lack of consumer spending. Financial influences involve ‘deregulation’ which is the removal of government regulations from the industry in hope of improving competition. The improvement of competition allows businesses the opportunity to improve efficiency and productivity of their employers and aim to achieve their required goal. Woolworths and Coles have recently removed regulations relating to supplier payments in order to lower costs and open up opportunities to expand their business and increase profit. Geographical influences such as location will determine the growth and development of a specific business. Geographical influences impact business opportunities as it provides challenges to increase profits, sales and expansion of business. An example of expansion of business is IKEA who have expanded their business to Melbourne, Australia because of economic growth in the Australian economy. Due to dramatic increase in consumer spending, IKEA’s profit increased rapidly and therefore they were able to purchase an 80, 000 metre square warehouse. Geographical influence impacts on business opportunities as it increases employment, sales and expansion of business as seen by the actions of IKEA. Social influences provide opportunities for businesses to change or develop to meet consumer demands. Social influences such as changes in consumer tastes and preferences significantly impacts on business productivity and opportunities. Failure for a business to satisfy consumer’s wants can be detrimental to a business and therefore can lead to a decrease in profits and sales or even cessation if they fail to meet consumer demands. An example of social influence on a business is the impact of the style of clothing of AussieBum. AussieBum manufactures and sells their products via the internet and are successful as their material and style of the underwear and beach clothing is famous among society. The business is successful as the material they produce is unique. Additionally, the location of the manufacturing is based in Australia further satisfying the taste and preferences on Australian consumers. Social influences for this business includes its consumers demanding Australian manufacturers to maintain uniqueness and reflect the Australian image; and consumers demanding products to be purchased over the internet. In this case, AussieBum successfully responds to social influences by having the correct production process of manufacturing their commodities and satisfying consumer demand and preferences. Legal influences impacts on business opportunities as it sets out regulations and laws that impacts business operations. Legal influences sets out guidelines that prevents businesses from discriminating or financial rorting. Additionally, legal influences such as laws and contracts can impact businesses as they are forced to buy from specific and this affects their total revenue. An example of legal influence on a business is the investigation of Coles. A recent article published by Sydney Morning Herald states that Coles is undergoing an investigation on discrimination between suppliers based on their private label brands. This breaches statutes which include anti – discrimination laws. Legal investigation is costly and affects consumer buying and spending at this business. Hence, it is crucial for businesses to abide by legislations to take advantage of the opportunities and maintain consumer satisfaction. Political influences impact businesses as government policies can lead to business uncertainty or business confidence. Political influences impact businesses as they implement policies which can change the structure of businesses. An example of political influences on a business is the impact the carbon tax has on BHP Billiton, a company in the mining industry. The carbon tax affects the company as BHP Billiton is now in charge of paying taxes which affect the company’s total revenue as there is an increase in costs. The carbon tax affects business opportunities in BHP Billiton as they are unable to hire new efficient and productive employees due to increase in their costs. Business opportunities in NSW can also be affected by taxation that can increase business costs and therefore restrict the businesses ability to expand or increase their profit or sales. Additionally, the exchange rate can affect the volume of import and exports from global markets hence impact of the price of products. Institutional influences refer to three bodies (Federal, State, and Local) which all have factors which impact business opportunities in NSW. The regulations of institutional influences are the safety and protection of employers in the business, the compulsory minimum wage, payment of taxes, approving new development and simple business codes of conduct and abiding by the legal business laws. These factors impact business opportunities as businesses must abide by these regulations in order to continue running and the breaching of the regulations can result in penalties which may affect the business financially. A recent investigation involving Coles breaching these regulations as they demanded additional payments from their suppliers led to a decrease in profits and loss of other suppliers. These factors affected Coles as their supply of specific products is decreasing yet they have such high demand but in result aren’t able to satisfy consumers wants. Business opportunities are impacted by the institutional influences as businesses are forced to run in a certain way as it can affect their financial status as well as their reputation if they fail to do so. Technology is improving at a rapid pace and allowing businesses to produce more efficiently. Technological influences impact vehicle manufacturing businesses such as Holden. Holden’s vehicles are produced rapidly because of innovative technology. The new Holden Barina features Apple’s Siri voice command providing more features and improving the product. Additionally, technological influence can impact businesses negatively. For example, technological advancements often replace employees and this decreases the opportunity of hiring new employment contributing to unemployment. Nonetheless, technological influences provide opportunities for businesses to produce products more efficiently and in turn increase their total revenue. Competition is advantageous to both consumers and businesses as it provides opportunities for improvement and demand for consumer satisfaction. A competitive situation often influences businesses to lower prices of its products to gain consumer satisfaction. For example, Woolworths and Coles promote lower prices to compete with one another. This provides consumers with wider range of choice and preferences. More so, they promote consumer points for purchasing goods and services at their store to remain competitive. Also, Jetstar has a policy which states they will provide a 10% discount on their service if their competitive airlines (i. e. Virgin Australia and Tiger Airways) offer a cheaper price for their service.In recent times financial/capital, labour and consumers have significantly changed. Financial/capital markets have seen international financial/capital flows become more flexible and easily accessible due to globalisation. Therefore, markets are more integrated. ASX is an example of these changes as the business has now made it more easily accessible for consumers to purchase and sell shares globally over the internet. Financial/capital markets influence business opportunities as businesses in NSW are linked globally are able to communicate and operate more efficiently. However, negative economic influence can impact on domestic markets in NSW which can impede on business operations.

