Monday, December 30, 2019

National Conflict and Dispute Essay - 1560 Words

Introduction Disputes and conflicts are mostly caused by race, gender, culture, language, ideologies and religion. These factors are inter-related for it shows the differences of people in every way that causes arguments, debates and misunderstanding either internationally or locally. Numerous times of debates and advocacy between who is dominant and who is subordinate has been a great input in the making of our history which until now, is still being added. Disputes and conflicts in this era is just repeating history therefore, history speaks for itself. Since the study of anthropology is studying humanity either cultural, past societies, physical or language; it studies how and why the society has been formed the way it is now.†¦show more content†¦The physical violence was not only in New York and Washington, the physical changes—violent ones—have been made to the brains of all Americans (Lakoff, 2004). The period is remarkably first, because of the ext raordinary degree to which the nations of the region and America lacked perspective on the cultural basis for each other’s political motivations and strategies in the international arena; and second, for the degree to which each side was able to use vilification of the other as a political stratagem for domestic political purposes (Beeman, 2008). The differences between the two regions went beyond simple misunderstanding and conflict of interests, it was more on cultural and communicational. Both regions have constructed an image that would â€Å"demonize† the other, so vivid that even the simplest person can understand. Middle Eastern opposition to the West is far from being a phenomenon invented by Iran, Iraq, Obama bin Laden, the Taliban, or the Palestinians (Beeman, 2008). The horrifying event that happened on September 11 is not solely a result of the crisis before the attack but because of misunderstanding between the two regions way back 150 years. Middle Eas t nations believed that the meddling of United States in their political affairs only confirms the century-old assertion of the West is to rob the nation’s prerogatives and patrimony. In the midst ofShow MoreRelatedSino Soviet Relations1016 Words   |  5 Pagesas they were both pursuing different methods of achieving communism, and during many occasions they disagreed with each other. However the most significant factor causing the split was their conflicting national interests, as although without the existing personal rivalries and ideological disputes the split would not have happened, they emphasised the sheer differences between both sides. Due to these interests, there was a deterioration in Sino-Soviet relations and from then on they could neverRead MoreTraditional and Non-Traditional Litigation1006 Words   |  4 Pagesday to resolve disputes are the traditional and nontraditional judicial dispute resolution systems. Generally, the traditional system tends to be mo re rigid than the nontraditional system, with a very specific sequence of litigation steps to follow to arrive at the resolution of the dispute. In either case, the traditional or nontraditional litigation systems can work towards the resolution of specific types of conflict; both are necessary tools for resolving a variety of dispute types in the worldRead MoreStrategic Location And Energy Reserves1177 Words   |  5 Pagesâ€Å"We will continue to rely on diplomacy and dialogue to peacefully resolve difference and disputes. We will do so in accordance with and in adherence to the norms, customs, and principles of international law (Cheng, 2016). Disputes in the SCS have been a long-standing issues amongst claimants such as Malaysia, Brunei, Philippines, Vietnam, Taiwan, Indonesia, and Republic of China. Apart from territorial disputes, the SCS holds a critical geostrategic importance due to its strategic location and energyRead MoreMalaysia s Approach On Resolving The South Chin a Sea1212 Words   |  5 Pagesthe South China Sea (SCS) Disputes CDR Mohamad Hasli bin Abu Hassan RMN Defense Language Institute English Language Center During his keynote address at the opening of the 30th Asia-Pacific roundtable, the Malaysian Prime Minister said, â€Å"We will continue to rely on diplomacy and dialogue to peacefully resolve difference and disputes. We will do so in accordance with and in adherence to the norms, customs, and principles of international law (Cheng, 2016). Disputes in the SCS have been a long-standingRead MoreDifferent Levels Of Development Within The Middle East Multilateral Working Group On Water991 Words   |  4 Pagesunresolved non-water related issues with one s neighbours, both water-related and otherwise, is also an exacerbating factor in water conflicts. Israel, Syria, and Turkey, each and respectively have difficult political issues outstanding, which makes discussions on the Jordan and Euphrates more intricate. Relative development can inform the nature of water disputes in a number of ways. For example, a more-developed region may have better options to alternative sources of water, or to different waterRead MoreRegional State Failure With Weak Institutions1362 Words   |  6 PagesThe purpose of this essay is to present an argument for the notion that state failure around countries with weak institutions can be a regional phenomenon to a large extent. The spread of conflict across borders has sometimes destabilised entire regions, as conflict can often be contagious especially amongst states with weak governmental institutions. In this essay, I will illustrate regional state failure using the case studies of the countries in the Horn of Africa, The great Lakes region of AfricaRead MoreConflict Resolution and the Australian Contract Law1526 Words   |  6 PagesConflict Resolution and Australian Contract Law Introduction: Australian contract law is based on Common Law as originated from the British tradition. However, as noted by Australian Government (2012), said law is currently under review and subject to evolution in the near future. This will be some relevance to the discussion hereafter, which considers the implications of a contract between the parties of JG (the represented) and ITMS (the representation) and further consider the implicationsRead MoreMediation and Human Services Lobbyist1385 Words   |  6 Pagesorg/This website allows people in the direct area of Maine to obtain mediation services for free or at a low cost. These trained mediators that will meet in a convenient location and help with disputes between employers/employee, parents/teen, neighbors and several other involved people struggling with conflict. http://www.cmds.org.uk/this website helps mediate for people in Europe. They are accredited by the Civil Mediation Council. Because CMDS is run by educated professionals in me dical and legalRead MoreMediation, Conciliation and Arbitration in Conflict Management1405 Words   |  6 PagesCONCILIATION AND ARBITRATION IN CONFLICT MANAGEMENT Outline a. Introduction b. Definitions of conflict c. Conflict management d. Negotiation, Mediation, Conciliation and Arbitration as in Conflict Management e. Recommendation f. Summary/Conclusion Introduction Conflict is a natural phenomenon in every human societal living. It exits whenever people or groups disagree over which goals or values to pursue and the method and timing to be adopted in that regard. Since conflict is inevitable, it must be properlyRead MoreHistory Of Adr And Conflict Management Essay1462 Words   |  6 Pagesfollowing review of the literature discusses the history of ADR and conflict management. Additionally, this section discusses the four principal ADR processes Mediation, Arbitration, Negotiation and Conciliation as part of the conflict resolution mechanisms. The theoretical framework and guiding theories were explored. Finally, this chapter analyses the legislative framework in both at National and International arena. 2.1.1 Alternative Dispute Resolution ADR is a generic term that refers to a wide array

Sunday, December 22, 2019

Organizational Culture And Its Impact On Employees ...

Introduction Leaders are facing unprecedented challenges in today’s global organizations to prove themselves in employees’ perception of being ethical leaders. Some conducts, which might be considered right in one organizational culture might be considered wrong in another. Normative appropriate conduct varies with societal and organizational culture (Yidong Xinxin, 2013). Perception of leaders being ethical affects employees’ performance and innovative work behavior (Yidong Xinxin, 2013). Global leaders should possess traits such as honesty, altruism, high moral values, transparency, integrity, and fairness to be respected by the followers as a role model (Cowart, Gilley, Avery, Barber, Gilley, 2014; Yidong Xinxin, 2013). Leaders perceived to have internal value compass to guide them through the complex and ambiguous ethical dilemma times (Murty, 2014; Yidong Xinxin, 2013).There are many religious and spiritual scriptures such as the Bible, the Bhagavad Gita, Dharma Sastra, or the Sutras of Patanjali, which form the ethical values of a human being (Yidong Xinxin, 2013). Ethical leaders look for the greater good and are selflessly working to serve others. Ethical leaders are aware of their responsibilities and concern about society and environment (Weng, 2014). Ethical leaders possess charisma to influence their followers. Transformational leadership model postulated that charismatic leaders have morality and ethical conduct as their core values (Weng, 2014).Show MoreRelatedAdvanced Hr Solutions, Inc.. Each Organization Has Its1482 Words   |  6 Pagesstructure and culture of the environment, and it is vital to select employees who will flourish in the environment (Argosy University Online, 2016). I/O psychologists aid in developing and managing an organizational culture and structure that defends the business strategy and core competencies. The strategic vision of Advanced HR Solutions, Inc. is to respect and encourage employees’ abilities and bring out the best in their employees and clients while promoting a culture of high performance, innovationRead MoreOrganizational Culture And Human Behavior1323 Words   |  6 Pagesin managing projects (Murthy, 2014). A major factor of a project’s success is the behavior of the employees. Employee behavior is influenced by organizational cultu re and leadership. This paper will briefly explore the influence organizational culture and human behavior have on the success of projects, in particular projects plagued with conflict. First, this paper will discuss the influences organizational culture has on the success of projects. Secondly, the role project leadership plays in theRead MoreTaking a Look at Organizational Culture1362 Words   |  5 PagesOrganizational culture is a belief that employees share values, beliefs, or perceptions regarding an organization, or a hierarchical society (Tsai, 2011). This is depicted as the qualities, convictions, or observations held by workers inside an association or by an authoritative unit. Since organizations reflect the qualities, convictions and behavioral standards that are utilized by workers, the circumstances that they experience can impact the mentality and conduct of the staff. One perspectiveRead MoreVisual And Verbal Components Of An Organization Essay1624 Words   |  7 PagesIntroduction Culture is something like behavioral rules which are unwritten and unspoken that is produced when group of people comes at a place to work together. Culture is created by the attitude, the values, beliefs and important assumptions as well as performance and activities shared by a group of people. Organizational culture is made up of every sort of experiences that all employee brings to the work place. Organization culture is particularly introduced by the organization s founder, executivesRead MoreProcedural Justice And Job Satisfaction Of Nursing Employees1523 Words   |  7 Pages outcome. According to the write-up, â€Å"procedural justice and job satisfaction of nursing employees are positively and significantly related to their innovative behavior† (Xerri, 2014, p.4), and â€Å"interactional justice directly affects job satisfaction and indirectly affects innovative behavior through job satisfaction† (Xerri, 2014, p.4). In other words, an organization that engages in practical apprehensions reaps perfected job satisfaction, which in turn has a bearing on workplace attitudes. ToRead MoreThe Omnipotent View of Management1331 Words   |  6 Pagesexternal forces outside the manager’ control. The view of managers as omnipotent is consistent with the stereotypical picture of the take-charge executive who can overcome any obstacle in carrying out the organization’s objectives. The  symbolic view  organizational results as being influenced by factors outside the control of managers: economy, customers, governmental policies, competitors’ actions, the state of the particular industry, the control of proprietary technology, and decisions made by the previousRead MoreComponents of Transformational Leadership Theory Essay909 Words   |  4 Pagesorganization to a higher morality (Burns, 1978). Morality was defined as leaders and followers working together to fulfill organizational goals and achieve higher performances within a context of change and innovation. Leaders would surpass their own self-interest, in order to, foresee, foster, and indoctrinate a new organizational vision to their followers. Bass operationalized Burns’ seminal work into a leadership model to better indentify transformational leadership characteristics. The model emphasized fourRead MoreTransformational Leadership Style For Producing Positive Changes And Strengthening Organizations982 Words   |  4 PagesThese leaders are passionate, energetic, and focused on helping every member of the group succeed. The four dimensions of transformational leadership garner trust, respect, and admiration from followers in the organization. Organizational commitment results from employees being satisfied and devoted to the vision of the company. Another important trait of a transformational leader is emotional intelligence. It is necessary in relationship building and managing emotions in situations. RecognizingRead MoreThe Manager: Omnipotent or Symbolic865 Words   |  4 Pagesorganization’s culture and the environment in which the organization exists. However, these parameters don’t totally constrain a manager; managers can and do influence their culture and environment. The Organization’s Culture âÅ"“ Describe the seven dimensions of organizational culture. âÅ"“ Discuss the impact of a strong culture on organizations and managers. âÅ"“ Explain the source of an organization’s culture. âÅ"“ Describe how culture is transmitted to employees. âÅ"“ Describe how culture affectsRead MoreControl Mechanism1416 Words   |  6 Pagesthe positive corporate culture. This culture attracts dynamic people to the organization who are encouraged to be innovative and grow as leaders while supporting and promoting the mission of the airline. This culture was established through effective planning, organizing and leadership. To maintain this culture and the success of the airline, the function of controlling is critical. Systems must be in place to monitor performance and outcomes to ensure that organizational goals are being met. When