Friday, January 10, 2020

The Quintessential Manual to Research Paper Writing Service

The Quintessential Manual to Research Paper Writing Service The Pain of Research Paper Writing Service The price per page for your term paper is going to be reflected based on the deadline and the degree of urgency. Don't be afraid to click the order if you will need just the ideal research paper. All you have to do is make your purchase! The ordering process on the website is so straightforward you will discover that it's familiar and simple to use from the very first moment. The One Thing to Do for Research Paper Writing Service Don't hesitate to select any topic you enjoy and produce a well-organized student essay or a research paper in line with the guidelines presented above. As you probably know, the hardest part is only to start the paper. The primary aim of example research papers is to assist students learn to develop their own assignment and to comprehend how a paper is structured. Employing an outline template can assist the student organize the paper and elimin ate the ideas that aren't pertinent to the function of the essay. The Lost Secret of Research Paper Writing Service Our clients are always pleased with the premium quality of essays they get from ProfEssayService.com. In reality, our writing company has been research top excellent research papers what students all over the world for several years. The entire procedure of writing a research paper can take substantial time as there are many things to think about. You may narrate about that, but not argue and earn research to supply appropriate evidence to show your point. If You Read Nothing Else Today, Read This Report on Research Paper Writing Service In case you're not able to do the research paper because of any reason, you can trust ProfEssays to write for you in accordance to your requirements. There are lots of financial benefits directly connected to the creation and sale of tobacco in many sections of the planet. Don't wait for one more study to come out to figure ou t whether you're making the perfect choices for your loved ones. The very first and the most significant truth is that e-cigarettes, though they are not as harmful than the standard tobacco cigarettes still can harm health. Getting the Best Research Paper Writing Service Obviously, when you try to turn in an ordinary paper done in the middle of the night in a couple of hours, then it's a bit of cake, naturally. In order to receive revisions, you want to get in contact with your respective paper writer within two weeks following your paper is delivered. Next tips will reveal to you just how to fulfill the goal of research paper introduction and eradicate the creative mess. When many students don't have an opportunity to order a paper or wish to create it on their own, using online samples might be good way out. Editing and Proofreading in case you have written a research paper all on your own, you might still gain from the expertise of the greatest editors and proofreaders. In addition, it lets the writer know if further research should be run on this issue. Therefore, if you require professional essay writer fill the information regarding your paper requirements above and we'll finish up for you! Because academic fashions of writing are referred to creative writing also. How to Get Started with Research Paper Writing Service? A reaction paper is a sort of written assignment, which necessitates personal opinion and conclusions on a particular article or abstract. Now you've got a notion of the way to compose a research question, and you're prepared to venture out all on your own. When you've completed all that, you're going to be prepared to get started considering making your research question. After reading the thesis, there ought to be no doubt precisely what the research will be about. The Research Paper Writing Service Stories Some of the greatest research paper introduction samples consist of primary resources supporting the argument or r esearch of the issue. A research paper involves surveying a field of knowledge to be able to get the best possible info in that area. On top of that, you're confident your personal data will be held in strictest confidence. Accordingly, the overall research could be balanced, the venture configuration may be updated, new strategies may be formulated, and new information may be gathered. You may even avail additional research paper services to make sure you get a good product. If you're on our service for the very very first time, you probably want to understand why we are the best research paper writing service available on the market. Very best Price Guarantee You will certainly become premium service at the very best price in comparison to other service providers online. Now, you're able to personally observe the sorts of services put for sale and pick the suitable writer. If you choose to receive a research paper from our site, you're going to receive a wide collection o f advantages. Finding an internet company which may write quality and affordable papers is a far superior option. Digital And Paper Maps To start off, you may wish to put money into some type of directional aid to prevent getting lost during your travels. If there is just a single research that could make your CV look solutions, it's a cover letter. Writing a reaction paper can be a really challenging undertaking, so many students use examples to find out more about its structure and key capabilities. The ability of the study has to be increased by obtaining a bigger sample size. APA format is a favorite among students because of its simple guidelines and approach. Research Paper Writing Service - the Story Experienced writing from WiseEssays are prepared to talk about their wisdom, wisdom and research findings with students. It is a helpful skill to get, but it is not mandatory for all professions. It is their passion and they are always ready to provide you the best Res earch writing help. Explain how you want to start conducting your research. An individual must observe that such strategy isn't quite accurate. Don't neglect the value of logic and harmony, as you're struggling with your literary assignment. The experiment will test if a person could keep giving electric shocks to a different individual simply because they are told to achieve that. Qualitative research is a powerful method to comprehend and learn more about the meaning ascribed to a specific issue.