Saturday, December 14, 2019

Industrious, Meticulous Hardworker Free Essays

Hardware : Cisco router 7200, 2651, switches 3550, APC UPS System, 4006 HP Server ? Tools : Tacacs, Secute CRT, Wireshark ? Protocols : TCP/IP, OSPE, RIP,FTP and TFTP ? Database : SQL and MySQL ? Certification : OCP(Oracle Certified Professional) 1. ( Operating System: Windows 9x /XP,Dos 1. Languages: C, C++, Java, Visual Basic 1. We will write a custom essay sample on Industrious, Meticulous Hardworker or any similar topic only for you Order Now Database : MS Access, Oracle 9i 1. Web Tools: HTML EXPERIENCEDell (Technical Support Associate): Mar 2008 – Feb 2009: Technical support services offered to different clients of Dell, based in USA, for various Dell Hardware, Software and Internet based issues. Developed good understanding of pre implantation and post implementation issues for need to maintain uniform standard procedures for purchase and compatibility of software Vs hardware. Handled issues regarding resourcing for components and their impact on project time over run.Understood need for development of vendor base and building up of redundancy factors for new technologies. IBM (Sr. Technical Support Representative): Jun 2009 – Jul 2010: Provided IT support to IBM’s client Carphone Warehouse, UK and it’s partners. Joined as an entry level service desk agent, and moved on to the role of a 2nd Line agent during the course of my tenure, based on my performance. 2nd Line agents role, mainly dealt with providing solutions for issues, which were otherwise complex for service desk to resolve.This role involved handling calls, and web based tickets from branches of Carphone warehouse, spread across Europe and Germany. Performed mentoring tasks, and up-skilling new joiners in the organization. Queue monitoring activities undertaken to have a watch on metrics like AHT according to the client specified SLAs. Generating reports based on the metrics, required by managers, to analyze trends and emerging patterns, which would help reduce future redundancies. Providing quality feedbacks and advice to peers, thus enabling them to communicate effectively with customers. How to cite Industrious, Meticulous Hardworker, Papers

Friday, December 6, 2019

Information Management System a Case of Online Security

Quesiton: Identify the common ways hackers use to gain access to systems and analyse and evaluate the methods and systems that are being used to block the attacks and defend the systems? Answer: Introduction Internet provides a wide source of information to the users thereby making the world available at their doorsteps. In the present scenario internet has become a source for online transactions, online shopping, web chatting, web promotions etc. However, (_) pointed that these services of internet are subject to various new dangers. Security and caution are the two major factors related with the internet services. Easttom (2012) commented that computer hacking is becoming an alarming issue for the all users. Computer hacking is considered illegal in the eye of law and the parties involved in the same are subject to imprisonment of penalties. The hackers with the help of the loopholes within the computer systems hack or lock personal files of the user, gain access to the bank accounts of the users and misuse the information for their own benefit. Hacking has given rise to things like spyware, scar ware and ransom ware. The essay will here try to evaluate the common ways through which ha cking is made possible and further the essay will make a critical evaluation of the methods that are used by the organizations to prevent hacking. Discussion on online hacking Common ways of hacking The hackers have devised various ways of intruding into the computer programs of the users. Major social media companies like LinkedIn, Google, and Yahoo had been victims of hacking. In the following segment, some of the most common methods are discussed. Social engineering The hackers use the psychological manipulation technique in order to gain access to the personal information of the user. In this method, the hackers or the cyber spies intrude into the network of the victim by sending the victim an email along with an attachment or a link to a website. Leavitt (2011) opined that as soon as the user clicks on the link or attachments with the help of Trojan horse programs, the hacker gains access to the computer system without the knowledge of the user. The hacker can then successfully configure the system of the user and introduce various computer viruses like Malware that opens up a communication channel to the hacker that allows them to browse as well as control the system of the user.(Refer to appendix 1) An alarming instance of the case of social engineering hacking was seen when Chinese hackers hacked the personal Gmail accounts of US officials and human activists. The smart use of the social engineering technique was found in this case. The emails sent to the US officials were customized according to the user so that the user would open the link giving the hackers an opportunity to introduce the Malware. For instance, the email links of Draft US-China Joint Statement were sent to the officials (Sanger et al. 2013). Denial of service attacks Another common attack strategy of the hackers are usage of the Denial of service (DOS). This is an attempt which makes the system totally unavailable to the users. The DoS attack interrupts or suspends the services of the host connected to the internet. However, Barrett (2011) commented that if the user of the system is able to identify the early symptoms of the DoS attack then the user may be able to avoid the same. Some of the symptoms concern unusual slow network performance, unavailability of certain websites, inability to access certain websites, increase in the number of spam mails, denial of internet connection etc. The DoS attacks either crash the system of the user or flood the system. The DoS attacks particularly targeted for government concerns and financial sectors cripples the whole working system making huge losses for organizations and personnel. The attack on the China Internet Network Information Centre on 25 August 2013 reduced the traffic levels by 32%. The organization is responsible for the conversion of readable domain names into numeric addresses that support the internet. The DoS attack on the internet system was reported to be the largest DoS attack thereby destabilizing the access of the China officials and organizations to webs, mails and other internet services (The Economist, 2013) Packet sniffing This technique involves capturing, decoding, inspecting and interpreting of the information within a network packet on a TCP or IP network. This method used majorly to gain access to the user Ids, passwords, credit card numbers and network details. Collective and Shaw (2012) suggested that this type of attack is the most threatening attack since the hackers can conceal their identify and this attack gives access to the personal and bank information which may result in huge financial loss of the victim. The range of information access is vast in case of packet sniffing hence majority of the hackers indulges in the sniffing process since the risk of identification is low (Coleman, 2010). In this context, the hackers use sniffer software and engage in the process either through the internal systems, or through the wireless systems or through external sniffing systems. The hacker sniffing in the packet will be able to access all the websites if the victim, the send mails of the victim, t he downloads and the streaming events like audio, video and internet telephones. Holt et al. (2012) commented that various employers within an organisation also use the packet sniffing as tracking devise to track the activities of the employees while they are doing work from home. The hackers use the HTTP sessions in order to sniff into the user Id and password of the victims. Although Secure Socket layers (SSL) are being incorporated nowadays in order to secure the sessions; however, there are a large number of private sessions that use less secure encryptions. (Refer to appendix 3) Third party hackings This is a rare method used in cases of target hackings. The hackers in some cases may intrude upon the websites of a third party related with the actual victim and gain personal access of the third party in order to access the information of the actual victims. These types of attacks are generally seen in cases of company hackings. If the hacker has targeted a company for hacking, then the hacker will search for the employees of that company in social websites like LinkedIn to gain personal information access. The hacker will then infiltrate into the website and mail account of the third party and steal the employee credentials. The attack becomes easier for the hacker because majority of the employees use same username and password for both personal and professional mail accounts. Thus by obtaining the personal employee credentials the hacker will be able to gain access