Thursday, January 2, 2020

Why Are Noble Gases Called Noble

Why are the noble gases called noble? The ability to avoid reacting when provoked—to turn up ones nose and ignore lesser human foibles—is largely considered a noble trait in humans.   What amounts to a constant pursuit for humans just comes naturally to noble gases. Noble gases, most often found as monatomic gases, have completely filled outer electron shells, so have no inclination to react with other elements, thus very rarely forming compounds with other elements. However, just as a nobleman can be pushed into losing his dignity, getting a noble gas to react is possible. With a great enough energy supply, the outer electrons of a noble gas can be ionized, and once the gas is ionized, it can accept electrons from other elements. Even under these conditions, noble gases do not form many compounds. Only a few hundred are known to exist. Examples include xenon hexafluoride (XeF6) and argon fluorohydride (HArF). Fun Fact The term noble gas comes from the translation of the German word  Edelgas. Noble gases have had their own special name since as early as 1898.   More About the Noble Gas Elements The noble gases make up the last column of elements in the periodic table. They are commonly called Group 18, the inert gases, the rare gases, the helium family, or the neon family. The group consists of 7 elements: helium, neon, argon, krypton, xenon, and radon. These elements are gases at ordinary room temperature and pressure. Noble gases are characterized by: low reactivitylow boiling pointmelting and boiling point close to each other (liquid over a narrow range)very low electronegativityhigh ionization energyusually colorless and odorlessgases under ordinary conditions The lack of reactivity makes these elements useful for many applications. They can be used to shield reactive chemicals from oxygen. They are ionized for use in lamps and lasers. A comparable set of elements are the noble metals, which display low reactivity (for metals).