to the company information. Panko (2010) suggested that the hackers would use the third party website as an agent of controlling the access to the victims website. Apart from the above mentioned ways, hacking attacks are also implemented though web downloads, USB drive insertion and wifi compromises. In cases of open wireless networks, it becomes easier for the hackers to invade the system without any protection and firewalls. These hacking attacks are majorly common in cases of retail outlets where the transactions are done through an open system. The hackers can easily get access to the card information of the users. Commonly in some cases, it is seen that the USB or other external devices inserted within the systems may have been affected with virus thereby affecting the users system with the same. Kaufman, et al. (2002) suggested that by targeting a specific website the hackers would be able to infect a large group of users. By downloading from these websites will make the systems of the users vulnerable to the external attacks. This very common hacking method remains undetected and unprotected (Booms, 2010). Evaluation of the defense methods used to block hacking The growing rate of unethical hacking has made it indispensible for the software engineers to devise strategies for reducing the effect of hacking and protect personal information from external intruding (Bachmann, 2010). The Computer Misuse Act 1990, UK states that hacking is a criminal offense. Thus as per this law any unauthorized access to computer material, unauthorized access with intent to commit further crime and unauthorized modification are taken as criminal acts. The hackers are thus subjected to criminal offences under the Frauds Act, Forgery and counterfeiting act 1981, Theft Act 1968 and Criminal Damage Act 1971. Antivirus software The most common method of securing personal data infiltration is to secure the computers and phones with antivirus software. The software is designed with database of malware and hence the software installed within the computers compare the contents of the files with the database to detect the presence of the malware. The ant viruses are capable of detecting the malwares based on the signature detection, behavior detection, heuristic detection and data mining approach. Ludlow (2010) commented that the use of data mining techniques in detection of the malware is done by assessing the behavior of the file comparing them with a given set of file feature. However, Kleiman (2011) argued that uses of this software are subject to renewal costs. For instance, McAfee requires the user to unsubscribe and again create new subscription of the software 60days before the expiry of the software life. Moreover, the installation of the antivirus in Microsoft Windows may give rise to certain false ala rms that may make some of the applications in the system unusable creating problems for the user. Firewall systems Apart from Antivirus systems, the organizations are also using firewall systems as a source of network security. Harris et al. (2011) opined that firewalls are system that controls the incoming and outgoing network traffic based on internet rules. In case an incoming traffic is identified from a threatening external source, then the firewall can effectively build a wall to protect the internal network. The attacks from packet sniffers are protected with the help of firewalls and packet filters. The firewalls protect the computers by filtering the traffic based on attributes like IP address, source port, destination service and IP. Thus the companies depending upon the personal security needs makes necessary configurations within the firewall. Thus by marking the specific list of programs under the firewall system the organization can effectively secure the incoming of the websites. Attack and penetration tests Apart from these, the organizations also conduct attack and penetration tests, in order to indentify the vulnerable points within the network that the hackers can easily access. This review gives the organizations opportunity to remove personal information, makes changes in Id and passwords and uses systems that are more powerful in order to prevent the attacks (Jaishankar, 2011). The use of the proxy settings also enables the users to gain information about the IP address of hackers. This has helped the investigators to catch and imprison many inexperienced hackers. However the use of the proxy settings may create a vulnerable situation for the organization as well. The hackers may also intrude upon the personal settings through the proxy settings where there is no provision for firewall (Leavitt, 2011). Password protection The password hacking is an alarming issue for individuals as well as the organizations hence the individuals should firstly use long passwords of approximately 10 characters so that the cryptography becomes stronger. Moreover, rather than using a single word password, the individuals can use a combination of uppercase and lower case in order to frame a different password. The passwords should also be a combination of special characters and numbers along with the alphabets in order to reduce the scope of guess by the hackers. Cheswick et al. (2003) opined that for the prevention of network sniffing the organizations also use tools like Ant sniff that detects the mode of the network. The network traffic can also be protected by the use of encryptions like Secure Sockets layers or Transport Layer Security. Furthermore, to reduce the attacks through social engineering, Google has framed the policy of Spam mails. Majority of the social engineered mails are directly transmitted to the spam box of the user making them unreachable for the user. Moreover, Google provides security warnings to the users making them alert and vigilant about their data protection and instruct and instructing them to change the passwords frequently (Reddy et al. 2010). Conclusion The essay shows the vulnerability of the users in respect of internet services. With the advent of technologies, the companies have tried to devise strategies in order to protect their security systems; however, the hackers use the smallest loopholes within the system to track the networks and to gain access on the personal information of the user. With the huge progress in the field of hacking in terms of computer hacking, phone hacking, personal database hacking and external security exploits, the organizations as well as the individuals are falling under harassments and financial losses. The essay shows the major common methods used by the hackers. However, the essay also critically analyses the different prevention methods employed by the individuals and the organizations. With the help of vulnerability scanners, the organizations can check the network vulnerability from the viewpoint of the hackers. This is the basic step that all organizations should take in order to ensure tha t their data is protected. Thus from the easy it can be evaluated that the use of the antivirus is also essential for the individuals and the organizations to protect their systems from computer virus and computer worms. However the major step should be taken on part of the individuals by remaining alert and vigilant while using internet services and avoid sharing personal information with anyone over the internet in order to avoid prospects of social engineering. Reference list Bachmann, M. (2010). The risk propensity and rationality of computer hackers.The International Journal of Cyber Criminology,4(1-2), 643-656. Barrett, D. (2011). Hackers penetrate NASDAQ computers.The Wall Street Journal,5. Booms, T. E. (2010). Hacking into federal court: employee authorization under the computer fraud and abuse act.Vand. J. Ent. Tech. L.,13, 543. Cheswick, W. R., Bellovin, S. M., and Rubin, A. D. (2003).Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc.. Coleman, G. (2010). The hacker conference: A ritual condensation and celebration of a lifeworld.Anthropological Quarterly,83(1), 47-72. Collective, B. S. M., and Shaw, D. (2012, February). Makey Makey: improvising tangible and nature-based user interfaces. InProceedings of the sixth international conference on tangible, embedded and embodied interaction(pp. 367-370). ACM. Easttom, W. C. (2012).Computer security fundamentals. Pearson Education India. Harris, S., Ness, J., Eagle, C., Lenkey, G., Williams, T. (2011).Gray Hat Hacking: The Ethical Hacker's Handbook. McGraw-Hill. Holt, T. J., Strumsky, D., Smirnova, O., and Kilger, M. (2012). Examining the social networks of malware writers and hackers.International Journal of Cyber Criminology,6(1), 891-903. Jaishankar, K. (Ed.). (2011).Cyber criminology: exploring internet crimes and criminal behavior. CRC Press. Kleiman, D. (2011).The Official CHFI Study Guide (Exam 312-49): For Computer Hacking Forensic Investigator. Syngress. Kaufman, C., Perlman, R., and Speciner, M. (2002).Network security: private communication in a public world. Prentice Hall Press. Leavitt, N. (2011). Mobile security: finally a serious problem?.Computer,44(6), 11-14. Ludlow, P. (2010). Wikileaks and hacktivist culture.The Nation,4, 25-26. Panko, R. (2010).Corporate Computer and Network Security, 2/e. Pearson Education India. Reddy, S. V., Sai Ramani, K., Rijutha, K., Ali, S. M., and Reddy, C. P. (2010, June). Wireless hacking-a WiFi hack by cracking WEP. InEducation Technology and Computer (ICETC), 2010 2nd International Conference on(Vol. 1, pp. V1-189). IEEE. Sanger, D., Barboza, D., and Perlroth, N. (2013). Chinese Army Unit is seen as tied to Hacking against US.The New York Times,21. The Economist, (2013).The Economist explains. [online] Available at: https://www.economist.com/blogs/economist-explains/2013/08/economist-explains-16.) [Accessed 18 Mar. 2015].